You are on page 1of 690

Technical Reference Guide

v e r s i o n 2.8.3
AT283_TRG_E2

Technical Reference Guide


Forsk 2010 AT283_TRG_E2 3
Contact Information
Atoll 2.8.2 Technical Reference Guide Release AT283_TRG_E2
Copyright 1997 - 2010 by Forsk
The software described in this document is provided under a licence agreement. The software may only be used/copied
under the terms and conditions of the licence agreement. No part of this document may be copied, reproduced or
distributed in any form without prior authorisation from Forsk.
The product or brand names mentioned in this document are trademarks or registered trademarks of their respective
registering parties.
About the Technical Reference Guide
This document is targeted at readers with a prior knowledge of Atoll, its operation and basic functioning. It is not the User
Manual for Atoll, and does not teach how to operate and use Atoll. It is a supplementary document containing detailed
descriptions of models, algorithms and concepts adopted in Atoll. Therefore, it concerns only the appropriate personnel.
The Atoll Technical Reference Guide is divided into three parts with each part comprising similar topics. The first part
contains descriptions of general terms, entities, ideas and concepts in Atoll that are encountered throughout its use. It is
followed by the second part that consists of descriptions of entities common to all types of networks and the algorithms
that are technology independent and are available in any network type. Lastly, the guide provides detailed descriptions of
each basic type of network that can be modelled and studied in Atoll.
Forsk (Head Office) 7 rue des Briquetiers
31700 Blagnac
France

www.forsk.com
sales@forsk.com
support@forsk.com
+33 (0) 562 74 72 10
+33 (0) 562 74 72 25
+33 (0) 562 74 72 11
Web
Sales and pricing information
Technical support
General
Technical support
Fax
Forsk (USA Office) 200 South Wacker Drive
Suite 3100
Chicago, IL 60606
USA

sales_us@forsk.com
support_us@forsk.com
+1 312 674 4846
+1 888 GoAtoll (+1 888 462 8655)
+1 312 674 4847
Sales and pricing information
Technical support
General
Technical support
Fax
Forsk (China Office) Suite 302, 3/F, West Tower,
Jiadu Commercial Building,
No.66 Jianzhong Road,
Tianhe Hi-Tech Industrial Zone,
Guangzhou, 510665,
Peoples Republic of China

www.forsk.com.cn
enquiries@forsk.com.cn
+86 20 8553 8938
+86 20 8553 8285
Web
Information and enquiries
Telephone
Fax
Technical Reference Guide
4 AT283_TRG_E2 Forsk 2010
Table of Contents
Forsk 2010 AT283_TRG_E2 5
Table of Contents
1 Coordinate Systems and Units ....................................................... 23
1.1 Coordinate Systems............................................................................................................................... 23
1.1.1 Description of Coordinate Systems .................................................................................................. 23
1.1.1.1 Geographic Coordinate System.................................................................................................. 23
1.1.1.2 Datum......................................................................................................................................... 23
1.1.1.3 Meridian...................................................................................................................................... 23
1.1.1.4 Ellipsoid ...................................................................................................................................... 23
1.1.1.5 Projection.................................................................................................................................... 24
1.1.1.6 Projection Coordinate System.................................................................................................... 24
1.1.2 Coordinate Systems in Atoll ............................................................................................................. 24
1.1.2.1 Projection Coordinate System.................................................................................................... 24
1.1.2.2 Display Coordinate System........................................................................................................ 24
1.1.2.3 Internal Coordinate Systems ...................................................................................................... 24
1.1.3 File Formats ..................................................................................................................................... 25
1.1.3.1 Unit Codes.................................................................................................................................. 25
1.1.3.2 Datum Codes.............................................................................................................................. 26
1.1.3.3 Projection Method Codes ........................................................................................................... 27
1.1.3.4 Ellipsoid Codes........................................................................................................................... 27
1.1.3.5 Projection Parameter Indices...................................................................................................... 28
1.1.4 Creating a Coordinate System......................................................................................................... 28
1.2 Units....................................................................................................................................................... 28
1.2.1 Power Units ...................................................................................................................................... 28
1.2.2 Length Units ..................................................................................................................................... 29
1.3 BSIC Format .......................................................................................................................................... 29
2 Geographic and Radio Data ........................................................... 33
2.1 Geographic Data.................................................................................................................................... 33
2.1.1 Data Type......................................................................................................................................... 33
2.1.1.1 Digital Terrain Model (DTM) ....................................................................................................... 33
2.1.1.2 Clutter (Land Use) ...................................................................................................................... 34
2.1.1.2.1 Clutter Classes...................................................................................................................... 34
2.1.1.2.2 Clutter Heights ...................................................................................................................... 34
2.1.1.3 Traffic Data ................................................................................................................................. 34
2.1.1.3.1 User Profile Environment Based Traffic Maps ...................................................................... 34
2.1.1.3.2 User Profile Traffic Maps....................................................................................................... 34
2.1.1.3.3 Sector Traffic Maps............................................................................................................... 34
2.1.1.3.4 User Density Traffic Maps..................................................................................................... 35
2.1.1.4 Vector Data................................................................................................................................. 35
2.1.1.5 Scanned Images......................................................................................................................... 35
2.1.1.6 Population................................................................................................................................... 35
2.1.1.7 Other Geographic Data............................................................................................................... 35
2.1.2 Supported Geographic Data Formats .............................................................................................. 35
2.2 Radio Data............................................................................................................................................. 36
2.2.1 Site ................................................................................................................................................... 36
2.2.2 Antenna............................................................................................................................................ 36
2.2.3 Transmitter ....................................................................................................................................... 36
2.2.4 Repeater........................................................................................................................................... 36
2.2.5 Remote Antenna .............................................................................................................................. 37
2.2.6 Station .............................................................................................................................................. 37
2.2.7 Hexagonal Design............................................................................................................................ 37
2.2.8 GSM GPRS EGPRS Documents ..................................................................................................... 37
2.2.8.1 TRX............................................................................................................................................. 37
2.2.8.2 Subcell ........................................................................................................................................ 37
2.2.8.3 Cell Type..................................................................................................................................... 37
2.2.9 All CDMA, WiMAX, and LTE Documents ......................................................................................... 37
2.2.9.1 Cell.............................................................................................................................................. 37
Technical Reference Guide
6 AT283_TRG_E2 Forsk 2010
3 File Formats.....................................................................................41
3.1 BIL Format ..............................................................................................................................................41
3.1.1 HDR Header File...............................................................................................................................41
3.1.1.1 Description ..................................................................................................................................41
3.1.1.2 Samples ......................................................................................................................................42
3.1.1.2.1 Digital Terrain Model..............................................................................................................42
3.1.1.2.2 Clutter Classes File................................................................................................................42
3.1.1.2.3 BIL File...................................................................................................................................42
3.2 TIF Format start here..............................................................................................................................42
3.2.1 TFW Header File...............................................................................................................................43
3.2.2 Sample..............................................................................................................................................44
3.2.2.1 Clutter Classes File .....................................................................................................................44
3.3 BMP Format............................................................................................................................................44
3.3.1 BMP File Description.........................................................................................................................44
3.3.1.1 BMP File Structure ......................................................................................................................44
3.3.1.2 BMP Raster Data Encoding ........................................................................................................45
3.3.1.2.1 Raster Data Compression Descriptions.................................................................................46
3.3.2 BPW/BMW Header File Description..................................................................................................47
3.3.3 Sample..............................................................................................................................................47
3.3.3.1 Clutter Classes File .....................................................................................................................47
3.4 PNG Format............................................................................................................................................47
3.4.1 PGW Header File Description...........................................................................................................47
3.5 Generic Raster Header File (.wld) ..........................................................................................................47
3.5.1 WLD File Description ........................................................................................................................48
3.5.2 Sample..............................................................................................................................................48
3.5.2.1 Clutter Classes File .....................................................................................................................48
3.6 DXF Format ............................................................................................................................................48
3.7 SHP Format ............................................................................................................................................48
3.8 MIF Format .............................................................................................................................................48
3.9 TAB Format ............................................................................................................................................49
3.10 ECW Format ...........................................................................................................................................49
3.11 Erdas Imagine Format ............................................................................................................................50
3.12 Planet EV/Vertical Mapper Geographic Data Format .............................................................................50
3.13 ArcView Grid Format ..............................................................................................................................50
3.13.1 ArcView Grid File Description ...........................................................................................................50
3.13.2 Sample..............................................................................................................................................51
3.14 Other Supported Geographic Data File Formats....................................................................................51
3.15 Planet Format .........................................................................................................................................51
3.15.1 DTM File............................................................................................................................................51
3.15.1.1 Description ..................................................................................................................................51
3.15.1.2 Sample ........................................................................................................................................52
3.15.2 Clutter Class Files.............................................................................................................................52
3.15.2.1 Description ..................................................................................................................................52
3.15.2.2 Sample ........................................................................................................................................52
3.15.3 Vector Files .......................................................................................................................................53
3.15.3.1 Description ..................................................................................................................................53
3.15.3.2 Sample ........................................................................................................................................53
3.15.4 Image Files........................................................................................................................................53
3.15.5 Text Data Files..................................................................................................................................54
3.16 MNU Format ...........................................................................................................................................54
3.16.1 Description........................................................................................................................................54
3.16.2 Sample..............................................................................................................................................54
3.17 XML Table Export/Import Format ...........................................................................................................55
3.17.1 Index.xml File....................................................................................................................................55
3.17.2 XML File............................................................................................................................................55
3.18 Externalised Propagation Results Format ..............................................................................................57
3.18.1 DBF File............................................................................................................................................57
3.18.1.1 DBF File Format ..........................................................................................................................57
3.18.1.1.1 DBF Structure........................................................................................................................57
3.18.1.1.2 DBF Header (Variable Size - Depends on Field Count) ........................................................57
3.18.1.1.3 Each DBF Record (Fixed Length)..........................................................................................59
3.18.1.2 DBF File Content .........................................................................................................................59
3.18.2 LOS File............................................................................................................................................60
3.19 Externalised Tuning Files .......................................................................................................................60
3.19.1 DBF File............................................................................................................................................60
3.19.1.1 DBF File Format ..........................................................................................................................60
3.19.1.1.1 DBF Structure........................................................................................................................60
Table of Contents
Forsk 2010 AT283_TRG_E2 7
3.19.1.1.2 DBF Header (Variable Size - Depends on Field Count)........................................................ 60
3.19.1.1.3 Each DBF Record (Fixed Length) ......................................................................................... 62
3.19.1.2 DBF File Content ........................................................................................................................ 62
3.19.2 PTS File............................................................................................................................................ 62
3.20 Interference Histograms File Formats.................................................................................................... 63
3.20.1 One Histogram per Line (.im0) Format............................................................................................. 63
3.20.1.1 Sample........................................................................................................................................ 63
3.20.2 One Value per Line with Dictionary File (.clc) Format ...................................................................... 64
3.20.2.1 CLC File...................................................................................................................................... 64
3.20.2.1.1 Description............................................................................................................................ 64
3.20.2.1.2 Sample.................................................................................................................................. 65
3.20.2.2 DCT File...................................................................................................................................... 66
3.20.2.2.1 Description............................................................................................................................ 66
3.20.2.2.2 Sample.................................................................................................................................. 66
3.20.3 One Value per Line (Transmitter Name Repeated) (.im1) Format ................................................... 67
3.20.3.1 Sample........................................................................................................................................ 67
3.20.4 Only Co-Channel and Adjacent Values (.im2) Format ..................................................................... 68
3.20.4.1 Sample........................................................................................................................................ 68
3.21 Antenna Pattern Formats....................................................................................................................... 69
3.21.1 2D Antenna Diagram Format ........................................................................................................... 69
3.21.2 Import Format of Text Files Containing 3D Antenna Patterns.......................................................... 70
4 Calculations .................................................................................... 73
4.1 Overview................................................................................................................................................ 73
4.2 Path Loss Matrices................................................................................................................................. 74
4.2.1 Calculation Area Determination........................................................................................................ 75
4.2.1.1 Computation Zone ...................................................................................................................... 75
4.2.2 Calculate / Force Calculation Comparison....................................................................................... 75
4.2.2.1 Calculate..................................................................................................................................... 75
4.2.2.2 Force Calculation........................................................................................................................ 76
4.2.3 Matrix Validity ................................................................................................................................... 76
4.3 Path Loss Calculations........................................................................................................................... 77
4.3.1 Ground Altitude Determination......................................................................................................... 77
4.3.2 Clutter Determination ....................................................................................................................... 77
4.3.2.1 Clutter Class ............................................................................................................................... 78
4.3.2.2 Clutter Height.............................................................................................................................. 78
4.3.3 Geographic Profile Extraction........................................................................................................... 78
4.3.3.1 Extraction Methods..................................................................................................................... 78
4.3.3.1.1 Radial Extraction................................................................................................................... 78
4.3.3.1.2 Systematic Extraction ........................................................................................................... 79
4.3.3.2 Profile Resolution: Multi-Resolution Management...................................................................... 80
4.4 Coverage Predictions............................................................................................................................. 81
4.4.1 Use of Polygonal Zones in Coverage Prediction Reports ................................................................ 81
4.4.2 Filtering Coverage Prediction Exports.............................................................................................. 81
4.4.3 Smoothing Coverage Prediction Exports ......................................................................................... 81
4.4.3.1 Smoothing: Percentage Method ................................................................................................. 81
4.4.3.2 Smoothing: Number of points method ........................................................................................ 82
4.5 Propagation Models ............................................................................................................................... 84
4.5.1 Okumura-Hata and Cost-Hata Propagation Models......................................................................... 85
4.5.1.1 Hata Path Loss Formula............................................................................................................. 85
4.5.1.2 Corrections to the Hata Path Loss Formula................................................................................ 85
4.5.1.3 Calculations in Atoll .................................................................................................................... 85
4.5.2 ITU 529-3 Propagation Model .......................................................................................................... 86
4.5.2.1 ITU 529-3 Path Loss Formula..................................................................................................... 86
4.5.2.2 Corrections to the ITU 529-3 Path Loss Formula ....................................................................... 86
4.5.2.2.1 Environment Correction ........................................................................................................ 86
4.5.2.2.2 Area Size Correction............................................................................................................. 86
4.5.2.2.3 Distance Correction .............................................................................................................. 87
4.5.2.3 Calculations in Atoll .................................................................................................................... 87
4.5.3 Standard Propagation Model (SPM) ................................................................................................ 87
4.5.3.1 SPM Path Loss Formula............................................................................................................. 87
4.5.3.2 Calculations in Atoll .................................................................................................................... 88
4.5.3.2.1 Visibility and Distance Between Transmitter and Receiver................................................... 88
4.5.3.2.2 Effective Transmitter Antenna Height ................................................................................... 88
4.5.3.2.3 Effective Receiver Antenna Height ....................................................................................... 91
4.5.3.2.4 Correction for Hilly Regions in Case of LOS......................................................................... 91
4.5.3.2.5 Diffraction.............................................................................................................................. 92
4.5.3.2.6 Losses due to Clutter ............................................................................................................ 92
Technical Reference Guide
8 AT283_TRG_E2 Forsk 2010
4.5.3.2.7 Recommendations.................................................................................................................93
4.5.3.3 Automatic SPM Calibration .........................................................................................................93
4.5.3.3.1 General Algorithm..................................................................................................................94
4.5.3.3.2 Sample Values for SPM Path Loss Formula Parameters......................................................94
4.5.3.4 Unmasked Path Loss Calculation ...............................................................................................95
4.5.4 WLL Propagation Model....................................................................................................................96
4.5.4.1 WLL Path Loss Formula..............................................................................................................96
4.5.4.2 Calculations in Atoll .....................................................................................................................96
4.5.4.2.1 Free Space Loss....................................................................................................................96
4.5.4.2.2 Diffraction...............................................................................................................................96
4.5.5 ITU-R P.526-5 Propagation Model....................................................................................................96
4.5.5.1 ITU 526-5 Path Loss Formula .....................................................................................................96
4.5.5.2 Calculations in Atoll .....................................................................................................................97
4.5.5.2.1 Free Space Loss....................................................................................................................97
4.5.5.2.2 Diffraction...............................................................................................................................97
4.5.6 ITU-R P.370-7 Propagation Model....................................................................................................97
4.5.6.1 ITU 370-7 Path Loss Formula .....................................................................................................97
4.5.6.2 Calculations in Atoll .....................................................................................................................97
4.5.6.2.1 Free Space Loss....................................................................................................................97
4.5.6.2.2 Corrected Standard Loss.......................................................................................................97
4.5.7 Erceg-Greenstein (SUI) Propagation Model .....................................................................................98
4.5.7.1 SUI Terrain Types .......................................................................................................................99
4.5.7.2 Erceg-Greenstein (SUI) Path Loss Formula................................................................................99
4.5.7.3 Calculations in Atoll ...................................................................................................................100
4.5.8 ITU-R P.1546-2 Propagation Model................................................................................................100
4.5.8.1 Calculations in Atoll ...................................................................................................................101
4.5.8.1.1 Step 1: Determination of Graphs to be Used.......................................................................101
4.5.8.1.2 Step 2: Calculation of Maximum Field Strength...................................................................101
4.5.8.1.3 Step 3: Determination of Transmitter Antenna Height .........................................................101
4.5.8.1.4 Step 4: Interpolation/Extrapolation of Field Strength ...........................................................101
4.5.8.1.5 Step 5: Calculation of Correction Factors............................................................................103
4.5.8.1.6 Step 6: Calculation of Path Loss..........................................................................................104
4.5.9 Sakagami Extended Propagation Model.........................................................................................104
4.5.10 Appendices .....................................................................................................................................106
4.5.10.1 Free Space Loss .......................................................................................................................106
4.5.10.2 Diffraction Loss..........................................................................................................................106
4.5.10.2.1 Knife-Edge Diffraction..........................................................................................................106
4.5.10.2.2 3 Knife-Edge Deygout Method.............................................................................................107
4.5.10.2.3 Epstein-Peterson Method ....................................................................................................108
4.5.10.2.4 Deygout Method with Correction .........................................................................................108
4.5.10.2.5 Millington Method.................................................................................................................109
4.6 Path Loss Tuning..................................................................................................................................109
4.6.1 Transmitter Path Loss Tuning.........................................................................................................109
4.6.2 Repeater Path Loss Tuning ............................................................................................................110
4.7 Antenna Attenuation Calculation ..........................................................................................................111
4.7.1 Calculation of Azimuth and Tilt Angles............................................................................................111
4.7.2 Antenna Pattern 3-D Interpolation...................................................................................................112
4.7.3 Additional Electrical Downtilt Modelling...........................................................................................113
4.7.4 Antenna Pattern Smoothing............................................................................................................113
4.7.4.1 Smoothing Algorithm.................................................................................................................115
4.8 Shadowing Model .................................................................................................................................115
4.8.1 Shadowing Margin Calculation........................................................................................................119
4.8.1.1 Shadowing Margin Calculation in Predictions ...........................................................................120
4.8.1.2 Shadowing Margin Calculation in Monte-Carlo Simulations......................................................121
4.8.2 Macro-Diversity Gains Calculation..................................................................................................122
4.8.2.1 Uplink Macro-Diversity Gain Evaluation....................................................................................122
4.8.2.1.1 Shadowing Error PDF (n Signals)........................................................................................122
4.8.2.1.2 Uplink Macro-Diversity Gain ................................................................................................124
4.8.2.2 Downlink Macro-Diversity Gain Evaluation ...............................................................................124
4.8.2.2.1 Shadowing Error PDF (n Signals)........................................................................................124
4.8.2.2.2 Downlink Macro-Diversity Gain............................................................................................127
4.9 Appendices...........................................................................................................................................127
4.9.1 Transmitter Radio Equipment .........................................................................................................127
4.9.1.1 UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE Documents..............................................128
4.9.1.2 GSM Documents .......................................................................................................................129
4.9.2 Secondary Antennas.......................................................................................................................129
Table of Contents
Forsk 2010 AT283_TRG_E2 9
5 GSM GPRS EDGE Networks ....................................................... 133
5.1 Signal Level Calculations..................................................................................................................... 133
5.1.1 Point Analysis................................................................................................................................. 133
5.1.1.1 Profile Tab ................................................................................................................................ 133
5.1.1.2 Reception Tab .......................................................................................................................... 133
5.1.2 Signal Level-based Coverage Predictions ..................................................................................... 134
5.1.2.1 Service Area Determination...................................................................................................... 134
5.1.2.1.1 All Servers........................................................................................................................... 134
5.1.2.1.2 Best Signal Level and a Margin .......................................................................................... 134
5.1.2.1.3 Second Best Signal Level and a Margin ............................................................................. 134
5.1.2.1.4 Best Signal Level per HCS Layer and a Margin.................................................................. 135
5.1.2.1.5 Second Best Signal Level per HCS Layer and a Margin .................................................... 135
5.1.2.1.6 HCS Servers and a Margin ................................................................................................. 135
5.1.2.1.7 Highest Priority HCS Server and a Margin.......................................................................... 136
5.1.2.1.8 Best Idle Mode Reselection Criterion (C2).......................................................................... 136
5.1.2.2 Coverage Display ..................................................................................................................... 137
5.1.2.2.1 Coverage Resolution .......................................................................................................... 137
5.1.2.2.2 Display Types ..................................................................................................................... 137
5.2 Interference-based Calculations .......................................................................................................... 138
5.2.1 Carrier-to-Interference Ratio Calculation........................................................................................ 138
5.2.2 Point Analysis................................................................................................................................. 141
5.2.3 Interference-based Coverage Predictions...................................................................................... 141
5.2.3.1 Service Area Determination...................................................................................................... 141
5.2.3.2 Coverage Area Determination .................................................................................................. 141
5.2.3.2.1 Interference Condition Satisfied by At Least One TRX....................................................... 141
5.2.3.2.2 Interference Condition Satisfied by The Worst TRX ........................................................... 142
5.2.3.3 Coverage Display ..................................................................................................................... 142
5.2.3.3.1 Coverage Resolution .......................................................................................................... 142
5.2.3.3.2 Display Types ..................................................................................................................... 142
5.3 GPRS/EDGE Calculations ................................................................................................................... 142
5.3.1 Coding Scheme Selection and Throughput Calculation Without Ideal Link Adaptation................. 143
5.3.1.1 Calculations Based on C .......................................................................................................... 143
5.3.1.2 Calculations Based on C/I ........................................................................................................ 143
5.3.1.3 Calculations Based on C/(I+N) ................................................................................................. 144
5.3.2 Coding Scheme Selection and Throughput Calculation With Ideal Link Adaptation...................... 144
5.3.2.1 Calculations Based on C .......................................................................................................... 144
5.3.2.2 Calculations Based on C/I ........................................................................................................ 145
5.3.2.3 Calculations Based on C/(I+N) ................................................................................................. 145
5.3.3 Application Throughput Calculation................................................................................................ 145
5.3.4 BLER Calculation ........................................................................................................................... 146
5.3.5 GPRS/EDGE Coverage Predictions............................................................................................... 146
5.3.5.1 Service Area Determination...................................................................................................... 146
5.3.5.1.1 All Servers........................................................................................................................... 146
5.3.5.1.2 Best Signal Level and a Margin .......................................................................................... 146
5.3.5.1.3 Second Best Signal Level and a Margin ............................................................................. 146
5.3.5.1.4 Best Signal Level per HCS Layer and a Margin.................................................................. 147
5.3.5.1.5 Second Best Signal Level per HCS Layer and a Margin .................................................... 147
5.3.5.1.6 HCS Servers and a Margin ................................................................................................. 147
5.3.5.1.7 Highest Priority HCS Server and a Margin.......................................................................... 147
5.3.5.1.8 Best Idle Mode Reselection Criterion (C2).......................................................................... 148
5.3.5.2 Coverage Display ..................................................................................................................... 148
5.3.5.2.1 Coverage Resolution .......................................................................................................... 148
5.3.5.2.2 Display Types ..................................................................................................................... 148
5.4 Codec Mode Selection and CQI Calculations...................................................................................... 150
5.4.1 Circuit Quality Indicator Calculations.............................................................................................. 152
5.4.2 CQI Calculation Without Ideal Link Adaptation .............................................................................. 152
5.4.2.1 Calculations Based on C/N....................................................................................................... 152
5.4.2.2 Calculations Based on C/(I+N) ................................................................................................. 152
5.4.3 CQI Calculation With Ideal Link Adaptation ................................................................................... 153
5.4.3.1 Calculations Based on C/N....................................................................................................... 153
5.4.3.2 Calculations Based on C/(I+N) ................................................................................................. 153
5.4.4 Circuit Quality Indicators Coverage Predictions ............................................................................. 154
5.4.4.1 Service Area Determination...................................................................................................... 154
5.4.4.1.1 All Servers........................................................................................................................... 154
5.4.4.1.2 Best Signal Level and a Margin .......................................................................................... 154
5.4.4.1.3 Second Best Signal Level and a Margin ............................................................................. 154
5.4.4.1.4 Best Signal Level per HCS Layer and a Margin.................................................................. 154
Technical Reference Guide
10 AT283_TRG_E2 Forsk 2010
5.4.4.1.5 Second Best Signal Level per HCS Layer and a Margin.....................................................155
5.4.4.1.6 HCS Servers and a Margin..................................................................................................155
5.4.4.1.7 Highest Priority HCS Server and a Margin ..........................................................................155
5.4.4.2 Coverage Display ......................................................................................................................156
5.4.4.2.1 Coverage Resolution ...........................................................................................................156
5.4.4.2.2 Display Types ......................................................................................................................156
5.5 Traffic Analysis .....................................................................................................................................156
5.5.1 Traffic Distribution...........................................................................................................................156
5.5.1.1 Normal Cells (Nonconcentric, No HCS Layer) ..........................................................................156
5.5.1.1.1 Circuit Switched Services ....................................................................................................156
5.5.1.1.2 Packet Switched Services ...................................................................................................157
5.5.1.2 Concentric Cells ........................................................................................................................157
5.5.1.2.1 Circuit Switched Services ....................................................................................................157
5.5.1.2.2 Packet Switched Services ...................................................................................................157
5.5.1.3 HCS Layers ...............................................................................................................................157
5.5.1.3.1 Circuit Switched Services ....................................................................................................157
5.5.1.3.2 Packet Switched Services ...................................................................................................157
5.5.2 Calculation of the Traffic Demand per Subcell................................................................................157
5.5.2.1 User Profile Traffic Maps...........................................................................................................157
5.5.2.1.1 Normal Cells (Nonconcentric, No HCS Layer).....................................................................157
5.5.2.1.2 Concentric Cells...................................................................................................................158
5.5.2.1.3 HCS Layers .........................................................................................................................159
5.5.2.2 Sector Traffic Maps ...................................................................................................................162
5.5.2.2.1 Normal Cells (Nonconcentric, No HCS Layer).....................................................................162
5.5.2.2.2 Concentric Cells...................................................................................................................163
5.5.2.2.3 HCS Layers .........................................................................................................................163
5.6 Network Dimensioning..........................................................................................................................167
5.6.1 Dimensioning Models and Quality Graphs......................................................................................167
5.6.1.1 Circuit Switched Traffic..............................................................................................................168
5.6.1.2 Packet Switched Traffic.............................................................................................................168
5.6.1.2.1 Throughput ..........................................................................................................................168
5.6.1.2.2 Delay....................................................................................................................................170
5.6.1.2.3 Blocking Probability .............................................................................................................170
5.6.2 Network Dimensioning Process ......................................................................................................172
5.6.2.1 Network Dimensioning Engine ..................................................................................................172
5.6.2.1.1 Inputs...................................................................................................................................172
5.6.2.1.2 Outputs ................................................................................................................................172
5.6.2.2 Network Dimensioning Steps ....................................................................................................172
5.6.2.2.1 Step 1: Timeslots Required for CS Traffic ...........................................................................172
5.6.2.2.2 Step 2: TRXs Required for CS Traffic and Dedicated PS Timeslots ...................................173
5.6.2.2.3 Step 3: Effective CS Blocking, Effective CS Traffic Overflow and Served CS Traffic..........173
5.6.2.2.4 Step 4: TRXs to Add for PS Traffic......................................................................................173
5.6.2.2.5 Step 5: Served PS Traffic ....................................................................................................175
5.6.2.2.6 Step 6: Total Traffic Load ....................................................................................................176
5.7 Key Performance Indicators Calculation...............................................................................................176
5.7.1 Circuit Switched Traffic ...................................................................................................................176
5.7.1.1 Erlang B.....................................................................................................................................176
5.7.1.2 Erlang C ....................................................................................................................................176
5.7.1.3 Served Circuit Switched Traffic .................................................................................................177
5.7.2 Packet Switched Traffic...................................................................................................................177
5.7.2.1 Case 1: Total Traffic Demand > Dedicated + Shared Timeslots ...............................................177
5.7.2.1.1 Traffic Load..........................................................................................................................177
5.7.2.1.2 Packet Switched Traffic Overflow........................................................................................177
5.7.2.1.3 Throughput Reduction Factor ..............................................................................................177
5.7.2.1.4 Delay....................................................................................................................................177
5.7.2.1.5 Blocking Probability .............................................................................................................177
5.7.2.1.6 Served Packet Switched Traffic...........................................................................................177
5.7.2.2 Case 2: Total Traffic Demand < Dedicated + Shared Timeslots ...............................................178
5.7.2.2.1 Traffic Load..........................................................................................................................178
5.7.2.2.2 Packet Switched Traffic Overflow........................................................................................178
5.7.2.2.3 Throughput Reduction Factor ..............................................................................................178
5.7.2.2.4 Delay....................................................................................................................................178
5.7.2.2.5 Blocking Probability .............................................................................................................178
5.7.2.2.6 Served Packet Switched Traffic...........................................................................................178
5.8 Neighbour Allocation.............................................................................................................................178
5.8.1 Global Allocation for All Transmitters..............................................................................................179
5.8.2 Allocation for a Group of Transmitters or One Transmitter .............................................................182
Table of Contents
Forsk 2010 AT283_TRG_E2 11
5.9 AFP Appendices .................................................................................................................................. 182
5.9.1 The AFP Cost Function.................................................................................................................. 182
5.9.1.1 Cost Function............................................................................................................................ 183
5.9.1.2 Cost Components..................................................................................................................... 184
5.9.1.2.1 Separation Violation Cost Component ................................................................................ 184
5.9.1.2.2 Interference Cost Component ............................................................................................. 185
5.9.1.2.3 I_DIV, F_DIV and Other Advanced Cost Parameters......................................................... 187
5.9.2 The AFP Blocked Traffic Cost ........................................................................................................ 187
5.9.2.1 Calculation of New Traffic Loads Including Blocked Traffic Loads........................................... 188
5.9.2.2 Recalculation of CS and PS From Traffic Loads ...................................................................... 189
5.9.2.3 Testing the Blocked Cost Using Traffic Analysis ...................................................................... 190
5.9.3 Interferences .................................................................................................................................. 190
5.9.3.1 Using Interferences................................................................................................................... 190
5.9.3.2 Cumulative Density Function of C/I Levels............................................................................... 190
5.9.3.3 Precise Definition...................................................................................................................... 191
5.9.3.4 Precise Interference Distribution Strategy ................................................................................ 191
5.9.3.4.1 Direct Availability of Precise Interference Distribution to the AFP....................................... 191
5.9.3.4.2 Efficient Calculation and Storage of Interference Distribution............................................. 191
5.9.3.4.3 Robustness of the IM.......................................................................................................... 191
5.9.3.5 Traffic Load and Interference Information Discrimination......................................................... 191
6 UMTS HSPA Networks ................................................................. 195
6.1 General Prediction Studies .................................................................................................................. 195
6.1.1 Calculation Criteria......................................................................................................................... 195
6.1.2 Point Analysis................................................................................................................................. 195
6.1.2.1 Profile Tab ................................................................................................................................ 195
6.1.2.2 Reception Tab .......................................................................................................................... 195
6.1.3 Coverage Studies........................................................................................................................... 196
6.1.3.1 Service Area Determination...................................................................................................... 196
6.1.3.1.1 All Servers........................................................................................................................... 196
6.1.3.1.2 Best Signal Level and a Margin .......................................................................................... 196
6.1.3.1.3 Second Best Signal Level and a Margin ............................................................................. 196
6.1.3.2 Coverage Display ..................................................................................................................... 197
6.1.3.2.1 Plot Resolution.................................................................................................................... 197
6.1.3.2.2 Display Types ..................................................................................................................... 197
6.2 Definitions and Formulas ..................................................................................................................... 198
6.2.1 Inputs.............................................................................................................................................. 198
6.2.2 Ec/I0 Calculation ............................................................................................................................ 204
6.2.3 DL Eb/Nt Calculation...................................................................................................................... 204
6.2.4 UL Eb/Nt Calculation...................................................................................................................... 205
6.3 Active Set Management ....................................................................................................................... 206
6.4 Simulations........................................................................................................................................... 206
6.4.1 Generating a Realistic User Distribution ........................................................................................ 207
6.4.1.1 Simulations Based on User Profile Traffic Maps ...................................................................... 207
6.4.1.1.1 Circuit Switched Service (i) ................................................................................................. 207
6.4.1.1.2 Packet Switched Service (j) ................................................................................................ 208
6.4.1.2 Simulations Based on Sector Traffic Maps............................................................................... 210
6.4.1.2.1 Throughputs in Uplink and Downlink................................................................................... 211
6.4.1.2.2 Total Number of Users (All Activity Statuses) ..................................................................... 211
6.4.1.2.3 Number of Users per Activity Status ................................................................................... 212
6.4.2 Power Control Simulation............................................................................................................... 212
6.4.2.1 Algorithm Initialization............................................................................................................... 213
6.4.2.2 R99 Part of the Algorithm......................................................................................................... 214
6.4.2.3 HSDPA Part of the Algorithm.................................................................................................... 218
6.4.2.3.1 HSDPA Power Allocation.................................................................................................... 218
6.4.2.3.2 Number of HS-SCCH Channels and Maximum Number of HSDPA Bearer Users............. 219
6.4.2.3.3 HSDPA Bearer Allocation Process ..................................................................................... 219
6.4.2.3.4 Fast Link Adaptation Modelling........................................................................................... 221
6.4.2.3.5 MIMO Modelling.................................................................................................................. 231
6.4.2.3.6 Scheduling Algorithms ........................................................................................................ 231
6.4.2.3.7 Dual-Cell HSDPA................................................................................................................ 233
6.4.2.4 HSUPA Part of the Algorithm.................................................................................................... 236
6.4.2.4.1 Admission Control ............................................................................................................... 237
6.4.2.4.2 HSUPA Bearer Allocation Process ..................................................................................... 239
6.4.2.4.3 Noise Rise Scheduling........................................................................................................ 240
6.4.2.4.4 Radio Resource Control...................................................................................................... 244
6.4.2.5 Convergence Criteria................................................................................................................ 244
Technical Reference Guide
12 AT283_TRG_E2 Forsk 2010
6.4.3 Results ............................................................................................................................................244
6.4.3.1 R99 Related Results .................................................................................................................244
6.4.3.2 HSPA Related Results ..............................................................................................................246
6.4.3.2.1 Statistics Tab .......................................................................................................................246
6.4.3.2.2 Mobiles Tab .........................................................................................................................247
6.4.3.2.3 Cells Tab..............................................................................................................................250
6.4.3.2.4 Sites Tab..............................................................................................................................252
6.4.4 Appendices .....................................................................................................................................252
6.4.4.1 Admission Control in the R99 Part ............................................................................................252
6.4.4.2 Resources Management ...........................................................................................................252
6.4.4.2.1 OVSF Codes Management..................................................................................................252
6.4.4.2.2 Channel Elements Management .........................................................................................254
6.4.4.2.3 Iub Backhaul Throughput.....................................................................................................254
6.4.4.3 Downlink Load Factor Calculation.............................................................................................255
6.4.4.3.1 Downlink Load Factor per Cell.............................................................................................255
6.4.4.3.2 Downlink Load Factor per Mobile ........................................................................................257
6.4.4.4 Uplink Load Factor Due to One User ........................................................................................257
6.4.4.5 Inter-carrier Power Sharing Modelling.......................................................................................259
6.4.4.6 Best Server Determination in Monte Carlo Simulations - Old Method ......................................259
6.5 UMTS HSPA Prediction Studies...........................................................................................................261
6.5.1 Point Analysis..................................................................................................................................261
6.5.1.1 AS Analysis Tab........................................................................................................................261
6.5.1.1.1 Bar Graph and Pilot Sub-Menu............................................................................................261
6.5.1.1.2 Downlink Sub-Menu.............................................................................................................264
6.5.1.1.3 Uplink Sub-Menu .................................................................................................................268
6.5.2 Coverage Studies............................................................................................................................272
6.5.2.1 Pilot Reception Analysis............................................................................................................272
6.5.2.1.1 Prediction Study Inputs........................................................................................................273
6.5.2.1.2 Study Display Options .........................................................................................................273
6.5.2.2 Downlink Service Area Analysis................................................................................................273
6.5.2.2.1 Prediction Study Inputs........................................................................................................274
6.5.2.2.2 Study Display Options .........................................................................................................274
6.5.2.3 Uplink Service Area Analysis ....................................................................................................275
6.5.2.3.1 Prediction Study Inputs........................................................................................................275
6.5.2.3.2 Study Display Options .........................................................................................................276
6.5.2.4 Downlink Total Noise Analysis ..................................................................................................277
6.5.2.4.1 Study Inputs.........................................................................................................................277
6.5.2.4.2 Analysis on All Carriers........................................................................................................277
6.5.2.4.3 Analysis on a Specific Carrier..............................................................................................278
6.5.2.5 HSDPA Prediction Study...........................................................................................................278
6.5.2.5.1 Prediction Study Inputs........................................................................................................278
6.5.2.5.2 Study Display Options .........................................................................................................278
6.5.2.6 HSUPA Prediction Study...........................................................................................................282
6.5.2.6.1 Prediction Study Inputs........................................................................................................282
6.5.2.6.2 Calculation Options..............................................................................................................283
6.5.2.6.3 Display Options....................................................................................................................283
6.6 Automatic Neighbour Allocation............................................................................................................285
6.6.1 Neighbour Allocation for All Transmitters........................................................................................285
6.6.2 Neighbour Allocation for a Group of Transmitters or One Transmitter............................................289
6.6.3 Importance Calculation ...................................................................................................................289
6.6.3.1 Importance of Intra-carrier Neighbours .....................................................................................289
6.6.3.2 Importance of Inter-carrier Neighbours .....................................................................................290
6.7 Primary Scrambling Code Allocation ....................................................................................................291
6.7.1 Automatic Allocation Description.....................................................................................................291
6.7.1.1 Options and Constraints............................................................................................................291
6.7.1.2 Allocation Process.....................................................................................................................292
6.7.1.2.1 Single Carrier Network.........................................................................................................293
6.7.1.2.2 Multi-Carrier Network...........................................................................................................293
6.7.1.3 Priority Determination................................................................................................................294
6.7.1.3.1 Cell Priority ..........................................................................................................................294
6.7.1.3.2 Transmitter Priority ..............................................................................................................296
6.7.1.3.3 Site Priority ..........................................................................................................................296
6.7.2 Allocation Examples........................................................................................................................296
6.7.2.1 Allocation Strategies and Use a Maximum of Codes ................................................................296
6.7.2.1.1 Strategy: Clustered..............................................................................................................297
6.7.2.1.2 Strategy: Distributed ............................................................................................................298
6.7.2.1.3 Strategy: One Cluster per Site............................................................................................298
6.7.2.1.4 Strategy: Distributed per Site..............................................................................................299
Table of Contents
Forsk 2010 AT283_TRG_E2 13
6.7.2.2 Allocate Carriers Identically ...................................................................................................... 299
6.8 Automatic GSM-UMTS Neighbour Allocation ...................................................................................... 300
6.8.1 Overview ........................................................................................................................................ 300
6.8.2 Automatic Allocation Description.................................................................................................... 300
6.8.2.1 Algorithm Based on Distance ................................................................................................... 300
6.8.2.2 Algorithm Based on Coverage Overlapping ............................................................................. 301
6.8.2.3 Appendices............................................................................................................................... 303
6.8.2.3.1 Delete Existing Neighbours Option ..................................................................................... 303
6.8.2.3.2 Calculation of Inter-Transmitter Distance............................................................................ 303
7 CDMA2000 Networks ................................................................... 307
7.1 General Prediction Studies .................................................................................................................. 307
7.1.1 Calculation Criteria......................................................................................................................... 307
7.1.2 Point Analysis................................................................................................................................. 307
7.1.2.1 Profile Tab ................................................................................................................................ 307
7.1.2.2 Reception Tab .......................................................................................................................... 308
7.1.3 Coverage Studies........................................................................................................................... 308
7.1.3.1 Service Area Determination...................................................................................................... 308
7.1.3.1.1 All Servers........................................................................................................................... 308
7.1.3.1.2 Best Signal Level and a Margin .......................................................................................... 308
7.1.3.1.3 Second Best Signal Level and a Margin ............................................................................. 308
7.1.3.2 Coverage Display ..................................................................................................................... 309
7.1.3.2.1 Plot Resolution.................................................................................................................... 309
7.1.3.2.2 Display Types ..................................................................................................................... 309
7.2 Definitions and Formulas ..................................................................................................................... 310
7.2.1 Parameters Used for CDMA2000 1xRTT Modelling ...................................................................... 310
7.2.1.1 Inputs........................................................................................................................................ 310
7.2.1.2 Ec/I0 Calculation....................................................................................................................... 314
7.2.1.3 DL Eb/Nt Calculation ................................................................................................................ 314
7.2.1.4 UL Eb/Nt Calculation ................................................................................................................ 315
7.2.1.5 Simulation Results.................................................................................................................... 317
7.2.2 Parameters Used for CDMA2000 1xEV-DO Modelling.................................................................. 318
7.2.2.1 Inputs........................................................................................................................................ 318
7.2.2.2 Ec/I0 and Ec/Nt Calculations .................................................................................................... 321
7.2.2.3 UL Eb/Nt Calculation ................................................................................................................ 322
7.2.2.4 Simulation Results.................................................................................................................... 323
7.3 Active Set Management ....................................................................................................................... 324
7.4 Simulations........................................................................................................................................... 325
7.4.1 Generating a Realistic User Distribution ........................................................................................ 325
7.4.1.1 Number of Users, User Activity Status and User Data Rate..................................................... 325
7.4.1.1.1 Simulations Based on User Profile Traffic Maps................................................................. 325
7.4.1.1.2 Simulations Based on Sector Traffic Maps ......................................................................... 328
7.4.1.2 Transition Flags for 1xEV-DO Rev.0 User Data Rates............................................................. 333
7.4.1.3 User Geographical Position...................................................................................................... 333
7.4.2 Network Regulation Mechanism..................................................................................................... 333
7.4.2.1 CDMA2000 1xRTT Power Control Simulation Algorithm.......................................................... 333
7.4.2.1.1 Algorithm Initialization ......................................................................................................... 334
7.4.2.1.2 Presentation of the Algorithm.............................................................................................. 334
7.4.2.1.3 Convergence Criterion ........................................................................................................ 340
7.4.2.2 CDMA2000 1xEV-DO Power/Data Rate Control Simulation Algorithm.................................... 341
7.4.2.2.1 Algorithm Initialization ......................................................................................................... 342
7.4.2.2.2 Presentation of the Algorithm.............................................................................................. 342
7.4.2.2.3 Convergence Criterion ........................................................................................................ 347
7.4.3 Appendices..................................................................................................................................... 348
7.4.3.1 Admission Control..................................................................................................................... 348
7.4.3.2 Resources Management........................................................................................................... 348
7.4.3.2.1 Walsh Code Management .................................................................................................. 348
7.4.3.2.2 Channel Element Management .......................................................................................... 349
7.4.3.3 Downlink Load Factor Calculation ............................................................................................ 349
7.4.3.3.1 Downlink Load Factor per Cell ............................................................................................ 349
7.4.3.3.2 Downlink Load Factor per Mobile........................................................................................ 351
7.4.3.4 Best Server Determination in Monte Carlo Simulations - Old Method...................................... 351
7.5 CDMA2000 Prediction Studies............................................................................................................. 353
7.5.1 Point Analysis: The AS Analysis Tab ............................................................................................. 353
7.5.1.1 Bar Graph and Pilot Sub-Menu................................................................................................. 353
7.5.1.2 Downlink Sub-Menu.................................................................................................................. 355
7.5.1.2.1 CDMA2000 1xRTT.............................................................................................................. 355
7.5.1.2.2 CDMA2000 1xEV-DO......................................................................................................... 359
Technical Reference Guide
14 AT283_TRG_E2 Forsk 2010
7.5.1.3 Uplink Sub-Menu.......................................................................................................................360
7.5.1.3.1 CDMA2000 1xRTT ..............................................................................................................360
7.5.1.3.2 CDMA2000 1xEV-DO..........................................................................................................364
7.5.2 Coverage Studies............................................................................................................................367
7.5.2.1 Pilot Reception Analysis............................................................................................................367
7.5.2.2 Downlink Service Area Analysis................................................................................................368
7.5.2.2.1 CDMA2000 1xRTT ..............................................................................................................368
7.5.2.2.2 CDMA2000 1xEV-DO..........................................................................................................370
7.5.2.3 Uplink Service Area Analysis ....................................................................................................371
7.5.2.3.1 CDMA2000 1xRTT ..............................................................................................................371
7.5.2.3.2 CDMA2000 1xEV-DO..........................................................................................................372
7.5.2.4 Downlink Total Noise Analysis ..................................................................................................375
7.5.2.4.1 Analysis on all Carriers........................................................................................................375
7.5.2.4.2 Analysis on a Specific Carrier..............................................................................................376
7.6 Automatic Neighbour Allocation............................................................................................................376
7.6.1 Neighbour Allocation for all Transmitters ........................................................................................376
7.6.2 Neighbour Allocation for a Group of Transmitters or One Transmitter............................................379
7.6.3 Importance Calculation ...................................................................................................................379
7.6.3.1 Importance of Intra-carrier Neighbours .....................................................................................379
7.6.3.2 Importance of Inter-carrier Neighbours .....................................................................................380
7.7 PN Offset Allocation..............................................................................................................................381
7.7.1 Automatic Allocation Description.....................................................................................................381
7.7.1.1 Options and Constraints............................................................................................................381
7.7.1.2 Allocation Process.....................................................................................................................382
7.7.1.2.1 Single Carrier Network.........................................................................................................382
7.7.1.2.2 Multi-Carrier Network...........................................................................................................383
7.7.1.2.3 Difference between Adjacent and Distributed PN-Clusters .................................................383
7.7.1.3 Priority Determination................................................................................................................384
7.7.1.3.1 Cell Priority ..........................................................................................................................384
7.7.1.3.2 Transmitter Priority ..............................................................................................................386
7.7.1.3.3 Site Priority ..........................................................................................................................386
7.7.2 Allocation Examples........................................................................................................................386
7.7.2.1 Strategy: PN Offset per Cell ......................................................................................................387
7.7.2.2 Strategy: Adjacent PN-Clusters Per Site...................................................................................387
7.7.2.3 Strategy: Distributed PN-Clusters Per Site...............................................................................388
7.8 Automatic GSM-CDMA Neighbour Allocation.......................................................................................388
7.8.1 Overview.........................................................................................................................................388
7.8.2 Automatic Allocation Description.....................................................................................................388
7.8.2.1 Algorithm Based on Distance....................................................................................................389
7.8.2.2 Algorithm Based on Coverage Overlapping..............................................................................389
7.8.2.3 Delete Existing Neighbours Option ...........................................................................................391
8 TD-SCDMA Networks....................................................................395
8.1 Definitions and Formulas......................................................................................................................395
8.1.1 Inputs ..............................................................................................................................................395
8.1.2 P-CCPCH Eb/Nt and C/I Calculation ..............................................................................................399
8.1.3 DwPCH C/I Calculation...................................................................................................................400
8.1.4 DL TCH Eb/Nt and C/I Calculation..................................................................................................400
8.1.5 UL TCH Eb/Nt and C/I Calculation..................................................................................................400
8.1.6 Interference Calculation..................................................................................................................401
8.1.7 HSDPA Dynamic Power Calculations.............................................................................................401
8.1.8 Smart Antenna Models....................................................................................................................401
8.1.8.1 Downlink Beamforming .............................................................................................................401
8.1.8.2 Uplink Beamforming..................................................................................................................402
8.1.8.3 Uplink Beamforming and Interference Cancellation (MMSE) ....................................................402
8.2 Signal Level Based Calculations ..........................................................................................................403
8.2.1 Point Analysis..................................................................................................................................403
8.2.1.1 Profile Tab.................................................................................................................................403
8.2.1.2 Reception Tab...........................................................................................................................403
8.2.2 RSCP Based Coverage Predictions................................................................................................404
8.2.2.1 Calculation Criteria....................................................................................................................404
8.2.2.2 P-CCPCH RSCP Coverage Prediction .....................................................................................404
8.2.2.2.1 Coverage Condition.............................................................................................................404
8.2.2.2.2 Coverage Display ................................................................................................................405
8.2.2.3 Best Server P-CCPCH Coverage Prediction.............................................................................405
8.2.2.4 P-CCPCH Pollution Coverage Prediction..................................................................................405
8.2.2.5 DwPCH RSCP Coverage Prediction.........................................................................................406
8.2.2.5.1 Coverage Condition.............................................................................................................406
Table of Contents
Forsk 2010 AT283_TRG_E2 15
8.2.2.5.2 Coverage Display................................................................................................................ 406
8.2.2.6 UpPCH RSCP Coverage Prediction......................................................................................... 406
8.2.2.6.1 Coverage Condition ............................................................................................................ 406
8.2.2.6.2 Coverage Display................................................................................................................ 406
8.2.2.7 Baton Handover Coverage Prediction ...................................................................................... 407
8.2.2.7.1 Coverage Condition ............................................................................................................ 407
8.2.2.7.2 Coverage Display................................................................................................................ 407
8.2.2.8 Scrambling Code Interference Analysis.................................................................................... 407
8.3 Monte Carlo Simulations...................................................................................................................... 408
8.3.1 Generating a Realistic User Distribution ........................................................................................ 408
8.3.1.1 Simulations Based on User Profile Traffic Maps ...................................................................... 408
8.3.1.1.1 Circuit Switched Service (i) ................................................................................................. 409
8.3.1.1.2 Packet Switched Service (j) ................................................................................................ 409
8.3.1.2 Simulations Based on Sector Traffic Maps............................................................................... 412
8.3.1.2.1 Throughputs in Uplink and Downlink................................................................................... 412
8.3.1.2.2 Total Number of Users (All Activity Statuses) ..................................................................... 412
8.3.1.2.3 Number of Users per Activity Status ................................................................................... 413
8.3.2 Power Control Simulation............................................................................................................... 413
8.3.2.1 Algorithm Initialisation............................................................................................................... 414
8.3.2.2 R99 Part of the Algorithm......................................................................................................... 414
8.3.2.2.1 Determination of Mis Best Server (SBS(Mi))...................................................................... 414
8.3.2.2.2 Dynamic Channel Allocation ............................................................................................... 415
8.3.2.2.3 Uplink Power Control .......................................................................................................... 416
8.3.2.2.4 Downlink Power Control...................................................................................................... 418
8.3.2.2.5 Uplink Signals Update......................................................................................................... 420
8.3.2.2.6 Downlink Signals Update.................................................................................................... 420
8.3.2.2.7 Control of Radio Resource Limits (Downlink Traffic Power and Uplink Load) .................... 420
8.3.2.3 HSDPA Part of the Algorithm.................................................................................................... 421
8.3.2.3.1 HSDPA Power Allocation.................................................................................................... 421
8.3.2.3.2 Connection Status and Number of HSDPA Users .............................................................. 423
8.3.2.3.3 HSDPA Admission Control.................................................................................................. 423
8.3.2.3.4 HSDPA Dynamic Channel Allocation.................................................................................. 424
8.3.2.3.5 Ressource Unit Saturation .................................................................................................. 424
8.3.2.4 Convergence Criteria................................................................................................................ 424
8.4 TD-SCDMA Prediction Studies ............................................................................................................ 425
8.4.1 P-CCPCH Reception Analysis (Eb/Nt) or (C/I) ............................................................................... 425
8.4.2 DwPCH Reception Analysis (C/I) ................................................................................................... 426
8.4.3 Downlink TCH RSCP Coverage..................................................................................................... 428
8.4.4 Uplink TCH RSCP Coverage ......................................................................................................... 428
8.4.5 Downlink Total Noise...................................................................................................................... 429
8.4.6 Downlink Service Area (Eb/Nt) or (C/I)........................................................................................... 430
8.4.7 Uplink Service Area (Eb/Nt) or (C/I) ............................................................................................... 432
8.4.8 Effective Service Area (Eb/Nt) or (C/I) ........................................................................................... 433
8.4.9 Cell to Cell Interference.................................................................................................................. 434
8.4.10 UpPCH Interference....................................................................................................................... 435
8.4.11 HSDPA Coverage .......................................................................................................................... 435
8.5 Smart Antenna Modelling..................................................................................................................... 436
8.5.1 Modelling in Simulations................................................................................................................. 437
8.5.1.1 Grid of Beams Modelling .......................................................................................................... 437
8.5.1.2 Adaptive Beam Modelling......................................................................................................... 438
8.5.1.3 Statistical Modelling.................................................................................................................. 439
8.5.1.4 Beamforming Smart Antenna Models....................................................................................... 439
8.5.1.4.1 Downlink Beamforming....................................................................................................... 440
8.5.1.4.2 Uplink Beamforming............................................................................................................ 441
8.5.1.4.3 Uplink Beamforming and Interference Cancellation (MMSE).............................................. 442
8.5.1.5 3rd Party Smart Antenna Modelling.......................................................................................... 444
8.5.2 Construction of the Geographic Distributions................................................................................. 444
8.5.3 Modelling in Coverage Predictions................................................................................................. 445
8.5.4 HSDPA Coverage Prediction ......................................................................................................... 446
8.5.4.1 Fast Link Adaptation Modelling................................................................................................. 446
8.5.4.1.1 CQI Based on P-CCPCH Quality........................................................................................ 446
8.5.4.1.2 CQI Based on HS-PDSCH Quality...................................................................................... 450
8.5.4.2 Coverage Prediction Display Options....................................................................................... 451
8.5.4.2.1 Colour per CQI .................................................................................................................... 451
8.5.4.2.2 Colour per Peak Throughput............................................................................................... 451
8.5.4.2.3 Colour per HS-PDSCH Ec/Nt.............................................................................................. 451
8.6 N-Frequency Mode and Carrier Allocation........................................................................................... 452
8.6.1 Automatic Carrier Allocation........................................................................................................... 452
Technical Reference Guide
16 AT283_TRG_E2 Forsk 2010
8.7 Neighbour Allocation.............................................................................................................................452
8.7.1 Neighbour Allocation for All Transmitters........................................................................................453
8.7.2 Neighbour Allocation for a Group of Transmitters or One Transmitter............................................456
8.7.3 Importance Calculation ...................................................................................................................456
8.8 Scrambling Code Allocation..................................................................................................................457
8.8.1 Automatic Allocation Description.....................................................................................................457
8.8.1.1 Allocation Constraints and Options ...........................................................................................457
8.8.1.2 Allocation Strategies..................................................................................................................458
8.8.1.3 Allocation Process.....................................................................................................................458
8.8.1.3.1 Single Carrier Network.........................................................................................................459
8.8.1.3.2 Multi-Carrier Network...........................................................................................................460
8.8.1.4 Priority Determination................................................................................................................460
8.8.1.4.1 Cell Priority ..........................................................................................................................460
8.8.1.4.2 Transmitter Priority ..............................................................................................................462
8.8.1.4.3 Site Priority ..........................................................................................................................463
8.8.2 Scrambling Code Allocation Example.............................................................................................463
8.8.2.1 Single Carrier Network ..............................................................................................................463
8.8.2.1.1 Strategy: Clustered..............................................................................................................464
8.8.2.1.2 Strategy: Distributed per Cell ...............................................................................................464
8.8.2.1.3 Strategy: One SYNC_DL Code per Site..............................................................................465
8.8.2.1.4 Strategy: Distributed per Site...............................................................................................465
8.8.2.2 Multi Carrier Network.................................................................................................................465
8.9 Automatic GSM/TD-SCDMA Neighbour Allocation ..............................................................................466
8.9.1 Automatic Allocation Description.....................................................................................................466
8.9.1.1 Algorithm Based on Distance....................................................................................................467
8.9.1.2 Algorithm Based on Coverage Overlapping..............................................................................467
8.9.1.3 Appendices................................................................................................................................469
8.9.1.3.1 Delete Existing Neighbours Option......................................................................................469
8.9.1.3.2 Calculation of Inter-Transmitter Distance ............................................................................469
9 WiMAX BWA Networks..................................................................473
9.1 Definitions and Formulas......................................................................................................................473
9.1.1 Input ................................................................................................................................................473
9.1.2 Co- and Adjacent Channel Overlaps Calculation............................................................................477
9.1.3 Preamble Signal Quality Calculations.............................................................................................477
9.1.3.1 Preamble Signal Level Calculation............................................................................................477
9.1.3.2 Preamble Noise Calculation......................................................................................................478
9.1.3.3 Preamble Interference Calculation............................................................................................478
9.1.3.4 Preamble C/N Calculation.........................................................................................................478
9.1.3.5 Preamble C/(I+N) Calculation....................................................................................................478
9.1.4 Traffic and Pilot Signal Quality Calculations ...................................................................................478
9.1.4.1 Traffic and Pilot Signal Level Calculation (DL) ..........................................................................478
9.1.4.2 Traffic and Pilot Noise Calculation (DL) ....................................................................................479
9.1.4.3 Traffic and Pilot Interference Calculation (DL) ..........................................................................479
9.1.4.4 Traffic and Pilot C/N Calculation (DL) .......................................................................................480
9.1.4.5 Traffic and Pilot C/(I+N) Calculation (DL) ..................................................................................481
9.1.4.6 Traffic Signal Level Calculation (UL) .........................................................................................481
9.1.4.7 Traffic Noise Calculation (UL) ...................................................................................................481
9.1.4.8 Traffic Interference Calculation (UL) .........................................................................................482
9.1.4.9 Traffic C/N Calculation (UL) ......................................................................................................482
9.1.4.10 Traffic C/(I+N) Calculation (UL) .................................................................................................482
9.1.5 Throughput Calculation...................................................................................................................482
9.1.5.1 Calculation of Total Cell Resources ..........................................................................................482
9.1.5.2 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation...........484
9.1.6 Scheduling and Radio Resource Management...............................................................................485
9.1.6.1 User Throughput Calculation.....................................................................................................486
9.1.7 Smart Antenna Models....................................................................................................................487
9.1.7.1 Downlink Beamforming .............................................................................................................487
9.1.7.2 Uplink Beamforming..................................................................................................................487
9.1.7.3 Uplink Beamforming and Interference Cancellation (MMSE) ....................................................488
9.2 Calculation Processes ..........................................................................................................................488
9.2.1 Point Analysis: Profile Tab ..............................................................................................................488
9.2.2 Point Analysis: Reception Tab ........................................................................................................488
9.2.3 Point Analysis: Interference Tab .....................................................................................................489
9.2.4 Preamble Signal Level Coverage Predictions.................................................................................489
9.2.4.1 Coverage Area Determination...................................................................................................490
9.2.4.1.1 All Servers ...........................................................................................................................490
9.2.4.1.2 Best Signal Level and a Margin...........................................................................................490
Table of Contents
Forsk 2010 AT283_TRG_E2 17
9.2.4.1.3 Second Best Signal Level and a Margin ............................................................................. 490
9.2.4.2 Coverage Display ..................................................................................................................... 490
9.2.4.2.1 Coverage Resolution .......................................................................................................... 490
9.2.4.2.2 Display Types ..................................................................................................................... 490
9.2.5 Effective Signal Analysis Coverage Predictions............................................................................. 491
9.2.5.1 Coverage Area Determination .................................................................................................. 492
9.2.5.2 Coverage Parameter Calculation.............................................................................................. 492
9.2.5.3 Coverage Display ..................................................................................................................... 492
9.2.5.3.1 Coverage Resolution .......................................................................................................... 492
9.2.5.3.2 Effective Signal Analysis (DL) Display Types ..................................................................... 492
9.2.5.3.3 Effective Signal Analysis (UL) Display Types ..................................................................... 493
9.2.6 Calculations on Subscriber Lists .................................................................................................... 494
9.2.7 Monte Carlo Simulations ................................................................................................................ 494
9.2.7.1 Generating a Realistic User Distribution................................................................................... 494
9.2.7.1.1 Simulations Based on User Profile Traffic Maps and Subscriber Lists ............................... 495
9.2.7.1.2 Simulations Based on Sector Traffic Maps ......................................................................... 496
9.2.7.2 Simulation Process................................................................................................................... 498
9.2.8 C/(I+N)-Based Coverage Predictions............................................................................................. 502
9.2.8.1 Coverage Area Determination .................................................................................................. 503
9.2.8.2 Coverage Parameter Calculation.............................................................................................. 503
9.2.8.3 Coverage Display ..................................................................................................................... 504
9.2.8.3.1 Coverage Resolution .......................................................................................................... 504
9.2.8.3.2 Coverage by C/(I+N) Level (DL) Display Types.................................................................. 504
9.2.8.3.3 Coverage by Best Bearer (DL) Display Types .................................................................... 505
9.2.8.3.4 Coverage by Throughput (DL) Display Types..................................................................... 505
9.2.8.3.5 Coverage by Quality Indicator (DL) Display Types ............................................................. 506
9.2.8.3.6 Coverage by C/(I+N) Level (UL) Display Types.................................................................. 506
9.2.8.3.7 Coverage by Best Bearer (UL) Display Types .................................................................... 507
9.2.8.3.8 Coverage by Throughput (UL) Display Types..................................................................... 507
9.2.8.3.9 Coverage by Quality Indicator (UL) Display Types ............................................................. 508
9.3 Calculation Algorithms ......................................................................................................................... 508
9.3.1 Co- and Adjacent Channel Overlaps Calculation........................................................................... 508
9.3.1.1 Conversion From Channel Numbers to Start and End Frequencies ........................................ 509
9.3.1.2 Co-Channel Overlap Calculation .............................................................................................. 510
9.3.1.3 Adjacent Channel Overlap Calculation..................................................................................... 510
9.3.1.4 FDD TDD Overlap Ratio Calculation ..................................................................................... 511
9.3.1.5 Total Overlap Ratio Calculation................................................................................................ 512
9.3.2 Preamble Signal Level and Quality Calculations............................................................................ 512
9.3.2.1 Preamble Signal Level Calculation........................................................................................... 512
9.3.2.2 Preamble Noise Calculation ..................................................................................................... 514
9.3.2.3 Preamble Interference Calculation ........................................................................................... 515
9.3.2.4 Preamble C/N Calculation ........................................................................................................ 516
9.3.2.5 Preamble C/(I+N) Calculation................................................................................................... 517
9.3.3 Best Server Determination ............................................................................................................. 517
9.3.4 Service Area Calculation................................................................................................................ 518
9.3.5 Permutation Zone Selection (WiMAX 802.16e).............................................................................. 519
9.3.6 Traffic and Pilot Signal Level and Quality Calculations .................................................................. 520
9.3.6.1 Traffic and Pilot Signal Level Calculation (DL) ......................................................................... 520
9.3.6.2 Traffic and Pilot Noise Calculation (DL).................................................................................... 521
9.3.6.3 Traffic and Pilot Interference Calculation (DL).......................................................................... 522
9.3.6.3.1 Traffic and Pilot Interference Signal Levels Calculation (DL).............................................. 523
9.3.6.3.2 Effective Traffic and Pilot Interference Calculation (DL) ..................................................... 527
9.3.6.4 Traffic and Pilot C/N Calculation (DL)....................................................................................... 530
9.3.6.5 Traffic and Pilot C/(I+N) and Bearer Calculation (DL) .............................................................. 532
9.3.6.6 Traffic Signal Level Calculation (UL) ........................................................................................ 534
9.3.6.7 Traffic Noise Calculation (UL)................................................................................................... 535
9.3.6.8 Traffic Interference Calculation (UL)......................................................................................... 536
9.3.6.8.1 Traffic Interference Signal Levels Calculation (UL)............................................................. 536
9.3.6.8.2 Noise Rise Calculation (UL) ................................................................................................ 537
9.3.6.9 Traffic C/N Calculation (UL)...................................................................................................... 537
9.3.6.10 Traffic C/(I+N) and Bearer Calculation (UL) ............................................................................. 541
9.3.7 Throughput Calculation .................................................................................................................. 544
9.3.7.1 Calculation of Total Cell Resources.......................................................................................... 544
9.3.7.1.1 Calculation of Sampling Frequency .................................................................................... 544
9.3.7.1.2 Calculation of Symbol Duration........................................................................................... 545
9.3.7.1.3 Calculation of Total Cell Resources - TDD Networks ......................................................... 545
9.3.7.1.4 Calculation of Total Cell Resources - FDD Networks ......................................................... 547
9.3.7.2 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation.......... 547
Technical Reference Guide
18 AT283_TRG_E2 Forsk 2010
9.3.8 Scheduling and Radio Resource Management...............................................................................551
9.3.8.1 Scheduling and Radio Resource Allocation ..............................................................................551
9.3.8.2 User Throughput Calculation.....................................................................................................557
9.3.9 Smart Antenna Models....................................................................................................................558
9.3.9.1 Downlink Beamforming .............................................................................................................559
9.3.9.2 Uplink Beamforming..................................................................................................................560
9.3.9.3 Uplink Beamforming and Interference Cancellation (MMSE) ....................................................562
9.4 Automatic Allocation Algorithms ...........................................................................................................563
9.4.1 Automatic Neighbour Allocation......................................................................................................563
9.4.2 Automatic Inter-Technology Neighbour Allocation..........................................................................566
9.4.3 Automatic Frequency Planning.......................................................................................................568
9.4.3.1 Separation Constraint and Relationship Weights......................................................................569
9.4.3.2 Calculation of Cost Between TBA and Related Cells................................................................569
9.4.3.3 AFP Algorithm...........................................................................................................................571
9.4.4 Automatic Preamble Index Allocation .............................................................................................571
9.4.4.1 Constraint and Relationship Weights ........................................................................................572
9.4.4.2 Calculation of Cost Between TBA and Related Cells................................................................573
9.4.4.3 Automatic Allocation Algorithm..................................................................................................575
10 LTE Networks ................................................................................579
10.1 Definitions and Formulas......................................................................................................................579
10.1.1 Input ................................................................................................................................................579
10.1.2 Downlink Transmission Powers Calculation ...................................................................................582
10.1.3 Co- and Adjacent Channel Overlaps Calculation............................................................................584
10.1.4 Signal Level and Signal Quality Calculations..................................................................................585
10.1.4.1 Signal Level Calculation (DL) ....................................................................................................585
10.1.4.2 Noise Calculation (DL) ..............................................................................................................586
10.1.4.3 Interference Calculation (DL) ....................................................................................................586
10.1.4.4 C/N Calculation (DL) .................................................................................................................587
10.1.4.5 C/(I+N) Calculation (DL) ............................................................................................................587
10.1.4.6 Signal Level Calculation (UL) ....................................................................................................588
10.1.4.7 Noise Calculation (UL) ..............................................................................................................589
10.1.4.8 Interference Calculation (UL) ....................................................................................................589
10.1.4.9 Noise Rise Calculation (UL) ......................................................................................................589
10.1.4.10 C/N Calculation (UL) .................................................................................................................590
10.1.4.11 C/(I+N) Calculation (UL) ............................................................................................................590
10.1.5 Throughput Calculation...................................................................................................................590
10.1.5.1 Calculation of Downlink Cell Resources....................................................................................590
10.1.5.2 Calculation of Uplink Cell Resources ........................................................................................591
10.1.5.3 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation...........592
10.1.6 Scheduling and Radio Resource Management...............................................................................593
10.1.6.1 User Throughput Calculation.....................................................................................................594
10.2 Calculation Processes ..........................................................................................................................594
10.2.1 Point Analysis: Profile Tab ..............................................................................................................594
10.2.2 Point Analysis: Reception Tab ........................................................................................................595
10.2.3 Point Analysis: Interference Tab .....................................................................................................595
10.2.4 Downlink Reference Signal Level Coverage Predictions................................................................595
10.2.4.1 Coverage Area Determination...................................................................................................596
10.2.4.1.1 All Servers ...........................................................................................................................596
10.2.4.1.2 Best Signal Level and a Margin...........................................................................................596
10.2.4.1.3 Second Best Signal Level and a Margin..............................................................................596
10.2.4.2 Coverage Display ......................................................................................................................596
10.2.4.2.1 Coverage Resolution ...........................................................................................................596
10.2.4.2.2 Display Types ......................................................................................................................596
10.2.5 Effective Signal Analysis Coverage Predictions..............................................................................597
10.2.5.1 Coverage Area Determination...................................................................................................598
10.2.5.2 Coverage Parameter Calculation ..............................................................................................598
10.2.5.3 Coverage Display ......................................................................................................................598
10.2.5.3.1 Coverage Resolution ...........................................................................................................598
10.2.5.3.2 Effective Signal Analysis (DL) Display Types......................................................................598
10.2.5.3.3 Effective Signal Analysis (UL) Display Types......................................................................600
10.2.6 Calculations on Subscriber Lists.....................................................................................................600
10.2.7 Monte Carlo Simulations.................................................................................................................601
10.2.7.1 Generating a Realistic User Distribution ...................................................................................601
10.2.7.1.1 Simulations Based on User Profile Traffic Maps and Subscriber Lists................................601
10.2.7.1.2 Simulations Based on Sector Traffic Maps..........................................................................603
10.2.7.2 Simulation Process....................................................................................................................604
Table of Contents
Forsk 2010 AT283_TRG_E2 19
10.2.8 C/(I+N)-Based Coverage Predictions............................................................................................. 607
10.2.8.1 Coverage Area Determination .................................................................................................. 607
10.2.8.2 Coverage Parameter Calculation.............................................................................................. 607
10.2.8.3 Coverage Display ..................................................................................................................... 609
10.2.8.3.1 Coverage Resolution .......................................................................................................... 609
10.2.8.3.2 Coverage by C/(I+N) Level (DL) Display Types.................................................................. 609
10.2.8.3.3 Coverage by Best Bearer (DL) Display Types .................................................................... 610
10.2.8.3.4 Coverage by Throughput (DL) Display Types..................................................................... 610
10.2.8.3.5 Coverage by Quality Indicator (DL) Display Types ............................................................. 611
10.2.8.3.6 Coverage by C/(I+N) Level (UL) Display Types.................................................................. 611
10.2.8.3.7 Coverage by Best Bearer (UL) Display Types .................................................................... 611
10.2.8.3.8 Coverage by Throughput (UL) Display Types..................................................................... 612
10.2.8.3.9 Coverage by Quality Indicator (UL) Display Types ............................................................. 613
10.3 Calculation Algorithms ......................................................................................................................... 613
10.3.1 Downlink Transmission Powers Calculation................................................................................... 613
10.3.2 Co- and Adjacent Channel Overlaps Calculation........................................................................... 617
10.3.2.1 Conversion From Channel Numbers to Start and End Frequencies ........................................ 618
10.3.2.2 Co-Channel Overlap Calculation .............................................................................................. 618
10.3.2.3 Adjacent Channel Overlap Calculation..................................................................................... 619
10.3.2.4 Total Overlap Ratio Calculation................................................................................................ 620
10.3.3 Signal Level and Signal Quality Calculations ................................................................................. 620
10.3.3.1 Signal Level Calculation (DL) ................................................................................................... 620
10.3.3.2 Noise Calculation (DL).............................................................................................................. 623
10.3.3.3 Interference Calculation (DL).................................................................................................... 624
10.3.3.4 C/N Calculation (DL)................................................................................................................. 628
10.3.3.5 C/(I+N) and Bearer Calculation (DL) ........................................................................................ 630
10.3.3.6 Signal Level Calculation (UL) ................................................................................................... 634
10.3.3.7 Noise Calculation (UL).............................................................................................................. 636
10.3.3.8 Interference Calculation (UL).................................................................................................... 636
10.3.3.8.1 Interfering Signal Level Calculation (UL)............................................................................. 637
10.3.3.8.2 Noise Rise Calculation (UL) ................................................................................................ 638
10.3.3.9 C/N Calculation (UL)................................................................................................................. 639
10.3.3.10 C/(I+N) and Bearer Calculation (UL) ........................................................................................ 641
10.3.4 Best Server Determination ............................................................................................................. 644
10.3.5 Service Area Calculation................................................................................................................ 645
10.3.6 Throughput Calculation .................................................................................................................. 646
10.3.6.1 Calculation of Total Cell Resources.......................................................................................... 646
10.3.6.1.1 Calculation of Downlink Cell Resources ............................................................................. 646
10.3.6.1.2 Calculation of Uplink Cell Resources.................................................................................. 648
10.3.6.2 Channel Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation.......... 649
10.3.7 Scheduling and Radio Resource Management .............................................................................. 652
10.3.7.1 Scheduling and Radio Resource Allocation.............................................................................. 652
10.3.7.2 User Throughput Calculation.................................................................................................... 658
10.4 Automatic Allocation Algorithms........................................................................................................... 659
10.4.1 Automatic Neighbour Allocation ..................................................................................................... 659
10.4.2 Automatic Inter-Technology Neighbour Allocation ......................................................................... 661
10.4.3 Automatic Frequency Planning ...................................................................................................... 663
10.4.3.1 Separation Constraint and Relationship Weights ..................................................................... 664
10.4.3.2 Calculation of Cost Between TBA and Related Cells ............................................................... 664
10.4.3.3 AFP Algorithm........................................................................................................................... 667
10.4.4 Automatic Physical Cell ID Allocation............................................................................................. 667
10.4.4.1 Constraint and Relationship Weights........................................................................................ 667
10.4.4.2 Calculation of Cost Between TBA and Related Cells ............................................................... 668
10.4.4.3 Automatic Allocation Algorithm................................................................................................. 671
11 Repeaters and Remote Antennas................................................. 675
11.1 UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE Documents......................................................... 675
11.1.1 Signal Level Calculation................................................................................................................. 675
11.1.2 Downlink Total Gain Calculation .................................................................................................... 677
11.1.3 Uplink Total Gain Calculation......................................................................................................... 678
11.1.4 Repeater Noise Figure ................................................................................................................... 680
11.1.5 Appendix: Carrier Power and Interference Calculation .................................................................. 680
11.2 GSM Documents.................................................................................................................................. 683
11.2.1 Signal Level Calculation................................................................................................................. 683
11.2.2 EIRP Calculation ............................................................................................................................ 684
11.3 Donor-side Parameter Calculations ..................................................................................................... 686
11.3.1 Azimuth .......................................................................................................................................... 686
11.3.2 Mechanical Downtilt ....................................................................................................................... 686
Technical Reference Guide
20 AT283_TRG_E2 Forsk 2010
Chapter 1
Coordinate Systems and Units
Forsk 2010 AT283_TRG_E2 23
Chapter 1: Coordinate Systems and Units
1 Coordinate Systems and Units
1.1 Coordinate Systems
A map or a geo-spatial database is a flat representation of data collected from a curved surface. A projection is a means
for producing all or part of a spheroid on a flat sheet. This projection cannot be done without distortion. Therefore, the
cartographer must choose the characteristic (distance, direction, scale, area, or shape) that he wants to be shown
accurately at the expense of the other characteristics, or compromise on several characteristics [1-3]. The projected zones
are referenced using cartographic coordinates (meter, yard, etc.). Two projection methods are widely used:
The Lambert Conformal-Conic Method: A portion of the earth is mathematically projected on a cone
conceptually secant at one or two standard parallels. This projection method is useful for representing countries
or regions that have a predominant east-west expanse.
The Universal Transverse Mercator (UTM) Method: A portion of the earth is mathematically projected on a
cylinder tangent to a meridian (which is transverse or crosswise to the equator). This projection method is useful
for mapping large areas that are oriented north-south.
The geographic system is not a projection. It is only a representation of a location on the surface of the earth in geographic
coordinates (degree-minute-second, grade) giving the latitude and longitude in relation to the meridian origin (e.g., Paris
for NTF system and Greenwich for ED50 system). The locations in the geographic system can be converted into other
projections.
1.1.1 Description of Coordinate Systems
A Geographic coordinate system is a latitude and longitude coordinate system. The latitude and longitude are related to
an ellipsoid, a geodetic datum, and a prime meridian. The geodetic datum provides the position and orientation of the
ellipsoid relative to the earth.
Cartographic coordinate systems are obtained by transforming each (latitude, longitude) value into an (easting, northing)
value. A projection coordinate system is obtained by transforming each (latitude, longitude) value into an (easting,
northing) value. Projection coordinate systems are geographic coordinate systems that provide longitude and latitude, and
the transformation method characterised by a set of parameters. Different methods may require different sets of
parameters. For example, the parameters required for Transverse Mercator coordinate systems are:
The longitude of the natural origin (central meridian)
The latitude of the natural origin
The False Easting value
The False Northing value
A scaling factor at the natural origin (central meridian)
Basic definitions are presented below.
1.1.1.1 Geographic Coordinate System
The geographic coordinate system is a datum and a meridian. Atoll enables you to choose the most suitable geographic
coordinate system for your geographic data.
1.1.1.2 Datum
The datum consists of the ellipsoid and its position relative to the WGS84 ellipsoid. In addition to the ellipsoid, translation,
rotation, and distortion parameters define the datum.
1.1.1.3 Meridian
The standard meridian is Greenwich, but some geographic coordinate systems are based on other meridians. These
meridians are defined by the longitude with respect to Greenwich.
1.1.1.4 Ellipsoid
The ellipsoid is the pattern used to model the earth. It is defined by its geometric parameters.
References:
[1] Snyder, John. P., Map Projections Used by the US Geological Survey, 2nd Edition, United States Government
Printing Office, Washington, D.C., 313 pages, 1982.
[2] http://www.colorado.edu/geography/gcraft/notes/gps/gps_f.html
[3] http://www.posc.org/Epicentre.2_2/DataModel/ExamplesofUsage/eu_cs34.html
[4] http://www.ign.fr/telechargement/Pi/SERVICES/transfo.pdf (Document in French)
24 AT283_TRG_E2 3DF 01955 6980 RKZZA Forsk 2010
Technical Reference Guide
1.1.1.5 Projection
The projection is the transformation applied to project the ellipsoid of the earth on to a plane. There are different projection
methods that use specific sets of parameters.
1.1.1.6 Projection Coordinate System
The projection coordinate system is the result of the application of a projection to a geographic coordinate system. It
associates a geographic coordinate system and a projection. Atoll enables you to choose the projection coordinate
system matching your geographic data.
1.1.2 Coordinate Systems in Atoll
Depending on the working environment, there can be either two or four coordinate systems used in Atoll. If you are
working with stand-alone documents, i.e., documents not connected to databases, there are two coordinate systems used
in Atoll:
Projection coordinate system
Display coordinate system
If you are working in a multi-user environment, Atoll uses four coordinate systems:
Projection coordinate system for the Atoll document
Display coordinate system for the Atoll document
Internal projection coordinate system for the database
Internal display coordinate system for the database
1.1.2.1 Projection Coordinate System
The projection coordinate system is the coordinate system of the available raster geographic data files. You should set the
projection coordinate system of your Atoll document so that it corresponds to the coordinate system of the available raster
geographic data. You can set the projection coordinate system of your document in the Options dialog.
All the raster geographic data files that you want to import and use in an Atoll document must have the same coordinate
system. You cannot work with raster geographic data files with different coordinate systems in the same document.
The projection coordinate system is used to keep the coordinates of sites (radio network data) consistent with the
geographic data.
When you import a raster geographic data file, Atoll reads the geo-referencing information from the file (or from its header
file, depending on the geographic data file format), i.e., its Northwest pixel, to determine the coordinates of each pixel.
Atoll does not use any coordinate system during the import process. However, the geo-referencing information of
geographic data files are considered to be provided in the projection coordinate system of the document.
1.1.2.2 Display Coordinate System
The display coordinate system is the coordinate system used for the display, e.g., in dialogs, in the Map window rulers, in
the status bar, etc. The coordinates of each pixel of geographic data are converted to the display coordinate system from
the projection coordinate system for display. The display coordinate system is also used for sites (radio network data). You
can set the display coordinate system of your document in the Options dialog.
If you import sites data, the coordinate system of the sites must correspond to the display coordinate system of your Atoll
document.
If you change the display coordinate system in a document which is not connected to a database, the coordinates of all
the sites are converted to the new display system.
1.1.2.3 Internal Coordinate Systems
The internal coordinate systems are the projection and the display coordinate systems stored in a database. The projection
and display coordinate systems set by the administrator in the central Atoll project are stored in the database when the
database is created, and cannot be modified by users. Only the administrator can modify the internal coordinate systems
manually by editing the entries in the CoordSys and the Units tables. All Atoll documents opened from a database will
have the internal coordinate systems of the database as their default projection and display coordinate systems.
Note:
If you import vector geographic data (e.g., traffic, measurements, etc.) with different coordinate
systems, it is possible to convert the coordinate systems of these data into the projection
coordinate system of your Atoll document.
Note:
If the coordinate systems of all your geographic data files and sites (radio network data) are the
same, you do not have to define the projection and display coordinate systems separately. By
default, the two coordinate systems are the same.
Forsk 2010 AT283_TRG_E2 25
Chapter 1: Coordinate Systems and Units
When exporting an Atoll project to a database, the currently chosen display coordinate system becomes the internal
display coordinate system for the database, and the currently chosen projection coordinate system becomes the internal
projection coordinate system for the database.
Although Atoll stores both the coordinate systems in the database, i.e., the projection and the display coordinate systems,
the only relevant coordinate system for the database is the internal display coordinate system because this coordinate
system is the one used for the coordinates of sites (radio network data).
Users working on documents connected to a database can modify the coordinate systems in their documents locally, and
save these changes in their documents, but they cannot modify the coordinate systems stored in the database.
If you change the display coordinate system in a document which is not connected to a database, the coordinates of all
the sites are converted to the new display system.
If you change the display coordinate system in a document which is connected to a database, the coordinates of all the
sites are converted to the new coordinate system in the Atoll document locally but not in the database because the internal
coordinate systems cannot be changed.
Atoll uses the internal coordinates systems in order to keep the site coordinates consistent in the database which is
usually accessed by a large number of users in a multi-user environment.
1.1.3 File Formats
The Coordsystems folder located in the Atoll installation directory contains all the coordinate systems, both geographic
and cartographic, offered in the tool. Coordinate systems are grouped by regions. A catalogue per region and a
"Favourites" catalogue are available in Atoll. The Favourites catalogue is initially empty and can be filled by the user by
adding coordinate systems to it. Each catalogue is described by an ASCII text file with .cs extension. In a .cs file, each
coordinate system is described in one line. The line syntax for describing a coordinate system is:
Examples:
You should keep the following points in mind when editing or creating .cs files:
The identification code enables Atoll to differentiate coordinates systems. In case you create a new coordinate
system, its code must be an integer value higher than 32767.
When describing a new datum, you must enter the ellipsoid code and parameters instead of the datum code in
brackets. There can be 3 to 7 parameters defined in the following order: Dx, Dy, Dz, Rx, Ry, Rz, S. The syntax of
the line in the .cs file will be:
There can be up to seven projection parameters. These parameters must be ordered according to the parameter
index (see "Projection Parameter Indices" on page 28). Parameter with index 0 is the first one. Projection
parameters are delimited by commas.
For UTM projections, you must provide positive UTM zone numbers for north UTM zones and negative numbers
for south UTM zones.
You can add all other information as comments (such as usage or region).
Codes of units, data, projection methods, and ellipsoids, and projection parameter indices are listed in the tables below.
1.1.3.1 Unit Codes
Code = "Name of the system"; Unit Code; Datum Code; Projection Method Code,
Projection Parameters; "Comments"
4230 = "ED50"; 101; 230; 1; "Europe - west"
32045 = "NAD27 / Vermont"; 2; 267; 6, -72.5, 42.5, 500000, 0, 0.9999643; "United
States - Vermont"
Code = "Name of the system"; Unit Code; {Ellipsoid Code, Dx, Dy, Dz, Rx, Ry,
Rz, S}; Projection Method Code, Projection Parameters; "Comments"
Code Cartographic Units Code Geographic Units
0 Metre 100 Radian
1 Kilometre 101 Degree
2 Foot 102 Grad
3 Link 103 ArcMinute
4 Chain 104 ArcSecond
5 Yard
6 Nautical mile
7 Mile
-1 Unspecified -1 Unspecified
26 AT283_TRG_E2 3DF 01955 6980 RKZZA Forsk 2010
Technical Reference Guide
1.1.3.2 Datum Codes
Code Datum Code Datum
121 Greek Geodetic Reference System 1987 260 Manoca
125 Samboja 261 Merchich
126 Lithuania 1994 262 Massawa
130 Moznet (ITRF94) 263 Minna
131 Indian 1960 265 Monte Mario
201 Adindan 266 M'poraloko
202 Australian Geodetic Datum 1966 267 North American Datum 1927
203 Australian Geodetic Datum 1984 268 NAD Michigan
204 Ain el Abd 1970 269 North American Datum 1983
205 Afgooye 270 Nahrwan 1967
206 Agadez 271 Naparima 1972
207 Lisbon 272 New Zealand Geodetic Datum 1949
208 Aratu 273 NGO 1948
209 Arc 1950 274 Datum 73
210 Arc 1960 275 Nouvelle Triangulation Franaise
211 Batavia 276 NSWC 9Z-2
212 Barbados 277 OSGB 1936
213 Beduaram 278 OSGB 1970 (SN)
214 Beijing 1954 279 OS (SN) 1980
215 Reseau National Belge 1950 280 Padang 1884
216 Bermuda 1957 281 Palestine 1923
217 Bern 1898 282 Pointe Noire
218 Bogota 283 Geocentric Datum of Australia 1994
219 Bukit Rimpah 284 Pulkovo 1942
221 Campo Inchauspe 285 Qatar
222 Cape 286 Qatar 1948
223 Carthage 287 Qornoq
224 Chua 288 Loma Quintana
225 Corrego Alegre 289 Amersfoort
226 Cote d'Ivoire 290 RT38
227 Deir ez Zor 291 South American Datum 1969
228 Douala 292 Sapper Hill 1943
229 Egypt 1907 293 Schwarzeck
230 European Datum 1950 294 Segora
231 European Datum 1987 295 Serindung
232 Fahud 296 Sudan
233 Gandajika 1970 297 Tananarive 1925
234 Garoua 298 Timbalai 1948
235 Guyane Francaise 299 TM65
236 Hu Tzu Shan 300 TM75
237 Hungarian Datum 1972 301 Tokyo
238 Indonesian Datum 1974 302 Trinidad 1903
239 Indian 1954 303 Trucial Coast 1948
240 Indian 1975 304 Voirol 1875
241 Jamaica 1875 305 Voirol Unifie 1960
242 Jamaica 1969 306 Bern 1938
243 Kalianpur 307 Nord Sahara 1959
244 Kandawala 308 Stockholm 1938
245 Kertau 309 Yacare
247 La Canoa 310 Yoff
248 Provisional South American Datum 1956 311 Zanderij
Forsk 2010 AT283_TRG_E2 27
Chapter 1: Coordinate Systems and Units
1.1.3.3 Projection Method Codes
1.1.3.4 Ellipsoid Codes
249 Lake 312 Militar-Geographische Institut
250 Leigon 313 Reseau National Belge 1972
251 Liberia 1964 314 Deutsche Hauptdreiecksnetz
252 Lome 315 Conakry 1905
253 Luzon 1911 322 WGS 72
254 Hito XVIII 1963 326 WGS 84
255 Herat North 901 Ancienne Triangulation Franaise
256 Mahe 1971 902 Nord de Guerre
257 Makassar 903
NAD 1927 Guatemala/Honduras/Salvador
(Panama Zone)
258 European Reference System 1989
Code Datum Code Datum
Code Projection Method Code Projection Method
0 Undefined 8 Oblique Stereographic
1 No projection > Longitude / Latitude 9 New Zealand Map Grid
2 Lambert Conformal Conical 1SP 10 Hotine Oblique Mercator
3 Lambert Conformal Conical 2SP 11 Laborde Oblique Mercator
4 Mercator 12 Swiss Oblique Cylindrical
5 Cassini-Soldner 13 Oblique Mercator
6 Transverse Mercator 14 UTM Projection
7 Transverse Mercator South Oriented
Code Name Major Axis Minor Axis
1 Airy 1830 6377563.396 6356256.90890985
2 Airy Modified 1849 6377340.189 6356034.44761111
3 Australian National Spheroid 6378160 6356774.71919531
4 Bessel 1841 6377397.155 6356078.96261866
5 Bessel Modified 6377492.018 6356173.50851316
6 Bessel Namibia 6377483.865 6356165.38276679
7 Clarke 1858 6378293.63924683 6356617.98173817
8 Clarke 1866 6378206.4 6356583.8
9 Clarke 1866 Michigan 6378693.7040359 6357069.45104614
10 Clarke 1880 (Benoit) 6378300.79 6356566.43
11 Clarke 1880 (IGN) 6378249.2 6356515
12 Clarke 1880 (RGS) 6378249.145 6356514.86954978
13 Clarke 1880 (Arc) 6378249.145 6356514.96656909
14 Clarke 1880 (SGA 1922) 6378249.2 6356514.99694178
15 Everest 1830 (1937 Adjustment) 6377276.345 6356075.41314024
16 Everest 1830 (1967 Definition) 6377298.556 6356097.5503009
17 Everest 1830 (1975 Definition) 6377301.243 6356100.231
18 Everest 1830 Modified 6377304.063 6356103.03899315
19 GRS 1980 6378137 6356752.31398972
20 Helmert 1906 6378200 6356818.16962789
21 Indonesian National Spheroid 6378160 6356774.50408554
22 International 1924 6378388 6356911.94612795
23 International 1967 6378160 6356774.71919530
24 Krassowsky 1940 6378245 6356863.01877305
25 NWL 9D 6378145 6356759.76948868
26 NWL 10D 6378135 6356750.52001609
27 Plessis 1817 6376523 6355862.93325557
28 AT283_TRG_E2 3DF 01955 6980 RKZZA Forsk 2010
Technical Reference Guide
1.1.3.5 Projection Parameter Indices
1.1.4 Creating a Coordinate System
Atoll provides a large catalogue of default coordinate systems. Nevertheless, it is possible to add the description of
geographic and cartographic coordinate systems. New coordinate systems can be created from scratch or initialised on
the basis of an existing one.
To create a new coordinate system from scratch:
1. Select Tools > Options. The Options dialogue opens.
2. Select the Coordinates tab.
3. Click the browse button (...) on the right of the Projection field.
4. Click the New button. The Coordinate System dialog opens.
5. In the Coordinate System dialogue:
a. Select the coordinate systems catalogue to which you want to add the new coordinate system.
b. In the General properties section: Enter a name for the new coordinate system, select a unit. You can also
enter any comments about its usage. Atoll assigns the code automatically.
c. In the Category section: Select the type of coordinate system. Enter the longitude and latitude for a
geographic coordinate system, or the type of projection and its set of associated parameters for a cartographic
coordinate system (false easting and northing, and the first and second parallels).
d. In the Geo section: Specify the meridian and choose a datum for the coordinate system. The associated
ellipsoid is automatically selected. You can also describe a geodetic datum by selecting "..." in the Datum list.
In this case, you must provide parameters (Dx, Dy, Dz, Rx, Ry, Rz, and S) needed for the transformation of
the datum into WGS84, and an ellipsoid.
6. Click OK. The new coordinate system is added to the selected coordinate system catalogue.
To create a new coordinate system based on an existing system, select a coordinate system in the Coordinate Systems
dialog before clicking New in step 4. The new coordinate system is initialised with the values of the selected coordinate
system.
1.2 Units
1.2.1 Power Units
Depending on the working environment, there can be either one or two types of units for transmission and reception
powers. If you are working with stand-alone documents, i.e., documents not connected to databases, there is only one unit
used in Atoll:
Display power units
If you are working in a multi-user environment, Atoll uses two type of units:
Display power units for the Atoll document
Internal power units for the database
28 Struve 1860 6378297 6356655.84708038
29 War Office 6378300.583 6356752.27021959
30 WGS 84 6378137 6356752.31398972
31 GEM 10C 6378137 6356752.31398972
32 OSU86F 6378136.2 6356751.51667196
33 OSU91A 6378136.3 6356751.61633668
34 Clarke 1880 6378249.13884613 6356514.96026256
35 Sphere 6371000 6371000
Code Name Major Axis Minor Axis
Index Projection Parameter Index Projection Parameter
0 UTM zone number 4 Scale factor at origin
0 Longitude of origin 4 Latitude of 1st parallel
1 Latitude of origin 5 Azimuth of central line
2 False Easting 5 Latitude of 2nd parallel
3 False Northing 6 Angle from rectified to skewed grid
Forsk 2010 AT283_TRG_E2 29
Chapter 1: Coordinate Systems and Units
The display units are used for the display in dialogs and tables, e.g., reception thresholds (coverage prediction properties,
etc.), and received signal levels (measurements, point analysis, coverage predictions, etc.). You can set the display units
for your document in the Options dialog.
The internal units are the power units stored in a database. The power units set by the administrator in the central Atoll
project are stored in the database when the database is created, and cannot be modified by users. Only the administrator
can modify the internal units manually by editing the entries in the Units tables. All Atoll documents opened from a
database will have the internal units of the database as their default power units.
Users working on documents connected to a database can modify the units in their documents locally, and save these
changes in their documents, but they cannot modify the units stored in the database.
1.2.2 Length Units
There are two types of units for distances, heights, and offsets:
Display length units
Internal length units
The display length units are used to display distances, heights, and offsets in dialogs, tables, and the status bar. You can
set the display units for your document in the Options dialog.
The internal unit for lengths is metre for all Atoll documents whether they are connected to databases or not. The internal
unit is not stored in the databases. The internal unit cannot be changed.
1.3 BSIC Format
Depending on the working environment, there can be either one or two types of BSIC formats. If you are working with
stand-alone documents, i.e., documents not connected to databases, there is only one BSIC format:
Display BSIC format
If you are working in a multi-user environment, Atoll uses two type of formats:
Display BSIC format for the Atoll document
Internal BSIC format for the database
The display format is used for the display in dialogs and tables. You can set the display format for your document from the
Transmitters folders context menu.
The internal format is the BSIC format stored in a database. The BSIC format set by the administrator in the central Atoll
project is stored in the database when the database is created, and cannot be modified by users. Only the administrator
can modify the internal format manually by editing the corresponding entry in the Units tables. All Atoll documents opened
from a database will have the internal format of the database as their default BSIC format.
Users working on documents connected to a database can modify the format in their documents locally, and save this
change in their documents, but they cannot modify the format stored in the database.
30 AT283_TRG_E2 3DF 01955 6980 RKZZA Forsk 2010
Technical Reference Guide
Chapter 2
Geographic and Radio Data
Forsk 2010 AT283_TRG_E2 33
Chapter 2: Geographic and Radio Data
2 Geographic and Radio Data
2.1 Geographic Data
2.1.1 Data Type
Atoll manages several geographic data types; DTM (Digital Terrain Model), clutter (Land-Use), scanned images, vector
data, traffic data, population, and any other generic data.
2.1.1.1 Digital Terrain Model (DTM)
The DTM (Digital Terrain Model or height) files describe the ground elevation above the sea level. DTM files supported by
Atoll are 16 bits/pixel relief maps in .tif, .bil, Planet and Erdas Imagine formats and 8 bits/pixel relief maps in .tif, .bil,
Erdas Imagine and .bmp formats. DTM maps are taken into account in path loss calculations by Atoll propagation models.
DTM file provides altitude value (z stated in metre) on evenly spaced points. Abscissa and ordinate axes are respectively
oriented in right and downwards directions. Space between points is defined by pixel size (P stated in metre). Pixel size
must be the same in both directions. First point given in the file corresponds to the centre of the upper-left pixel of the map.
This point refers to the northwest point geo-referenced by Atoll. Four points (hence, four altitude values) are necessary
to describe a bin; these points are bin vertices.
Therefore, a n*n bin DTM file requires (n)
2
points (altitude values).
Figure 2.1Digital Terrain Model
Figure 2.2Schematic view of a DTM file
Notes:
Altitude values differ within a bin. Method used to calculate altitudes is described in the
Path loss calculations: Altitude determination part. Concerning DTM map display, Atoll
takes altitude of the southwest point of each bin to determine its colour.
In most documents, Digital Elevation Model (DEM) and Digital Terrain Model (DTM) are
differentiated and do not have the same meaning. By definition, DEM refers to altitude
above sea level including, both, ground and clutter while DTM just corresponds to the
ground height above sea level. In Atoll, the DEM term may be used instead of DTM term.
34 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
2.1.1.2 Clutter (Land Use)
You may import two types of clutter files in ATL documents. These files indicate either the clutter class or the clutter height
on each bin of the map.
2.1.1.2.1 Clutter Classes
Atoll supports 8 bits/pixel (255 classes) raster maps in .tif, .bil, .bmp, Erdas Imagine formats or 16 bits/pixel raster maps
in Planet format. This kind of clutter file describes the land cover (dense urban, buildings, residential, forest, open,
villages, ). A grid map represents ground and each bin of the map is characterised by a code corresponding to a main
type of cover (a clutter class). Atoll automatically lists all the clutter classes of the map. It is possible to specify an average
clutter height for each clutter class manually during the map description step. Clutter maps are taken into account in path
loss calculations by Atoll propagation models.
Clutter file provides a clutter code per bin. Bin size is defined by pixel size (P stated in metre). Pixel size must be the same
in both directions. Abscissa and ordinate axes are respectively oriented in right and downwards directions. First point given
in the file corresponds to the centre of the upper-left pixel of the image. This point refers to the northwest point geo-
referenced by Atoll.
Therefore, a n*n bin Clutter file requires (n)
2
code values.
2.1.1.2.2 Clutter Heights
Files supported by Atoll for clutter heights are 8 or 16 bits/pixel raster maps in .tif, .bil and Erdas Imagine formats. The file
provides clutter height value on evenly spaced points. Abscissa and ordinate axes are respectively oriented in right and
downwards directions. Space between points is defined by pixel size (P in metre). Pixel size must be the same in both
directions. First point given in the file corresponds to the centre of the upper-left pixel of the map. This point refers to the
northwest point geo-referenced by Atoll.
These maps are taken into account in path loss calculations by Atoll propagation models.
2.1.1.3 Traffic Data
Atoll offers different kinds of traffic data:
2.1.1.3.1 User Profile Environment Based Traffic Maps
Atoll supports 8 bits/pixel (256 class) traffic raster maps in .tif, .bil, .bmp, Erdas Imagine formats. These maps provide
macroscopic traffic estimation. Each pixel is assigned an environment class, which is a list of user profiles with a defined
mobility type and a density.
2.1.1.3.2 User Profile Traffic Maps
Atoll supports vector traffic maps with .dxf, Planet, .shp, .mif and .agd formats. These maps are detailed traffic
estimations (lines, polygons or points carrying a specific traffic). Each polygon, line or point is assigned a specific user
profile with associated mobility type and density. They can be built from population density vector maps.
2.1.1.3.3 Sector Traffic Maps
Atoll supports maps with .agd format. This kind of map is based on the network feedback. It provides actual information
on connections (and not just subscriber estimation) from the network. It is built from a coverage by transmitter prediction
Figure 2.3Clutter Classes
Note:
The clutter code is the same inside a bin.
Note:
Atoll considers the clutter height of the nearest point in calculations (see Path loss
calculations: Clutter determination part). For map display, Atoll takes clutter height of the
southwest point of each bin to determine its colour.
Forsk 2010 AT283_TRG_E2 35
Chapter 2: Geographic and Radio Data
study that defines sector boundaries for the traffic distribution in each sector. In UMTS and CDMA, either data rates or the
number of users per service are indicated for each transmitter service area. In GSM/TDMA, Atoll expects a number of
Erlangs in case of voice service and data rate values for packet-switched services for each transmitter service area.
2.1.1.3.4 User Density Traffic Maps
This kind of map is only available in GSM/TDMA documents. Atoll supports 16 and 32 bits/pixel traffic raster maps in .tif,
.bil, .bmp, Planet and Erdas Imagine formats. This map is also based on the network feedback as it deals with network
users information as well. Each pixel is assigned a number of users with a given service, terminal and mobility type.
In GSM documents, traffic maps are taken into account for traffic analysis and network dimensioning. In UMTS and CDMA
documents, they are used by the Monte-Carlo simulator to model user distributions and evaluate related network
parameters (cell power, mobile terminal power, ).
2.1.1.4 Vector Data
These data represent either polygons (regions, etc.), lines (roads, coastlines, etc.) or points (towns, etc.). Atoll supports
vector data files in .dxf, Planet, .shp, .mif and .agd formats. These maps are only used for display and provide
information about the geographic environment.
2.1.1.5 Scanned Images
These geographic data include the road maps and the satellite images. They are only used for display and provide
information about the geographic environment. Atoll supports scanned image files in .tif (1, 4, 8, 24-bits/pixel), .bil (1, 4,
8, 24-bits/pixel), Planet (1, 4, 8, 24-bits/pixel), .bmp (1-24-bits/pixel), Erdas Imagine (1, 4, 8, 24-bits/pixel) and .ecw (24-
bits/pixel) formats.
2.1.1.6 Population
Atoll deals with vector population files (polygons, lines or points) in .mif, .shp and .agd formats or 8, 16, 32 bits/pixel raster
population files in .tif, .bil, .bmp and Erdas Imagine formats. Population map describes the population distribution. They
are considered in clutter statistics and in coverage prediction reports.
2.1.1.7 Other Geographic Data
It is possible to import generic geographic data types, other than those listed above, (Customer density, revenue density,
etc.) in Atoll. These data can be either vector files in .mif, .shp and .agd formats or 8, 16, 32 bits/pixel raster files in .tif,
.bil, .bmp and Erdas Imagine formats. These maps are taken into account in clutter statistics and in coverage prediction
reports.
The ArcView Grid format (.txt) is an ASCII format dedicated to define raster maps. It may be used to export any raster map
such as DTM, images, Clutter Classes and/or Heights, Population, Generic data maps and even coverage predictions.
The contents of an ArcView Grid file are in ASCII and consist of a header, describing the content, followed by the content
in the form of cell values.
2.1.2 Supported Geographic Data Formats
Atoll offers Import/Export filters for the most commonly used geographic data formats. The different filters are:
Notes:
The minimum resolution supported by Atoll is 1m for any raster maps, excepted for
scanned images, for which it is unlimited.
DTM and clutter map resolution must be an integer.
All the raster maps you want to import in an ATL document must be represented in the
same projection system.
File format
Import/
Export
Can contain Georeferenced
.bil Both
DTM, Clutter classes and heights, Traffic,
Image, Population, Other data
Yes via .hdr files
.tif Both
DTM, Clutter classes and heights, Traffic,
Image, Population, Other data
Yes via associated .tfw files if
they exist
Planet Both DTM, Clutter classes, Image, Vector data Yes via index files
.bmp Both
DTM, Clutter heights, Clutter classes, Traffic,
Image, Population, Other data
Yes via .bpw (or .bmw) files
.dxf Import Only Vector data, Vector traffic Yes
.shp Both
Vector data, Vector traffic, Population, Other
data
Yes
.mif/.mid Both
Vector data, Vector traffic, Population, Other
data
Yes
36 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Thus, to sum up, you can import:
DTM files in .tif (16-bits, 8-bits), .bil (16-bits, 8-bits), Planet (16-bits), Erdas Imagine (16-bits, 8-bits), Vertical
Mapper (.grd, .grc) and .bmp (8-bits) formats.
Clutter heights files in .tif (16-bits, 8-bits), .bil (16-bits, 8-bits), Erdas Imagine (16-bits, 8-bits), Vertical Mapper (.grd,
.grc) and .bmp (8-bits) formats.
Clutter classes and traffic raster files in .tif (8-bits), .bil (8-bits), .bmp (8-bit), Erdas Imagine (8-bits) and Vertical
Mapper (.grd, .grc) and Planet format (16-bits) are also supported.
Vector data files in .dxf, Planet, .shp, .mif and .agd formats.
Vector traffic files in .dxf, Planet, .shp, .mif and .agd formats.
Scanned image files in .tif (1, 4, 8, 24-bits), .bil (1, 4, 8, 24-bits), Planet (1, 4, 8, 24-bits), .bmp (1-24-bits), Erdas
Imagine (1, 4, 8, 24-bits), Vertical Mapper (.grd, .grc) and .ecw (Enhanced Compressed Wavelet) (24 bits) formats.
Population files in .mif, .shp, .agd, .tif (8, 16, 32-bits), .bil (8, 16, 32-bits), .bmp (8, 32-bits), Vertical Mapper (.grd,
.grc) and Erdas Imagine (8, 16, 32-bits) formats.
Other generic data types in .mif, .shp, .agd, .tif (8, 16, 32-bits), .bil (8, 16, 32-bits), .bmp (8, 32-bits), Vertical
Mapper (.grd, .grc) and Erdas Imagine (8, 16, 32-bits) formats.
2.2 Radio Data
Atoll manages several radio data types; sites, transmitters, antennas, stations and hexagonal designs. Data definition in
Atoll is detailed hereafter.
2.2.1 Site
A site is a geographical point where one or several transmitters (multi-sectored site or station) equipped with antennas are
located.
2.2.2 Antenna
An antenna is a device used for transmitting or receiving electromagnetic waves.
2.2.3 Transmitter
A transmitter is a group of radio devices located at a site. Transmitters are equipped with antenna(s) and other equipment
such as feeder, tower mounted amplifiers (TMA) and BTS.
2.2.4 Repeater
A repeater is a device that receives, amplifies and transmits the radiated or conducted RF carrier both in downlink and
uplink. It comprises a donor side and a server side. The donor side receives the signal from a donor transmitter. This signal
may be carried by different types of links such as radio link, microwave link, or optic fibre. The server side transmits the
repeated signal.
Erdas Imagine Import Only
DTM, Clutter classes and heights, Traffic,
Image, Population, Other data
Yes
ArcView Grid Export Only
DTM, Clutter classes and heights, Traffic,
Image, Population, Other data
Yes automatically embedded in
the data file
.agd Both
Vector data, Vector traffic, Population, Other
data
Yes automatically embedded in
the data file
Vertical Mapper
(.grd, .grc)
Both
DTM, Clutter classes and heights, Traffic,
Image, Population, Other data
Yes automatically embedded in
the data file
.ecw Import Only Images Yes via ers file (not mandatory)
Note:
The .wld files may be used as georeferencement file for any type of binary raster file.
Tiled .tif format is not supported.
Note:
It is possible to import Packbit, FAX-CCITT3 and LZW compressed .tif files. However, in
case of DTM and clutter, we recommend not to use compressed files in order to avoid poor
performances. If uncompressed files are too big, it is better to split them.
Forsk 2010 AT283_TRG_E2 37
Chapter 2: Geographic and Radio Data
2.2.5 Remote Antenna
The use of remote antennas allows antenna positioning at locations that would normally require prohibitively long runs of
feeder cable. A remote antenna is connected to the base station via an optic fibre. The main difference from a repeater is
that a remote antenna generates its own cell whereas a repeater extends the coverage of an existing cell.
2.2.6 Station
A station can represent one transmitter on a site or a group of transmitters on a same site sharing the same properties.
You can define station templates and build your network from stations instead of single transmitters.
2.2.7 Hexagonal Design
A hexagonal design is a group of stations created from the same station template.
2.2.8 GSM GPRS EGPRS Documents
2.2.8.1 TRX
A base station (transmitter) consists of several transceivers or TRXs. One TRX supports as many timeslots as the
multiplexing factor defined in properties of your frequency band (8 timeslots in GSM networks). Three types of TRXs are
modelled in Atoll:
The BCCH TRX type: carries the BCCH,
The TCH TRX type: which is the default traffic carrier,
The TCH_INNER TRX type: this TRX type is an inner traffic carrier.
2.2.8.2 Subcell
A subcell corresponds to a group of TRXs having the same radio characteristics, the same quality (C/I) requirements, and
common settings. A subcell is characterised by the transmitter-TRX type pair. Each transmitter may have one or more
subcells. The most common configurations are the {BCCH, TCH} configuration or the {BCCH, TCH, TCH_INNER} one.
2.2.8.3 Cell Type
A cell type describes the subcells (types of TRXs) that a cell can use and their parameters, which can be different. In the
current Atoll version, the cell type definition must include a TRX type as the BCCH carrier (BCCH TRX type) and another
TRX type as the default traffic carrier (TCH TRX type). Only one TRX type carrying the broadcast and only one TRX type
carrying the default TCH are supported.
2.2.9 All CDMA, WiMAX, and LTE Documents
2.2.9.1 Cell
Cell comprises the carrier characteristics of a transmitter. Cell is characterised by the transmitter-carrier pair. The
transmitter-carrier pair must be unique.
38 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Chapter 3
File Formats
Forsk 2010 AT283_TRG_E2 41
Chapter 3: File Formats
3 File Formats
3.1 BIL Format
Band Interleaved by Line is a method of organizing image data for multi-band images. It is a schema for storing the actual
pixel values of an image in a file. The pixel data is typically preceded by a file header that contains auxiliary data about the
image, such as the number of rows and columns in the image, a colour map, etc. .bil data stores pixel information band
by band for each line, or row, of the image. Although .bil is a data organization schema, it is treated as an image format.
An image description (number of rows and columns, number of bands, number of bits per pixel, byte order, etc.) has to be
provided to be able to display the .bil file. This information is included in the header .hdr file associated with the .bil file. A
.hdr file has the same name as the .bil file it refers to, and should be located in the same directory as the source file. The
.hdr structure is simple; it is an ASCII text file containing eleven lines. You can open a .hdr file using any ASCII text editor.
Atoll supports the following objects in .bil format:
Digital Terrain Model (8 or 16 bits)
Clutter heights (8 or 16 bits)
Clutter classes and User profile environment based traffic maps (8 bits)
User density traffic maps (16 or 32 bits)
Raster images (1, 4, 8, 24 bits)
Population maps (8, 16, 32 bits)
Other generic geographic data (8, 16, 32 bits)
Path loss or received signal level value matrices (16 bits)
3.1.1 HDR Header File
3.1.1.1 Description
The header file is a text file that describes how data are organised in the .bil file. The header file is made of rows, each
row having the following format:
where keyword corresponds to an attribute type, and value defines the attribute value.
Keywords required by Atoll are described below. Other keywords are ignored.
Four additional keywords may be optionally managed.
which can be :
in some cases, this keyword can be replace by datatype defined as follows:
keywordvalue
nrowsNumber of rows in the image.
ncolsNumber of columns in the image.
nbandsNumber of spectral bands in the image, (1 for DTM data and 8 bit pictures).
nbitsNumber of bits per pixel per band; 8 or 16 for DTMs or Clutter heights
(altitude in metres), 8 for clutter classes file (clutter
code), 16 for path loss matrices (path loss in dB, field
value in dBm, dBV and DBV/m).
byteorderByte order in which image pixel values are stored. Accepted values are
M (Motorola byte order) or I (Intel byte order).
layoutMust be bil.
skipbytesByte to be skipped in the image file in order to reach the beginning
of the image data. Default value is 0.
ulxmapx coordinate of the centre of the upper-left pixel.
ulymapy coordinate of the centre of the upper-left pixel.
xdim x size in metre of a pixel.
ydim y size in metre of a pixel.
pixeltypeType of data read (in addition to the length)
UNSIGNDINT Undefined 8, 16, 24 or 32 bits
SIGNEDINT Integer 16 or 32 bits
FLOAT Real 32 or 64 bits
42 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
It can be:
The other optional keywords are :valueoffset, valuescale and nodatavalue.
By default, integer data types are chosen with respect to the pixel length (nbits).
So, we have
3.1.1.2 Samples
Here, the data is 20m.
3.1.1.2.1 Digital Terrain Model
3.1.1.2.2 Clutter Classes File
3.1.1.2.3 BIL File
.bil files are usually binary files without header. Data are stored starting from the Northwest corner of the area. The
skipbytes value defined in the header file allows to skip records if the data do not start at the beginning of the file.
3.2 TIF Format start here
Tagged Image File Format graphics filter supports all image types (monochrome, greyscale, palette colour, and RGB full
colour images) and Packbit, LZW or fax group 3-4 compressions. .tif files are not systematically geo-referenced. You have
datatypeType of data read (in addition to the length)
Un Undefined n bits (8, 16, 24 or 32 bits)
In Integer n bits (16 or 32 bits)
Rn Real n bits (32 or 64 bits)
RGB24 Integer 3 colour components on 24 bits
valueoffsetReal value to be added to the read value (V
read
)
valuescaleScaling factor to be applied to the read value
nodatavalueValue corresponding to NO DATA
V V
read
val uescal e val ueoffset + =
nrows1500
ncols1500
nbands1
nbits8 or 16
byteorderM
layoutbil
skipbytes0
ulxmap975000
ulymap1891000
xdim 20.00
ydim 20.00
nrows1500
ncols1500
nbands1
nbits8
byteorderM
layoutbil
skipbytes0
ulxmap975000
ulymap1891000
xdim 20.00
ydim 20.00
Forsk 2010 AT283_TRG_E2 43
Chapter 3: File Formats
to enter spatial references of the image manually during the import procedure (x and y-axis map coordinates of the centre
of the upper-left pixel, pixel size); an associated file with .tfw extension will be simultaneously created with the same name
and in the same directory as the .tif file it refers to. Atoll will then use the .tfw file during the import procedure for an
automatic geo-referencing.
You can modify the colour palette convention used by Atoll when exporting .tif files. This can be helpful when working on
.tif files exported by Atoll in other tools. In the default palette, the first colour indexes represent the useful information and
the remaining colour indexes represent the background. It is possible to export .tif files with a palette which defines the
background colour at the colour index 0, and then the colour indexes necessary to represent useful information. Add the
following lines in the Atoll.ini file to set up the new palette convention:
Please refer to the Administrator Manual for more details about the Atoll.ini file.
Atoll supports the following objects in .tif format:
Digital Terrain Model (8 or 16 bits)
Clutter heights (8 or 16 bits)
Clutter classes and User profile environment based traffic maps (8 bits)
User density traffic maps (16 or 32 bits)
Raster images (1, 4, 8, 24 bits)
Population maps (8, 16, 32 bits)
Other generic geographic data (8, 16, 32 bits)
.tfw file contains the spatial reference data of an associated .tif file. The .tfw file structure is simple; it is an ASCII text file
that contains six lines. You can open a .tfw file using any ASCII text editor.
3.2.1 TFW Header File
The .tfw files contain spatial reference data for the associated .tif file. The header file is a text file that describes how data
are organised in the .tif file. You can open a .tfw file using any ASCII text editor. The header file consists of six lines, with
each line having the following description:
Note:
Atoll also supports .tif files using the Packbit, FAX-CCITT3 and LZW compression modes.
[TiffExport]
PaletteConvention=Gis
Notes:
Using compressed geo data formats (compressed .tif, Erdas Imagine, or .ecw) can cause
performance loss due to real-time decompression. However, you can recover this loss in
performance by:
- Either, hiding the status bar, which provides geographic data information in real time, by
unchecking the Status Bar item in the View menu.
- Or, not displaying some of the information, such as altitude, clutter class and clutter
height, in the status bar. This can be done through the Atoll.ini file, by adding the following
lines:
[StatusBar]
DisplayZ=0
DisplayClutterClass=0
DisplayClutterHeight=0
You can also save the produced map in an uncompressed format.
Please refer to the Administrator Manual for more details about the Atoll.ini file.
Line Description
1 x dimension of a pixel in map units
2 amount of translation
3 amount of rotation
4 negative of the y dimension of a pixel in map units
5 x-axis map coordinate of the centre of the upper-left pixel
6 y-axis map coordinate of the centre of the upper-left pixel
Note:
Atoll does not use the lines 2 and 3 when importing a .tif format geographic file.
44 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.2.2 Sample
3.2.2.1 Clutter Classes File
3.3 BMP Format
This is the MS-Windows standard format. It holds black & white, 16-, 256- and True-colour images. The palletized 16-
colour and 256-colour images may be compressed via run length encoding (though compressed .bmp files are quite rare).
The image data itself can either contain pointers to entries in a colour table or literal RGB values. .bmp files are not
systematically geo-referenced. You have to enter spatial references of the image manually during the import procedure (x
and y-axis map coordinates of the centre of the upper-left pixel, pixel size). When exporting (saving) a .bmp file, an
associated file with .bpw extension is created with the same name and in the same directory as the .bmp file it refers to.
Atoll stores the georeferencing information in this file for future imports of the .bmp so that the .bpw file can be used during
the import procedure for automatic geo-referencing. Atoll also supports .bmw extension for the .bmp related world files.
Atoll supports the following objects in .bmp format:
Digital Terrain Model (8 bits)
Clutter Heights (8 bits)
Clutter classes and User density traffic maps (8 bits)
Raster images (1, 4, 8, 24 bits)
Population maps (8, 32 bits)
Other generic geographic data (8, 32 bits)
3.3.1 BMP File Description
A .bmp file contains of the following data structures:
BITMAPFILEHEADER bmfh Contains some
information about the bitmap file (about the file, not about the bitmap
itself).
BITMAPINFOHEADER bmih Contains information
about the bitmap (such as size, colours, etc.).
RGBQUAD aColors[] Contains a colour table.
BYTE aBitmapBits[] Image data (whose
format is specified by the bmih structure).
3.3.1.1 BMP File Structure
The following tables give exact information about the data structures. The Start-value is the position of the byte in the file
at which the explained data element of the structure starts, the Size-value contains the number of bytes used by this data
element, the Name column contains both generic name and the name assigned to this data element by the Microsoft API
documentation, and the Description column gives a short explanation of the purpose of this data element.
BITMAPFILEHEADER (Header - 14 bytes):
BITMAPINFOHEADER (InfoHeader - 40 bytes):
100.00
0.00
0.00
-100.00
60000.00
2679900.00
Start Size
Name
Description
Generic MS API
1 2 Signature bfType Must always be set to 'BM' to declare that this is a .bmp-file.
3 4 FileSize bfSize Specifies the size of the file in bytes.
7 2 Reserved1 bfReserved1 Unused. Must be set to zero.
9 2 Reserved2 bfReserved2 Unused. Must be set to zero.
11 4 DataOffset bfOffBits
Specifies the offset from the beginning of the file to the bitmap (raster)
data.
Start Size
Name
Description
Generic MS API
Forsk 2010 AT283_TRG_E2 45
Chapter 3: File Formats
RGBQUAD array (ColorTable):
Pixel data:
The interpretation of the pixel data depends on the BITMAPINFOHEADER structure. It is important to know that the rows
of a .bmp are stored upside down meaning that the uppermost row which appears on the screen is actually the lowermost
row stored in the bitmap. Another important thing is that the number of bytes in one row must always be adjusted by
appending zero bytes to fit into the border of a multiple of four (16-bit or 32-bit rows).
3.3.1.2 BMP Raster Data Encoding
Depending on the image BitCount and on the Compression flag there are 6 different encoding schemes. In all of them,
Pixels are stored bottom-up, left-to-right.
Pixel lines are padded with zeros to end on a 32-bit boundary.
15 4 Size biSize
Specifies the size of the BITMAPINFOHEADER structure, in
bytes (= 40 bytes).
19 4 Width biWidth Specifies the width of the image, in pixels.
23 4 Height biHeight Specifies the height of the image, in pixels.
27 2 Planes biPlanes
Specifies the number of planes of the target device, must be
set to zero or 1.
29 2 BitCount biBitCount
Specifies the number of bits per pixel.
1 = monochrome pallete. # of colours = 1
4 = 4-bit palletized. # of colours = 16
8 = 8-bit palletized. # of colours = 256
16 = 16-bit palletized. # of colours = 65536
24 = 24-bit palletized. # of colours = 16M
31 4 Compression biCompression
Specifies the type of compression, usually set to zero.
0 = BI_RGB no compression
1 = BI_RLE8 8-bit RLE encoding
2 = BI_RLE4 4-bit RLE encoding
35 4 ImageSize biSizeImage
Specifies the size of the image data, in bytes. If there is no
compression, it is valid to set this element to zero.
39 4 XpixelsPerM biXPelsPerMeter Specifies the the horizontal pixels per meter.
43 4 YpixelsPerM biYPelsPerMeter Specifies the the vertical pixels per meter.
47 4 ColoursUsed biClrUsed
Specifies the number of colours actually used in the bitmap. If
set to zero the number of colours is calculated using the
biBitCount element.
51 4 ColoursImportant biClrImportant
Specifies the number of colour that are 'important' for the
bitmap. If set to zero, all colours are considered important.
Note:
biBitCount actually specifies the colour resolution of the bitmap. It also decides if there is a
colour table in the file and how it looks like.
- In 1-bit mode the colour table has to contain 2 entries (usually white and black). If a bit in
the image data is clear, it points to the first palette entry. If the bit is set, it points to the
second.
- In 4-bit mode the colour table must contain 16 colours. Every byte in the image data
represents two pixels. The byte is split into the higher 4 bits and the lower 4 bits and each
value of them points to a palette entry.
- In 8-bit mode every byte represents a pixel. The value points to an entry in the colour
table which contains 256 entries.
- In 24-bit mode three bytes represent one pixel. The first byte represents the red part, the
second the green and the third the blue part. There is no need for a palette because every
pixel contains a literal RGB-value, so the palette is omitted.
Start Size
Name
Description
Generic MS API
1 1 Blue rgbBlue Specifies the blue part of the colour.
2 1 Green rgbGreen Specifies the green part of the colour.
3 1 Red rgbRed Specifies the red part of the colour.
4 1 Reserved rgbReserved Must always be set to zero.
Note:
In a colour table (RGBQUAD), the specification for a colour starts with the blue byte, while
in a palette a colour always starts with the red byte.
46 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For uncompressed formats every line will have the same number of bytes.
Colour indices are zero based, meaning a pixel colour of 0 represents the first colour table entry, a pixel colour of
255 (if there are that many) represents the 256th entry. For images with more than 256 colours there is no colour
table.
3.3.1.2.1 Raster Data Compression Descriptions
4-bit / 16 colour images
8-bit / 256 colour images
Encoding type
BitCoun
t
Compressio
n
Remarks
1-bit
B&W images
1 0
Every byte holds 8 pixels, its highest order bit representing the
leftmost pixel of these 8. There are 2 colour table entries. Some
readers assume that 0 is black and 1 is white. If you are storing
black and white pictures you should stick to this, with any other 2
colours this is not an issue. Remember padding with zeros up to a
32-bit boundary.
4-bit
16 colour images
4 0
Every byte holds 2 pixels, its high order 4 bits representing the left of
those. There are 16 colour table entries. These colours do not have
to be the 16 MS-Windows standard colours. Padding each line with
zeros up to a 32-bit boundary will result in up to 28 zeros = 7 'wasted
pixels'.
8-bit
256 colour images
8 0
Every byte holds 1 pixel. There are 256 colour table entries.
Padding each line with zeros up to a 32-bit boundary will result in up
to 3 bytes of zeros = 3 'wasted pixels'.
16-bit
High colour images
16 0
Every 2 bytes hold 1 pixel. There are no colour table entries.
Padding each line with zeros up to a 16-bit boundary will result in up
to 2 zero bytes.
24-bit
True colour images
24 0
Every 4 bytes hold 1 pixel. The first holds its red, the second its
green, and the third its blue intensity. The fourth byte is reserved
and should be zero. There are no colour table entries. No zero
padding necessary.
4-bit
16 colour images
4 2
Pixel data is stored in 2-byte chunks. The first byte specifies the
number of consecutive pixels with the same pair of colour. The
second byte defines two colour indices. The resulting pixel pattern
will have interleaved high-order 4-bits and low order 4 bits
(ABABA...). If the first byte is zero, the second defines an escape
code. The End-of-Bitmap is zero padded to end on a 32-bit
boundary. Due to the 16bit-ness of this structure this will always be
either two zero bytes or none.
8-bit
256 colour images
8 1
The pixel data is stored in 2-byte chunks. The first byte specifies the
number of consecutive pixels with the same colour. The second byte
defines their colour indices. If the first byte is zero, the second
defines an escape code. The End-of-Bitmap is zero padded to end
on a 32-bit boundary. Due to the 16bit-ness of this structure this will
always be either two zero bytes or none.
n (Byte 1) c (Byte 2) Description
>0 any
n pixels to be drawn. The 1st, 3rd, 5th, ... pixels' colour is in c's high-order 4 bits, the
even pixels' colour is in c's low-order 4 bits. If both colour indices are the same, it
results in just n pixels of colour c.
0 0 End-of-line
0 1 End-of-Bitmap
0 2
Delta. The following 2 bytes define an unsigned offset in x and y direction (y being up).
The skipped pixels should get a colour zero.
0 >=3
The following c bytes will be read as single pixel colours just as in uncompressed files.
Up to 12 bits of zeros follow, to put the file/memory pointer on a 16-bit boundary again.
n (Byte 1) c (Byte 2) Description
>0 any n pixels of colour number c
0 0 End-of-line
0 1 End-of-Bitmap
0 2
Delta. The following 2 bytes define an unsigned offset in x and y direction (y being up).
The skipped pixels should get a colour zero.
Forsk 2010 AT283_TRG_E2 47
Chapter 3: File Formats
3.3.2 BPW/BMW Header File Description
The header file is a text file that describes how data are organised in the .bmp file. The header file is made of rows, each
row having the following description:
Atoll supports .bpw and .bmw header file extensions for Import, but exports headers with .bpw file extensions.
3.3.3 Sample
3.3.3.1 Clutter Classes File
3.4 PNG Format
Portable Network Graphics (PNG) is a bitmapped image format that employs lossless data compression. PNG supports
palette-based (palettes of 24-bit RGB or 32-bit RGBA colors), greyscale, RGB, or RGBA images. PNG was designed for
transferring images on the Internet, not professional graphics, and so does not support other color spaces (such as
CMYK). PNG files nearly always use file extension .PNG or .png.
When exporting (saving) a .png file, an associated file with .pgw extension is created with the same name and in the same
directory as the .png file it refers to. Atoll stores the georeferencing information in this file for future imports of the .png so
that the .pgw file can be used during the import procedure for automatic geo-referencing.
For more information on the PNG file format, see www.w3.org/TR/PNG/.
3.4.1 PGW Header File Description
A PNG World file (.pgw file extension) is a plain text file used by geographic information systems (GIS) to provide
georeferencing information for raster map images in .png format. The world file parameters are:
3.5 Generic Raster Header File (.wld)
.wld is a new Atoll specific header format that can be used for any raster data file for georeferencing. At the time of import
of any raster data file, Atoll can use the corresponding .wld file to read the georeferencing information related to the raster
data file. The .wld file contains the spatial reference data of any associated raster data file. The .wld file structure is simple;
it is an ASCII text file containing six lines. You can open a .wld file using any ASCII text editor.
0 >=3
The following c bytes will be read as single pixel colours just as in uncompressed files.
A zero follows, if c is odd, putting the file/memory pointer on a 16-bit boundary again.
Line Description
1 x dimension of a pixel in map units
2 amount of translation
3 amount of rotation
4 negative of the y dimension of a pixel in map units
5 x-axis map coordinate of the centre of the upper-left pixel
6 y-axis map coordinate of the centre of the upper-left pixel
100.00
0.00
0.00
-100.00
60000.00
2679900.00
Line Description
1 x dimension of a pixel in map units
2 amount of translation
3 amount of rotation
4 negative of the y dimension of a pixel in map units
5 x-axis map coordinate of the centre of the upper-left pixel
6 y-axis map coordinate of the centre of the upper-left pixel
48 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.5.1 WLD File Description
The .wld file is a text file that describes how data are organised in the associated raster data file. The header file is made
of rows, each row having the following description:
3.5.2 Sample
3.5.2.1 Clutter Classes File
3.6 DXF Format
Atoll is capable of importing and working with AutoCAD drawings in the Drawing Interchange Format (DXF). .dxf files
can have ASCII or binary formats. But only the ASCII .dxf files can be used in Atoll.
.dxf files are composed of pairs of codes and associated values. The codes, known as group codes, indicate the type of
value that follows. .dxf files are organized into sections of records containing the group codes and their values. Each group
code and value is a separate line.
Each section starts with a group code 0 followed by the string, SECTION. This is followed by a group code 2 and a string
indicating the name of the section (for example, HEADER). Each section ends with a 0 followed by the string ENDSEC.
3.7 SHP Format
ESRI (Environmental Systems Research Institute, Inc.) ArcView GIS Shapefiles have a simple, non-topological format
for storing geometric locations and attribute information of geographic features. A shapefile is one of the spatial data
formats that you can work with in ArcExplorer. .shp data files usually have associated .shx and .dbf files.
Among these three files:
The .shp file stores the feature geometry
The .shx file stores the index of the feature geometry.
The .dbf (dBASE) file stores the attribute information of features. When a shapefile is added as a theme to a view,
this file is displayed as a feature table.
You can define mappings between the coordinate system used for the ESRI vector files, defined in the corresponding .prj
files, and Atoll. In this way, when you import a vector file, Atoll can detect the correct coordinate system automatically.
For more information about defining the mapping between coordinate systems, please refer to the Administrator Manual.
3.8 MIF Format
MapInfo Interchange Format (.mif) allows various types of data to be attached to a variety of graphical items. These ASCII
files are editable, easy to generate, and work on all platforms supported by MapInfo. Vector objects with a .mif extension
may be imported in Atoll.
Two files, a .mif and a .mid, contain MapInfo data. Graphics reside in the .mif file while the text contents are stored in the
.mid file. The text data is delimited with one row per record, and Carriage Return, Carriage Return plus Line Feed, or Line
Feed between lines. The .mif file has two sections, the file header and the data section. The .mid file is optional. When
there is no .mid file, all fields are blank.
You can find more information at http://www.mapinfo.com.
Line Description
1 x dimension of a pixel in map units
2 amount of translation
3 amount of rotation
4 negative of the y dimension of a pixel in map units
5 x-axis map coordinate of the centre of the upper-left pixel
6 y-axis map coordinate of the centre of the upper-left pixel
100.00
0.00
0.00
-100.00
60000.00
2679900.00
Forsk 2010 AT283_TRG_E2 49
Chapter 3: File Formats
You can define mappings between the coordinate system used for the MapInfo vector files, defined in the corresponding
.mif files, and Atoll. In this way, when you import a vector file, Atoll can detect the correct coordinate system automatically.
For more information about defining the mapping between coordinate systems, please refer to the Administrator Manual.
3.9 TAB Format
TAB files (MapInfo Tables) are the native format of MapInfo. They actually consist of a number of files with extensions
such as .TAB, .DAT and .MAP. All of these files need to be present and kept together for the table to work. These are
defined as follows:
.TAB: table structure in ASCII format
.DAT: table data storage in binary format
.MAP: storage of map objects in binary format
.ID: index to the MapInfo graphical objects (.MAP) file
.IND: index to the MapInfo tabular (DAT) file
You can find more information at http://www.mapinfo.com.
You can define mappings between the coordinate system used for the MapInfo vector files, defined in the corresponding
.mif files, and Atoll. In this way, when you import a vector file, Atoll can detect the correct coordinate system automatically.
For more information about defining the mapping between coordinate systems, please refer to the Administrator Manual.
TAB files are also supported as georeference information files for raster files (.bmp and .tif). The .TAB file must have the
following format:
The fields in bold are described below:
3.10 ECW Format
The Enhanced Compressed Wavelet file format is supported in Atoll. .ecw files are geo-referenced image files, which can
be imported in Atoll. This is an Open Standard wavelet compression technology, developed by Earth Resource Mapping,
which can compress images with up to a 100-to-1 compression ratio. Each compressed image file contains a header
carrying the following information about the image:
The image size expressed as the number of cells across and down
The number of bands (RGB images have three bands)
The image compression rate
The cell measurement units (meters, degrees or feet)
The size of each cell in measurement units
Coordinate space information (Projection, Datum etc.)
!table
!version 300
!charset WindowsLatin1
Definition Table
File "raster.bmp"
Type "RASTER"
(ulxmap,ulymap) (0,0) Label "Pt 1",
(llxmap,llymap) (0,nrows) Label "Pt 2",
(lrxmap,lrymap) (ncols,nrows) Label "Pt 3",
(urxmap,urymap) (ncols,0) Label "Pt 4"
Field Description
File "raster.bmp" Name of the raster file (e.g., raster.bmp)
ulxmap x coordinate of the centre of the upper-left pixel in metres
ulymap y coordinate of the centre of the upper-left pixel in metres
llxmap x coordinate of the centre of the lower-left pixel in metres
llymap y coordinate of the centre of the lower-left pixel in metres
lrxmap x coordinate of the centre of the lower-right pixel in metres
lrymap y coordinate of the centre of the lower-right pixel in metres
urxmap x coordinate of the centre of the upper-right pixel in metres
urymap y coordinate of the centre of the upper-right pixel in metres
nrows Number of rows in the image
ncols Number of columns in the image
50 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.11 Erdas Imagine Format
Atoll supports Erdas Imagine data files in order to import DTM (8 or 16 bit/pixel), clutter (8 bit/pixel), traffic (8 bit/pixel),
and image (1-24 bit/pixel) files with the .img format. These files use the Erdas Imagine Hierarchical File Format (HFA)
structure. For any type of file, if there are pyramids (storage of different resolution layers), they are used to enhance
performance when decreasing the resolution of the display. Some aspects of working with Erdas Imagine format in Atoll
are:
Atoll supports uncompressed as well as compressed (or partially compressed) DTM .img files.
You can create a .mnu file to improve the clutter class map loading.
The colour-to-code association (raster maps) may be automatically imported from the .img file.
These files are automatically geo-referenced, i.e., they do not require any additional file for geo-reference.
For image files, the number of supported bands is either 1 (colour palette is defined separately) or 3 (no colour palette but
direct RGB information for each pixel). In case of 3 bands, only 8 bit per pixel format is supported. Therefore, 8-bit images,
containing RGB information (three bands are provided: the first band is for Blue, the second one is for Green and the third
for Red), can be considered as 24 bit per pixel files. 32 bit per pixel files are not supported.
3.12 Planet EV/Vertical Mapper Geographic Data Format
Vertical Mapper offers two types of grids:
Numerical continuous grids, which contain numerical information (such as DTM), and are stored in files with the
.grd extension.
Classified grids, which contain alphanumeric (characters) information, and are stored in files with the .grc
extension.
Atoll is capable of supporting the Vertical Mapper Classified Grid (GRC) and Vertical Mapper Continuous Grid (GRD) file
formats in order to import and export:
GRD: DTM, image, population, traffic density, and other data types.
GRC: DTM, clutter classes, clutter heights, environment traffic, image, population, and other data types.
It is also possible to export coverage prediction studies in GRD and GRC formats.
This is the geographic data format used by Planet EV. So, it is possible to directly import geographic data from Planet EV
to Atoll using this format.
3.13 ArcView Grid Format
The ArcView Grid format (.txt) is an ASCII format dedicated to defining raster maps. It may be used to export any raster
map such as DTM, images, clutter classes and/or heights, population, other data maps, and even coverage predictions.
The contents of an ArcView Grid file are in ASCII and consist of a header, describing the content, followed by the content
in the form of cell values.
3.13.1 ArcView Grid File Description
The format of this file is as follows:
Notes:
Using compressed geo data formats (compressed .tif, Erdas Imagine, or .ecw) can cause
performance loss due to real-time decompression. However, you can recover this loss in
performance by:
- Either, hiding the status bar, which provides geographic data information in real time, by
unchecking the Status Bar item in the View menu.
- Or, not displaying some of the information, such as altitude, clutter class and clutter
height, in the status bar. This can be done through the Atoll.ini file, by adding the following
lines:
[StatusBar]
DisplayZ=0
DisplayClutterClass=0
DisplayClutterHeight=0
You can also save the produced map in an uncompressed format.
Please refer to the Administrator Manual for more details about the Atoll.ini file.
ncols XXXNumber of columns of the grid (XXX columns).
nrows XXXNumber of rows of the grid (XXX rows).
xllcenter XXX OR
xllcorner XXXSignificant value relative to the bin centre or corner.
Forsk 2010 AT283_TRG_E2 51
Chapter 3: File Formats
3.13.2 Sample
3.14 Other Supported Geographic Data File Formats
Other than the .bil, .tif, Planet, .dxf, .shp, .mif, .img, and .ecw formats, Atoll supports 3 other formats.
The .ist and .dis formats are ASCII files used for Digital Terrain Model only. .ist images come from Istar, whereas .dis
images come from IGN (Institut Gographique National). The .ist format works in exactly the same way as the .bil format,
except for DTM images. For DTM images, the .ist format uses a decimetric coding for altitudes, whereas .bil images use
only a metric coding.
3.15 Planet Format
The Planet geographic data are described by a set of files grouped in a Planet directory. The directory structure depends
on the geographic data type.
Atoll supports the following objects in Planet format:
Digital Terrain Model (8 and 16 bits)
Clutter class maps (16 bits)
Raster images (1, 4, 8 and 24 bits)
Vector data
Text data
3.15.1 DTM File
3.15.1.1 Description
The DTM directory consists of three files; the height file and two other files detailed below:
The index file structure is simple; it is an ASCII text file that holds position information about the file. It contains
five columns. You can open an index file using any ASCII text editor. The format of the index file is as follows:
yllcenter OR
yllcorner XXXSignificant value relative to the bin centre or corner.
cellsize XXXGrid resolution.
nodata_value XXXOptional value corresponding to no data (no information).
//Row 1Top of the raster. Description of the first row. Syntax: ncols number of
values separated by spaces.
:
:
//Row NBottom of the raster.
ncols 303
nrows 321
xllcorner 585300.000000
yllcorner 5615700.000000
cellsize 100.000000
nodata_value 0
...
Field Acceptable values Description
File name Text Name of file referenced by the index file
East min Float x-axis map coordinate of the centre of the upper-left pixel in meters
East max Float x-axis map coordinate of the centre of the upper-right pixel in meters
North min Float y-axis map coordinate of the centre of the lower-left pixel in meters
North max Float y-axis map coordinate of the centre of the upper-left pixel in meters
Square size Float Dimension of a pixel in meters
52 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The projection file provides information about the projection system used. This file is optional. It is an ASCII text
file with four lines maximum.
3.15.1.2 Sample
Index file associated with height file (DTM data):
Projection file associated with height file (DTM data):
3.15.2 Clutter Class Files
3.15.2.1 Description
The Clutter directory consists of three files; the clutter file and two other files detailed below:
The menu file, an ASCII text file, defines the feature codes for each type of clutter. It consists of as many lines
(with the following format) as there are clutter codes in the clutter data files. This file is optional.
The index file gives clutter spatial references. The structure of clutter index file is the same as the structure of DTM
index file.
3.15.2.2 Sample
Menu file associated with the clutter file:
Line Description
Spheroid
Zone
Projection
Central meridian
Latitude and longitude of projection central meridian and equivalent x and y coordinates in meters
(optional)
Note:
In the associated binary file, the value -9999 corresponds to No data which is supported
by Atoll.
sydney1 303900 343900 6227900 6267900 50
Australian-1965
56
UTM
0 153 500000 10000000
Field Type Description
Clutter-code Integer (>1) Identification code for clutter class
Feature-name Text (up to 32 characters in length)
Name associated with the clutter-code. (It may contain
spaces)
Note:
In the associated binary file, the value -9999 corresponds to No data which is supported
by Atoll.
1 open
2 sea
3 inlandwater
4 residential
5 meanurban
6 denseurban
7 buildings
8 village
9 industrial
10 openinurban
11 forest
Forsk 2010 AT283_TRG_E2 53
Chapter 3: File Formats
3.15.3 Vector Files
3.15.3.1 Description
Vector data comprises terrain features such as coastlines, roads, etc. Each of these features is stored in a separate vector
file. Four types of files are used, the vector file, where x and y coordinates of vector paths are stored, and three other files
detailed below:
The menu file, an ASCII text file, lists the vector types stored in the database. The menu file is composed of one
or more records with the following structure:
The fields are separated by space character.
The index file, an ASCII text file, lists the vector files and associates each vector file with one vector type, and
optionally with one attribute file. The index file consists of one or more records with the following structure:
The fields are separated by spaces.
The attribute file stores the height and description properties of vector paths. This file is optional.
3.15.3.2 Sample
Index file associated with the vector files
3.15.4 Image Files
The image directory consists of two files, the image file with .tif extension and an index file with the same structure as the
DTM index file structure.
12 parks
13 denseurbanhigh
14 blockbuildings
15 denseblockbuild
16 rural
17 mixedsuburban
Field Type Description
Vector type code Integer > 0 Identification code for the vector type
Vector type name Text (up to 32 characters in length) Name of the vector type
Field Type Description
Vector file name Text (up to 32 characters in length) Name of the vector file
Attribute file name Text (up to 32 characters in length)
Name of attribute file associated with the vector file
(optional)
Dimensions Real
vector file eastmin: minimum x-axis coordinate of all
vector path points in the vector file
vector file eastmax: maximum x-axis coordinate of all
vector path points in the vector file
vector file northmin: minimum y-axis coordinate of all
vector path points in the vector file
vector file northmax: maximum y-axis coordinate of all
vector path points
Vector type name Text (up to 32 characters in length)
Name of the vector type with which the vector file is
associated. This one must match exactly a vector type
name field in the menu file.
sydney1.airport313440 333021 6239426 6244784 airport
sydney1.riverlake303900 342704 6227900 6267900 riverlake
sydney1.coastline322837 343900 6227900 6267900 coastline
sydney1.railways303900 336113 6227900 6267900 railways
sydney1.highways303900 325155 6240936 6267900 highways
sydney1.majstreets303900 342770 6227900 6267900 majstreets
sydney1.majorroads303900 342615 6227900 6267900 majorroads
54 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.15.5 Text Data Files
The text data directory consists of:
The text data files are ASCII text files with the following format:
Each file contains a line of text followed by easting and northing of that text, etc.
The index file, an ASCII text file, stores the position of each text file. It consists of one or more records with the
following structure:
The fields are separated by spaces.
The menu file, an ASCII text file, contains the text features. This file is optional.
3.16 MNU Format
3.16.1 Description
A .mnu file is useful when importing clutter classes or raster traffic files in .tif, .bil and .img formats. It gives the
correspondence between the clutter (or traffic) code and the class name. It is a text file with the same name as the clutter
(or traffic) file with .mnu extension. It must be stored at the same location as the clutter (or traffic) file. It has the same
structure as the menu file used in the Planet format.
Separator used can either be a space character or a tab.
3.16.2 Sample
A .mnu file associated to a clutter classes file:
Airport
637111.188 3094774.00
Airport
628642.688 3081806.25
Field Type Description
File name Text (up to 32 characters in length) File name of the text data file
East Min Real
Minimum x-axis coordinate of all points listed in the text
data file
East Max Real
Maximum x-axis coordinate of all points listed in the text
data file
North Min Real
Minimum y-axis coordinate of all points listed in the text
data file
North Max Real
Maximum y-axis coordinate of all points listed in the text
data file
Text feature Text (up to 32 characters in length) This field is omitted in case no menu file is available.
railwayp.txt -260079 693937 2709348 3528665 Railway_Station
airport.txt -307727 771663 2547275 3554675 Airport
ferryport.txt 303922 493521 2667405 3241297 Ferryport
1 Airport
2 Ferryport
3 Railway_Station
Field Type Description
Class code Integer > 0 Identification code for the clutter (or traffic) class
Class name Text (up to 50 characters in length) Name of the clutter (or traffic) class. It may contain spaces.
0 none
1 open
2 sea
Forsk 2010 AT283_TRG_E2 55
Chapter 3: File Formats
3.17 XML Table Export/Import Format
All the data tables in an Atoll document can be exported to XML files.
Atoll creates the following files when exporting data tables to XML files:
One index.xml file which contains the mapping between the data tables in Atoll and the corresponding XML file
created by the export.
One XML file per data table which contains the data table format (schema) and the data.
The XML import does not modify the active document table and field definitions. Therefore, the Networks and
CustomFields tables, although exported, are not imported.
The following sections describe the structures of these two types of XML files created at export.
3.17.1 Index.xml File
The index.xml file stores the system (GSM, UMTS, etc.) and the technology (TDMA, CDMA, etc.) of the document, and
the version of Atoll used for exporting the data tables to XML files. It also contains the mapping between the data tables
in the Atoll document and the XML file corresponding to each data table.
The root tag <Atoll_XML_Config...> of the index.xml file contains the following attributes:
The index file also contains a list of mapping between the tables exported from Atoll and the XML files corresponding to
each table. This list is sorted in the order the Atoll tables are to be imported.
The list is composed of <XML_Table.../> tags with the following attributes:
A sample extract of the index.xml is given below:
Note that no closing tag </XML_Table> is required.
3.17.2 XML File
Atoll creates an XML file per exported data table. This XML file has two sections, one for storing the description of the
table structure, and the second for the data itself. The XML file uses the standard XML rowset schema (schema included
in the XML file between <s:Schema id=RowsetSchema> and </s:Schema> tags).
Rowset Schema
The XML root tag for XML files using the rowset schema is the following:
3 inland_water
4 residential
5 meanurban
Attribute Description
Atoll_File_System Corresponds to the SYSTEM_ field of the Networks table of the exported document
Atoll_File_Technology
Corresponds to the TECHNOLOGY field of the Networks table of the exported
document
Atoll_File_Version Corresponds to the Atoll version
Attribute Description
XML_File Corresponds to the exported XML file name (e.g., "Sites.xml")
Atoll_Table Corresponds to the exported Atoll table name (e.g., "Sites")
<Atoll_XML_Config Atoll_File_System="UMTS" Atoll_File_Technology="CDMA"
Atoll_File_Version="2.x.x build xxxx">
<XML_Table XML_File="CustomFields.xml" Atoll_Table="CustomFields" />
<XML_Table XML_File="CoordSys.xml" Atoll_Table="CoordSys" />
...
</Atoll_XML_Config>
<xml xmlns:s='uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882'
xmlns:dt='uuid:C2F41010-65B3-11d1-A29F-00AA00C14882'
xmlns:rs='urn:schemas-microsoft-com:rowset'
xmlns:z='#RowsetSchema'>
56 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The schema definition follows the root tag and is enclosed between the following tags:
In the rowset schema, after the schema description, the data are enclosed between <rs:data> and </rs:data>.
Between these tags, each record is handled by a <z:row /> tag having its attributes set to the record field values since
in the rowset schema, values are handled by attributes. Note that no closing tag </z:row> is required.
A sample extract of a Sites.xml file containing the Sites table with only one site is given below:
<s:Schema id=RowsetSchema>
<!-Schema is defined here, using <s:ElementType> and <s:AttributeType> tags ->
</s:Schema>
<xml xmlns:s='uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882'
xmlns:dt='uuid:C2F41010-65B3-11d1-A29F-00AA00C14882'
xmlns:rs='urn:schemas-microsoft-com:rowset'
xmlns:z='#RowsetSchema'>
<s:Schema id='RowsetSchema'>
<s:ElementType name='row' content='eltOnly' rs:updatable='true'>
<s:AttributeType name='NAME' rs:number='1' rs:maydefer='true'
rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='NAME'
rs:keycolumn='true'>
<s:datatype dt:type='string' dt:maxLength='50'/>
</s:AttributeType>
<s:AttributeType name='LONGITUDE' rs:number='2' rs:maydefer='true'
rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='LONGITUDE'>
<s:datatype dt:type='float' dt:maxLength='8' rs:precision='15'
rs:fixedlength='true'/>
</s:AttributeType>
<s:AttributeType name='LATITUDE' rs:number='3' rs:maydefer='true'
rs:writeunknown='true' rs:basetable='Sites' rs:basecolumn='LATITUDE'>
<s:datatype dt:type='float' dt:maxLength='8' rs:precision='15'
rs:fixedlength='true'/>
</s:AttributeType>
<s:AttributeType name='ALTITUDE' rs:number='4' rs:nullable='true'
rs:maydefer='true' rs:writeunknown='true' rs:basetable='Sites'
rs:basecolumn='ALTITUDE'>
<s:datatype dt:type='r4' dt:maxLength='4' rs:precision='7'
rs:fixedlength='true'/>
</s:AttributeType>
<s:AttributeType name='COMMENT_' rs:number='5' rs:nullable='true'
rs:maydefer='true' rs:writeunknown='true' rs:basetable='Sites'
rs:basecolumn='COMMENT_'>
<s:datatype dt:type='string' dt:maxLength='255'/>
</s:AttributeType>
<s:extends type='rs:rowbase'/>
</s:ElementType>
</s:Schema>
<rs:data>
<rs:insert>
<z:row NAME='Site0' LONGITUDE='8301' LATITUDE='-9756'/>
</rs:insert>
</rs:data>
</xml>
Forsk 2010 AT283_TRG_E2 57
Chapter 3: File Formats
3.18 Externalised Propagation Results Format
Propagation results, i.e. the path loss matrices, may be stored in an external folder. This folder consists of a dBASE III
based file named pathloss.dbf that contains calculation parameters of all the transmitters considered and one file (or two
when calculating main and extended path loss matrices) per transmitter taken into account. This is a binary file with .los
extension and contains the path loss values for a transmitter.
3.18.1 DBF File
dBASE III file (pathloss.dbf) has a standard .dbf format described below. Its content can be checked by opening it in MS-
Access. The format is detailed hereafter.
3.18.1.1 DBF File Format
For general information, the format of .dbf files in any Xbase language is described.
Following notations are used in tables:
3.18.1.1.1 DBF Structure
3.18.1.1.2 DBF Header (Variable Size - Depends on Field Count)
Note:
Each transmitter path loss matrix is calculated on the area where calculation radius
intersects the computation zone (see: Computation zone).
FS = FlagShipD3 = dBaseIII+
Fb = FoxBaseD4 = dBaseIV
Fp = FoxProD5 = dBaseV
CL = Clipper
Byte Description
0...n .dbf header (see next part for size, byte 8)
n+1
1st record of fixed length (see next parts)
2nd record (see next part for size, byte10)
last record
If .dbf is not empty
last optional: 0x1a (eof byte)
Byte Size Contents Description Applies for (supported by)
00 1 0x03 plain .dbf FS, D3, D4, D5, Fb, Fp, CL
0x04 plain .dbf D4, D5 (FS)
0x05 plain .dbf D5, Fp (FS)
0x43 with .dbv memo var size FS
0xB3 with .dbv and .dbt memo FS
0x83 with .dbt memo FS, D3, D4, D5, Fb, Fp, CL
0x8B with .dbt memo in D4 format D4, D5
0x8E with SQL table D4, D5
0xF5 with .fmp memo Fp
01 3 YYMMDD Last update digits All
04 4 ulong Number of records in file All
08 2 ushort Header size in bytes All
10 2 ushort Record size in bytes All
12 2 0,0 Reserved All
14 1 0x01 Begin transaction D4, D5
0x00 End Transaction D4, D5
0x00 ignored FS, D3, Fb, Fp, CL
15 1 0x01 Encrypted D4, D5
0x00 normal visible All
16 12 0 (1) multi-user environment use D4,D5
28 1 0x01 production index exists Fp, D4, D5
58 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Field descriptor array in the .dbf header (32 bytes for each field)
Field type and size in the .dbf header, field descriptor (1 byte)
0x00 index upon demand All
29 1 n language driver ID D4, D5
0x01 codepage437 DOS USA Fp
0x02 codepage850 DOS Multi ling Fp
0x03 codepage1251 Windows ANSI Fp
0xC8 codepage1250 Windows EE Fp
0x00 ignored FS, D3, Fb, Fp, CL
30 2 0,0 reserved All
32 n*32 Field Descriptor, (see next paragraph) all
+1 1 0x0D Header Record Terminator all
Byte Size Contents Description Applies for (supported by)
0 11 ASCI field name, 0x00 termin all
11 1 ASCI field type (see next paragraph) all
12 4 n,n,n,n Fld address in memory D3
n,n,0,0 offset from record begin Fp
0,0,0,0 ignored FS, D4, D5, Fb, CL
16 1 byte Field length, bin (see next paragraph) all \ FS,CL: for C field type
17 1 byte decimal count, bin all / both used for fld lng
18 2 0,0 reserved all
20 1 byte Work area ID D4, D5
0x00 unused FS, D3, Fb, Fp, CL
21 2 n,n multi-user dBase D3, D4, D5
0,0 ignored FS, Fb, Fp, CL
23 1 0x01 Set Fields D3, D4, D5
0x00 ignored FS, Fb, Fp, CL
24 7 0...0 reserved all
31 1 0x01 Field is in .mdx index D4, D5
0x00 ignored FS, D3, Fb, Fp, CL
Size Type Description/Storage Applies for (supported by)
C 1...n Char
ASCII (OEM code page chars)
rest= space, not \0 term.
all
n = 1...64kb (using deci count) FS
n = 1...32kb (using deci count) Fp, CL
n = 1...254 all
D 8 Date 8 ASCII digits (0...9) in the YYYYMMDD format all
F 1...n Numeric
ASCII digits (-.0123456789)
variable pos. of float.point
n = 1...20
FS, D4, D5, Fp
N 1...n Numeric
ASCII digits (-.0123456789)
fix posit/no float.point
all
n = 1...20 FS, Fp, CL
n = 1...18 D3, D4, D5, Fb
L 1 Logical ASCII chars (YyNnTtFf space) FS, D3, Fb, Fp, CL
ASCII chars (YyNnTtFf?) D4, D5 (FS)
M 10 Memo
10 digits repres. the start block posit. in .dbt file, or 10 spaces if
no entry in memo
all
V 10 Variable
Variable, bin/asc data in .dbv
4bytes bin= start pos in memo
4bytes bin= block size
1byte = subtype
1byte = reserved (0x1a)
10 spaces if no entry in .dbv
FS
Forsk 2010 AT283_TRG_E2 59
Chapter 3: File Formats
3.18.1.1.3 Each DBF Record (Fixed Length)
3.18.1.2 DBF File Content
The .dbf file provides information that is needed to check validity of each path loss matrix.
P 10 Picture
binary data in .ftp
structure like M
Fp
B 10 Binary
binary data in .dbt
structure like M
D5
G 10 General
OLE objects
structure like M
D5, Fp
2 2 short int binary int max +/- 32767 FS
4 4 long int binary int max +/- 2147483647 FS
8 8 double binary signed double IEEE FS
Byte Size Description Applies for (supported by)
0 1 deleted flag "*" or not deleted " " all
1n 1
x-times contents of fields, fixed length, unterminated.
For n, see (2) byte 1011
All
Field Type Description
TX_NAME Text Name of the transmitter
FILE_NAME Text Name (and optionally, path) of .los file
MODEL_NAME Text Name of propagation model used to calculate path loss
MODEL_SIG Text
Signature (identity number) of model used in calculations. You may check it in the
propagation model properties (General tab).
The Model_SIG is used for the purpose of validity. A unique Model_SIG is
assigned to each propagation model. When model parameters are modified, the
associated model ID changes. This enables Atoll to detect path loss matrix
invalidity. In the same way, two identical propagation models in different projects
do not have the same model ID
a
.
ULXMAP Float X-coordinate of the top-left corner of the path loss matrix upper-left pixel
ULYMAP Float Y-coordinate of the top-left corner of the path loss matrix upper-left pixel
RESOLUTION Float Resolution of path loss matrix in metre
NROWS Float Number of rows in path loss matrix
NCOLS Float Number of columns in path loss matrix
FREQUENCY Float Frequency band
TILT Float Transmitter antenna mechanical tilt
AZIMUTH Float Transmitter antenna azimuth
TX_HEIGHT Float Transmitter height in metre
TX_POSX Float X-coordinate of the transmitter
TX_POSY Float Y-coordinate of the transmitter
ALTITUDE Float Ground height above sea level at the transmitter in metre
RX_HEIGHT Float Receiver height in metre
ANTENNA_SI Float
Logical number referring to antenna pattern. Antennas with the same pattern will
have the same number.
MAX_LOS Float
Maximum path loss stated in 1/16 dB. This information is used, when no
calculation radius is set, to check the matrix validity.
CAREA_XMIN Float
Lowest x-coordinate of centre pixel located on the calculation radius
b
CAREA_XMAX Float Highest x-coordinate of centre pixel located on the calculation radius
CAREA_YMIN Float Lowest y-coordinate of centre pixel located on the calculation radius
CAREA_YMAX Float Highest y-coordinate of centre pixel located on the calculation radius
WAREA_XMIN Float
Lowest x-coordinate of centre pixel located in the computation zone
c
WAREA_XMAX Float Highest x-coordinate of centre pixel located in the computation zone
WAREA_YMIN Float Lowest y-coordinate of centre pixel located in the computation zone
WAREA_YMAX Float Highest y-coordinate of centre pixel located in the computation zone
60 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.18.2 LOS File
The data file is a binary file with a standard row-column structure. Data are stored starting from the southwest to the
northeast corner of the area. The file contains 16-bit signed integer values in the range [-32768; +32767] with a 1/16 dB
precision. "No data" values are represented by +32767.
3.19 Externalised Tuning Files
Atoll can tune path loss matrices obtained from propagation results by the use of real measurements (CW Measurements
or Test Mobile Data). For each measured transmitter, Atoll tries to merge measurements and predictions on the same
points and to smooth the surrounding points of the path loss matrices for homogeneity reasons. A transmitter path loss
matrix can be tuned several times by the use of several measurement paths. All these tuning paths are stored in a
catalogue. This catalogue is stored under a .tuning folder containing a .dbf file and one .pts file per corrected transmitter.
Since a tuning file can contain several measurement paths, all these measurements are added to the tuning file.
For more information on the path loss tuning algorithm, See .
3.19.1 DBF File
dBASE III file (pathloss.dbf) has a standard .dbf format described below. Its content can be checked by opening it in MS-
Access. The format is detailed hereafter.
3.19.1.1 DBF File Format
For general information, the format of .dbf files in any Xbase language is described.
Following notations are used in tables:
3.19.1.1.1 DBF Structure
3.19.1.1.2 DBF Header (Variable Size - Depends on Field Count)
LOCKED Boolean
Locking status
0: path loss matrix is not locked
1: path loss matrix is locked.
INC_ANT Boolean
Atoll indicates if losses due to the antenna pattern are taken into account in the
path loss matrix.
0: antenna losses not taken into account
1: antenna losses included
a. In order to benefit from the calculation sharing feature, users must retrieve the propagation models from the same
central database. This can be done using the Open from database command for a new document or the Refresh
command for an existing one. Otherwise, Atoll generates different model_ID (even if same parameters are applied
on the same kind of model) and calculation sharing become unavailable due to inconsistency.
b. These coordinates enable Atoll to determine the area of calculation for each transmitter.
c. These coordinates enable Atoll to determine the rectangle including the computation zone.
FS = FlagShipD3 = dBaseIII+
Fb = FoxBaseD4 = dBaseIV
Fp = FoxProD5 = dBaseV
CL = Clipper
Byte Description
0...n .dbf header (see next part for size, byte 8)
n+1
1st record of fixed length (see next parts)
2nd record (see next part for size, byte10)
last record
If .dbf is not empty
last optional: 0x1a (eof byte)
Byte Size Contents Description Applies for (supported by)
00 1 0x03 plain .dbf FS, D3, D4, D5, Fb, Fp, CL
0x04 plain .dbf D4, D5 (FS)
0x05 plain .dbf D5, Fp (FS)
0x43 with .dbv memo var size FS
0xB3 with .dbv and .dbt memo FS
0x83 with .dbt memo FS, D3, D4, D5, Fb, Fp, CL
Forsk 2010 AT283_TRG_E2 61
Chapter 3: File Formats
Field descriptor array in the .dbf header (32 bytes for each field)
Field type and size in the .dbf header, field descriptor (1 byte)
0x8B with .dbt memo in D4 format D4, D5
0x8E with SQL table D4, D5
0xF5 with .fmp memo Fp
01 3 YYMMDD Last update digits All
04 4 ulong Number of records in file All
08 2 ushort Header size in bytes All
10 2 ushort Record size in bytes All
12 2 0,0 Reserved All
14 1 0x01 Begin transaction D4, D5
0x00 End Transaction D4, D5
0x00 ignored FS, D3, Fb, Fp, CL
15 1 0x01 Encrypted D4, D5
0x00 normal visible All
16 12 0 (1) multi-user environment use D4,D5
28 1 0x01 production index exists Fp, D4, D5
0x00 index upon demand All
29 1 n language driver ID D4, D5
0x01 codepage437 DOS USA Fp
0x02 codepage850 DOS Multi ling Fp
0x03 codepage1251 Windows ANSI Fp
0xC8 codepage1250 Windows EE Fp
0x00 ignored FS, D3, Fb, Fp, CL
30 2 0,0 reserved All
32 n*32 Field Descriptor, (see next paragraph) all
+1 1 0x0D Header Record Terminator all
Byte Size Contents Description Applies for (supported by)
0 11 ASCI field name, 0x00 termin all
11 1 ASCI field type (see next paragraph) all
12 4 n,n,n,n Fld address in memory D3
n,n,0,0 offset from record begin Fp
0,0,0,0 ignored FS, D4, D5, Fb, CL
16 1 byte Field length, bin (see next paragraph) all \ FS,CL: for C field type
17 1 byte decimal count, bin all / both used for fld lng
18 2 0,0 reserved all
20 1 byte Work area ID D4, D5
0x00 unused FS, D3, Fb, Fp, CL
21 2 n,n multi-user dBase D3, D4, D5
0,0 ignored FS, Fb, Fp, CL
23 1 0x01 Set Fields D3, D4, D5
0x00 ignored FS, Fb, Fp, CL
24 7 0...0 reserved all
31 1 0x01 Field is in .mdx index D4, D5
0x00 ignored FS, D3, Fb, Fp, CL
Size Type Description/Storage Applies for (supported by)
C 1...n Char
ASCII (OEM code page chars)
rest= space, not \0 term.
all
n = 1...64kb (using deci count) FS
n = 1...32kb (using deci count) Fp, CL
n = 1...254 all
62 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.19.1.1.3 Each DBF Record (Fixed Length)
3.19.1.2 DBF File Content
The .dbf file provides information about the measured transmitters participating in the tuning.
3.19.2 PTS File
The tuning file contains a header and the list of points.
The contents of the header is:
4 bytes : version
4 bytes : flag (can be used to manage flags like active flag)
50 bytes : GUID
4 bytes : Number of points
255 bytes : original measurements name (with prefix Num : for test mobile data and CW: for CW measurements)
256 bytes : comment
4 bytes : X_RADIUS
4 bytes : Y_RADIUS
4 bytes : Gain : measurement gain - losses
4 bytes : Global error
4 bytes : Rx height
4 bytes : Frequency
D 8 Date 8 ASCII digits (0...9) in the YYYYMMDD format all
F 1...n Numeric
ASCII digits (-.0123456789)
variable pos. of float.point
n = 1...20
FS, D4, D5, Fp
N 1...n Numeric
ASCII digits (-.0123456789)
fix posit/no float.point
all
n = 1...20 FS, Fp, CL
n = 1...18 D3, D4, D5, Fb
L 1 Logical ASCII chars (YyNnTtFf space) FS, D3, Fb, Fp, CL
ASCII chars (YyNnTtFf?) D4, D5 (FS)
M 10 Memo
10 digits repres. the start block posit. in .dbt file, or 10 spaces if
no entry in memo
all
V 10 Variable
Variable, bin/asc data in .dbv
4bytes bin= start pos in memo
4bytes bin= block size
1byte = subtype
1byte = reserved (0x1a)
10 spaces if no entry in .dbv
FS
P 10 Picture
binary data in .ftp
structure like M
Fp
B 10 Binary
binary data in .dbt
structure like M
D5
G 10 General
OLE objects
structure like M
D5, Fp
2 2 short int binary int max +/- 32767 FS
4 4 long int binary int max +/- 2147483647 FS
8 8 double binary signed double IEEE FS
Byte Size Description Applies for (supported by)
0 1 deleted flag "*" or not deleted " " all
1n 1
x-times contents of fields, fixed length, unterminated.
For n, see (2) byte 1011
All
Field Type Description
TX_NAME Text Name of the transmitter
FILE_NAME Text Name (and optionally, path) of .pts file
AREA_XMIN Float Not used
AREA_XMAX Float Not used
AREA_YMIN Float Not used
AREA_YMAX Float Not used
Forsk 2010 AT283_TRG_E2 63
Chapter 3: File Formats
8 bytes : Tx Position
The list of points contains following 4-uplet for all points
4 bytes : X
4 bytes : Y
4 bytes : Measurement value
4 bytes : Incidence angle.
3.20 Interference Histograms File Formats
Interference histograms required by automatic frequency planning tools can be imported and exported.
3.20.1 One Histogram per Line (.im0) Format
This file contains one histogram per line for each interfered/interfering subcell pair. The histogram is a list of C/I values
with associated probabilities.
The .im0 file consists of two parts:
The first part is a header used for format identification. It must start with and contain the following lines:
The second part details interference histogram of each interfered subcell-interferer subcell pair.
The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following
format:
The 4 tab-separated columns are defined in the table below:
3.20.1.1 Sample
Notes:
No validity check is carried out when importing an interference histogram file.
Atoll only imports interference histograms related to loaded transmitters.
The lines starting with the symbol "#" are considered as comments.
The interferer TRX type is not specified. In fact, the subcells of the interferer transmitter
differ by their power offsets. If the power offset of a subcell is X with respect to the BCCH,
then its interference C/I histogram will be shifted by X with respect to the BCCH
interference histogram. It contains no further information; therefore, the interferer TRX type
is always BCCH.
For each interfered subcell-interferer subcell pair, Atoll saves probabilities for several C/I
values (between 6 to 24 values). Five of these values are fixed; probabilities are calculated
for C/I values equal to 9, 1, 8, 14, and 22 dB. Then, between each fixed C/I value, there
can be up to three additional values (this number depends on the probability variation
between the fixed values). The C/I values have 0.5 dB accuracy and probability values are
calculated and stored with an accuracy of 0.002 for probabilities between 1 and 0.05, and
with an accuracy of 0.0001 for probabilities lower than 0.05.
If no power offset is defined on the Interfered TRX type, it is possible to use the "All" value.
The values of probability should be absolute (between 0 and 1), and not in precentage
(between 0 and 100%).
# Calculation Results Data File.
# Version 1.1, Tab separated format. Commented lines start with #.
<Column1><tab><Column2><tab><Column3><tab><Column4><newline>
Column name Description
Column1 Interfered transmitter Name of the interfered transmitter.
Column2 Interfering transmitter Name of the interferer transmitter.
Column3 Interfered TRX type
Interfered subcell. In order to save storage, all subcells with no power
offset are not duplicated (e.g. BCCH, TCH).
Column4 C/I Probability
C/I value and the probability associated to this value separated by a space
character. This entry cannot be null.
# Calculation Results Data File.
# Version 1.1, Tab separated format. Commented lines start with #.
# Remark: C/I results do not incorporate power offset values.
64 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.20.2 One Value per Line with Dictionary File (.clc) Format
Atoll creates two ASCII text files in a specified directory: xxx.dct and xxx.clc (xxx is the user-specified name).
3.20.2.1 CLC File
3.20.2.1.1 Description
The .clc file consists of two parts:
The first part is a header used for format identification. It must start with and contain the following lines:
The second part details interference histogram of each interfered subcell-interferer subcell pair.
The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following
format:
The 5 tab-separated columns are defined in the table below:
# Fields are:
#------------------------------------------------------------------------
#Transmitter Interferer TRX type {C/I Probability} values
#------------------------------------------------------------------------
#
# Warning, The parameter settings of this header can be wrong if
# the "export" is performed following an "import". They
# are correct when the "export" follows a "calculate".
#
# Service Zone Type is "Best signal level of the highest priority HCS layer".
# Margin is 5.
# Cell edge coverage probability 75%.
# Traffic spreading was Uniform
##---------------------------------------------------------------------#
#
Site0_2 Site0_1 BCCH,TCH-10 1 -9 0.996 -6 0.976 -4 0.964 -1 0.936
0 0.932 1 0.924 4 0.896 7 0.864 8 0.848
9 0.832 10 0.824 11 0.804 14 0.712 17 0.66
Site0_2 Site0_3 BCCH,TCH-10 1 -9 0.996 -6 0.976 -4 0.972 -1 0.948
0 0.94 1 0.928 4 0.896 7 0.856 8 0.84
11 0.772 13 0.688 14 0.636 15 0.608 18 0.556
Site0_3 Site0_1 BCCH,TCH-10 1 -9 0.996 -6 0.98 -3 0.948 0 0.932
1 0.924 4 0.892 7 0.852 8 0.832 9 0.816
10 0.784 11 0.764 14 0.644 15 0.616 18 0.564
Site0_3 Site0_2 BCCH,TCH-9 1 -6 0.972 -3 0.964 -2 0.96 0 0.94
1 0.932 4 0.904 7 0.876 8 0.86 9 0.844
11 0.804 13 0.744 14 0.716 15 0.692 18 0.644
Note:
When importing interference histograms with standard format, you must specify the .clc file
to be imported. Atoll looks for the associated .dct file in the same directory and uses it to
decode transmitter identifiers. If this file is unavailable, Atoll assumes that the transmitter
identifiers are the transmitter names. In this case, the columns 1 and 2 of the .clc file must
contain the names of the interfered and interferer transmitters instead of their identification
numbers.
# Calculation Results Data File.
# Version 1.1, Tab separated format. Commented lines start with #.
<Column1><tab><Column2><tab><Column3><tab><Column4><tab><Column5><newline>
Forsk 2010 AT283_TRG_E2 65
Chapter 3: File Formats
3.20.2.1.2 Sample
Column name Description
Column1 Interfered transmitter
Identification number of the interfered transmitter. If the column is empty,
its value is identical to the one of the line above.
Column2 Interfering transmitter
Identification number of the interferer transmitter. If the column is null, its
value is identical to the one of the line above.
Column3 Interfered TRX type
Interfered subcell. If the column is null, its value is identical to the one of
the line above. In order to save storage, all subcells with no power offset
are not duplicated (e.g. BCCH, TCH).
Column4 C/I threshold C/I value. This column cannot be null.
Column5 Probability C/I > Threshold
Probability to have C/I the value specified in column 4 (C/I threshold). This
field must not be empty.
Note:
The columns 1, 2, and 3 must be defined only in the first line of each histogram.
# Calculation Results Data File.
# Version 1.1, Tab separated format. Commented lines start with #.
# Remark: C/I results do not incorporate power offset values.
# Fields are:
##------------#------------#------------#-----------#------------------#
#| Interfered | Interfering| Interfered | C/I | Probability |
#| Transmitter| Transmitter| Trx type | Threshold | C/I >= Threshold |
##------------#------------#------------#-----------#------------------#
#
# Warning, The parameter settings of this header can be wrong if
# the "export" is performed following an "import". They
# are correct when the "export" follows a "calculate".
#
# Service Zone Type is "Best signal level of the highest priority HCS layer".
# Margin is 5.
# Cell edge coverage probability 75%.
# Traffic spreading was Uniform
##---------------------------------------------------------------------#
1 2 TCH_INNER 8 1
9 0.944
10 0.904
11 0.892
14 0.844
15 0.832
16 0.812
17 0.752
22 0.316
25 0.292
1 2 BCCH,TCH 8 1
9 0.944
10 .904
13 0.872
14 0.84
17 0.772
Note:
66 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.20.2.2 DCT File
3.20.2.2.1 Description
The .dct file is divided into two parts:
The first part is a header used for format identification. It must start with and contain the following lines:
The second part provides information about transmitters taken into account in AFP.
The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following
format:
The last four columns describe the interference matrix scope. One transmitter per line is described separated with a tab
character.
3.20.2.2.2 Sample
If the TCH and BCCH histograms are the same, they are not duplicated. A single record
indicates that the histograms belong to TCH and BCCH both. For example, instead of:
1 2 TCH -9.5 1 - 9 1 - 6 1
1 2 BCCH -9.5 1 - 9 1 - 6 1
We have:
1 2 TCH,BCCH -9.5 1 - 9 1 - 6 1
# Calculation Results Dictionary File.
# Version 1.1, Tab separated format. Commented lines start with #.
<Column1><tab><Column2><newline>
Column name Type Description
Column1 Transmitter name Text Name of the transmitter
Column2 Transmitter Identifier Integer Identification number of the transmitter
Column3 BCCH during calculation Integer BCCH used in calculations
Column4 BSIC during calculation Integer BSIC used in calculations
Column5 % of vic coverage Float Percentage of overlap of the victim service area
Column6 % of int coverage Float Percentage of overlap of the interferer service area
# Calculation Results Dictionary File.
# Version 2.1, Tab separated format. Commented lines start with #.
# Fields are:
##-----------#-----------#-----------#-----------#---------#---------#
#|Transmitter|Transmitter|BCCH during|BSIC during|% of vic'|% of int'|
#|Name |Identifier |calculation|calculation|coverage |coverage |
##-----------#-----------#-----------#-----------#---------#---------#
#
# Warning, The parameter settings of this header can be wrong if
# the "export" is performed following an "import". They
# are correct when the "export" follows a "calculate".
#
# Service Zone Type is "Best signal level per HCS layer".
# Margin is 5.
# Cell edge coverage probability is 75%.
# Traffic spreading was Uniform (percentage of interfered area)
##---------------------------#
Site0_0 1 -1 -1 100 100
Site0_1 2 -1 -1 100 100
Site0_2 3 -1 -1 100 100
Site1_0 4 -1 -1 100 100
Forsk 2010 AT283_TRG_E2 67
Chapter 3: File Formats
3.20.3 One Value per Line (Transmitter Name Repeated) (.im1)
Format
This file contains one C/I threshold and probability pair value per line for each interfered/interfering subcell pair. The
histogram is a list of C/I values with associated probabilities.
The .im1 file consists of two parts:
The first part is a header used for format identification. It must start with and contain the following lines:
The second part details interference histogram of each interfered subcell-interferer subcell pair.
The lines after the header are considered as comments if they start with the symbol "#". If not, they must have the following
format:
The 5 tab-separated columns are defined in the table below:
3.20.3.1 Sample
Site1_1 5 -1 -1 100 100
Site1_2 6 -1 -1 100 100
Site2_0 7 -1 -1 100 100
Site2_1 8 -1 -1 100 100
# Calculation Results Data File.
# Version 1.1, Tab separated format. Commented lines start with #.
<Column1><tab><Column2><tab><Column3><tab><Column4><tab><Column5><newline>
Column name Description
Column1 Interfered transmitter Name of the interfered transmitter.
Column2 Interfering transmitter Name of the interferer transmitter.
Column3 Interfered TRX type
Interfered subcell. In order to save storage, all subcells with no power
offset are not duplicated (e.g. BCCH, TCH).
Column4 C/I threshold C/I value. This column cannot be null.
Column5 Probability C/I > Threshold
Probability to have C/I the value specified in column 4 (C/I threshold). This
field must not be empty.
# Calculation Results Data File.
# Version 1.1, Tab separated format. Commented lines start with #.
# Remark: C/I results do not incorporate power offset values.
# Fields are:
#------------------------------------------------------------------------
#Transmitter Interferer TRX type C/I Probability
#------------------------------------------------------------------------
#
# Warning, The parameter settings of this header can be wrong if
# the "export" is performed following an "import". They
# are correct when the "export" follows a "calculate".
#
# Service Zone Type is "Best signal level of the highest priority HCS layer".
# Margin is 5.
# Cell edge coverage probability 75%.
# Traffic spreading was Uniform
##---------------------------------------------------------------------#
Site0_2 Site0_1 BCCH,TCH -10 1
Site0_2 Site0_1 BCCH,TCH -9 0.996
Site0_2 Site0_1 BCCH,TCH -6 0.976
68 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
3.20.4 Only Co-Channel and Adjacent Values (.im2) Format
In this case, there is only one .im2 file containing co-channel and adjacent channel interference probabilities specified for
each interfered transmitter interferer transmitter pair. There is only one set of values for all the subcells of the interfered
transmitter.
Each line must have the following format:
Where the separator (<SEP>) can either be a tab or a semicolon.
The four columns are defined in the table below:
corresponds to the required C/I threshold. This parameter is defined for each subcell.
is the adjacent channel protection level.
3.20.4.1 Sample
Site0_2 Site0_1 BCCH,TCH -4 0.964
Site0_2 Site0_1 BCCH,TCH -1 0.936
Site0_2 Site0_1 BCCH,TCH 0 0.932
Site0_2 Site0_1 BCCH,TCH 1 0.924
Site0_2 Site0_1 BCCH,TCH 4 0.896
Site0_2 Site0_1 BCCH,TCH 7 0.864
Site0_2 Site0_1 BCCH,TCH 8 0.848
Site0_2 Site0_1 BCCH,TCH 9 0.832
Site0_2 Site0_1 BCCH,TCH 10 0.824
...
<Column1><SEP><Column2><SEP><Column3><SEP><Column4><newline>
Column name Description
Column1 Interfered transmitter Name of the interfered transmitter.
Column2 Interfering transmitter Name of the interferer transmitter.
Column3
Co-channel interference
probability
Probability of having
Column4
Adjacent channel
interference probability
Probability of having
C I Max
BCCH TCH ,
C I
req
( ) s
C I Max
BCCH TCH ,
C I
req
( ) F s
C I
req

F
# Calculation Results Data File.
# Version 1.1, Tab separated format. Commented lines start with #.
# Remark: C/I results do not incorporate power offset values.
# Fields are:
#------------------------------------------------------------------------
#Transmitter Interferer Co-channel Adjacent channel
#------------------------------------------------------------------------
#
# Warning, The parameter settings of this header can be wrong if
# the "export" is performed following an "import". They
# are correct when the "export" follows a "calculate".
#
# Service Zone Type is "Best signal level of the highest priority HCS layer".
# Margin is 5.
# Cell edge coverage probability 75%.
# Traffic spreading was Uniform
##---------------------------------------------------------------------#
Site0_2 Site0_1 0.226667 0.024
Site0_2 Site0_3 0.27 0.024
Forsk 2010 AT283_TRG_E2 69
Chapter 3: File Formats
The columns in the sample above are separated with a tab. These columns can also be separated with a semilcolon:
3.21 Antenna Pattern Formats
This section describes the format of the DIAGRAM field of the Antennas table. This field stores the antenna diagrams in
a 2D (angle vs. attenuation) format. This is the format of the contents of the DIAGRAM field of the Antennas table when it
is copied from, pasted to, imported to (from txt, csv, or xls files), and exported from (in txt or csv files) the Antennas table.
Antenna patterns can also be imported in Planet 2D-format antenna files and 3D antenna files. The file format required for
3D antenna file import is described in "Import Format of Text Files Containing 3D Antenna Patterns" on page 70.
3.21.1 2D Antenna Diagram Format
The format of 2D antenna patterns containing co-polar diagrams only can be understood from Figure 3.1 on page 69.
The contents of the DIAGRAM field are formatted as follows:
Pattern Descriptor 1: Space-separated list of parameters.
- First entry: The number of co-polar diagrams. For example, 2.
- Second entry: First co-polar diagram type = 0 for azimuth (horizontal) diagram.
- Third entry: The elevation angle of the azimuth diagram.
- Fourth entry: The number of angle-attenuation pairs in the first co-polar diagram. For example, 360.
Co-polar Horizontal Diagram: Horizontal co-polar diagram (the second entry in the preceding descriptor is 0).
The format is space-separated angle attenuation pairs. For example, 0 0 1 0 2 0.1....
Pattern Descriptor 2: Space-separated list of parameters.
- First entry: Second co-polar diagram type = 1 for elevation (vertical) diagram.
- Second entry: The azimuth angle of the elevation diagram.
- Third entry: The number of angle-attenuation pairs in the second co-polar diagram. For example, 360.
Co-polar Vertical Diagram: Vertical co-polar diagram (the first entry in the preceding descriptor is 1). The format
is space-separated angle attenuation pairs. For example, 0 0 1 0.1....
End: The number cross-polar diagrams = 0.
The format of 2D antenna patterns containing co-polar and cross-polar diagrams can be understood from Figure 3.2 on
page 69.
The contents of the DIAGRAM field are formatted as follows:
Pattern Descriptor 1: Space-separated list of parameters.
- First entry: The number of co-polar diagrams. For example, 2.
- Second entry: First co-polar diagram type = 0 for azimuth (horizontal) diagram.
Site0_3 Site0_1 0.276 0.02
Site0_3 Site0_2 0.226 0.028
Site0_2;Site0_1;0.226667;0.024
Site0_2;Site0_3;0.27;0.024
Site0_3;Site0_1;0.276;0.02
Site0_3;Site0_2;0.226;0.028
Figure 3.12D Antenna Pattern Format Containing Co-polar Diagrams Only
Figure 3.22D Antenna Pattern Format Containing Co-polar and Cross-polar Diagrams
Pattern
End Co-polar Horizontal Diagram Co-polar Vertical Diagram
2 0 0 360 0 0 1 0 2 0.1 1 0 360 0 0 1 0.1 0
Discriptor 1
Pattern
Discriptor 2
Pattern
Co-polar Horizontal Diagram Co-polar Vertical Diagram
2 0 0 360 0 0 1 0 2 0.1 1 0 360 0 0 1 0.1
Discriptor 1
Pattern
Discriptor 2
Pattern
Cross-polar Horizontal Diagram Cross-polar Vertical Diagram
Discriptor 3
Pattern
Discriptor 4
2 0 0 360 0 0 1 0 2 0.1 1 0 360 0 0 1 0.1
70 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
- Third entry: The elevation angle of the azimuth diagram.
- Fourth entry: The number of angle-attenuation pairs in the first co-polar diagram. For example, 360.
Co-polar Horizontal Diagram: Horizontal co-polar diagram (the second entry in the preceding descriptor is 0).
The format is space-separated angle attenuation pairs. For example, 0 0 1 0 2 0.1....
Pattern Descriptor 2: Space-separated list of parameters.
- First entry: Second co-polar diagram type = 1 for elevation (vertical) diagram.
- Second entry: The azimuth angle of the elevation diagram.
- Third entry: The number of angle-attenuation pairs in the second co-polar diagram. For example, 360.
Co-polar Vertical Diagram: Vertical co-polar diagram (the first entry in the preceding descriptor is 1). The format
is space-separated angle attenuation pairs. For example, 0 0 1 0.1....
Pattern Descriptor 3: Space-separated list of parameters.
- First entry: The number of cross-polar diagrams. For example, 2.
- Second entry: First cross-polar diagram type = 0 for azimuth (horizontal) diagram.
- Third entry: The elevation angle of the azimuth diagram.
- Fourth entry: The number of angle-attenuation pairs in the first cross-polar diagram. For example, 360.
Cross-polar Horizontal Diagram: Horizontal cross-polar diagram (the second entry in the preceding descriptor
is 0). The format is space-separated angle attenuation pairs. For example, 0 0 1 0 2 0.1....
Pattern Descriptor 4: Space-separated list of parameters.
- First entry: Second cross-polar diagram type = 1 for elevation (vertical) diagram.
- Second entry: The azimuth angle of the elevation diagram.
- Third entry: The number of angle-attenuation pairs in the second cross-polar diagram. For example, 360.
Cross-polar Vertical Diagram: Vertical cross-polar diagram (the first entry in the preceding descriptor is 1). The
format is space-separated angle attenuation pairs. For example, 0 0 1 0.1....
You may use a 3rd party software or develop a tool to to convert the contents of the DIAGRAM field into binary. In binary,
each antenna is described by a header and a list of value pairs.
The header is defined as follows:
flag: (Integer, 32 bits) -1 for omni diagrams, 0 for directional
num: (Short integer, 16 bits) Number of diagrams (0, 1, 2, 3, 4)
siz0: (Short integer, 16 bits) Size of the first diagram (horizontal co-polar section, elevation = 0)
siz1: (Short integer, 16 bits) Size of the second diagram (vertical co-polar section, azimuth = 0)
siz2: (Short integer, 16 bits) Size of the third diagram (horizontal cross-polar)
siz3: (Short integer, 16 bits) Size of the fourth diagram (vertical cross-polar)
prec: (Short integer, 16 bits) Precision of the following angle values (100)
Then follows the content of each of the defined diagrams, i.e., the diagrams whose sizes (siz0, siz1, siz2, siz3) are not
zero. Each diagram consists of a list of value pairs. The number of value pairs in a list depends on the value of the siz0,
siz1, siz2, and siz3 parameters. For example, siz2 = 5 means there are five value pairs in the third diagram.
The value pairs in each list are:
ang: (Short integer, 16 bits) The first component of the value pair is the angle in degrees multiplied by 100. For
example, 577 means 5.77 degrees.
loss: (Short integer, 16 bits) The second component of the value pair is the loss in dB for the given angle ang.
All the lists of value pairs are concatenated without a separator.
3.21.2 Import Format of Text Files Containing 3D Antenna Patterns
Text files containing 3D antenna patterns that may be imported in Atoll must have the following format:
Header: The text file may contain a header with additional information. When you import the antenna pattern you
can indicate the row number in the file where the header ends and the antenna pattern begins.
Antenna Pattern: Each row contains three values to describe the 3D antenna pattern. The columns containing
the values can be in any order:
- Azimuth: Allowed range of values is from 0to 360. The smallest increment allowed is 1.
- Tilt: Allowed range of values is from -90to 90or from 0to 180. The smallest increment allowed is 1.
- Attenuation: The attenuation in dB.
Chapter 4
Calculations
Forsk 2010 AT283_TRG_E1 73
Chapter 4: Calculations
4 Calculations
4.1 Overview
Three kinds of predictions are available in Atoll:
Point analysis enables you to visualise transmitter-receiver profile and to get predictions for a user-defined
receiver in real time anywhere on a geographic map (Point analysis window: Profile tab).
Coverage studies consider each bin of calculation areas as a potential receiver you can define. Therefore, covered
bins correspond to areas where a criterion on the predicted received signal is fulfilled.
Point analysis based on path loss matrices enables you to get parameters derived from predicted values in
coverage studies (field received, path loss, C/I, UMTS parameters) for a receiver anywhere inside a calculation
area (Point analysis window: Reception, Interference, AS analysis tabs).
An overview of different analysis methods is presented in the table below:
In any case, prediction is performed in three steps:
1
st
step: First of all, Atoll calculates the path loss ( ), using the selected propagation model.
is the loss on the transmitter-receiver path calculated through the propagation model. value depends on
the selected propagation model.
is the transmitter antenna attenuation (from antenna patterns).
is the receiver antenna attenuation ( ) (from antenna patterns).
2
nd
step: When the option Shadowing taken into account is selected, Atoll evaluates a shadowing margin,
, from the user-defined model standard deviation at the receiver and the cell edge coverage probability.
Coverage studies Point analysis
Point analysis based on path loss
matrices
Any study Profile
Reception, Results,
Interference, AS analysis
Receiver
position
At the centre of each
calculation bin within
calculation areas
Anywhere. Even beyond
computation zone
Anywhere inside the calculation areas
Calculation
Path loss matrix
calculation
Real time
No calculation: result coming from path
loss matrices
Profile
extraction
a
Radial except when
using SPM
Systematic
Method used for coverage studies: radial
except when using SPM
Result
One value inside a
calculation bin
Different values inside a
calculation bin
One value inside a calculation bin
a. When using SPM, you can choose either radial or systematic calculation option.
Notes:
In coverage studies, Atoll calculates path loss for every bin within calculation areas.
However, only results on calculation bins inside the computation zone are displayed.
Profile point analysis is calculated in real time. Therefore, prediction is always consistent
with the network. On the other hand, if you modify any parameter (radio or geo), which may
make matrices invalid, consider updating the matrices before using point analysis based on
path loss matrices.
Due to different calculation methods, you can get different results at a same point when
performing a point analysis in profile or reception mode.
Notes:
In any project, Atoll considers that the receiver antenna is in the transmitter antenna axis.
Therefore, the receiver antenna attenuation is supposed to be zero.
Transmitter antenna attenuation may not be considered in this step. It depends on
propagation model provider, who may choose to include this parameter in
calculation. However, all the propagation models available in Atoll calculate by
considering transmitter antenna attenuation.
L
path
L
path
L
model
L
ant
Tx
L
ant
Rx
+ + =
L
model
L
model
L
ant
Tx
L
ant
Rx
L
ant
Rx
0 =
L
path
L
path
M
Shadowi ng model
74 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
3
rd
step: Then, Atoll determines the prediction criterion and displays coverage.
For a signal level study,
The signal level at the receiver ( ) is calculated. We have (in dBm):
Where
is the effective isotropic radiated power of the transmitter.
is the transmitter power.
is the transmitter antenna gain.
are transmitter losses.
is the shadowing margin.
are the indoor losses, taken into account when the option Indoor coverage is selected,
are receiver losses.
is the receiver antenna gain.
The prediction is performed for a user-defined cell edge coverage probability (x%). This means that the measured criterion
exceeds the predicted criterion for x% of time. The prediction is reliable during x% of time.
4.2 Path Loss Matrices
Atoll is able to calculate two path loss matrices per transmitter, a first matrix over a smaller radius computed with a high
resolution and a propagation model (main matrix), and a second matrix over a larger radius computed with a low resolution
and another propagation model (extended matrix).
To be considered for calculations, a transmitter must fulfil the following conditions:
It must be active,
It must satisfy filter criteria defined in the Transmitters folder, and
It must have a calculation area.
In the rest of the document, a transmitter fulfilling the conditions detailed above will be called TBC transmitter.
The path loss matrix size of a TBC transmitter depends on its calculation area. Atoll determines a path loss value ( )
on each calculation bin (calculation bin is defined by the resolution) of the calculation area of the TBC transmitter. You may
have one or two path loss matrices per TBC transmitter.
Note:
For a cell edge coverage probability of 50%, the shadowing margin is always zero. In this
case, Atoll still works as above.
Notes:
In UMTS and CDMA documents, and .
In UMTS and CDMA documents, Atoll considers that and equal zero when
calculating the received signal level (in point analysis, Profile and Reception tabs, and in
common coverage studies such as Coverage per transmitter, Coverage by field level,
Overlapping).
In GSM_EGPRS documents, .
In GSM_EGPRS documents, receiver is equipped with an antenna with zero gain.
Note:
In case of interference studies, only signal from interfered transmitter (C) is downgraded by
the shadowing margin. We consider that interference value (I) is not altered by the
shadowing margin.
P
Rec
P
Rec
EIRP L
path
M
Shadowi ng model
L
Indoor
G
ant
Rx
L
Rx
( ) + =
EIRP P
Tx
G
ant
Tx
L
Tx
+ =
EIRP
P
Tx
G
ant
Tx
L
Tx
M
Shadowi ng model
L
Indoor
L
Rx
G
ant
Rx
P
Tx
P
Pi l ot
= L
Tx
L
total DL
=
G
ant
Rx
L
Rx
L
Tx
L
total DL
=
L
path
Forsk 2010 AT283_TRG_E1 75
Chapter 4: Calculations
4.2.1 Calculation Area Determination
4.2.1.1 Computation Zone
Transmitter calculation area is made of a rectangle or a square depending on transmitter calculation radius and the
computation zone.
Calculation radius enables Atoll to define a square around the transmitter. One side of the square equals twice the entered
calculation radius.
Since the computation zone can be made of one or several polygons, transmitter calculation area corresponds to the
intersection area between its calculation square and the rectangle containing the computation zone area(s).
4.2.2 Calculate / Force Calculation Comparison
4.2.2.1 Calculate
The Calculate feature (F7) enables you:
1. To calculate prediction studies
The first time you click Calculate (no path loss matrices exist), Atoll computes path loss matrices for each TBC
transmitter. Then, it calculates created and unlocked coverage prediction studies inside the computation zone.
2. To check result validity and update calculations
If calculations have been performed once and you have changed some parameters such as radio data or
calculation area, Atoll automatically detects path loss matrices to be recalculated. These are either one or several
path loss matrices that become invalid due to certain modifications. Then Atoll calculates the prediction study, or
just the prediction study if matrices were all still valid.
Figure 4.1Example 1: Single Calculation Area
Figure 4.2Example 2: Multiple Calculation Areas
Computation zone(s)
Rectangle containing the computation zone(s)
Calculation area defined (square)

Transmitter
Calculation area: real area for which Atoll calculates path losses
76 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
4.2.2.2 Force Calculation
With the Force calculation feature (Ctrl+F7), Atoll deletes all the path loss matrices even if they are valid, recalculates
them and then updates the results of prediction studies.
4.2.3 Matrix Validity
Atoll manages path loss matrix validity transmitter by transmitter, even in case of transmitters with two path loss matrices
(main and extended matrices). Therefore, even if only one path loss matrix of the transmitter is invalid, Atoll will recalculate
both of them. All the geographic data modifications and some radio data changes can make matrices invalid. This table
lists these modifications and also changes that have an impact only on prediction studies.
Note:
Geographic data (DTM, clutter) modification makes path loss matrices invalid. However,
Atoll does not detect this invalidity just by using Calculate. Therefore, to update
calculations, you must click the Force calculation command.
Modification Matrix validity Impact on Calculate
Force
calculation
Frequency Invalid Path loss matrices Sufficient Not necessary
Antenna* coordinates (site coordinate:
X and Y, Dx and Dy)
Invalid Path loss matrices Sufficient Not necessary
Antenna
a
height
Invalid Path loss matrices Sufficient Not necessary
Antenna
a
pattern
Invalid Path loss matrices Sufficient Not necessary
Downtilt
a
Invalid Path loss matrices Sufficient Not necessary
Azimuth
a
Invalid Path loss matrices Sufficient Not necessary
% Power (when there is other
antennas)
Invalid Path loss matrices Sufficient Not necessary
Site position/altitude Invalid Path loss matrices Sufficient Not necessary
Grid resolution (main or/and
extended)
Invalid Path loss matrices Sufficient Not necessary
Propagation model (main or/and
extended)
Invalid Path loss matrices Sufficient Not necessary
Propagation model parameters Invalid Path loss matrices Sufficient Not necessary
Calculation areas
1. Calculation areas gets smaller
Valid Prediction study Sufficient Not necessary
Calculation areas
2. Calculation areas gets larger
Invalid Path loss matrices Sufficient Not necessary
Receiver height Invalid Path loss matrices Sufficient Not necessary
Receiver losses Valid Prediction study Sufficient Not necessary
Receiver gain Valid Prediction study Sufficient Not necessary
Receiver antenna
Valid because
Prediction study Sufficient Not necessary
Geographic layer order Invalid Path loss matrices
Insufficient
b
Necessary
Geographic file resolution Invalid Path loss matrices
Insufficient
b
Necessary
New DTM map Invalid Path loss matrices
Insufficient
b
Necessary
New clutter class edition Invalid Path loss matrices
Insufficient
b
Necessary
Coverage study resolution Valid Prediction study Sufficient Not necessary
Cell edge coverage probability Valid Prediction study Sufficient Not necessary
Coverage study conditions Valid Prediction study Sufficient Not necessary
Coverage study display options Valid Prediction study Sufficient Not necessary
a.Modification of any parameter related to main or other antennas makes matrix invalid.
b.Except if this action has an impact on the site positions/altitudes.
L
ant
Rx
0 =
Tip 1
Calculate or Force Calculation?
If you modify radio data or calculation areas, use the Calculate button. On the other hand, if you change geographic
data, it is necessary to use Force calculation.
Forsk 2010 AT283_TRG_E1 77
Chapter 4: Calculations
4.3 Path Loss Calculations
4.3.1 Ground Altitude Determination
Atoll determines reception and transmission site altitude from Digital Terrain Model map. The method used to evaluate
site altitude is based on a bilinear interpolation. It is described below.
Let us suppose a site S located inside a bin. Atoll knows the altitudes of four bin vertices, S1, S1, S2 and S2, from the
DTM file (Centre of each DTM pixel).
1
st
step: Atoll draws a vertical line through S. This line respectively intersects (S1,S1) and (S2, S2) lines at S1 and S2.
2
nd
step: Atoll determines the S1 and S2 altitudes using a linear interpolation method.
3
rd
step: Atoll performs a second linear interpolation to evaluate the S altitude.
4.3.2 Clutter Determination
Some propagation models need clutter class and clutter height as information at receiver or along a transmitter-receiver
profile.
Tip 2
Calculation area management
When performing prediction studies, it is recommended to follow this methodology to minimise recalculations:
1
st
step: Calculate without computation zone.
2
nd
step: Draw a computation zone and calculate.
3
rd
step: Decrease the calculation radius and calculate.
Figure 4.3Ground Altitude Determination - 1
Figure 4.4Ground Altitude Determination - 2
Figure 4.5Ground Altitude Determination - 3
Figure 4.6Ground Altitude Determination - 4
78 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
4.3.2.1 Clutter Class
Atoll uses clutter classes file to determine the clutter class.
4.3.2.2 Clutter Height
To evaluate the clutter height, Atoll uses clutter heights file if available in the .atl document; clutter height of a site is the
height of the nearest point in the file.
Example: Let us suppose a site S. In the clutter heights file, Atoll reads clutter heights of four points around the site, S1,
S1, S2 and S2. Here, the nearest point to S is S2; therefore Atoll takes the S2 clutter height as clutter height of S.
If you do not have any clutter height file, Atoll takes clutter height information in clutter classes file. In this case, clutter
height is an average height related to a clutter class.
4.3.3 Geographic Profile Extraction
Geographic profile extraction is needed in order to calculate diffraction losses. Profiles can be based on DTM only or on
DTM and clutter both. In fact, it depends on the selected propagation model.
4.3.3.1 Extraction Methods
4.3.3.1.1 Radial Extraction
Atoll draws radials from the site (where transmitter is located) to each calculation bin located along the transmitter
calculation area border. In other words, Atoll determines a geographic profile between site and each bin centre.
Figure 4.7Clutter Height
Figure 4.8Radial calculation method
Forsk 2010 AT283_TRG_E1 79
Chapter 4: Calculations
The receiver may be located either anywhere within a calculation bin (Point prediction) or at the centre of a calculation bin
(Coverage study). Therefore, according to the receiver position, Atoll chooses the nearest profile and uses it (receiver is
considered as located on the profile) to perform prediction study at the receiver.
4.3.3.1.2 Systematic Extraction
In this case, Atoll systematically extracts a geographic profile between the site (where transmitter resides) and the
receiver.
Transmitter
Radial: Atoll will extract a geographic profile for each radial
Centre of a bin located on the calculation border
Receiver: it may be anywhere in point analysis or at the centre of each calculation bin in coverage studies
Figure 4.9Site-bin centre profile
Figure 4.10Radial calculation method
Transmitter
Geographic profiles
Receiver: it may be anywhere in point analysis or at the centre of each calculation bin in coverage studies
80 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
4.3.3.2 Profile Resolution: Multi-Resolution Management
Geographic profile resolution depends on resolution of geographic data used by the propagation model (DTM and/or
clutter).
1. 1
st
case: If the chosen propagation model considers both DTM and clutter heights along the profile, the profile
resolution will be the highest of the two.
Example 1: Standard Propagation Model is used to perform predictions. A DTM map with a 40 m resolution and
a clutter heights map with a 20 m resolution are available.
Both DTM and clutter maps are considered when using the Standard propagation model. Therefore, here, the
profile resolution will be 20 m. It means that Atoll will extract geographic information, ground altitude and clutter
height, every 20 m. To get ground altitude every 20m, Atoll uses the bilinear interpolation method described in
"Ground Altitude Determination" on page 77. Clutter heights are read from the clutter heights map. Atoll takes the
clutter height of the nearest point every 20m (see Path loss calculations: Clutter determination).
Example 2: Standard Propagation Model is used to perform predictions. A DTM map with a 40 m resolution and
a clutter classes map with a 20 m resolution are available. No clutter height file has been imported in .atl document.
Both DTM and clutter maps are considered when using the Standard propagation model. Therefore, here, the
profile resolution will be 20 m. It means that Atoll will extract geographic information, ground altitude and clutter
height, every 20 m. To get ground altitude every 20 m, Atoll uses the bilinear interpolation method described in
"Ground Altitude Determination" on page 77. Atoll uses the clutter classes map to determine clutter height. Every
20 m, it determines clutter class and takes associated average height.
2. 2
nd
case: If the chosen propagation model takes into account only DTM map along the profile, profile resolution
will be the highest resolution among the DTM files.
Example: Cost-Hata is used to perform predictions. Both DTM maps with 40 m and 25 m resolutions and a clutter
map with a 20 m resolution are available.
Only DTM maps are considered along the whole profile when using Cost-Hata model. Therefore, here, the profile
resolution will be 25 m. It means that Atoll will extract geographic information, only the ground altitude, every
25 m. DTM 1 is on the top of DTM 2. Thus, Atoll will consider ground elevation read from DTM 1 in the definition
area of DTM 1 and DTM 2 elsewhere. To get ground altitude every 25 m, Atoll uses the bilinear interpolation
method described in "Ground Altitude Determination" on page 77.
Explorer window Work space
DTM
DTM 1 (25m)
DTM 2 (40m)
Clutter
Clutter (20m)
Notes:
The selected profile resolution does not depend on the geographic layer order. In the last
example, whatever the DTM file order you choose, profile resolution will always be 25m.
On the other hand, the geographic layer order will influence the usage of data to establish
the profile.
The calculation bin of path loss matrices defined by the grid resolution is independent of
geographic file resolution.
Forsk 2010 AT283_TRG_E1 81
Chapter 4: Calculations
4.4 Coverage Predictions
4.4.1 Use of Polygonal Zones in Coverage Prediction Reports
Prediction statistics are evaluated over the focus zone, if existing, then over the computation zone, if existing, or over the
whole covered area. The area of the focus and computation zones are calculated by decomposition in triangles.
The area of each prediction is calculated by counting its pixels inside the focus (resp. computation) zone. This number
multiplied by the area of one of its pixels gives the total area.
This area depends on the resolution of the coverage prediction. At the border of the focus (or computation) zone, pixels
are considered either inside or outside the zone. A pixel is inside if its centre is inside the focus zone.
If a prediction covers the entire focus (resp. computation) zone, its area should be equal to the focus (or computation) zone
area, but as these 2 different methods differ, the results may be slightly different. If it happens that the value of the
prediction area is higher than the focus zone area, then the calculated percentage value is higher than 100%. In that case,
Atoll9955 automatically replaces it by 100%.
4.4.2 Filtering Coverage Prediction Exports
Filtering can directly be applied to any type of prediction export (raster or vector) in order to exclude holes and islands.
The principle is to set the colour of each pixel by extracting the dominant colour of the bounding box made of pixels around
the pixel to be filled using a dispersion factor: .
where is the distance from the pixel to be filled to each pixel within the bounding box and where is the value at that
pixel.
In other words, the pixel will be filled by the most representative value within this bounding box.
The user-defined filtering percentage gives the size of the bounding box: pixels in each direction. In other words,
the bounding box is increased by one pixel every 10% (since Y is defined as a percentage in the interface)
4.4.3 Smoothing Coverage Prediction Exports
Smoothing can be applied to any prediction export in vector format to simplify its contours.
The principle is to reduce the number of points defining the contour of the polygon. This is done using a vertex reduction
routine reducing successive vertices which are clustered too closely (vertex reduction within tolerance of prior vertex
cluster, Douglas-Peucher polyline simplification).
Two methods can be set up in order to define the degree of coverage smoothing.
4.4.3.1 Smoothing: Percentage Method
The user-defined smoothing percentage gives the approximation tolerance: , where is the user-defined
export resolution. The tolerance defines the interval within which the algorithm tries to reduce the number of points as
explained hereafter.
Figure 4.11Bounding box for prediction filtering
D
2
X 2t ( ) ( ) exp
D X
Y Y 10
Z
2
2
------- R
Z
20
------ R
82 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
Lets consider the case of 3 successive points, A
1
, A
2
, A
3
. The aim of smoothing is to reduce the number of points
according to the tolerance such that A
2
will be deleted if within this tolerance (and A
1
and A
3
will be directly linked) and A
2
will be conserved if outside this tolerance.
- If A
2
is outside this interval, the exported shape will be (in blue):
- If A2 is within this interval, the exported shape will be (in blue):
4.4.3.2 Smoothing: Number of points method
The second method consists in defining a maximum number of points to be deleted. This number of points helps the
algorithm to determine the optimised tolerance (See "Smoothing: Percentage Method" on page 81) such that, with this
obtained tolerance, the number of points to be deleted will be lower than this value.
Lets consider the following initial coverage
Starting from the maximum possible tolerance, one can estimate the number of points to be filtered out (circled in red).
Figure 4.12Smoothing Tolerance Definition
Forsk 2010 AT283_TRG_E1 83
Chapter 4: Calculations
If this number is greater than the maximum number of points defined in the interface, Atoll reduces the tolerance until
reaching the requested maximum number of points or less.
The first the number of points respecting the constraint is obtained, smoothing is applied by deleting these points and
linking the remaining closest points.
84 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
4.5 Propagation Models
Propagation models available in Atoll are listed in the table below along with their main characteristics.
C
O
S
T
-
H
a
t
a
O
k
u
m
u
r
a
-
H
a
t
a
1
5
0
-
2
0
0
0

M
H
z
L
(
d
,

f
,

H
R
x
)
(
p
e
r

e
n
v
i
r
o
n
m
e
n
t
)
D
i
f
f
r
a
c
t
i
o
n

l
o
s
s
D
e
y
g
o
u
t
(
1

o
b
s
t
a
c
l
e
)
D
T
M
R
a
d
i
a
l
M
a
c
r
o

c
e
l
l
M
i
n
i

c
e
l
l
S
t
r
e
e
t
M
o
b
i
l
e
G
S
M

9
0
0
,

G
S
M

1
8
0
0
,
U
M
T
S
,

C
D
M
A
2
0
0
0
,
L
T
E
E
r
c
e
g
-
G
r
e
e
n
s
t
e
i
n
(
S
U
I
)
1
9
0
0
-
6
0
0
0

M
H
z
L
(
d
,

f
,

H
T
x
,

H
R
x
)
(
p
e
r

e
n
v
i
r
o
n
m
e
n
t
)
D
i
f
f
r
a
c
t
i
o
n

l
o
s
s
D
e
y
g
o
u
t
(
1

o
b
s
t
a
c
l
e
)
D
T
M
R
a
d
i
a
l
M
a
c
r
o

c
e
l
l
M
i
n
i

c
e
l
l
S
t
r
e
e
t
F
i
x
e
d
U
r
b
a
n

a
n
d

s
u
b
u
r
b
a
n
a
r
e
a
s
1
0
0
m

<

d

<

8
k
m
F
i
x
e
d

W
i
M
A
X
I
T
U

5
2
9
-
3
3
0
0
-
1
5
0
0

M
H
z
L
(
d
,

f
,

H
R
x
)
(
p
e
r

e
n
v
i
r
o
n
m
e
n
t
)
D
i
f
f
r
a
c
t
i
o
n

l
o
s
s
D
e
y
g
o
u
t
(
1

o
b
s
t
a
c
l
e
)
D
T
M
R
a
d
i
a
l
M
a
c
r
o

c
e
l
l
M
i
n
i

c
e
l
l
S
t
r
e
e
t
M
o
b
i
l
e
1

<

d

<

1
0
0
k
m
G
S
M
,

C
D
M
A
2
0
0
0
,
L
T
E
S
t
a
n
d
a
r
d

P
r
o
p
a
g
a
t
i
o
n

M
o
d
e
l
1
5
0
-
3
5
0
0

M
H
z
L
(
d
,

H
T
x
e
f
f
,

H
R
x
e
f
f
,

D
i
f
f

l
o
s
s
,

c
l
u
t
t
e
r
)
D
e
y
g
o
u
t

(
3

o
b
s
t
a
c
l
e
s
)
E
p
s
t
e
i
n
-
P
e
t
e
r
s
o
n

(
3

o
b
s
t
a
c
l
e
s
)
D
e
y
g
o
u
t

c
o
r
r
e
c
t
e
d

(
3

o
b
s
t
a
c
l
e
s
)
M
i
l
l
i
n
g
t
o
n

(
1

o
b
s
t
a
c
l
e
)
D
T
M
C
l
u
t
t
e
r
R
a
d
i
a
l
S
y
s
t
e
m
a
t
i
c
M
a
c
r
o

c
e
l
l
M
i
n
i

c
e
l
l
S
t
r
e
e
t
R
o
o
f
t
o
p
M
o
b
i
l
e

a
n
d

F
i
x
e
d
1

<

d

<

2
0
k
m
G
S
M
,

U
M
T
S
,
C
D
M
A
2
0
0
0
,

W
i
M
A
X
,

L
T
E
W
L
L
3
0
-
1
0
0
0
0

M
H
z
F
r
e
e

s
p
a
c
e

l
o
s
s
D
i
f
f
r
a
c
t
i
o
n

l
o
s
s
D
e
y
g
o
u
t
(
3

o
b
s
t
a
c
l
e
s
)
D
T
M
C
l
u
t
t
e
r
R
a
d
i
a
l
-
S
t
r
e
e
t
R
o
o
f
t
o
p
F
i
x
e
d
F
i
x
e
d

r
e
c
e
i
v
e
r
s
W
L
L
,

M
i
c
r
o
w
a
v
e
l
i
n
k
s
,

W
i
M
A
X
I
T
U

5
2
6
-
5
3
0
-
1
0
0
0
0

M
H
z
F
r
e
e

s
p
a
c
e

l
o
s
s
D
i
f
f
r
a
c
t
i
o
n

l
o
s
s
D
e
y
g
o
u
t
(
3

o
b
s
t
a
c
l
e
s
)
D
e
y
g
o
u
t

c
o
r
r
e
c
t
e
d
(
3

o
b
s
t
a
c
l
e
s
)
D
T
M
R
a
d
i
a
l
M
a
c
r
o

c
e
l
l
S
t
r
e
e
t
F
i
x
e
d
F
i
x
e
d

r
e
c
e
i
v
e
r
s
W
L
L
I
T
U

1
5
4
6
3
0
-
3
0
0
0

M
H
z
F
r
e
e

s
p
a
c
e

l
o
s
s

+
C
o
r
r
e
c
t
i
o
n
s
- - -
M
a
c
r
o

c
e
l
l
R
o
o
f
t
o
p
M
o
b
i
l
e
1

<

d

<

1
0
0
0
k
m
L
a
n
d

a
n
d

m
a
r
i
t
i
m
e
m
o
b
i
l
e
,

b
r
o
a
d
c
a
s
t
I
T
U

3
7
0
-
7
(
V
i
e
n
n
a

9
3
)
1
0
0
-
4
0
0

M
H
z
F
r
e
e

s
p
a
c
e

l
o
s
s
C
o
r
r
e
c
t
e
d
s
t
a
n
d
a
r
d
l
o
s
s
- - -
M
a
c
r
o

c
e
l
l
R
o
o
f
t
o
p
F
i
x
e
d
d

>

1
0
k
m
L
o
w

f
r
e
q
u
e
n
c
i
e
s
B
r
o
a
d
c
a
s
t
P
r
o
p
a
g
a
t
i
o
n
m
o
d
e
l
F
r
e
q
u
e
n
c
y
b
a
n
d
P
h
y
s
i
c
a
l
p
h
e
n
o
m
e
n
a
D
i
f
f
r
a
c
t
i
o
n
c
a
l
c
u
l
a
t
i
o
n
m
e
t
h
o
d
P
r
o
f
i
l
e
b
a
s
e
d

o
n
P
r
o
f
i
l
e
e
x
t
r
a
c
t
i
o
n
m
o
d
e
C
e
l
l

s
i
z
e
R
e
c
e
i
v
e
r
l
o
c
a
t
i
o
n
R
e
c
e
i
v
e
r
U
s
e
Forsk 2010 AT283_TRG_E1 85
Chapter 4: Calculations
4.5.1 Okumura-Hata and Cost-Hata Propagation Models
4.5.1.1 Hata Path Loss Formula
Hata formula empirically describes the path loss as a function of frequency, receiver-transmitter distance and antenna
heights for an urban environment. This formula is valid for flat, urban environments and 1.5 metre mobile antenna height.
Path loss (Lu) is calculated (in dB) as follows:
f is the frequency (MHz).
h
Tx
is the transmitter antenna height above ground (m) (Hb notation is also used in Atoll).
d is the distance between the transmitter and the receiver (km).
The parameters A
1
, A
2
, A
3
, B
1
, B
2
, and B
3
can be user-defined. Default values are proposed in the table below:
4.5.1.2 Corrections to the Hata Path Loss Formula
As described above, the Hata formula is valid for urban environment and a receiver antenna height of 1.5m. For other
environments and mobile antenna heights, corrective formulas must be applied.
For urban areas:
For suburban areas:
For quasi-open rural areas:
For open rural areas:
a(h
Rx
) is a correction for a receiver antenna height different from 1.5m.
4.5.1.3 Calculations in Atoll
Hata models take into account topo map (DTM) between transmitter and receiver and morpho map (clutter) at the receiver.
1
st
step: For each calculation bin, Atoll determines the clutter bin on which the receiver is located. This clutter bin
corresponds to a clutter class. Then, it uses the Hata formula assigned to this clutter class to evaluate .
2
nd
step: This step depends on whether the Add diffraction loss option is checked.
If the Add diffraction loss option is unchecked, Atoll stops calculations.
Notes:
In formulas described above, is stated in dB.
Under Physical phenomena, L(...) expressions refer to formulas customisable in Atoll.
SUI stands for Stanford University Interim models.
L
model
Lu A
1
A
2
f ( ) log A
3
h
Tx
( ) log B
1
B
2
h
Tx
( ) log B
3
h
Tx
+ + ( ) d log + + + =
Parameters
Okumura-Hata
f s1500 MHz
Cost-Hata
f > 1500 MHz
A
1
69.55 49.30
A
2
26.16 33.90
A
3
-13.82 -13.82
B
1
44.90 44.90
B
2
-6.55 -6.55
B
3
0 0
L
model 1
Lu a h
Rx
( ) =
L
model 1
Lu a h
Rx
( ) 2
f
28
------
\ .
| |
log
\ .
| |
2
5.4 =
L
model 1
Lu a h
Rx
( ) 4.78 f ( ) log ( )
2
18.33 f ( ) log 35.94 + =
L
model 1
Lu a h
Rx
( ) 4.78 f ( ) log ( )
2
18.33 f ( ) log 40.94 + =
Environment a(h
Rx
)
Rural/Small city
Large city
1.1 f ( ) log 0.7 ( )h
Rx
1.56 f ( ) log 0.8 ( )
3.2 11.75h
Rx
( ) log ( )
2
4.97
Note:
When receiver antenna height equals 1.5m, a(h
Rx
) is close to 0 dB regardless of
frequency.
L
model 1
86 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
If the Add diffraction loss option is selected, Atoll proceeds as follows:
a. It extracts a geographic profile between the transmitter and the receiver based on the radial calculation mode.
b. It determines the largest obstacle along the profile in accordance with the Deygout method and evaluates
losses due to diffraction .
4.5.2 ITU 529-3 Propagation Model
4.5.2.1 ITU 529-3 Path Loss Formula
The ITU 529.3 model is a Hata-based model. For this reason, its formula empirically describes the path loss as a function
of frequency, receiver-transmitter distance and antenna heights for a urban environment. This formula is valid for flat,
urban environments and 1.5 metre mobile antenna height.
The standard ITU 529-3 formula, for a receiver located on a urban environment, is given by:
where:
E is the field strength for 1 kW ERP
f is the frequency (MHz).
is the transmitter antenna height above ground (m) (H
b
notation is also used in Atoll)
is the receiver antenna height above ground (m)
d is the distance between the transmitter and the receiver (km)
b is the distance correction
The domain of validity of such is formula is:
Frequency range: 300-1500 MHz
Base Station height: 30-200 m
Mobile height: 1-10 m
Distance range: 1-100 km
Since Atoll needs the path loss (Lu) formula, a conversion has to be made. One can find the following conversion formula:
which gives the following path loss formula for the ITU 529-3 model:
4.5.2.2 Corrections to the ITU 529-3 Path Loss Formula
4.5.2.2.1 Environment Correction
As described above, the Hata formula is valid for urban environment. For other environments and mobile antenna heights,
corrective formulas must be applied.
for large city and urban environments
for suburban area
for rural area
4.5.2.2.2 Area Size Correction
In the formulas above, is the environment correction and is defined according to the area size
Note:
Like for any Hata-based model, is, by default, limited to the computed free space
loss value. It is also possible to avoid this option (option in the related scrolling menu of
Configuration tab).
L
model
L
model 1
=
L
model 2
L
model
L
model 1
L
model 2
+ =
L
model
E 69.82 6.16 f log 13.82 h
Tx
log 44.9 6.55 h
Tx
log ( ) d log ( )
b
+ =
h
Tx
h
Rx
Lu 139.37 20 f log E + =
Lu 69.55 26.16 f log 13.82 h
Tx
log 44.9 6.55 h
Tx
log ( ) d log ( )
b
+ + =
L
model 1
Lu a h
Rx
( ) =
L
model 1
Lu a h
Rx
( ) 2
f
28
------
\ .
| |
log
\ .
| |
2
5.4 =
L
model 1
Lu a h
Rx
( ) 4.78 f log ( )
2
18.33 f log 40.94 + =
Environment a(Hr)
Rural/Small city
a h
Rx
( )
1.1 f log 0.7 ( )h
Rx
1.56 f log 0.8 ( )
Forsk 2010 AT283_TRG_E1 87
Chapter 4: Calculations
4.5.2.2.3 Distance Correction
The distance correction refers to the term b above.
4.5.2.3 Calculations in Atoll
Hata-based models take into account topo map (DTM) between transmitter and receiver and morpho map (clutter) at the
receiver.
1
st
step: For each calculation bin, Atoll determines the clutter bin on which the receiver is located. This clutter bin
corresponds to a clutter class. Then, it uses the ITU 529-3 formula assigned to this clutter class to evaluate .
2
nd
step: This step depends on whether the Add diffraction loss option is checked.
If the Add diffraction loss option is unchecked, Atoll stops calculations.
If the Add diffraction loss option is selected, Atoll proceeds as follows:
a. It extracts a geographic profile between the transmitter and the receiver based on the radial calculation mode.
b. It determines the largest obstacle along the profile in accordance with the Deygout method and evaluates
losses due to diffraction .
4.5.3 Standard Propagation Model (SPM)
4.5.3.1 SPM Path Loss Formula
SPM is based on the following formula:
with,
K
1
: constant offset (dB).
K
2
: multiplying factor for log(d).
d: distance between the receiver and the transmitter (m).
K
3
: multiplying factor for log(H
Txeff
).
HTxeff: effective height of the transmitter antenna (m).
K
4
: multiplying factor for diffraction calculation. K
4
has to be a positive number.
Diffraction loss: loss due to diffraction over an obstructed path (dB).
K
5
: multiplying factor for
K
6
: multiplying factor for .
K
7
: multiplying factor for .
: effective mobile antenna height (m).
Large city
3.2 11.75h
Rx
( ) log ( )
2
4.97
Distance b
d<20 km 1
d>20 km
where
b 1 0.14 1.87 10
4
f 1.07 10
3
h'
Tx
+ + ( )
d
20
------ log
\ .
| |
0.8
+ =
h'
Tx
h
Tx
1 7 10
6
h
Tx
2
+
-------------------------------------------- =
Note:
Like for any Hata-based model, is, by default, limited to the computed free space
loss value. It is also possible to avoid this option (option in the related scrolling menu of
Configuration tab)
L
model 1
L
model
L
model 1
=
L
model 2
( )
L
model
L
model 1
L
model 2
+ =
L
model
L
model
K
1
K
2
d ( ) log K
3
H
Txeff
( ) log K
4
Di ffracti onLoss K
5
d ( ) log H
Txeff
( ) log + + + + +
K
6
H
Rxeff
( ) K
7
H
Rxeff
( ) log K
cl utter
f cl utter ( ) + +
=
d ( ) log H
Txeff
( ) log
H
Rxeff
H
Rxeff
( ) log
H
Rxeff
88 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
K
clutter
: multiplying factor for f(clutter).
f(clutter): average of weighted losses due to clutter.
4.5.3.2 Calculations in Atoll
4.5.3.2.1 Visibility and Distance Between Transmitter and Receiver
For each calculation bin, Atoll determines:
The distance between the transmitter and the receiver.
If the distance Tx-Rx is less than the maximum user-defined distance (break distance), the receiver is considered to be
near the transmitter. Atoll will use the set of values marked Near transmitter.
If the distance Tx-Rx is greater than the maximum distance, receiver is considered far from transmitter. Atoll will use the
set of values Far from transmitter.
Whether the receiver is in the transmitter line of sight or not.
If the receiver is in the transmitter line of sight, Atoll will take into account the set of values (K1,K2)LOS. The LOS is defined
by no obstruction along the direct ray between the transmitter and the receiver.
If the receiver is not in the transmitter line of sight, Atoll will use the set of values (K1,K2)NLOS.
4.5.3.2.2 Effective Transmitter Antenna Height
Effective transmitter antenna height (H
Txeff
) may be calculated with six different methods.
Height Above Ground
The transmitter antenna height is above the ground (H
Tx
in m).
H
Txeff
= H
Tx
Height Above Average Profile
The transmitter antenna height is determined relative to an average ground height calculated along the profile between a
transmitter and a receiver. The profile length depends on distance min and distance max values and is limited by the
transmitter and receiver locations. Distance min and Distance max are minimum and maximum distances from the
transmitter respectively.
where,
is the ground height (ground elevation) above sea level at transmitter (m).
is the average ground height above sea level along the profile (m).
Slope at Receiver Between 0 and Minimum Distance
The transmitter antenna height is calculated using the ground slope at receiver.
where,
is the ground height (ground elevation) above sea level at receiver (m).
is the ground slope calculated over a user-defined distance (Distance min). In this case, Distance min is a distance from
receiver.
Spot H
t
If then,
If then,
Note:
If the profile is not located between the transmitter and the receiver, H
Txeff
equals H
Tx
only.
Notes:
If then, Atoll uses 20m in calculations.
If then, Atoll takes 200m.
H
Txeff
H
Tx
H
0Tx
H
0
( ) + =
H
0Tx
H
0
H
Txeff
H
Tx
H
0Tx
+ ( ) H
0Rx
K d + =
H
0Rx
K
H
Txeff
20m <
H
Txeff
200m >
H
0Tx
H
0Rx
> H
Txeff
H
Tx
H
0Tx
H
0Rx
( ) + =
H
0Tx
H
0Rx
s H
Txeff
H
Tx
=
Forsk 2010 AT283_TRG_E1 89
Chapter 4: Calculations
Absolute Spot H
t
These values are only used in the two last methods and have different meanings according to the method.
Enhanced Slope at Receiver
Atoll offers a new method called Enhanced slope at receiver to evaluate the effective transmitter antenna height.
Let x-axis and y-axis respectively represent positions and heights. We assume that x-axis is oriented from the transmitter
(origin) towards the receiver.
This calculation is achieved in several steps:
1
st
step: Atoll determines line of sight between transmitter and receiver.
The LOS line equation is:
where,
is the receiver antenna height above the ground (m).
i is the point index.
Res is the profile resolution (distance between two points).
2
nd
step: Atoll extracts the transmitter-receiver terrain profile.
3
rd
step: Hills and mountains are already taken into account in diffraction calculations. Therefore, in order for them not to
unfavourably influence the regression line calculation, Atoll filters the terrain profile.
Atoll calculates two filtered terrain profiles; one established from the transmitter and another from the receiver. It
determines filtered height of every profile point. Profile points are evenly spaced on the basis of profile resolution. To
determine filtered terrain height at a point, Atoll evaluates ground slope between two points and compares it with a
threshold set to 0.05; where three cases are possible.
Some notations defined hereafter are used in next part.
is the filtered height.
is the original height. Original terrain height is determined from extracted ground profile.
- Filter starting from transmitter
Let us assume that
For each point, we have three different cases:
1
st
case: If and ,
Then,
Note:
Distance min and distance max are set to 3000 and 15000 m according to ITU
recommendations (low frequency broadcast f < 500 Mhz) and to 0 and 15000 m according
Okumura recommendations (high frequency mobile telephony).
Figure 4.13Enhanced Slope at Receiver
H
Txeff
H
Tx
H
0Tx
H
0Rx
+ =
Los i ( ) H
0Tx
H
Tx
+ ( )
H
0Tx
H
Tx
+ ( ) H
0Rx
H
Rx
+ ( ) ( )
d
-------------------------------------------------------------------------------Res i ( ) =
H
Rx
H
fi l t
H
ori g
H
fi l t Tx
Tx ( ) H
ori g
Tx ( ) =
H
ori g
i ( ) H
ori g
i 1 ( ) >
H
ori g
i ( ) H
ori g
i 1 ( )
Res
------------------------------------------------------ 0.05 s
H
fi l t Tx
i ( ) H
fi l t Tx
i 1 ( ) H
ori g
i ( ) H
ori g
i 1 ( ) ( ) + =
90 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
2
nd
case: If and
Then,
3
rd
case: If
Then,
If additionally
Then,
- Filter starting from receiver
Let us assume that
For each point, we have three different cases:
1
st
case: If and ,
Then,
2
nd
case: If and
Then,
3
rd
case: If
Then,
If additionally
Then,
Then, for every point of profile, Atoll compares the two filtered heights and chooses the higher one.
4
th
step: Atoll determines the influence area, R. It corresponds to the distance from receiver at which the original terrain
profile plus 30 metres intersects the LOS line for the first time (when beginning from transmitter).
The influence area must satisfy additional conditions:
,
,
R must contain at least three bins.
5
th
step: Atoll performs a linear regression on the filtered profile within R in order to determine a regression line.
The regression line equation is:
and
where,
i is the point index. Only points within R are taken into account.
d(i) is the distance between i and the transmitter (m).
Then, Atoll extends the regression line to the transmitter location. Therefore, its equation is:
Notes:
When several influence areas are possible, Atoll chooses the highest one.
If d < 3000m, R = d.
H
ori g
i ( ) H
ori g
i 1 ( ) >
H
ori g
i ( ) H
ori g
i 1 ( )
Res
------------------------------------------------------ 0.05 >
H
fi l t Tx
i ( ) H
fi l t Tx
i 1 ( ) =
H
ori g
i ( ) H
ori g
i 1 ( ) s
H
fi l t Tx
i ( ) H
fi l t Tx
i 1 ( ) =
H
fi l t
i ( ) H
ori g
i ( ) >
H
fi l t Tx
i ( ) H
ori g
i ( ) =
H
fi l t
Rx ( ) H
ori g
Rx ( ) =
H
ori g
i ( ) H
ori g
i 1 + ( ) >
H
ori g
i ( ) H
ori g
i 1 + ( )
Res
------------------------------------------------------- 0.05 s
H
fi l t Rx
i ( ) H
fi l t Rx
i 1 + ( ) H
ori g
i ( ) H
ori g
i 1 + ( ) ( ) + =
H
ori g
i ( ) H
ori g
i 1 + ( ) >
H
ori g
i ( ) H
ori g
i 1 + ( )
Res
------------------------------------------------------- 0.05 >
H
fi l t Rx
i ( ) H
fi l t Rx
i 1 + ( ) =
H
ori g
i ( ) H
ori g
i 1 + ( ) s
H
fi l t Rx
i ( ) H
fi l t Rx
i 1 + ( ) =
H
fi l t
i ( ) H
ori g
i ( ) >
H
fi l t Rx
i ( ) H
ori g
i ( ) =
H
fi l t
i ( ) max H
fi l t Tx
i ( ) H
fi l t Rx
i ( ) , ( ) =
R 3000m >
R 0.01 d >
y ax b + =
a
d i ( ) d
m
( ) H
fi l t
i ( ) H
m
( )
i

d i ( ) d
m
( )
2
i

------------------------------------------------------------------------ = b H
m
ad
m
=
H
m
1
n
--- H
fi l t
i ( )
i

=
d
m
d
R
2
---- =
Forsk 2010 AT283_TRG_E1 91
Chapter 4: Calculations
6
th
step: Then, Atoll calculates effective transmitter antenna height, (m).
If H
Txeff
is less than 20m, Atoll recalculates it with a new influence area, which begins at transmitter.
7
th
step: If is still less than 20m (even negative), Atoll evaluates path loss using and applies a
correction factor.
Therefore, if ,
where,
4.5.3.2.3 Effective Receiver Antenna Height
where,
is the receiver antenna height above the ground (m).
is the ground height (ground elevation) above sea level at the receiver (m).
is the ground height (ground elevation) above sea level at the transmitter (m).
4.5.3.2.4 Correction for Hilly Regions in Case of LOS
An optional corrective term enables Atoll to correct path loss for hilly regions when the transmitter and the receiver are in
Line-of-sight.
Therefore, if the receiver is in the transmitter line of sight and the Hilly terrain correction option is active, we have:
When the transmitter and the receiver are not in line of sight, the path loss formula is:
is determined in three steps. Influence area, R, and regression line are supposed available.
1
st
step: For every profile point within influence area, Atoll calculates height deviation between the original terrain profile
and regression line. Then, it sorts points according to the deviation and draws two lines (parallel to the regression line),
one which is exceeded by 10% of the profile points and the other one by 90%.
2
nd
step: Atoll evaluates the terrain roughness, Ah; it is the distance between the two lines.
3
rd
step: Atoll calculates .
We have
If ,
Else
If ,
Else
Notes:
In case , 1000m will be used in calculations.
If is still less than 20m, an additional correction is taken into account (7
th
step).
regr i ( ) a i Res ( ) b + =
H
Txeff
H
Txeff
H
0Tx
H
Tx
b +
1 a
2
+
-------------------------------------- =
H
Txeff
1000m >
H
Txeff
H
Txeff
H
Txeff
20m =
H
Txeff
20m <
L
model
L
model
H
Txeff
20m = ( ) d f , , ( ) K
l owant
+ =
K
l owant
d
10
5
--------- 0.3 H
Txeff
20 ( ) ( )
20 1 H
Txeff
20 ( ) ( )
9.63
d
1000
------------- +
\ .
| |
6.93
d
1000
------------- +
\ .
| |

------------------------------------------------------------------------------ =
Note:
The calculation of effective antenna heights ( and ) is based on extracted
DTM profiles. They are not properly performed if you have not imported heights (DTM file)
beforehand.
H
Rxeff
H
Rx
H
0Rx
+ ( ) H
0Tx
=
H
Rx
H
0Rx
H
0Tx
H
Rxeff
H
Txeff
L
model
K
1 LOS ,
K
2 LOS ,
d ( ) log K
3
H
Txeff
( ) log K
5
H
Txeff
( ) d ( ) log log K
6
H
Rx
K
cl utter
f cl utter ( ) K
hi l l LOS ,
+ + + + + + =
L
model
K
1 NLOS ,
K
2 NLOS ,
d ( ) log K
3
H
Txeff
( ) log K
4
Di ffracti on K
5
H
Txeff
( ) d ( ) log log K
6
H
Rx
K
cl utter
f cl utter ( ) + + + + + + =
K
hi l l LOS ,
K
hi l l LOS ,
K
hi l l LOS ,
K
h
K
hf
+ =
0 h A < 20m s K
h
0 =
K
h
7.73 h A ( ) log ( )
2
15.29 h A ( ) log 6.746 + =
0 h A < 10m s K
hf
2 0.1924 H
0Rx
H
Rx
regr i
Rx
( ) + ( ) =
K
hf
2 1.616 h A ( ) log ( )
2
14.75 h A ( ) log 11.21 + ( )
H
0Rx
H
Rx
regr i
Rx
( ) +
h A
------------------------------------------------------------ =
92 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
i
Rx
is the point index at receiver.
4.5.3.2.5 Diffraction
Four methods are available to calculate diffraction loss over the transmitter-receiver profile. They are detailed in the
Appendices.
Along the transmitter-receiver profile, you may consider:
Either ground altitude and clutter height (Consider heights in diffraction option),
In this case, Atoll uses clutter height information from clutter heights file if available in the .atl document.
Otherwise, it considers average clutter height specified for each clutter class in the clutter classes file description.
Or only ground altitude.
4.5.3.2.6 Losses due to Clutter
Atoll calculates f(clutter) over a maximum distance from receiver:
where,
L: loss due to clutter defined in the Clutter tab by the user (in dB).
w: weight determined through the weighting function.
n: number of points taken into account over the profile. Points are evenly spaced depending on the profile resolution.
Four weighting functions are available:
Uniform weighting function:
Triangular weighting function:
, where d
i
is the distance between the receiver and the ith point and D is the maximum distance
defined.
Logarithmic weighting function:
Exponential weighting function:
The chart below shows the weight variation with the distance for each weighting function.
Figure 4.14Losses due to Clutter
f cl utter ( ) L
i
w
i
i 1 =
n

=
w
i
1
n
--- =
w
i
d
i
d
j
j 1
n

-------------- =
d
i
D d'
i
=
w
i
d
i
D
---- 1 +
\ .
| |
log
d
j
D
---- 1 +
\ .
| |
log
j 1
n

-------------------------------------- =
w
i
e
d
i
D
----
1
e
d
j
D
----
1
j 1 =
n

-------------------------- =
Forsk 2010 AT283_TRG_E1 93
Chapter 4: Calculations
4.5.3.2.7 Recommendations
Beware that the clutter influence may be taken into account in two terms, Diffraction loss and f(clutter) at the same time.
To avoid this, we advise:
1. Not to consider clutter heights to evaluate diffraction loss over the transmitter-receiver profile if you specify losses
per clutter class.
This approach is recommended if the clutter height information is statistical (clutter roughly defined, no
altitude).
Or
2. Not to define any loss per clutter class if you take clutter heights into account in the diffraction loss.
In this case, f(clutter)=0. Losses due to clutter are only taken into account in the computed Diffraction loss term.
This approach is recommended if the clutter height information is either semi-deterministic (clutter roughly
defined, altitude defined with an average height per clutter class) or deterministic (clutter sharply defined, altitude
defined with an average height per clutter class or - even better - via a clutter height file).
In case of semi-deterministic clutter information, specify receiver clearance (m) per clutter class. Both ground altitude and
clutter height are considered along the whole transmitter-receiver profile except over a specific distance around the
receiver (clearance), where Atoll proceeds as if there was only the DTM map. The clearance information is used to model
streets.
In the above figure, the ground altitude and clutter height (in this case, average height specified for each clutter class in
the clutter classes map description) are taken into account along the profile.
Clearance definition is not necessary in case of deterministic clutter height information. Clutter height information is
accurate enough to be used directly without additional information such as clearance. Two cases can be considered:
1. If the receiver is in the street (clutter height lower than receiver height), Atoll calculates the path loss by
considering potentially some diffraction loss at reception.
2. If the receiver is supposed to be inside a building (clutter height higher than receiver height), Atoll does not
consider any difraction (and clearance) from the building but takes into account the indoor loss as an additional
penetration loss.
4.5.3.3 Automatic SPM Calibration
The goal of this tool is to calibrate parameters and methods of the SPM formula in a simple and reproducible way.
Calibration is based on imported CW measurement data. It is the process of limiting the difference between predicted and
measured values. For a complete description of the calibration procedure (including the very important prerequisite filtering
work on the CW measurement points), please refer to the User Manual and the SPM Calibration Guide.
The following SPM formula parameters can be estimated:
K
1
, K
2
, K
3
, K
4
, K
5
, K
6
and K
7
Figure 4.15Tx-Rx profile
Notes:
To consider indoor losses in building only when using a deterministic clutter map (clutter
height map), the 'Indoor Coverage' box must not be checked in predictions unless this loss
will be counted twice inside buildings (on the entire reception clutter class and not only
inside the building).
Like for any Hata-based model, is, by default, limited to the computed free space
loss value. It is also possible to avoid this option (option in the related scrolling menu of
Configuration tab)
Even with no clearance, the clutter height (extracted either from clutter class or clutter
height folders) is never considered at the last profile point.
L
model
94 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
Losses per clutter class (K
clutter
must be user-defined)
Effective antenna height method
Diffraction method
Automatic model calibration provides a mathematical solution. The relevance of this mathematical solution with a physical
and realistic solution must be determined before committing these results.
You must keep in mind that the model calibration and its result (standard deviation and root mean square) strongly depend
on the CW measurement samples you use. A calibrated model must restore the behaviour of CW measurements
depending on their configuration on a large scale, and not just totally coincide with a few number of CW measurements.
The calibrated model has to give correct results for every new CW measurement point in the same geographical zone,
without having been calibrated on these new CW measurements.
4.5.3.3.1 General Algorithm
Propagation model calibration is a special case of the more general Least-Square problems, i.e. given a real m x n matrix
A, and a real m-vector b, find a real n-vector x
0
that minimises the Euclidean length of Ax - b.
Here,
m is the number of measurement points,
n is the number of parameters to calibrate,
A is the values of parameter associated variables (log(d), log(heff), etc.) at each measurement point, and
b is the vector of measurement values.
The vector x
0
is the set of parameters found at the end of the calibration.
The theoretical mathematical solution of this problem was found by Gauss (around 1830). Further enhancements to the
original method were proposed in the 60's in order to solve the numerical instability problem.
In 1974, Lawson & Hanson [2] proposed a theoretical solution of the least-square problem with general linear inequality
constraints on the vector x
0
. Atoll implementation is based on this method, which is explained in detail in [1].
4.5.3.3.2 Sample Values for SPM Path Loss Formula Parameters
The following tables list some sample orders of magnitudes for the different parameters composing the Standard
Propagation Model formula.
K
1
depends on the frequency and the technology. Here are some sample values:
The above K1 values for WiMAX are extrapolated estimates for different frequency ranges. It is highly recommended to
calibrate the SPM using measurement data collected on the field for WiMAX networks before using the SPM for
References:
[1] Bjrck A. Numerical Methods for Least Square Problems, SIAM, 1996.
[2] Lawson C.L., Hanson R.J. Solving Least Squares Problems, SIAM, 1974.
Minimum Typical Maximum
K
1
Variable Variable Variable
K
2
20 44.9 70
K
3
-20 5.83 20
K
4
0 0.5 0.8
K
5
-10 -6.55 0
K
6
-1 0 0
K
7
-10 0 0
Project type Frequency (MHz) K
1
GSM 900 935 12.5
GSM 1800 1805 22
GSM 1900 1930 23
UMTS 2110 23.8
1xRTT 1900 23
WiMAX
2300 24.7
2500 25.4
2700 26.1
3300 27.8
3500 28.3
Forsk 2010 AT283_TRG_E1 95
Chapter 4: Calculations
predictions.
All K paramaters can be defined by the automatic calibration wizard. Since K
clutter
is a constant, its value is strongly
dependant on the values given to the losses per clutter classes. From experienced users, the typical losses (in dB) per
clutter class are:
These values have to be entered only when considering statistical clutter class maps only.
4.5.3.4 Unmasked Path Loss Calculation
You can use the SPM to calculate unmasked path losses. Unmasked path losses are calculated by not taking into account
the transmitter antenna patterns, i.e., the attenuation due to the transmitter antenna pattern is not included. Such path
losses are useful when using path loss matrices calculated by Atoll with automatic optimisation tools.
The instance of the SPM available by default, under the Propagation Models folder in the Modules tab, has the following
characteristics:
Signature: {D5701837-B081-11D4-931D-00C04FA05664}
Type: Atoll.StdPropagModel.1
You can access these parameters in the Propagation Models table by double-clicking the Propagation Models folder in
the Modules tab.
To make the SPM calculate path losses excluding the antenna pattern attenuation, you have to change the type of the
SPM to:
Type: Atoll.StdPropagModelUnmasked.1
However, changing the type only does not invalidate the already calculated path loss matrices, because the signature of
the propagation model is still the same. If you want Atoll to recognize that the SPM has changed, and to invalidate the
path loss matrices calculated with this model, you have to change the signature of the model as well. The default signature
for the SPM that calculates unmasked path loss matrices is:
Signature: {EEE060E5-255C-4C1F-B36C-A80D3D972583}
The above signature is a default signature. Atoll automatically creates different signatures for different instances of the
same propagation model. Therefore, it is possible to create different instances of the SPM, with different parameter
settings, and create unmasked versions of these instances.
You can change the signature and type of the original instance of the SPM, but it is recommended to make a copy of the
SPM in order not to lose the original SPM parameters. So, you will be able to keep different versions of the SPM, those
that calculate path losses with antenna pattern attenuation, and others that calculate path losses without it.
The usual process flow of an ACP working on an Atoll document through the API would be to:
1. Backup the storage directory of path loss matrices.
2. Set a different storage directory for calculating and storing unmasked path loss matrices.
3. Select the SPM used, backup its signature, and change its signature and type as shown above.
4. Perform optimisation using the path loss matrices calculated by the unmasked version of the SPM.
5. Restore the type and the signature of the SPM.
6. Reset the path loss storage directory to the original one.
Dense urban From 4 to 5
Woodland From 2 to 3
Urban 0
Suburban From -5 to -3
Industrial From -5 to -3
Open in urban From -6 to -4
Open From -12 to -10
Water From -14 to -12
Note:
The Standard Propagation Model is deduced from the Hata formulae, valid in the case of
an urban environment. The above values are consistent since they are normalized with
respect to the urban clutter class (0 dB for urban clutter class). Positive values correspond
to denser clutter classes and negative values to less dense clutter classes.
Notes:
It is not possible to calibrate the unmasked version of the SPM using measurement data.
You can also use Atoll.ini options, AngleCalculation = 2000 and AngleCalculation = 3000,
for calculating unmasked path losses and angles of incidence, respectively. These options
are only available for the propagation models available with Atoll by default. Please refer to
the Administrator Manual for details.
96 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
4.5.4 WLL Propagation Model
4.5.4.1 WLL Path Loss Formula
Where is the free space loss calculated using the formula entered in the model properties, is the diffraction loss
calculated using the 3-obstacle Deygout method, and is the diffraction multiplying factor defined in the model
properties.
4.5.4.2 Calculations in Atoll
4.5.4.2.1 Free Space Loss
Please refer to the Appendices for further details about free space loss calculation.
4.5.4.2.2 Diffraction
Atoll calculates diffraction loss along the transmitter-receiver profile built from DTM and clutter maps. Therefore, losses
due to clutter are taken into account in diffraction losses. Atoll takes clutter height information from the clutter heights file
if available in the .atl document. Otherwise, it considers average clutter height specified for each clutter class in the clutter
classes file description.
The Deygout construction (considering 3 obstacles) is used. This method is detailed in the Appendices. The final
diffraction losses are determined by multiplying the diffraction losses calculated using the Deygout method by the
Diffraction multiplying factor defined in the model properties.
Receiver Clearance
Define receiver clearance (m) per clutter class when clutter height information is either statistical or semi-
deterministic. Both ground altitude and clutter height are considered along the whole profile except over a specific
distance around the receiver (clearance), where Atoll proceeds as if there was only the DTM map (see SPM part). Atoll
uses the clearance information to model streets.
If the clutter is deterministic, do not define any receiver clearance (m) per clutter class. In this case, clutter height
information is accurate enough to be used directly without additional information such as clearance (Atoll can locate
streets).
Receiver Height
Entering receiver height per clutter class enables Atoll to consider the fact that receivers are fixed and located on the roofs.
Visibility
If the option Line of sight only is not selected, Atoll computes L
model
on each calculation bin using the formula defined
above. When selecting the option Line of sight only, Atoll checks for each calculation bin if the Diffraction loss (as defined
in the Diffraction loss: Deygout part) calculated along profile equals 0.
In this case, receiver is considered in line of sight and Atoll computes L
model
on each calculation bin using the
formula defined above.
Otherwise, Atoll considers that L
model
tends to infinity.
4.5.5 ITU-R P.526-5 Propagation Model
4.5.5.1 ITU 526-5 Path Loss Formula
Using the SPM, you can also calculate the angles of incidence by creating a new instance
of the SPM with the following characteristics:
Type: Atoll.StdPropagModelIncidence.1
Signature: {659F0B9E-2810-4e59-9F0D-DA9E78E1E64B}
Important:
The "masked" version of the algorithm has not been changed. It still takes into account
Atoll.ini options. However, the "unmasked" version does not take Atoll.ini options into
account.
Its highly recommended to use one method (Atoll.ini options) or the other one (new
identifier & signature) but not to combine both.
L
model
L
FS
F
Di ff
L
Di ff
+ =
L
FS
L
Di ff
F
Di ff
L
model
L
FS
L
Di ff
+ =
Forsk 2010 AT283_TRG_E1 97
Chapter 4: Calculations
Where is the free space loss calculated using the formula entered in the model properties and is the diffraction
loss calculated using the 3-obstacle Deygout method.
4.5.5.2 Calculations in Atoll
4.5.5.2.1 Free Space Loss
Please refer to the Appendices for further details about free space loss calculation.
4.5.5.2.2 Diffraction
Atoll calculates diffraction loss along the transmitter-receiver profile is built from the DTM map. The Deygout construction
(considering 3 obstacles), with or without correction, is used. These methods are detailed in the Appendices.
4.5.6 ITU-R P.370-7 Propagation Model
4.5.6.1 ITU 370-7 Path Loss Formula
If d<1 km,
If d>1000 km,
If 1<d<1000 km,
d is the distance between the transmitter and the receiver (km).
4.5.6.2 Calculations in Atoll
4.5.6.2.1 Free Space Loss
Please refer to the Appendices for further details about free space loss calculation.
4.5.6.2.2 Corrected Standard Loss
This formula is given for a 60 dBm (1kW) transmitter power.
where,
C
n
is the field strength received in dBV/m,
is a correction factor for effective receiver antenna height (dB),
A
cl
is the correction for terrain clearance angle (dB),
f is the frequency in MHz.
C
n
Calculation
The C
n
value is determined from charts C
n
=f(d, H
Txeff
).
In the following part, let us assume that C
n
=E
n
(d,H
Txeff
) (where E
n
(d,H
Txeff
) is the field received in dBV/m) is read from
charts for a distance, d (in km), and an effective transmitter antenna height, H
Txeff
(in m).
First of all, Atoll evaluates the effective transmitter antenna height, , as follows:
If ,
If ,
If ,
where,
is the transmitter antenna height above the ground (m).
is the ground height (ground elevation) above sea level at the transmitter (m).
is the average ground height (m) above sea level for the profile between a point 3 km from transmitter and the
receiver (located at d km from transmitter).
is the average ground height (m) above sea level for the profile between a point 3 km and another 15 km from
transmitter.
Then, depending on d and H
Txeff
, Atoll determines C
n
using bilinear interpolation as follows.
L
FS
L
Di ff
L
model
L
FS
=
L
model
1000 =
L
model
max L
FS
CorrectedS dardLoss tan , ( ) =
CorrectedS dardLoss tan 60 C
n
A
H
Rxeff
A
cl
108.75 31.54 20 f log + =
A
H
Rxef f
H
Txeff
0 d 3km < s H
Txeff
H
0Tx
H
Tx
H
0Rx
+ =
3 d 15km < s H
Txeff
H
0Tx
H
Tx
H
0
3 d ; ( ) + =
15 d < H
Txeff
H
0Tx
H
Tx
H
0
3 15 ; ( ) + =
H
Tx
H
0Tx
H
0
3 d ; ( )
H
0
3 15 ; ( )
98 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
If 37.5 H
Txeff
1200, C
n
= E
n
(d,H
Txeff
)
Otherwise, Atoll considers (d is stated in km)
Therefore,
If H
Txeff
< 37.5
If , we have
Else C
n
=E
n
(d, 37.5) E
n
(d
horizon
, 37.5) + E
n
(25, 37.5)
If H
Txeff
> 1200
If , we have
Else C
n
=E
n
(d, 1200) E
n
(d
horizon
, 1200) + E
n
(142, 1200)
A
HRxeff
Calculation
where,
H
Rx
is the user-defined receiver height,
c is the height gain factor.
A
cl
Calculation
If f 300 MHz,
Otherwise,
With
where,
is the clearance angle (in radians) determined according to the recommendation 370-7 (figure 19),
f is the frequency stated in MHz.
4.5.7 Erceg-Greenstein (SUI) Propagation Model
Erceg-Greenstein propagation model is a statistical path loss model derived from experimental data collected at 1.9 GHz
in 95 macrocells. The model is for suburban areas, and it distinguishes between different terrain categories called the
Stanford University Interim Terrain Models. This propagation model is well suited for distances and base station antenna
heights that are not well-covered by other models. The path loss model applies to base antenna heights from 10 to 80 m,
base-to-terminal distances from 0.1 to 8 km, and three distinct terrain categories.
The basic path loss equation of the Erceg-Greenstein propagation model is:
Where . This is a fixed quantity which depends upon the frequency of operation. d is the distance
between the base station antenna and the receiver terminal and d
0
is a fixed reference distance (100 m). a(H
BS
) is the
correction factor for base station antenna heights, H
BS
:
Where , and a, b, and c are correction coefficients which depend on the SUI terrain type.
The Erceg-Greenstein propagation model is further developed through the correction factors introduced by the Stanford
University Interim model. The standards proposed by the IEEE working group 802.16 include channel models developed
by Stanford University. The basic path loss equation with correction factors is presented below:
Note:
c values are provided in the recommendation 370-7; for example, c=4 in a rural case.
d
hori zon
4.1 H
Txeff
=
d d
hori zon
> C
n
E
n
d 25 d
hori zon
+ 37.5 , ( ) =
d d
hori zon
> C
n
E
n
d 142 d
hori zon
+ 1200 , ( ) =
A
H
Rxef f
c
6
--- 20
H
Rx
10
----------
\ .
| |
log =
s A
cl
8.1 6.9 20 v 0.1 ( )
2
1 + ( ) v 0.1 ( ) + ( ) log + | | =
A
cl
14.9 6.9 20 v 0.1 ( )
2
1 + ( ) v 0.1 ( ) + ( ) log + | | =
v u 4000
f
300
---------- =
u
PL A 10 a H
BS
( ) Log
10
d
d
0
------
\ .
| |
+ =
A 20 Log
10
4td
0

-------------
\ .
| |
=
a H
BS
( ) a b H
BS
c
H
BS
---------- + =
10 m H
BS
80 m s s
PL A 10 a H
BS
( ) Log
10
d
d
0
------
\ .
| |
a f ( ) a H
R
( ) + + =
Forsk 2010 AT283_TRG_E1 99
Chapter 4: Calculations
Where a(f) is the correction factor for the operating frequency, , with f being the operating
frequency in MHz. a(H
R
) is the correction factor for the receiver antenna height, , where d
depends on the terrain type.
4.5.7.1 SUI Terrain Types
The SUI models are divided into three types of terrains
1
, namely A, B and C.
Type A is associated with maximum path loss and is appropriate for hilly terrain with moderate to heavy tree
densities.
Type B is characterised with either mostly flat terrains with moderate to heavy tree densities or hilly terrains
with light tree densities.
Type C is associated with minimum path loss and applies to flat terrain with light tree densities.
The constants used for a, b, and c are given in the table below.
4.5.7.2 Erceg-Greenstein (SUI) Path Loss Formula
The Erceg-Greenstein (SUI) propagation model formula can be simplified from the following equation:
(1)
to the equation below:
(2)
Where,
f is the operating frequency in MHz
d is the distance from the transmitter to the received in m in equation (1) and in km in equation (2)
H
BS
is the transmitter height in m
H
R
is the receiver height in m
The above equation is divided into two parts in Atoll:
Where,
The above path loss formulas are valid for d > d
0
, i.e. d > 100 m. For d < 100 m, the path loss has been restricted to the
free space path loss with correction factors for operating frequency and receiver height:
instead of
Where a(f) and a(Hr) have the same definition as given above. Simplifying the above equation, we get,
, or
Note:
a(H
R
) = 0 for H
R
= 2 m.
References:
[1] V. Erceg et. al, An empirically based path loss model for wireless channels in suburban environments, IEEE J.
Select Areas Commun., vol. 17, no. 7, July 1999, pp. 1205-1211.
[2] Abhayawardhana, V.S.; Wassell, I.J.; Crosby, D.; Sellars, M.P.; Brown, M.G.; "Comparison of empirical propagation
path loss models for fixed wireless access systems," Vehicular Technology Conference, 2005. IEEE 61st Volume 1, 30
May-1 June 2005 Page(s):73 - 77 Vol. 1
a f ( ) 6 Log
10
f
2000
-------------
\ .
| |
=
a H
R
( ) X Log
10
H
R
2
-------
\ .
| |
=
1. The word terrain is used in the original definition of the model rather than environment. Hence it is used
interchangeably with environment in this description.
Model Parameter Terrain A Terrain B Terrain C
a 4.6 4.0 3.6
b (m
-1
)
0.0075 0.0065 0.005
c (m) 12.6 17.1 20
X 10.8 10.8 20
PL 20 Log
10
4td
0

-------------
\ .
| |
10 a H
BS
( ) Log
10
d
d
0
------
\ .
| |
a f ( ) a H
R
( ) + + =
PL 7.366 26 Log
10
f ( ) 10 a H
BS
( ) 1 Log
10
d ( ) + ( ) a H
R
( ) + + =
PL Lu a H
R
( ) =
Lu 7.366 26 Log
10
f ( ) 10 a H
BS
( ) 1 Log
10
d ( ) + ( ) + + =
PL 20 Log
10
4 t d

------------------
\ .
| |
a f ( ) a H
R
( ) + = PL 20 Log
10
4 t d

------------------
\ .
| |
=
PL 12.634 26 Log
10
f ( ) 20 Log
10
d ( ) a H
R
( ) + + = Lu 12.634 26 Log
10
f ( ) 20 Log
10
d ( ) + + =
100 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
The above equation is not user-modifiable in Atoll except for the coefficient of , i.e. 26. Atoll uses the same
coefficient as the one you enter for in Atoll for the case d > d
0
.
4.5.7.3 Calculations in Atoll
The Erceg-Greenstein (SUI) propagation model takes DTM into account between the transmitter and the receiver, and it
can also take clutter into account at the receiver location.
1
st
step: For each pixel in the calculation radius, Atoll determines the clutter bin on which the receiver is located. This
clutter bin corresponds to a clutter class. Atoll uses the Erceg-Greenstein (SUI) path loss formula assigned to this clutter
class to evaluate path loss.
2
nd
step: This step depends on whether the Add diffraction loss option is selected or not.
If the Add diffraction loss option is not selected, 1
st
step gives the final path loss result.
If the Add diffraction loss option is selected, Atoll proceeds as follows:
a. It extracts a geographic profile between the transmitter and the receiver using the radial calculation method.
b. It determines the largest obstacle along the profile in accordance with the Deygout method and evaluates
losses due to diffraction . For more information on the Deygout method, see "3 Knife-Edge Deygout
Method" on page 107.
The final path loss is the sum of the path loss determined in 1
st
step and .
Shadow fading is computed in Atoll independent of the propagation model. For more information on the shadow fading
calculation, see "Shadowing Model" on page 115.
4.5.8 ITU-R P.1546-2 Propagation Model
This propagation model is based on the P.1546-2 recommendations of the ITU-R. These recommendations extend the
P.370-7 recommendations, and are suited for operating frequencies from 30 to 3000 MHz. The path loss is calculated by
this propagation model with the help of graphs available in the recommendations. The graphs provided in the
recommendations represent field (or signal) strength, given in , as a function of distance for:
Nominal frequencies, : 100, 600, and 1000 MHz
The graphs provided for 100 MHz are applicable to frequencies from 30 to 300 MHz, those for 600 MHz are
applicable to frequencies from 300 to 1000 MHz, and the graphs for 1000 MHz are applicable to frequencies from
1000 to 3000 MHz. The method for interpolation is described in the recommendations (Annex 5, 6).
Transmitter antenna heights, : 10, 20, 37.5, 75, 150, 300, 600, and 1200 m
For any values of from 10 to 3000 m, an interpolation or extrapolation from the appropriate two curves is used,
as described in the recommendations (Annex 5, 4.1). For below 10 m, the extrapolation to be applied is given
in Annex 5, 4.2. It is possible for the value of to be negative, in which case the method is given in Annex 5,
4.3.
Time variability, : 1, 10, and 50 %
The propagation curves represent the field strength values exceeded for 1, 10 and 50 % of time.
Receiver antenna height, : 10 m
For land paths, the graphs represent field strength values for a receiver antenna height above ground, equal to
the representative height of the clutter around the receiver. The minimum value of the representative height of
clutter is 10 m. For sea paths, the graphs represent field strength values for a receiver antenna height of 10 m.
For other values of receiver antenna height, a correction is applied according to the environment of the receiver.
The method for calculating this correction is given in Annex 5, 9.
These recommendations are not valid for transmitter-receiver distances less than 1 km or greater than 1000 km. Therefore
in Atoll, the path loss between a transmitter and a receiver over less than 1 km is the same as the path loss over 1 km.
Similarly, the path loss between a transmitter and a receiver over more than 1000 km is the same as the path loss over
1000 km.
Moreover, these recommendations are not valid for transmitter antenna heights less than the average clutter height
surrounding the transmitter.
Note:
You can get the same resulting equation by setting a(hBS) = 2.
Log
10
f ( )
Log
10
f ( )
L
Di ffracti on
L
Di ffracti on
Notes:
The cold sea graphs are used for calculations over warm and cold sea both.
The mixture of land and sea paths is not supported by Atoll.
db V m ( )
f
n
h
1
h
1
h
1
h
1
t
h
2
Forsk 2010 AT283_TRG_E1 101
Chapter 4: Calculations
4.5.8.1 Calculations in Atoll
The input to the propagation model are the transmission frequency, transmitter and receiver heights, the distance between
the transmitter and the receiver, the precentage of time the field strength values are exceeded, the type of environment
(i.e., land or sea), and the clutter at the receiver location.
In the following calculations, is the transmission frequency, is the transmitter-receiver distance, and is the
percentage of time for which the path loss has to be calculated.
The following calculations are performed in Atoll to calculate the path loss using this propagation model.
4.5.8.1.1 Step 1: Determination of Graphs to be Used
First of all, the upper and lower nominal frequencies are determined for any given transmission frequency. The upper and
lower nominal frequencies are the nominal frequencies (100, 600, and 2000 MHz) between which the transmission
frequency is located, i.e., .
Once and are known, along with the information about the percentage of time and the type of path (land or sea),
the sets of graphs which will be used for the calculation are also known.
4.5.8.1.2 Step 2: Calculation of Maximum Field Strength
A field strength must not exceed a maximum value, , which is given by:
for land paths, and
for sea paths.
Where is the free space field strength for 1 kW ERP, is an enhancement for sea graphs.
4.5.8.1.3 Step 3: Determination of Transmitter Antenna Height
The transmitter antenna height to be used in the calculation depends on the type and length of the path.
Land paths
Sea paths
Here, all antenna heights (i.e., , , and ) are in expressed in m. is the antenna height above ground and
is the effective height of the transmitter antenna, which is its height over the average level of the ground between distances
of and d km from the transmitter in the direction of the receiver.
4.5.8.1.4 Step 4: Interpolation/Extrapolation of Field Strength
The interpolations are performed in series in the same order as described below. The first interpolation/extrapolation is
performed over the field strength values, , from the graphs for transmitter antenna height to determine . The second
interpolation/extrapolation is performed over the interpolated/extrapolated values of to determine . And, the thrid
and final interpolation/extrapolation is performed over the interpolated/extrapolated values of to determine .
Step 4.1: Interpolation/Extrapolation of Field Strength for Transmitter Antenna Height
If the value of coincides with one of the eight heights for which the field strength graphs are provided, namely 10, 20,
37.5, 75, 150, 300, 600, and 1200 m, the required field strength is obtained directly from the corresponding graph.
Otherwise:
If
The field strength is interpolated or extrapolated from field strengths obtained from two curves using the following
equation:
Where if , otherwise is the nearest nominal effective height below ,
if , otherwise is the nearest nominal effective height above , is the field
strength value for at the required distance, and is the field strength value for at the required
distance.
If
f d t
f
n1
f f
n2
< <
f
n1
f
n1
t
E
Max
E
Max
E
FS
106.9 20 Log d ( ) = =
E
Max
E
FS
E
SE
+ 106.9 20 Log d ( ) 2.38 1 d 8.94 ( ) exp { } Log 50 t ( ) + = =
E
FS
E
SE
h
1
h
eff
=
h
1
Max 1 h
a
, ( ) =
h
1
h
eff
h
a
h
a
h
eff
0.2 d
E E
h1
E
h1
E
d
E
d
E
f
h
1
10 m h
1
3000 m < <
E
h1
E
Low
E
Up
E
Low
( )
Log h
1
h
Low
( )
Log h
Up
h
Low
( )
------------------------------------------ + =
h
Low
600 m = h
1
1200 m > h
Low
h
1
h
Up
1200 m = h
1
1200 m > h
Up
h
1
E
Low
h
Low
E
Up
h
Up
0 m h
1
10 m < <
102 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
- For land path if the transmitter-receiver distance is less than the smooth-Earth horizon distance
, i.e., if ,
, or
because
- For land path if the transmitter-receiver distance is greater than or equal to the smooth-Earth horizon distance
, i.e., if ,
, or because
Where is the field strength value read for the transmitter-receiver distance of y from the graph available
for the transmitter antenna height of x.
If in the above equation, even though , the field strength is
determined from linear extrapolation for Log (distance) of the graph given by:
Where is penultimate tabulation distance (km), is the final tabulation distance (km), is the
field strength value for , and is the field strength value for .
- For sea path, should not be less than 1 m. This calculation requires the distance at which the path has 0.6
of the first Fresnel zone just unobstructed by the sea surface. This distance is given by:
(km)
Where (km) with (frequency-dependent term),
and (asymptotic term defined by the horizon distance).
If the 0.6 Fresnel clearance distance for the sea path where the transmitter antenna height is 20 m is
also calculated as:
(km)
Once and are known, the field strength for the required distance is given by:
Where is the maximum field strength at the required distance as calculated in "Step 2: Calculation of
Maximum Field Strength" on page 101, is for ,
, ,
and is the field strength calculated as described for land paths. and are field strengths
interpolated for distance y and , respectively, and .
If
A correction is applied to the field strength, , calculated in the above description in order to take into account
the diffraction and tropospheric scattering. This correction is the maximum of the diffraction correction,, and
tropospheric scattering correction, .
Where with and ,
, and is 1.35 for 100 MHz, 3.31 for 600 MHz, 6.00 for 2000 MHz.
d
H
h
1
( ) 4.1 h
1
= d 4.1 h
1
<
E
h1
E
10
d
H
10 ( ) ( ) E
10
d ( ) E
10
d
H
h
1
( ) ( ) + =
E
h1
E
10
12.9 km ( ) E
10
d ( ) E
10
d
H
h
1
( ) ( ) + = d
H
10 ( ) 12.9 km =
d
H
h
1
( ) 4.1 h
1
= d 4.1 h
1
>
E
h1
E
10
d
H
10 ( ) d d
H
h
1
( ) + ( ) = E
h1
E
10
12.9 km d d
H
h
1
( ) + ( ) = d
H
10 ( ) 12.9 km =
E
x
y ( )
d
H
10 ( ) d d
H
h
1
( ) + 1000 km > d 1000 km s
E
h1
E
Low
E
Up
E
Low
( )
Log d D
Low
( )
Log D
Up
D
Low
( )
-------------------------------------------- + =
D
Low
D
Up
E
Low
D
Low
E
Up
D
Up
h
1
D
h1
D
0.6
f h
1
h
2
10 m = ( ) , , ( ) =
D
0.6
Max 0.001
D
f
D
h

D
f
D
h
+
------------------- ,
\ .
| |
= D
f
0.0000389 f h
1
h
2
=
D
h
4.1 h
1
h
2
+ ( ) =
d D
h1
>
D
20
D
0.6
f h
1
20 m = ( ) h
2
10 m = ( ) , , ( ) =
D
h1
D
20
E
h1
E
Max
for d D
h1
s
E
D
h1
E
D
20
E
D
h1
( )
Log d D
h1
( )
Log D
20
D
h1
( )
--------------------------------------- + for D
h1
d D
20
< <
E' 1 F
S
( ) E'' F
S
+ for d D
20
>

=
E
Max
E
D
h1
E
Max
d D
h1
=
E
D
20
E
10
D
20
( ) E
20
D
20
( ) E
10
D
20
( ) ( )
Log h1 10 ( )
Log 20 10 ( )
---------------------------------- + = E' E
10
d ( ) E
20
d ( ) E
10
d ( ) ( )
Log h1 10 ( )
Log 20 10 ( )
---------------------------------- + =
E'' E
10
y ( ) E
20
y ( )
h
1
10 m and 20 m = F
S
d D
20
( ) d =
h
1
0 m <
E
h1
C
h1
Max C
h1d
C
h1t
, ( ) =
C
h1d
6.03 J v ( ) = J v ( ) 6.9 20 Log v 0.1 ( )
2
1 + v 0.1 + ( ) + | | = v K
v
u
eff2
=
u
eff2
arc
h
1

9000
-------------
\ .
| |
tan = K
v
Forsk 2010 AT283_TRG_E1 103
Chapter 4: Calculations
with , (radius of the Earth), and is the
effective Earth radius factor for mean refractivity conditions.
Step 4.2: Interpolation/Extrapolation of Field Strength for Transmitter-Receiver Distance
In the field strength graphs in the recommendations, the field strength is plotted against distance from 1 km to 1000 km.
The distance values for which field strengths are tabulated are 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18,
19, 20, 25, 30, 35, 40, 45, 50, 55, 60, 65, 70, 75, 80, 85, 90, 95, 100, 110, 120, 130, 140, 150, 160, 170, 180, 190, 200,
225, 250, 275, 300, 325, 350, 375, 400, 425, 450, 475, 500, 525, 550, 575, 600, 625, 650, 675, 700, 725, 750, 775, 800,
825, 850, 875, 900, 925, 950, 975, 1000. If the transmitter-receiver distance is a value from this list, then interpolation of
field strength is not required and the field strength can be directly read from the graphs.
If the transmitter-receiver distance does not coincide with the list of distances for which the field strengths are accurately
available from the graphs, the field strength are linearly interpolated or extrapolated for the logarithm of the distance using
the following equation:
Where is the lower value of the nearest tabulated distance to , is the higher value of the nearest tabulated
distance to , is the field strength value for , and is the field strength value for .
Step 4.3: Interpolation/Extrapolation of Field Strength for Transmission Frequency
The field strength at the transmission frequency is interpolated from the graphs available for the upper and lower nominal
frequencies as follows:
Where is the lower nominal frequency (100 MHz if f < 600 MHz, 600 MHz otherwise), is the higher nominal
frequency (600 MHz if f < 600 MHz, 2000 MHz otherwise), is the field strength value for , and is the field
strength value for .
In the case of transmission frequencies below 100 MHz or above 2000 MHz, the field strength values are extrapolated
from the two nearer nominal frequency values. The above equation is used for all land paths and sea paths.
4.5.8.1.5 Step 5: Calculation of Correction Factors
Step 5.1: Correction for Receiver Antenna Height
The receiver antenna height correction depends on the type of path and clutter in which the receiver is located. The field
strength values given by the graphs for land paths are for a reference receiver antenna at a height, (m), representative
of the height of the clutter surrounding the receiver, subject to a minimum height value of 10 m. Examples of reference
heights are 20 m for an urban area, 30 m for a dense urban area, and 10 m for a suburban area. For sea paths the notional
value of is 10 m.
For land paths, the elevation angle of the arriving ray is taken into account by calculating a modified representative clutter
height , given by .
Note that for , .
The different correction factors are calculated as follows:
For land path in urban and suburban zones
With and .
If , is reduced by .
For land path other zones
C
h1t
30 Log
u
e
u
e
u
eff2
+
------------------------
\ .
| |
= u
e
180 d
a t k
---------------------- = a 6370 km = k 4 3 =
E
d
E
Low
E
Up
E
Low
( )
Log d d
Low
( )
Log d
Up
d
Low
( )
------------------------------------------ + =
d
Low
d d
Up
d E
Low
d
Low
E
Up
d
Up
E
f
E
Low
E
Up
E
Low
( )
Log f f
Low
( )
Log f
Up
f
Low
( )
--------------------------------------- + =
f
Low
f
Up
E
Low
f
Low
E
Up
f
Up
R
R
R' R' Max 1
1000 d R 15 h
1
( )
1000 d 15
--------------------------------------------------------------- ,
\ .
| |
=
h
1
6.5 d R + < R' R ~
C
Recei ver
6.03 J v ( ) for h
2
R' <
3.2 6.2 Log f ( ) + ( ) Log
h
2
R'
------
\ .
| |
for h
2
R' >

=
J v ( ) 6.9 20 Log v 0.1 ( )
2
1 + v 0.1 + ( ) + | | = v 0.0108 f R' h
2
( ) arc
R' h
2

27
-----------------
\ .
| |
tan =
R' 10 m < C
Recei ver
3.2 6.2 Log f ( ) + ( ) Log
10
R'
------
\ .
| |

C
Recei ver
3.2 6.2 Log f ( ) + ( ) Log
h
2
10
------
\ .
| |
=
104 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
For sea path
and are determined as distances at which at which the path has 0.6 of the first Fresnel zone just
unobstructed by the sea surface with and variable , respectively. These distances are given by
and (km), respectively. Here
as explained earlier.
- If ,
- If and ,
- If and and ,
- If and and ,
Step 5.2: Correction for Short Urban/Suburban Paths
This correction is only applied when the path loss is to be calculated over land paths, over a transmitter-receiver distance
less than 15 km, in urban and suburban zones. This correction takes into account the presence of buildings in these zones.
The buildings are assumed to be of uniform height.
The correction represents a reduction in the field strength due to building clutter. It is added to the field strength and is
given by:
Where is the antenna height above the ground, and R is the clutter height of the clutter class where the receiver is
located. This correction is only applied when and .
Step 5.3: Correction for Receiver Clearance Angle
This correction is only applied when the path loss is to be calculated over land paths, and over a transmitter-receiver
distance less than 16 km. This correction gives more precise field strength prediction over small reception areas. The
correction is added to the field strength and is given by:
Where , , and
is the clearance angle in degrees determined from:
: The elevation angle of the line from the receiver which just clears all terrain obstructions in the direction of the
transmitter over a distance of up to 16 km but not going beyond the transmitter.
: The reference angle, .
Where and are the heights of the transmitter and the receiver above sea level, respectively.
4.5.8.1.6 Step 6: Calculation of Path Loss
First, the final field strength is calculated from the interpolated/extrapolated field strength, , by applying the corrections
calculated earlier. The calculated field strength is given by:
The resulting field strength is given by , from which the path loss (basic transmission loss, ) is
calculated as follows:
4.5.9 Sakagami Extended Propagation Model
The Sakagami extended propagation model is based on the simplification of the extended Sakagami-Kuboi propagation
model. The Sakagami extended propagation model is valid for frequencies above 3 GHz. Therefore, it is only available in
WiMAX 802.16d and WiMAX 802.16e documents by default.
The Sakagami-Kuboi propagation model requires detailed information about the environment, such as widths of the streets
where the receiver is located, the angles formed by the street axes and the directions of the incident waves, heights of the
buildings close to the receiver, etc. The path loss formula for the Sakagami-Kuboi propagation model is [1]:
d
10
d
h2
h
2
10 m = h
2
d
10
D
0.6
f h
1
h
2
10 m = ( ) , , ( ) = d
h2
D
0.6
f h
1
h
2
, , ( ) = D
0.6
Max 0.001
D
f
D
h

D
f
D
h
+
------------------- ,
\ .
| |
=
h
2
10 m > C
Recei ver
3.2 6.2 Log f ( ) + ( ) Log
h
2
10
------
\ .
| |
=
h
2
10 m < d d
10
> C
Recei ver
3.2 6.2 Log f ( ) + ( ) Log
h
2
10
------
\ .
| |
=
h
2
10 m < d d
10
< d d
h2
< C
Recei ver
0 =
h
2
10 m < d d
10
< d d
h2
> C
Recei ver
3.2 6.2 Log f ( ) + ( ) Log
h
2
10
------
\ .
| |

Log d d
h2
( )
Log d
10
d
h2
( )
-------------------------------------
\ .
| |
=
C
Bui l di ng
3.3 Log f ( ) ( ) 1 0.85 Log d ( ) ( ) 1 0.46 Log 1 h
a
R + ( ) ( ) =
h
a
d 15 km < h
1
R 150 m <
C
Cl earance
J v' ( ) J v ( ) =
J v ( ) 6.9 20 Log v 0.1 ( )
2
1 + v 0.1 + ( ) + | | = v' 0.036 f = v 0.065 u
Cl earance
f =
u
Cl earance
u
u
Ref
u
Ref
arc
h
1S
h
2S

1000 d
------------------------
\ .
| |
tan =
h
1S
h
2S
E
f
E
Cal c
E
f
C
Recei ver
C
Bui l di ng
C
Cl earance
+ + + =
E Mi n E
Cal c
E
Max
, ( ) = L
B
L
B
139 E 20 Log f ( ) + =
Forsk 2010 AT283_TRG_E1 105
Chapter 4: Calculations
Where,
W is the width (in meters) of the streets where the receiver is located
is the angle (in degrees) formed by the street axes and the direction of the incident wave
h
s
is the height (in meters) of the buildings close to the receiver
H
1
is the average height (in meters) of the buildings close to the receiver
h
b
is the height (in meters) of the transmitter antenna with respect to the observer
h
b0
is the height (in meters) of the transmitter antenna with respect to the ground level
H is the average height (in meters) of the buildings close to the base station
d is the separation (in kilometres) between the transmitter and the receiver
f is the frequency (in MHz)
The Sakagami-Kuboi propagation model is valid for:
Studies [2] have shown that the Sakagami-Kuboi propagation model can be extended to frequencies higher than 3 GHz,
which also allows a simplification in terms of the input required by the model.
The path loss formula for the extended Sakagami-Kuboi propagation model is:
Where a is a corrective factor with three components:
W is the width (in meters) of the streets where the receiver is located
H
0
(= h
s
= H
1
) is the height (in meters) of the buildings close to the receiver
h
b
(= h
b0
) is the height (in meters) of the transmitter antenna with respect to the ground
h
m
is the height (in meters) of the receiver antenna
H is the average height (in meters) of the buildings close to the base station
d is the separation (in metres) between the transmitter and the receiver
f is the frequency (in GHz)
The extended Sakagami-Kuboi propagation model is valid for:
Studies also show that above 3 GHz, the path loss predicted by the extended model is almost independant of the input
parameters such as street widths and angles. Therefore, the extended Sakagami-Kuboi propagation model can be
simplified to the extended Sakagami propagation model:
The extended Sakagami propagation model is valid for:
5 m < W < 50 m
0 < < 90
5 m < h
s
< 80 m
5 m < H
1
< 50 m
20 m < h
b
< 100 m
0.5 km < d < 10 km
450 MHz < f < 2200 MHz
5 m < W < 50 m
10 m < H
0
< 30 m
10 m < h
b
< 100 m
0.1 km < d < 3 km
0.8 GHz < f < 8 GHz
1.5 m < h
m
< 5 m
10 m < h
b
< 100 m
0.1 km < d < 3 km
3 GHz < f < 8 GHz
1.5 m < h
m
< 5 m
L
Model
100 7.1 Log W ( ) 0.023 1.4 Log h
s
( ) 6.1 Log H
1
( ) 24.37 3.7
H
h
b0
--------
\ .
| |
2
Log h
b
( ) + + + +
43.2 3.1 Log h
b
( ) | | Log d ( ) 20 Log f ( ) e
13 Log f ( ) 3.23 ( )
+ +
=

h
b0
H >
L
Model
54 40 Log d ( ) 30 Log h
b
( ) 21 Log f ( ) a + + + =
a a H
0
( ) a W ( ) a h
m
( ) + + 11 Log
H
0
20
-------
\ .
| |
7.1 Log
W
20
------
\ .
| |
5 Log
h
m
1.5
--------
\ .
| |
= =
L
Model
54 40 Log d ( ) 30 Log h
b
( ) 21 Log f ( ) 5 Log h
m
( ) + + =
106 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
The path loss calculation formula of the Sakagami extended propagation model resembles the formula of the Standard
Propagation Model. In Atoll, this model is in fact a copy of the Standard Propagation Model with the following values
assigned to the K coefficients:
For more information on the Standard Propagation Model, see "Standard Propagation Model (SPM)" on page 87.
4.5.10 Appendices
4.5.10.1 Free Space Loss
The calculation of free space loss is based on ITU 525 recommendations.

where,
f is the frequency in MHz,
d is the Tx-Rx distance in km,
Free space loss is stated in dB.
4.5.10.2 Diffraction Loss
The calculation of diffraction is based on ITU 526-5 recommendations. General method for one or more obstacles (knife-
edge diffraction) is used to evaluate diffraction losses (Diffraction loss in dB). Four construction modes are implemented
in Atoll. All of them are based on this same physical principle presented hereafter, but differ in the way they consider one
or several obstacles. Calculations take the earth curvature into account through the effective Earth radius concept (K
factor=1.333).
4.5.10.2.1 Knife-Edge Diffraction
The procedure checks whether a knife-edge obstructs the first Fresnel zone constructed between the transmitter and the
receiver. The diffraction loss, J(v), depends on the obstruction parameter (v), which corresponds to the ratio of the
obstruction height (h) and the radius of the Fresnel zone (R).
K1 65.4 (calculated for 3.5 GHz)
K2 40
K3 -30
K4 0
K5 0
K6 0
K7 -5
References:
[1] Manuel F. Catedra, Jesus Perez-Arriaga, "Cell Planning for Wireless Communications," Artech House Publishers,
1999.
[2] Koshiro Kitao, Shinichi Ichitsubo, "Path Loss Prediction Formula for Urban and Suburban Areas for 4G Systems,"
IEEE, 2006.
L
FS
32.4 20 f ( ) log 20 d ( ) log + + =
Figure 4.16Knife-Edge Diffraction
Forsk 2010 AT283_TRG_E1 107
Chapter 4: Calculations
where,
n is the Fresnel zone index,
c
0
is the speed of light (2.99792 x10
8
ms
-1
),
f is the frequency in Hz
d
1
is the distance from the transmitter to obstacle in m,
d
2
is the distance from obstacle to receiver in m.
We have:
where,
h is the obstruction height (height from the obstacle top to the Tx-Rx axis).
Hence,
For 1 knife-edge method, if ,
Else,
4.5.10.2.2 3 Knife-Edge Deygout Method
The Deygout construction, limited to a maximum of three edges, is applied to the entire profile from transmitter to receiver.
This method is used to evaluate path loss incurred by multiple knife-edges. Deygout method is based on a hierarchical
knife-edge sorting used to distinguish the main edges, which induce the largest losses, and secondary edges, which have
a lesser effect. The edge hierarchy depends on the obstruction parameter (v) value.
1 Obstacle
A straight line between transmitter and receiver is drawn and the height of the obstacle above the Tx-Rx axis, h
i
, is
calculated. The obstruction position, d
i
, is also recorded. v
i
are evaluated from these data. The point with the highest v
value is termed the principal edge, p, and the corresponding loss is J(vp).
Therefore, we have
3 Obstacles
Then, the main edge (point p) is considered as a secondary transmitter or receiver. Therefore, the profile is divided in two
parts: one half profile, between the transmitter and the knife-edge section, another half, constituted by the knife-edge-
receiver section.
Note:
In case of multiple-knife edge method, the minimum required to estimate diffraction loss
is -0.78.
R
c
0
n d
1
d
2

f d
1
d
2
+ ( )
---------------------------------- =
v
h
r
--- =
r
R
2
------- =
v 0.7 > J v ( ) 6.9 20 v 0.1 ( )
2
1 + v 0.1 ( ) + ( ) log + =
J v ( ) 0 =
v
Figure 4.17Deygout Construction 1 Obstacle
Di ffracti onLoss J v
P
( ) =
108 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
The same procedure is repeated on each half profile to determine the edge with the higher v. The two obstacles found,
(points t and r), are called secondary edges. Losses induced by the secondary edges, J(v
t
) and J(v
r
), are then calculated.
Once the edge hierarchy is determined, the total loss is evaluated by adding all the intermediary losses obtained.
Therefore, if
we have
Otherwise, If ,
4.5.10.2.3 Epstein-Peterson Method
The Epstein-Peterson construction is limited to a maximum of three edges. First, Deygout construction is applied to
determine the three main edges over the whole profile as described above. Then, the main edge height, h
p
, is recalculated
according to the Epstein-Peterson construction. h
p
is the height above a straight line connecting t and r points. The main
edge position d
p
is recorded and v
p
and J(v
p
) are evaluated from these data.
Therefore, we have
4.5.10.2.4 Deygout Method with Correction
The Deygout method with correction (ITU 526-5) is based on the Deygout construction (3 obstacles) plus an empirical
correction, C.
Figure 4.18Deygout Construction 3 Obstacles
Note:
In case of ITU 526-5 and WLL propagation models, Diffraction loss term is determined as
follows:
- If , we have
Where,
- Otherwise
v
P
0 >
Di ffracti onLoss J v
P
( ) J v
t
( ) J v
r
( ) + + =
v
P
0.7 > Di ffracti onLoss J v
P
( ) =
v
P
0.78 > Di ffracti onLoss J v
P
( ) J v
t
( ) J v
r
( ) + ( ) t + =
t mi n
J v
P
( )
6
-------------- 1 ,
\ .
| |
=
Di ffracti onLoss 0 =
Figure 4.19Epstein-Peterson Construction
Di ffracti onLoss J v
P
( ) J v
t
( ) J v
r
( ) + + =
Forsk 2010 AT283_TRG_E1 109
Chapter 4: Calculations
Therefore, If ,
we have
Otherwise
4.5.10.2.5 Millington Method
The Millington construction, limited to a single edge, is applied over the entire profile. Two horizon lines are drawn at the
transmitter and at the receiver. A straight line between the transmitter and the receiver is defined and the height of the
intersection point between the two horizon lines above the Tx-Rx axis, h
h
, is calculated. The position d
h
is recorded and
then, from these values, v
h
and J(v
h
) are evaluated using the same previous formulas.
Therefore, we have
4.6 Path Loss Tuning
Atoll can tune path loss matrices obtained from propagation results by the use of real measurements (CW Measurements
or Test Mobile Data). For each measured transmitter, Atoll tries to merge measurements and predictions on the same
points and to smooth the surrounding points of the path loss matrices for homogeneity reasons. A transmitter path loss
matrix can be tuned several times by the use of several measurement paths. All these tuning paths are stored in a
catalogue. This catalogue is stored under a .tuning folder containing a .dbf file and one .pts file per tuned transmitter. Since
a tuning file can contain several measurement paths, all these measurements are added to the tuning file.
For more information on the tuning files, See "Externalised Tuning Files" on page 60.
4.6.1 Transmitter Path Loss Tuning
The same algorithm is used for CW Measurement and Test Mobile Data. It is also the same for main and extended
matrices.
Path Losses tuning will be done using two steps.
1. Total matrix correction
A mean error is calculated between each measured value and the corresponding bin in the pathloss matrix. Mean error is
calculated for each pathloss matrix (main and extended) of each transmitter. This mean error is then applied to all the
matrix bins. This tuning is done to smooth the local corrections (step 2) of measured values and not the tuned bins.
2. Local correction for each measured value
For each measured value, an ellipse is used to define the pathloss area which has to be tuned. The main axis of the ellipse
is oriented to the transmitter.The ellipse is user-defined by two parameters :
Note:
In case of ITU 526-5 propagation model, Diffraction loss term is determined as follows:
- If , we have
Where,
(d: distance stated in km between the transmitter and the receiver).
- Otherwise
v
P
0 >
Di ffracti onLoss J v
P
( ) J v
t
( ) J v
r
( ) C + + + =
Di ffracti onLoss J v
P
( ) C + =
v
P
0.78 > Di ffracti onLoss J v
P
( ) t J v
t
( ) J v
r
( ) C + + ( ) + =
t mi n
J v
P
( )
6
-------------- 1 ,
\ .
| |
=
C 8.0 0.04d + =
Di ffracti onLoss 0 =
Figure 4.20Millington Construction
Di ffracti onLoss J v
h
( ) =
110 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
The radius of the axis parallel to the Profile (A)
The radius of the axis perpendicular to the Profile (B)
Lets take M a measurement value and the path loss value at point i, before any tuning.
The squared elliptic distance between i and M is given by:
Where:
and are the X-coordinates of i and M respectively
and are the Y-coordinates of i and M respectively
The mean error for the first tuning is given by:
Where is the error between measurement and prediction at point i
Then, the path loss value is tuned using E:
Finally, a second tuning ( ) is applied where:
so
Where is (measurement gain - losses).
So, the final tuned path loss is:
so
When several ellipses overlap a pathloss bin, the final tuned path loss is given by:
Where is the number of overlapping ellipses
4.6.2 Repeater Path Loss Tuning
In the case of repeaters, Atoll provides only a composite measured value per pixel which is a combination of the
contribution of both a transmitter and one or several repeaters. In order to tune the path loss matrices of donor transmitters
and repaters, its is mandatory to split the contribution of each element in the measured value as starting point.
Lets take M the measured value.
where :
represents the contribution of the donor transmitter in the measured value.
represents the contribution of the repeater in the measured value.
Note:
M is limited by the minimum measurement threshold defined in the interface.
Note:
E is limited by the maximum total correction defined in the interface.
Note:
is limited by the maximum local correction defined in the interface.
P
i
D
i
X
i
X
M
( )
2
A
2
--------------------------
Y
i
Y
M
( )
2
B
2
-------------------------- + =
X
i
X
M
Y
i
Y
M
E
1
n
---
\ .
| |
e
i
i

=
e
i
P
i
new
P
i
ol d
E + =
R
i
R
i
1 D
i
( ) M g P
i

new
( ) = R
i
1 D
i
( ) M g P
i
ol d
E + ( ) ( ) =
g
R
i
P
i
tuned
P
i
new
R
i
+ = P
i
tuned
P
i
ol d
E R
i
+ + =
P
i
tuned
1 d
j
( )P
j
tuned
j

\ .
|
| |
n d
j
j

\ .
|
| |
---------------------------------------------------- =
n
Note:
All the values are used in Watts
M M
d
M
r
+ =
M
d
M
r
Forsk 2010 AT283_TRG_E1 111
Chapter 4: Calculations
If and represent respectively the filtered signal level from the donor transmitter and the repeater on a pixel, one
can define the contribution of each element as follows:
and .
Following the path loss tuning process described in "Transmitter Path Loss Tuning" on page 109, the donor transmitter
(resp. the repeater) is then tuned using (resp. ) values.
4.7 Antenna Attenuation Calculation
The modelling method used to evaluate transmitter antenna attenuation, , is described below. Atoll calculates the
accurate azimuth and tilt angles and then, performs a 3-D interpolation of horizontal and vertical patterns to determine the
attenuation of antenna.
Furthermore, you will find explanations about the remote electrical downtilt modelling.
4.7.1 Calculation of Azimuth and Tilt Angles
From the direction of the transmitter antenna and the receiver position relative to the transmitter, Atoll determines the
receiver position relative to the direction of the transmitter antenna (i.e. the direction of the transmitter-receiver path in the
transmitter antenna coordinate system).
a
Tx
and e
Tx
are respectively the transmitter (Tx) antenna azimuth and tilt in the coordinate system .
a
Rx
and e
Rx
are respectively the azimuth and tilt of the receiver (Rx) in the coordinate system .
d is the distance between the transmitter (Tx) and the receiver (Rx).
In the coordinate system , the receiver coordinates are:
(1)
Let az and el respectively be the azimuth and tilt of the receiver in the transmitter antenna coordinate system
. These angles describe the direction of the transmitter-receiver path in the transmitter antenna coordinate
system. Therefore, the receiver coordinates in are:
(2)
C
d
C
r
M
d
M
C
d
C
d
C
r
+
------------------- = M
r
M
C
r
C
d
C
r
+
------------------- =
M
d
M
r
L
antTx
Figure 4.21Azimuth and Tilt Computation
S
0
x y z , , ( )
S
0
x y z , , ( )
S
0
x y z , , ( )
x
Rx
y
Rx
z
Rx
e
Rx
( ) cos a
Rx
( ) sin d
e
Rx
( ) cos a
Rx
( ) cos d
e
Rx
( ) sin d
=
S
Tx
x'' y'' z'' , , ( )
S
Tx
x'' y'' z'' , , ( )
x''
Rx
y''
Rx
z''
Rx
el ( ) cos az ( ) sin d
el ( ) cos az ( ) cos d
el ( ) sin d
=
112 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
According to the figure above, we have the following relations:
(3)
and
(4)
Therefore, the relation between the system and the transmitter antenna system is:
(5)
We get,
(6)
Then, substituting the receiver coordinates in the system S
0
from Eq. (1) and the receiver coordinates in the system S
Tx
from Eq. (2) in Eq. (6) leads to a system where two solutions are possible:
1
st
solution: If , then and
2
nd
solution: If , then
and
If , then
4.7.2 Antenna Pattern 3-D Interpolation
The direction of the transmitter-receiver path in the transmitter antenna coordinate system is given by angle values, az and
el. Atoll considers these values in order to determine transmitter antenna attenuations in the horizontal and vertical
patterns. It reads the attenuation H(az) in the horizontal pattern for the calculated azimuth angle az and the attenuation
V(el) in the vertical pattern for the calculated tilt angle el. Then, it calculates the antenna total attenuation, .
x'
y'
z'
a
Tx
( ) cos a
Tx
( ) sin 0
a
Tx
( ) sin a
Tx
( ) cos 0
0 0 1
x
y
z
- =
x''
y''
z''
1 0 0
0 e
Tx
( ) cos e
Tx
( ) sin
0 e
Tx
( ) sin e
Tx
( ) cos
x'
y'
z'
- =
S
0
x y z , , ( ) S
Tx
x'' y'' z'' , , ( )
x''
y''
z''
1 0 0
0 e
Tx
( ) cos e
Tx
( ) sin
0 e
Tx
( ) sin e
Tx
( ) cos
a
Tx
( ) cos a
Tx
( ) sin 0
a
Tx
( ) sin a
Tx
( ) cos 0
0 0 1
-
x
y
z
- =
x''
y''
z''
a
Tx
( ) cos a
Tx
( ) sin 0
e
Tx
( ) cos a
Tx
( ) sin e
Tx
( ) cos a
Tx
( ) cos e
Tx
( ) sin
e
Tx
( ) sin a
Tx
( ) sin e
Tx
( ) sin a
Tx
( ) cos e
Tx
( ) cos
x
y
z
- =
a
Rx
a
Tx
= az 0 = el e
Rx
e
Tx
=
a
Rx
a
Tx
=
az
1
e
Tx
( ) cos
a
Rx
a
Tx
( ) tan
--------------------------------------
e
Tx
( ) sin e
Rx
( ) tan
a
Rx
a
Tx
( ) sin
-------------------------------------------------- +
------------------------------------------------------------------------------------------------ atan =
el az ( ) sin
e
Tx
( ) sin
a
Rx
a
Tx
( ) tan
--------------------------------------
e
Tx
( ) cos e
Rx
( ) tan
a
Rx
a
Tx
( ) sin
---------------------------------------------------- +
)
`

atan =
az ( ) sin a
Rx
a
Tx
( ) sin 0 < az az 180 + =
Notes:
Atoll assumes that the horizontal and vertical patterns are two cross-sections of the 3-D
pattern. In other words, the description of the antenna pattern must satisfy the following:
H(0)=V(0) and H(180)=V(180)
In case of an electrical tilt, o, the horizontal pattern is a conical section with a o degrees
elevation off the horizontal plane. Here, horizontal and vertical patterns must satisfy the
following:
H(0)=V(o) and H(180)=V(180-o)
If the constraints listed above are satisfied, this implies that:
1. Interpolated horizontal and vertical patterns respectively fit in with the entered horizontal
and vertical patterns, even in case of electrical tilt,
2. The contribution of both the vertical pattern back and front parts are taken into account.
Otherwise, only the second point is guaranteed.
The above interpolation is performed in dBs.
L
antTx
az el , ( )
L
antTx
az el , ( ) H az ( )
180 az
180
------------------------- H 0 ( ) V el ( ) ( )
az
180
---------- H 180 ( ) V 180 el ( ) ( ) + =
Forsk 2010 AT283_TRG_E1 113
Chapter 4: Calculations
4.7.3 Additional Electrical Downtilt Modelling
The additional electrical downtilt, AEDT, also referred to as remote electrical downtilt or REDT, introduces a conical
transformation of the 3-D antenna pattern in the vertical axis. In order to take it into account, the vertical pattern is
transformed as follows:
when
when
Where, the angle values are in degrees.
The vertical pattern transformation is represented below. The left picture shows the initial vertical pattern when there is no
electrical downtilt and the right one shows the vertical pattern transformation due to an electrical downtilt of 10.
Then, Atoll proceeds as explained in the previous section. It determines the antenna attenuation in the transformed
vertical pattern for the calculated tilt angle (V(el)) and applies the 3-D interpolation formula in order to calculate the antenna
total attenuation, .
4.7.4 Antenna Pattern Smoothing
Empirical propagation models, like the Standard Propagation Model (SPM), require antenna pattern smoothing in the
vertical plane to simulate the effects of reflections and diffractions. Signal level predictions can be improved by smoothing
the high-attenuation points of the vertical pattern. You can smooth vertical as well as horizontal antenna patterns in Atoll.
The antenna pattern smoothing algorithm in Atoll first determines the peaks and nulls in the pattern within the smoothing
angle (A
Smoothing
) defined by the user. Peaks (P) are the lowest attenuation angles and nulls (N) are the highest
attenuation angles in the pattern. Then, it determines the nulls to be smoothed (N
Smoothing
) and their corresponding angles
according to the defined Peak-to-Null Deviation (D
Peak-to-Null
). D
Peak-to-Null
is the minimum difference of attenuation in dBs
between two peaks and a null between them. Finally, Atoll smooths the pattern between 0 and the smoothing angle
(A
Smoothing
) by applying the smoothing to a certain smoothing factor (F
Smoothing
) defined by the user.
Lets take an example of an antenna pattern to be smoothed, as shown in Figure 4.23 on page 114. Let D
Peak-to-Null
be 10
dB, A
Smoothing
= 90 degrees, and F
Smoothing
= 0.5.
Angle values in formulas are stated in degrees.
The above interpolation is not used in case the transmitter antenna has a 3-D antenna
pattern.
Figure 4.22Vertical Pattern Transformation due to Electrical Downtilt
V x ( ) V x AEDT ( ) = x 90 90 [ , ] e
V x ( ) V x AEDT + ( ) = x 90 270 [ , ] e
L
antTx
az el , ( )
114 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
Atoll first determines the peaks and nulls in the part of the pattern to be smoothed by verifying the slopes of the pattern
curve at each angle.
Peaks (P) and Nulls (N):
Then, Atoll verifies whether the difference of attenuation at a given angle is D
Peak-to-Null
less than the before and after it.
This comparison determines the nulls to be smoothed (N
Smoothing
).
Nulls to be smoothed (N
Smoothing
):
Once the nulls are known, Atoll applies the smoothing algorithm to all the attenuation values at all the angles between the
first peak, the null, and the last peak.
Figure 4.23Vertical Antenna Pattern
Figure 4.24Peaks and Nulls in the Antenna Pattern
Angle () Attenuation (dB)
1 0.1
15 33.5
21 13.2
30 37.6
38 16.9
49 32.2
67 15.6
Angle () Attenuation (dB)
15 33.5
30 37.6
49 32.2
Forsk 2010 AT283_TRG_E1 115
Chapter 4: Calculations
4.7.4.1 Smoothing Algorithm
For all nulls surrounded by two peaks P
1
and P
2
at angles and ,
Where,
i is the angle in degrees from to incremented by 1 degree,
A
Angle
is the attenuation at any given angle which can be i, or , and
F
Smoothing
is the smoothing factor defined by the user.
4.8 Shadowing Model
Propagation models predict the mean path loss as a function of transmission and reception parameters such as frequency,
antenna heights, and distance, etc. Therefore, the predicted path loss between a transmitter and a receiver is constant, in
a given environment and for a given distance. However, in reality different types of clutter may exist in the transmitter-
receiver path. Therefore, the path losses for the same distance could be different along paths that pass throught different
types of environments. The location of the receiver in different types of clutter causes variations with respect to the mean
path loss values given by the path loss models. Some paths undergo more loss while others are less obstructed and may
have higher received signal strength. The variation of path loss with respect to the mean path loss values predicted by the
propagation models, depending on the type of environment is called shadow fading (shadowing) or slow fading. "Slow"
fading implies that the variations in the path loss due to shadow fading occur comparatively slower than the fast fading
effect (Rayleigh fading), which is due to the mobile receiving multipath copies of a signal.
Different types of clutter (buildings, hills, etc.) make large shadows that cause variations in the path loss over long
distances. As a mobile passes under a shadow, the path loss to the mobile keeps varying from point to point. Shadow
fading varies as the mobile moves, while fast fading can vary even if the mobile remains at the same location or moves
over very small distances. It is crucial to account for the shadow fading in order to predict the reliability of coverage
provided by any mobile cellular system.
The shadowing effect is modelled by a log-normal (Gaussian) distribution, as shown in Figure 4.25 on page 115, whose
standard deviation depends on the type of clutter.
Different clutter types have different shadowing effects. Therefore, each clutter type in Atoll can have a different standard
deviation representing its shadowing characteristics. For different standard deviations, the shape of the Gaussian
distribution curve remains similar, as shown in Figure 4.25 on page 115.
The accuracy of this model depends upon:
The suitability of the range of standard deviation used for each clutter class,
The definition (bin size) of the digital map,
How up-to-date the digital map is,
The number of clutter classes,
The accuracy of assignment of clutter classes.
Shadowing is applied to the predicted path loss differently depending on the technology, and whether it is applied to
predictions or simulations. The following sections explain how shadowing margins are calculated and applied to different
technology documents.
n N
Smoothi ng
e o
1
o
2
A
i Smoothed ,
A
i
F
Smoothi ng
A
i
A
o
1
A
o
2
A
o
1

o
2
o
1

------------------------
\ .
|
| |
i o
1
( ) +
)
`

=
o
1
o
2
o
1
o
2
Figure 4.25Log-normal Probability Density Function
o
116 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
Shadowing margins are calculated for a given cell edge coverage probability. The cell edge coverage probability is the
probability of coverage at a pixel located at the cell edge, and corresponds to the reliability of coverage that you are
planning to achieve at the cell edge. For example, a cell edge coverage probability of 75 % means that the users located
at the cell edge will receive adequate signal level during 75 % of the time. Therefore, a coverage prediction with a cell edge
coverage probability of x % means that the signal level predicted on each pixel is reliable x % of the time, and the overall
predicted coverage area is reliable at least x % of the time.
GSM GPRS EGPRS Documents
The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120, and
applied to signal level or C/I as explained below.
Signal Level-Based Predictions
Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level,
and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of
the received signal level only, and do not depend on interference.
In these calculations (signal level calculations), a shadowing margin ( ) is applied to the
received signal level calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage
probability, and depends on the model standard deviation ( in dB) associated to the clutter class where the
receiver is located.
Interference-Based Predictions
Interference-based predictions include coverage predictions (Coverage by C/I Level, Interfered Zones, GPRS/
EGPRS Coding Schemes, RLC/MAC Throughout/Timeslot, Application Throughput/Timeslot, Circuit Quality
Indicators) and calculations in point analysis windows Interference tab that require calculation of the received
signal level and interference received from other base stations.
In these calculations, ( calculations), the shadowing margin ( ) is applied to the ratio of the
carrier power (C) and the interfering signal levels (I) received from the interfering base stations. This shadowing
margin is calculated for a given cell edge coverage probability and depends on the C/I standard deviation (
in dB) associated to the clutter class where the receiver is located.
UMTS HSPA and CDMA2000 1xRTT 1xEV-DO Documents
The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and
"Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121, and applied to signal level, E
c
/I
0
, or E
b
/N
t
as
explained below.
Signal Level-Based Predictions
Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level,
and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of
the received signal level only, and do not depend on interference.
In these calculations (signal level calculations), a shadowing margin ( ) is applied to the
received signal level calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage
probability, and depends on the model standard deviation ( in dB) associated to the clutter class where the
receiver is located.
Interference+noise-Based Predictions
Interference+noise-based predictions include coverage predictions (Pilot Reception Analysis, Downlink Total
Noise, Service Area Analyses, Handoff Status, etc.) and point analysis (AS Analysis tab) that require calculation
of the received signal level and interference and noise received from other base stations.
In these calculations, the shadowing margins ( , , or
) are applied to E
c
/I
0
or Eb/Nt. These shadowing margins are calculated for a given cell
edge coverage probability and depend on the E
c
/I
0
or Eb/Nt standard deviations ( , , or
, in dB) associated to the clutter class where the receiver is located.
Macro-Diversity Gains
References:
[1] Saunders S. Antennas and propagation for Wireless Communication Systems pp. 180-198
[2] Holma H., Toskala A. WCDMA for UMTS
[3] Jhong S., Leonard M. CDMA systems engineering handbook pp. 309-315, 1051-1053
[4] Remy J.G., Cueugnet J., Siben C. Systmes de radiocommunications avec les mobiles pp. 309-310
[5] Laiho J., Wacker A., Novosad T. Radio network planning and optimisation for UMTS pp. 80-81
M
Shadowi ng model
o
model
C I M
Shadowi ng C I
o
C I
M
Shadowi ng model
o
model
M
Shadowi ng Ec Io
M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Eb Nt ( )
UL

o
Ec Io
o
Eb Nt ( )
DL
o
Eb Nt ( )
UL
Forsk 2010 AT283_TRG_E1 117
Chapter 4: Calculations
Atoll calculates the uplink and downlink macro-diversity gains ( and ) depending
on the receiver handover status. These gains are respectively taken into account to evaluate the uplink Eb/Nt in
case of soft handover and the downlink Ec/Io from best server. For detailed description of the calculation of macro-
diversity gains, please refer to "Macro-Diversity Gains Calculation" on page 122.
Monte-Carlo Simulations
Random values for shadowing margins are calculated for each transmitter-receiver link and applied to the
predicted signal level. A shadowing margin for each transmitter-receiver link in each simulation is obtained by
taking a random value from the probability density distribution for the appropriate clutter class. The probability
distribution is a log-normal distribution as explained above.
TD-SCDMA Documents
The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and
"Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121, and applied to signal level or interference+noise
predictions as explained below.
Signal Level-Based Predictions
Signal level-based predictions include coverage predictions (Best Server and RSCP P-CCPCH Coverages, P-
CCPCG Pollution, Baton Handover Coverage, DwPCH and UpPCH Coverages, Cell to Cell Interference, and
Scrambling Code Interference) and calculations in point analysis tabs (Profile and Reception) that require
calculation of the received signal level only, and do not depend on interference.
In these calculations (signal level calculations), a shadowing margin ( ) is applied to the
received signal level calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage
probability, and depends on the model standard deviation ( in dB) associated to the clutter class where the
receiver is located.
Interference+noise-Based Predictions
Interference+noise-based predictions include coverage predictions (P-CCPCH Eb/Nt and C/I Coverages, Service
Area Analsyses for downlink and uplink Eb/Nt and C/I, etc.) that require calculation of the received signal level and
interference received from other base stations.
In these calculations, the shadowing margins ( , , or
) are applied to Eb/Nt. These shadowing margins are calculated for a given cell edge
coverage probability and depend on the Eb/Nt standard deviations ( , , or ,
in dB) associated to the clutter class where the receiver is located.
Monte-Carlo Simulations
Random values for shadowing margins are calculated for each transmitter-receiver link and applied to the
predicted signal level. A shadowing margin for each transmitter-receiver link in each simulation is obtained by
taking a random value from the probability density distribution for the appropriate clutter class. The probability
distribution is a log-normal distribution as explained above.
WiMAX 802.16d and WiMAX 802.16e Documents
The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and
"Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121 , and applied to signal level or C/(I+N) as
explained below.
Signal Level-Based Predictions
Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level,
and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of
the received signal level only, and do not depend on interference.
In these calculations (signal level calculations), a shadowing margin ( ) is applied to the
received signal level calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage
probability, and depends on the model standard deviation ( in dB) associated to the clutter class where the
receiver is located.
Interference+noise-Based Predictions
Interference-based predictions include coverage predictions (Coverage by C/(I+N) Level, Coverage by Best
Bearer, Coverage by Throughput, etc.) that require calculation of the received signal level and interference.
In these calculations, (C/(I+N) calculations), in addition to the shadowing margin ( ) applied to
the received signal level calculated for each pixel, the ratio is applied to the
interfering signal levels (I). is calculated for a given cell edge coverage probability and depends
on the C/I standard deviation ( in dB) associated to the clutter class where the receiver is located.
G
macro di versi ty
UL
G
macro di versi ty
DL
M
Shadowi ng model
o
model
M
Shadowi ng Eb Nt ( )
P CCPCH

M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Eb Nt ( )
UL

o
Eb Nt ( )
P CCPCH
o
Eb Nt ( )
DL
o
Eb Nt ( )
UL
M
Shadowi ng model
o
model
M
Shadowi ng model
M
Shadowi ng model
M
Shadowi ng C I

M
Shadowi ng C I
o
C I
118 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
The reason why the ratio is used can be understood from the following
derivation (linear, not it dB):
Inputs
- : The predicted received carrier power without any shadowing margin.
- : The predicted received interference power without any shadowing margin.
- : Shadowing margin based on the model standard deviation ( )
- : Shadowing margin based on the C/I standard deviation ( )
- : Thermal noise
Calculations
The effective received carrier power is given by:
The effective C/I is given by:
The above equations lead to:
Where corresponds to in dB.
Therefore, the effective C/(I+N) is given by:
Monte-Carlo Simulations
Random values for shadowing margins are calculated for each transmitter-receiver link and applied to the
predicted signal level. A shadowing margin for each transmitter-receiver link in each simulation is obtained by
taking a random value from the probability density distribution for the appropriate clutter class. The probability
distribution is a log-normal distribution as explained above.
LTE Documents
The shadowing margins are calculated as explained in "Shadowing Margin Calculation in Predictions" on page 120 and
"Shadowing Margin Calculation in Monte-Carlo Simulations" on page 121 , and applied to signal level or C/(I+N) as
explained below.
Signal Level-Based Predictions
Signal level-based predictions include coverage predictions (Coverage by Transmitter, Coverage by Signal Level,
and Overlapping Zones) and calculations in point analysis tabs (Profile and Reception) that require calculation of
the received signal level only, and do not depend on interference.
In these calculations (signal level calculations), a shadowing margin ( ) is applied to the signal
level calculated for each pixel. The shadowing margin is calculated for a given cell edge coverage probability, and
depends on the model standard deviation ( in dB) associated to the clutter class where the receiver is
located.
Interference+noise-Based Predictions
Interference-based predictions include coverage predictions (Coverage by C/(I+N) Level, Coverage by Best
Bearer, Coverage by Throughput, etc.) that require calculation of the received signal level and received
interference.
In these calculations, (C/(I+N) calculations), in addition to the shadowing margin ( ) applied to
the signal level calculated for each pixel, the ratio is applied to the interfering
signal levels (I). is calculated for a given cell edge coverage probability and depends on the C/I
standard deviation ( in dB) associated to the clutter class where the receiver is located.
M
Shadowi ng model
M
Shadowi ng C I

C
P
I
P
m
C
10
M
Shadowi ng model
10
-----------------------------------------------------
m
C I
10
M
Shadowi ng C I
10
----------------------------------------------
N
C m
C
C
P
=
C
I
---- m
C I
C
P
I
P
------- =
I
C
m
C I
C
P
I
P
-------
--------------------------
m
C
C
P

m
C I
C
P
I
P
-------
--------------------------
m
C
m
C I
------------ I
P
= = =
m
C
m
C I
------------ M
Shadowi ng model
M
Shadowi ng C I

C
I N + ( )
-----------------
m
C
C
P

m
C
m
C I
------------ I
P
N +
\ .
| |
---------------------------------------- =
M
Shadowi ng model
o
model
M
Shadowi ng model
M
Shadowi ng model
M
Shadowi ng C I

M
Shadowi ng C I
o
C I
Forsk 2010 AT283_TRG_E1 119
Chapter 4: Calculations
The reason why the ratio is used can be understood from the following
derivation (linear, not it dB):
Inputs
- : The predicted received carrier power without any shadowing margin.
- : The predicted received interference power without any shadowing margin.
- : Shadowing margin based on the model standard deviation ( )
- : Shadowing margin based on the C/I standard deviation ( )
- : Thermal noise
Calculations
The effective received carrier power is given by:
The effective C/I is given by:
The above equations lead to:
Where corresponds to in dB.
Therefore, the effective C/(I+N) is given by:
Monte-Carlo Simulations
Random values for shadowing margins are calculated for each transmitter-receiver link and applied to the
predicted signal level. A shadowing margin for each transmitter-receiver link in each simulation is obtained by
taking a random value from the probability density distribution for the appropriate clutter class. The probability
distribution is a log-normal distribution as explained above.
4.8.1 Shadowing Margin Calculation
The following sections describe the calculation method used for determining different shadowin margins.
The following shadowing margins are calculated using the method described below:
M
Shadowi ng model
M
Shadowi ng C I

C
P
I
P
m
C
10
M
Shadowi ng model
10
-----------------------------------------------------
m
C I
10
M
Shadowi ng C I
10
----------------------------------------------
N
C m
C
C
P
=
C
I
---- m
C I
C
P
I
P
------- =
I
C
m
C I
C
P
I
P
-------
--------------------------
m
C
C
P

m
C I
C
P
I
P
-------
--------------------------
m
C
m
C I
------------ I
P
= = =
m
C
m
C I
------------ M
Shadowi ng model
M
Shadowi ng C I

C
I N + ( )
-----------------
m
C
C
P

m
C
m
C I
------------ I
P
N +
\ .
| |
---------------------------------------- =
Network Type
Standard
Deviation
M
Shadowing
Applied to
GSM GPRS EGPRS
C
C/I
UMTS HSPA
C
E
c
/I
0
E
b
/N
t
(DL)
E
b
/N
t
(UL)
CDMA2000 1xRTT 1xEV-DO
C
E
c
/I
0
E
b
/N
t
(DL)
E
b
/N
t
(UL)
o
model
M
Shadowi ng model
o
C I
M
Shadowi ng C I
o
model
M
Shadowi ng model
o
Ec Io
M
Shadowi ng Ec Io
o
Eb Nt ( )
DL
M
Shadowi ng Eb Nt ( )
DL

o
Eb Nt ( )
UL
M
Shadowi ng Eb Nt ( )
UL

o
model
M
Shadowi ng model
o
Ec Io
M
Shadowi ng Ec Io
o
Eb Nt ( )
DL
M
Shadowi ng Eb Nt ( )
DL

o
Eb Nt ( )
UL
M
Shadowi ng Eb Nt ( )
UL

120 AT283_TRG_E1 Forsk 2010


Technical Reference Guide
4.8.1.1 Shadowing Margin Calculation in Predictions
Shadowing margins, M
Shadowing
, are calculated from standard deviation values defined for the clutter class where the pixel
(probe mobile) is located, and required cell edge coverage probability, and applied to the path loss, L
path
.
Shadowing Error PDF (1 Signal)
The measured path loss in dB can be expressed as a Gaussian random variable:
where,
L
path
is the predicted path loss,
o
dB
is the user-defined standard deviation of the error,
G(0,1) is a zero-mean unit-variance Gaussian random variable.
Therefore, the probability density function (pdf) for the random (shadowing) part of path loss is:
The probability that the shadowing error exceeds z dB is
Normalising x by dividing it by o
dB
:
where Q is the complementary cumulative function.
To ensure a given cell edge coverage probability, , for the predicted value, a shadowing margin, , is added
to the link budget.
Confidence in the prediction can be expressed as:
where,
is the signal level predicted at the receiver.

EIRP is the effective isotropic radiated power of the transmitter.


are receiver losses.
is the receiver antenna gain.
The shadowing margin is calculated such that:
A lookup table is used for mapping the values of Q vs. a set of cell edge coverage probabilities.
TD-SCDMA
C
E
b
/N
t
P-CCPCH
E
b
/N
t
(DL)
E
b
/N
t
(UL)
WiMAX 802.16d
WiMAX 802.16e
C and C/(I+N)
C/(I+N)
LTE
C and C/(I+N)
C/(I+N)
o
model
M
Shadowi ng model
o
Eb Nt ( )
P CCPCH
M
Shadowi ng Eb Nt ( )
P CCPCH

o
Eb Nt ( )
DL
M
Shadowi ng Eb Nt ( )
DL

o
Eb Nt ( )
UL
M
Shadowi ng Eb Nt ( )
UL

o
model
M
Shadowi ng model
o
C I
M
Shadowi ng C I
o
model
M
Shadowi ng model
o
C I
M
Shadowi ng C I
L L
path
o
dB
G 0 1 , ( ) + =
p
L
x ( )
1
o
dB
2t
--------------------- e
x
2
2o
dB
2
--------------
=
P
L
x z > ( ) p
L
x ( ) x d
z

}
1
o
dB
2t
--------------------- e
x
2
2o
dB
2
--------------
x d
z

}
= =
P
L
x z > ( )
1
2t
----------- e
x
2
2
----- -
x d
z
o
dB
----------

}
Q
z
o
dB
---------
\ .
| |
= =
R
L
M
Shadowi ng
C
d
P'
Tx
L P
rec
> L P'
Tx
s P
rec
G 0 1 , ( ) o
dB
M
Shadowi ng
s =
P
rec
P
rec
P'
Tx
L
path
M
Shadowi ng
=
P'
Tx
EIRP G
antRx
L
Rx
+ =
L
Rx
G
antRx
P C
d
P
rec
> ( ) R
L
M
Shadowi ng
( ) 1 P
L
x M
Shadowi ng
0 > ( ) 1 Q
M
Shadowi ng
o
dB
------------------------------
\ .
| |
= = =
Forsk 2010 AT283_TRG_E1 121
Chapter 4: Calculations
In interference-based predictions, where signal to noise ratio is calculated, the shadowing margin is only applied to the
signal from the interfered transmitter (C). We consider that the interference value is not altered by the shadowing margin.
Random variations also exist in the interfering signals, but taking only the average interference gives accurate results. [3]
explains how a certain level of interference is maintained by congestion control in CDMA-based networks.
4.8.1.2 Shadowing Margin Calculation in Monte-Carlo Simulations
Shadowing margins, M
Shadowing
, are calculated from standard deviation values defined for the clutter class where the pixel
(probe mobile) is located, and required cell edge coverage probability, and added to the path loss, L
path
.
Random values are generated during Monte-Carlo simulation. Each user is assigned a service, a mobility type, an activity
status, a geographic position and a random shadowing value.
For each link, path loss (L) can be broken down to .
Here, is a zero mean gaussian random variable representing variation due to shadowing. It can be
expressed as the sum of two uncorrelated zero mean gaussian random variables, and . models the error related
to the receivers location (surrounding environment), and remains the same for all links between the receiver and the base
stations from which it is receiving signals. models the error related to the path between the transmitter and the receiver.
Therefore, in case of two links, we have:
for link 1
for link 2
Standard deviations of and can be calculated from , the model standard deviation , and the
correlation coefficient between and .
Assuming all have the same standard deviations, we have:
Therefore,
is set to 0.5 in Atoll, which gives:
and
Therefore, to model shadowing error common to all the signals received at a receiver ( ), values are
randomly generated for each receiver. These values have a zero-mean gaussian distribution with a standard deviation of
, where is the model standard deviation associated with the receivers clutter class.
Figure 4.26Normalised Margin M i n arg
M
Shadowi ng
o
dB
------------------------------ =
L L
path
+ =
G 0 o
dB
, ( )

L

P

L

1

L

P
1
+ =

2

L

P
2
+ =

L
o
L
( )
P
i
o
P
( )
i
o
model
( )
( )
1

2

P
o
model
2
o
L
2
o
P
2
+ =

o
L
2
o
model
2
----------------- =
o
P
2
o
model
2
1 ( ) =
o
L
2
o
model
2
=

o
L
o
model
2
----------------- = o
P
o
model
2
----------------- =
E
Shadowi ng model
Recei ver
o
model
2
-----------------
\ .
| |
o
model
( )
122 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
Next, Atoll generates another random value for each transmitter-receiver pair. This values represents the shadowing error
not related to the location of the receiver ( ). These values also have a zero-mean gaussian distribution
with a standard deviation .
So, we have:
Random shadowing error has its mean value at zero. Hence, this shadowing modelling method has no impact on the
simulated network load. On the other hand, as shadowing errors on the transmitter-receiver links are uncorrelated, the
method influences the calculated macro-diversity gain in case the mobile is in soft handover.
4.8.2 Macro-Diversity Gains Calculation
The following sections explain how uplink and downlink macro-diversity gains are calculated in UMTS HSPA and
CDMA2000 1xRTT 1xEV-DO documents for predictions and AS Analysis tab of the point analysis tool.
4.8.2.1 Uplink Macro-Diversity Gain Evaluation
In UMTS HSPA and CDMA2000 1xRTT 1xEV-DO, mobiles may be in soft handoff (mobile connected to cells located on
different sites). In this case, we can consider the shadowing error pdf described below.
4.8.2.1.1 Shadowing Error PDF (n Signals)
For each link, path loss (L) can be broken down as:
is a zero mean gaussian random variable representing variation due to shadowing. It can be expressed as
the sum of two uncorrelated zero mean gaussian random variables, and . models error related to the receiver
local environment; it is the same whichever the link. models error related to the path between transmitter and receiver.
Therefore, in case of two links, we have:
for the link 1
for the link 2
Knowing , the uplink Eb/Nt standard deviation and the correlation coefficient between and , we
can calculate standard deviations of and (assuming all have the same standard deviations).
We have:
Therefore,
2 Signals Without Recombination
In technologies supporting soft handoff (UMTS and CDMA2000), cell is interference limited. As for one link, to ensure a
required cell edge coverage probability for the prediction, we add to each link budget a shadowing margin,
.
Prediction reliability in order to have Eb/Nt higher or equal to Eb/Nt from the best server can be expressed as:
E
Shadowi ng model
Path
o
model
2
-----------------
\ .
| |
E
Shadowi ng model
E
Shadowi ng model
Recei ver
E
Shadowi ng model
Path
+ =
Note:
The calculation and use of macro-diversity gains can be disabled through the Atoll.ini file.
For more information, see the Administrator Manual.
L L
path
+ =
G 0 o
dB
, ( )

L

P

L

1

L

P
1
+ =

2

L

P
2
+ =

i
o
Eb Nt ( )
UL
( )
1

2

L
o
L
( )
P
o
P
( )
P
o
Eb Nt ( )
UL
2
o
L
2
o
P
2
+ =

o
L
2
o
Eb Nt ( )
UL
2
-------------------------- =
o
P
2
o
Eb Nt ( )
UL
2
1 ( ) =
o
L
2
o
Eb Nt ( )
UL
2
=
R
L
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
C
d
1
N
1
--------- P'
Tx1
L
1
N
1
CI
pred
1
>
1
P'
Tx1
L
path
1
N
1
CI
pred
1
s =
Forsk 2010 AT283_TRG_E1 123
Chapter 4: Calculations
or
where
is the quality level (signal to noise ratio) predicted at the receiver for link i.
N
i
is the noise level for link i.
We note:
and
is the minimum needed margin on each link.
Therefore, the probability of having a quality at least equal to the best predicted one is:
We can express it using , and
Then, we have:
If we introduce user defined standard deviation and correlation coefficient , and consider that is a
Gaussian pdf:
C
d
2
N
2
--------- P'
Tx2
L
2
N
2
CI
pred
1
>
2
P'
Tx2
L
path
2
N
2
CI
pred
1
s =
CI
pred
i
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
P'
Txi
L
path
i
N
i
CI
pred
i
=
A
1
2
CI
pred
1
CI
pred
2
=
A
1
2
R
L
noMRC
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
( ) 1 P
L1 L2 ,
C
d
1
N
1
--------- CI
pred
1
<
C
d
2
N
2
--------- CI
pred
1
< ,
\ .
|
| |
=
R
L
noMRC
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
( ) 1 P

1

2
,

1
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
>
2
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
1
2
> , ( ) =

L

P
1

P
2
P

1

2
,

1
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
>
2
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
1
2
>
L
A
L
= , ( )
P

L
A
L
( ) P

P
1

P
2
,

P
1
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
L
>
P
2
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
1
2
A
L
> , ( ) =
P

1

2
,

1
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
>
2
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
1
2
>
L
A
L
= , ( )
P

L
A
L
( ) P

P
A
P
1
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
L
> ( ) P

P
A
P
2
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
1
2
A
L
> ( ) =
R
L
noMRC
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
( )
1 P

L
A
L
( ) P

P
A
P
1
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
L
> ( ) P

P
A
P
2
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
1
2
A
L
> ( ) A
L
d

\ .
|
|
| |
=
P

P
A
P
i
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
L
> ( )
1
o
P
2t
------------------ e
x
2

2o
P
2
----------
x d
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
L

\ .
| |

}
Q
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
L

o
P
---------------------------------------------------------------------
\ .
|
| |
=
\ .
|
|
|
|
| |
=
R
L
noMRC
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
( )
1 P

L
A
L
( ) Q
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
L

o
P
---------------------------------------------------------------------
\ .
|
| |
Q
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
A
1
2
A
L

o
P
----------------------------------------------------------------------------------
\ .
|
| |
A
L
d

\ .
|
|
| |
=
o
Eb Nt ( )
UL
( ) ( ) P

L
R
L
noMRC
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
( )
1
1
2t
----------- e
x
L
2

2
---------
Q
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
x
L
o
Eb Nt ( )
UL

o
Eb Nt ( )
UL
1
--------------------------------------------------------------------------------------------------------
\ .
|
|
| |
Q
M
Shadowi ng Eb Nt ( )
UL

2si gnal s
x
L
o
Eb Nt ( )
UL
A
1
2

o
Eb Nt ( )
UL
1
--------------------------------------------------------------------------------------------------------------------
\ .
|
|
| |
x
L
d

\ .
|
|
| |
=
124 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
n Signals Without Recombination
We can generalize the previous expression to n signals (n is the number of available signals - Atoll may consider up to 3
signals):
The case where softer handoff occurs (two signals from co-site cells) is equivalent to the one signal case. The Softer/soft
case is equivalent to the two signals case. For the path associated with the softer recombination, we will use combined
SNR to calculate the availability of the link.
Correlation Coefficient Determination
There is currently no agreed model for predicting correlation coefficient between and . Two key variables
influence correlation:
The angle between the two signals. If this angle is small, correlation is high.
The relative values of the two signal lengths. If angle is 0 and lengths are the same, correlation is zero. Correlation
is different from zero when path lengths differ.
A simple model has been found [1]:
when
is a function of the mean size of obstacles near the receiver and is also linked to the receiver environment.
In a normal handover status, assuming a hexagonal design for sites, is close to t (+/- t/3) and D1/D2 is close to 1.
In [1,5], when and .
In Atoll, is set to 0.5.
4.8.2.1.2 Uplink Macro-Diversity Gain
Atoll determines the uplink macro-diversity gain ( ) from the shadowing margins calculated in case of one
signal and n signals.
Therefore, we have:
Where n is the number of cell-mobile signals.
4.8.2.2 Downlink Macro-Diversity Gain Evaluation
In UMTS HSPA and CDMA2000 1xRTT 1xEV-DO, in case of soft handoff, mobiles are able to switch from one cell to
another if the best pilot drastically fades. To model this function, we have to consider the probability of fading over the
shadowing margin, both for the best signal and for all the other available signals, in the shadowing margin calculation.
Let us consider the shadowing error pdf described below.
4.8.2.2.1 Shadowing Error PDF (n Signals)
For each link, path loss (L) can be broken down as:
is a zero mean gaussian random variable representing variation due to shadowing. It can be expressed as
the sum of two uncorrelated zero mean gaussian random variables, and . models the error related to the receiver
local environment, which is the same for all links. models the error related to the path between the transmitter and the
receiver.
Therefore, in case of two links, we have:
for the link 1
for the link 2
R
L
noMRC
M
Shadowi ng Eb Nt ( )
UL

nsi gnal s
( )
1
1
2t
----------- e
x
L
2

2
---------
Q
M
Shadowi ng Eb Nt ( )
UL

nsi gnal s
x
L
o
Eb Nt ( )
UL

o
Eb Nt ( )
UL
1
--------------------------------------------------------------------------------------------------------
\ .
|
|
| |
Q
M
Shadowi ng Eb Nt ( )
UL

nsi gnal s
x
L
o
Eb Nt ( )
UL
A
1
2

o
Eb Nt ( )
UL
1
--------------------------------------------------------------------------------------------------------------------
\ .
|
|
| |
x
L
d

\ .
|
|
| |
=
( )
1

2

------
\ .
| |

D1
D2
-------- = |
T
| t s s

0.5 = 0.3 =
T
t
10
------ =

G
macro di versi ty
UL
G
macro di versi ty
UL
M
Shadowi ng Eb Nt ( )
UL

nsi gnal s
M
Shadowi ng Eb Nt ( )
UL

=
L L
path
+ =
G 0 o
dB
, ( )

L

P

L

1

L

P
1
+ =

2

L

P
2
+ =
Forsk 2010 AT283_TRG_E1 125
Chapter 4: Calculations
Knowing , the Ec/Io standard deviation and the correlation coefficient between and , we can calculate
standard deviations of and (assuming all have the same standard deviations).
We have:
Therefore,
2 Available Signals
In technologies supporting soft handoff (UMTS and CDMA2000) cells are interference limited. As for one link, to ensure a
required cell edge coverage probability for the prediction, we add a shadowing margin, , to each
link budget.
Prediction reliability to have for the best server can be expressed as:
Or
We note:
is the minimum needed margin on each link.
Therefore, probability of having a quality at least equal to the best predicted one is:
We can express it by using , and
Then, we have:

i
o
Ec I o
( )
1

2

L
o
L
( )
P
o
P
( )
P
o
Ec I o
2
o
L
2
o
P
2
+ =

o
L
2
o
Ec I o
2
---------------- =
o
P
2
o
Ec I o
2
1 ( ) =
o
L
2
o
Ec I o
2
=
R
L
M
Shadowi ng Ec Io
2si gnal s
Ec
Io
-------
Ec
Io
-------
\ .
| |
pred
>
Ec
1
Io
---------- P
pi l ot
1
L
1
Io
Ec
Io
-------
\ .
| |
pred
1
> =
1
P
pi l ot
1
L
m
1
Io
Ec
Io
-------
\ .
| |
pred
1
s
Ec
2
Io
---------- P
pi l ot
2
L
2
Io
Ec
Io
-------
\ .
| |
pred
1
> =
2
P
pi l ot
2
L
m
2
Io
Ec
Io
-------
\ .
| |
pred
1
s
M
Shadowi ng Ec Io
2si gnal s
P
pi l ot
i
L
m
i
Io
Ec
Io
-------
\ .
| |
pred
1
=
A
1
2 Ec
Io
-------
\ .
| |
pred
1
Ec
Io
-------
\ .
| |
pred
2
=
A
1
2
R
L
noMRC
M
Shadowi ng Ec Io
2si gnal s
( ) 1 P
L1 L2 ,
Ec
1
Io
----------
Ec
Io
-------
\ .
| |
pred
1
<
Ec
2
Io
----------
Ec
Io
-------
\ .
| |
pred
1
< ,
\ .
| |
=
R
L
noMRC
M
Shadowi ng Ec Io
2si gnal s
( ) 1 P
1 2 ,

1
M
Shadowi ng Ec Io
2si gnal s
>
2
M
Shadowi ng Ec Io
2si gnal s
A
1
2
> , ( ) =

L

P
1

P
2
P
1 2 ,

1
M
Shadowi ng Ec Io
2si gnal s
>
2
M
Shadowi ng Ec Io
2si gnal s
A
1
2
>
L
A
L
= , ( )
P

L
A
L
( ) P

P
1

P
2
,

P
1
M
Shadowi ng Ec Io
2si gnal s
A
L
>
P
2
M
Shadowi ng Ec Io
2si gnal s
A
1
2
A
L
> , ( ) =
P
1 2 ,

1
M
Shadowi ng Ec Io
2si gnal s
>
2
M
Shadowi ng Ec Io
2si gnal s
A
1
2
>
L
A
L
= , ( )
P

L
A
L
( ) P

P
A
P
1
M
Shadowi ng Ec Io
2si gnal s
A
L
> ( ) P

P
A
P
2
M
Shadowi ng Ec Io
2si gnal s
A
1
2
A
L
> ( ) =
R
L
noMRC
M
Shadowi ng Ec Io
2si gnal s
( )
1 P

L
A
L
( ) P

P
A
P
1
M
Shadowi ng Ec Io
2si gnal s
A
L
> ( ) P

P
A
P
2
M
Shadowi ng Ec Io
2si gnal s
A
1
2
A
L
> ( ) A
L
d

}
=
P

P
A
P
i
M
Shadowi ng Ec Io
2si gnal s
A
L
> ( )
1
o
P
2t
------------------ e
x
2

2o
P
2
----------

SHO
A
L

}
dx Q
M
Shadowi ng Ec Io
2si gnal s
A
L

o
P
-----------------------------------------------------------
\ .
|
| |
= =
126 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
If we introduce a user defined Ec/Io standard deviation and a correlation coefficient and consider that is a
Gaussian pdf:
n Available Signals
We can generalize the previous expression for n signals (n is the number of available signals - Atoll may consider up to
3 signals):
=1 dB
=5 dB
=10 dB
Figure 4.27Margin - Probability (Case of 2 Signals)
2 signals
=5 dB
=10 dB
Figure 4.28Margin - Probability (Case of 3 Signals with sigma = 8dB, delta1 = 1dB)
R
L
noMRC
M
Shadowi ng Ec Io
2si gnal s
( ) 1 P

L
A
L
( ) Q
M
Shadowi ng Ec Io
2si gnal s
A
L

o
P
-----------------------------------------------------------
\ .
|
| |
Q
M
Shadowi ng Ec Io
2si gnal s
A
1
2
A
L

o
P
------------------------------------------------------------------------
\ .
|
| |
A
L
d

}
=
o ( ) ( ) P

L
R
L
noMRC
M
Shadowi ng Ec Io
2si gnal s
( )
1
1
2t
----------- e
x
L
2

2
---------
Q
M
Shadowi ng Ec Io
2si gnal s
x
L
o
Ec I o

o
Ec I o
1
------------------------------------------------------------------------------------
\ .
|
| |
Q
M
Shadowi ng Ec Io
2si gnal s
A
1
2
x
L
o
Ec I o

o
Ec I o
1
------------------------------------------------------------------------------------------------
\ .
|
| |
x
L
d

}
=
R
L
noMRC
M
Shadowi ng Ec Io
nsi gnal s
( )
1
1
2t
----------- e
x
L
2

2
---------
Q
M
Shadowi ng Ec Io
nsi gnal s
x
L
o
Ec I o

o
Ec I o
1
------------------------------------------------------------------------------------
\ .
|
| |
x Q
M
Shadowi ng Ec Io
nsi gnal s
A
1
i
x
L
o
Ec I o

o
Ec I o
1
------------------------------------------------------------------------------------------------
\ .
|
| |
i 2 =
n
[
x
L
d

}
=
A
1
2
A
1
2
A
1
2
A
1
3
A
1
3
Forsk 2010 AT283_TRG_E1 127
Chapter 4: Calculations
Correlation Coefficient Determination
For further information about determination of the correlation coefficient, please see "Correlation Coefficient
Determination" on page 127.
4.8.2.2.2 Downlink Macro-Diversity Gain
Atoll determines the downlink macro-diversity gain ( ) from the shadowing margins calculated in case of
one signal and n signals.
Therefore, we have:
Where n is the number of available signals.
4.9 Appendices
4.9.1 Transmitter Radio Equipment
Radio equipment such as TMA, feeder and BTS, are taken into account to evaluate:
Total UL and DL losses of transmitter ( ) and transmitter noise figure in UMTS HSPA,
CDMA2000 1xRTT 1xEV-DO, TD-SCDMA, WiMAX 802.16d, WiMAX 802.16e, and LTE documents,
Transmitter total losses in GSM GPRS EGPRS documents.
In Atoll, the transmitter-equipment pair is modelled a single entity. The entry to the BTS is considered the reference point
which is the location of the transmission/reception parameters.
2 signals
=5 dB
=10 dB
Figure 4.29Margin - Probability (Case of 3 Signals with sigma = 8dB, delta1 = 2dB)
A
1
3
A
1
3
G
macro di versi ty
DL
G
macro di versi ty
DL
M
Shadowi ng Ec Io
nsi gnal s
M
Shadowi ng Ec Io
=
Figure 4.30Reference Point - Location of the Transmission/Reception parameters
Notes:
According to the book Radio network planning and optimisation for UMTS by Laiho J.,
Wacker A., Novosad T., the noise figure corresponds to the loss in case of passive
components. Therefore, feeder noise figure is equal to the cable uplink losses.
Loss and gain inputs specified in .atl documents must be positive values.
L
total UL
L
total DL
, NF
Tx
( )
L
Total
( )
NF
Feeder
L
Feeder
UL
=
128 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
4.9.1.1 UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE Documents
As the reference point is the BTS entry, the transmitter noise figure corresponds to the BTS noise figure. Therefore, we
have . Where is the BTS noise figure.
Uplink Total Losses:
Atoll9955 calculates total UL losses as follows:
Where,
are the miscellaneous reception losses (Transmitter property).
are the feeder reception losses ( , where , and
are respectively the feeder loss per metre (Feeder property), the reception feeder length in metre
(Transmitter property) and the connector reception losses.
are the losses due to BTS configuration (BTS property).
is the antenna diversity gain (Transmitter property). This gain does not exist in WiMAX and LTE
documents.
is the noise rise at transmitter due to repeaters. This parameter is taken into account only if the
transmitter has active repeater(s). The noise rise at transmitter due to repeaters is calculated as follows:
For each active repeater ( ), Atoll9955 calculates a noise injection margin ( ). This is the difference
between the donor transmitter noise figure ( ) and the repeater noise figure received at the donor.
Where,
- is the repeater noise figure,
- is the repeater amplification gain (repeater property),
- are the losses between the donor transmitter and the repeater (repeater property).
- For each active repeater ( ), Atoll9955 converts the noise injection margin ( ) to Watt. Then, it uses
the values to calculate the noise rise at the donor transmitter due to active repeaters ( ).
is the gain due to TMA, which is calculated as follows:
Where and are the composite noise figures with and without TMA respectively.
Friis' equation is used to calculate the composite noise figure when there is a TMA.
And,
Where,
- is the feeder noise figure.
- is the TMA noise figure.
- is the BTS noise figure.
- is the TMA reception gain.
- is the feeder UL gain .
NF
TX
NF
BTS
= NF
BTS
L
Total UL
L
Mi sc
UL
L
Feeder
UL
L
BTS Conf
UL
NR
Repeaters
G
Ant di v
UL
G
TMA
+ + + =
L
Mi sc
UL
L
Feeder
UL
L
Feeder
UL
L
Feeder
I
Feeder
UL
L
Connector
UL
+ = L
Feeder
I
Feeder
UL
L
Connector
UL
L
BTS Conf
UL
G
Ant di v
UL
NR
Repeaters
NR
Repeaters
10 Log 1
1
NIM
Rp
r
-------------------
r

+
\ .
|
| |
=
k NIM
Rp
k
NF
TX
NIM
Rp
r
NF
TX
NF
Rp
k
G
amp
Rp
k
L
TX Rp
k

+
\ .
| |
=
NF
Rp
k
G
amp
Rp
k
L
TX R p
k
k NIM
Rp
k
NR
Repeaters
G
TMA
G
TMA
NF
Composi te
Wi thoutTMA
NF
Composi te
Wi thTMA
=
NF
Composi te
Wi thTMA
NF
Composi te
Wi thoutTMA
NF
Composi te
Wi thTMA
10 Log 10
NF
TMA
10
--------------------
10
NF
Feeder
10
--------------------------
1
10
G
TMA
UL
10
----------------
------------------------------------
10
NF
BTS
10
-------------------
1
10
G
TMA
UL
10
----------------
10
G
Feeder
UL
10
----------------------

------------------------------------------------- + +
\ .
|
|
|
|
| |
=
NF
Composi te
Wi thoutTMA
NF
BTS
NF
Feeder
+ =
NF
Feeder
NF
TMA
NF
BTS
G
TMA
UL
G
Feeder
UL
G
Feeder
UL
L
Feeder
UL
=
Forsk 2010 AT283_TRG_E1 129
Chapter 4: Calculations
- is the feeder reception loss ( , where , and
are respectively the feeder loss per metre, the reception feeder length in metre and the connector
reception loss).
Downlink Total Losses:
Atoll9955 calculates total DL losses as follows.
Where,
is the TMA transmission loss.
is the feeder transmission loss ( , where , and
are respectively the feeder loss per metre, the transmission feeder length in metre and the connector
transmission losses).
are the miscellaneous transmission losses.
are the losses due to BTS configuration (BTS property).
4.9.1.2 GSM Documents
Atoll calculates DL total losses as follows:
Where,
is the TMA transmission loss.
is the feeder transmission loss ( , where , and
are respectively the feeder loss per metre, the transmission feeder length in metre and the connector
transmission loss).
are the miscellaneous transmission losses.
are the losses due to BTS configuration (BTS property).
4.9.2 Secondary Antennas
When secondary antennas are installed on a transmitter, the signal level received from it is calculated as follows:
(not in dB
2
)
Where,
P
Tx
is the transmitter power (P
pilot
in UMTS HSPA and CDMA2000 1xRTT 1xEV-DO, P
P-CCPCH
in TD-SCDMA, P
Preamble
in WiMAX 802.16d and WiMAX 802.16e, and P
DLRS
in LTE),
i is the secondary antenna index,
x
i
is the percentage of power dedicated to the secondary antenna, i,
is the gain of the main antenna installed on the transmitter,
L
Tx
are transmitter losses (L
Tx
=L
total-DL
),
is the gain of the secondary antenna, i, installed on the transmitter,
L
model
is the path loss calculated by the propagation model,
is the attenuation due to main antenna pattern,
is the attenuation due to pattern of the secondary antenna, i.
L
Feeder
UL
L
Feeder
UL
L
Feeder
I
Feeder
UL
L
Connector
UL
+ = L
Feeder
I
Feeder
UL
L
Connector
UL
L
Total DL
L
TMA
DL
L
Feeder
DL
L
Mi sc
DL
L
BTS Conf
DL
+ + + =
L
TMA
DL
L
Feeder
DL
L
Feeder
DL
L
Feeder
I
Feeder
DL
L
Connector
DL
+ = L
Feeder
I
Feeder
DL
L
Connector
DL
L
Mi sc
DL
L
BTS Conf
DL
L
Total DL
L
TMA
DL
L
Feeder
DL
L
Mi sc
DL
L
BTS Conf
DL
+ + + =
L
TMA
DL
L
Feeder
DL
L
Feeder
DL
L
Feeder
I
Feeder
DL
L
Connector
DL
+ = L
Feeder
I
Feeder
DL
L
Connector
DL
L
Mi sc
DL
L
BTS Conf
DL
2. Formula cannot be directly calculated from components stated in dB and must be converted in linear values.
P
rec
P
Tx
1 X
i
i

\ .
|
| |
G
ant m
Tx

L
Tx
------------------------
L
ant m
Tx

az
m
el
m
, ( )
-----------------------------------------------------------------------
P
Tx
X
i
G
ant i
Tx

L
Tx
---------------------
L
ant i
Tx

az
i
el
i
, ( )
----------------------------------------------
i

+
\ .
|
|
|
|
|
| |
L
model
------------------------------------------------------------------------------------------------------------------------------------------ =
G
ant m
Tx

G
ant i
Tx

L
ant m
Tx

az
m
el
m
, ( )
L
ant i
Tx

az
i
el
i
, ( )
130 AT283_TRG_E1 Forsk 2010
Technical Reference Guide
The definition of angles, az and el, depends on the used calculation method.
Method 1 (must be indicated in an Atoll.ini file):
- az
m
: the difference between the receiver antenna azimuth and azimuth of the transmitter main antenna,
- el
m
: the difference between the receiver antenna tilt and tilt of the transmitter main antenna,
- az
i
: the difference between the receiver antenna azimuth and azimuth of the transmitter secondary antenna, i,
- el
i
: the difference between the receiver antenna tilt and tilt of the transmitter secondary antenna, i,
Method 2 (default):
- az
m
: the receiver azimuth in the coordinate system of the transmitter main antenna,
- el
m
: the receiver tilt in the coordinate system of the transmitter main antenna,
- az
i
: the receiver azimuth in the coordinate system of the transmitter secondary antenna, i,
- el
i
: the receiver tilt in the coordinate system of the transmitter secondary antenna, i.
Chapter 5
GSM GPRS EDGE Networks
Forsk 2010 AT283_TRG_E2 133
Chapter 5: GSM GPRS EDGE Networks
5 GSM GPRS EDGE Networks
This chapter describes all the calculations performed in Atoll GSM/GPRS/EDGE documents. The first four sections
describe the signal level, interference, GPRS/EDGE-specific, and CQI calculations, respectively. The following three
sections explain the traffic analysis, network dimensioning, and KPI calculation processes. The last section describes the
neighbour allocation process in GSM.
5.1 Signal Level Calculations
Three parameters can be studied in point analysis (Profile tab) and in signal level-based coverage predictions:
Where,
EIRP is the effective isotropic radiated power of the transmitter,
is the loss on the transmitter-receiver path (path loss) calculated by the propagation model,
is the transmitter antenna attenuation (from antenna patterns),
is the shadowing margin. This parameter is taken into account when the option Shadowing
taken into account is selected,
are the indoor losses, taken into account when the option Indoor coverage is selected,
are the receiver losses,
is the receiver antenna gain,
AP is the power offset defined for the selected TRX type in the transmitter property dialog,
tt is the TRX type (in the GSM GPRS EGPRS.mdb document template, there are three possible TRX types, BCCH,
TCH and inner TCH).
5.1.1 Point Analysis
5.1.1.1 Profile Tab
For a selected transmitter, it is possible to display the signal level received from a TRX type ( ), the path loss,
, or the total losses, . Path loss and total losses are the same for all TRX types.
If the power reduction values defined for all the subcells are the same, the received signal level from the selected
transmitter will be the same for all TRX types.
5.1.1.2 Reception Tab
Analysis provided in the Reception tab is based on path loss matrices. Therefore, it is possible to display the signal levels
received from TBC transmitters for which path loss matrices have been calculated over their calculation areas.
For each transmitter, Atoll can display the signal level received from a TRX type ( ), the path loss, , or the
total losses, . Path loss and total losses are the same for all TRX types.
If the power reduction values defined for all the subcells are the same, the received signal level from the selected
transmitter will be the same for all TRX types.
Reception level bars are displayed in the order of decreasing signal level. The number of displayed bars depends on the
signal level received from the best server. Bars are only displayed for transmitters whose signal level is within a 30 dB
margin from the best server signal level.
Important:
All the calculations are performed on TBC (to be calculated) transmitters. For the definition
of TBC transmitters please refer to "Path Loss Matrices" on page 74.
Logarithms used in this chapter (Log function) are base-10 unless stated otherwise.
Studied Parameter Formulas
Signal level ( )
Signal level received from a transmitter on a TRX type
Path loss ( )
Total losses ( )
P
rec
Txi
P
rec
Txi
tt ( ) EIRP tt ( ) AP tt ( ) L
path
Txi
M
Shadowi ng model
L
Indoor
G
ant
Rx
L
Rx
( ) + =
L
path
Txi
L
path
Txi
L
model
L
ant
Tx
+ =
L
total
Txi
L
total
Txi
L
path
Txi
M
Shadowi ng model
L
Indoor
L +
Tx
L
Rx
+ + + ( ) G
ant
Tx
G
ant
Rx
+ ( ) =
L
model
L
ant
Tx
M
Shadowi ng model
L
Indoor
L
Rx
G
ant
Rx
P
rec
Txi
tt ( )
L
path
Txi
L
total
Txi
P
rec
Txi
tt ( ) L
path
Txi
L
total
Txi
134 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.1.2 Signal Level-based Coverage Predictions
For each TBC transmitter, Txi, Atoll calculates the selected parameter on each pixel inside the Txi calculation area. In
other words, each pixel inside the Txi calculation area is considered a probe (non-interfering) receiver.
Coverage prediction parameters to be set are:
The coverage conditions in order to determine the service area of each TBC transmitter, and
The display settings to select the displayed parameter and its shading levels.
5.1.2.1 Service Area Determination
Atoll uses parameters entered in the Condition tab of the coverage prediction properties dialogue to determine the areas
where coverage will be displayed.
We can distinguish eight cases as below. Let us assume that:
Each transmitter, Txi, belongs to a Hierarchical Cell Structure (HCS) layer, k, with a defined priority and a defined
reception threshold.
No max range is set.
5.1.2.1.1 All Servers
The service area of Txi corresponds to the pixels where:
5.1.2.1.2 Best Signal Level and a Margin
The service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.1.2.1.3 Second Best Signal Level and a Margin
The service area of Txi corresponds to the pixels where:
Note:
You can use a value other than 30 dB for the margin from the best server signal level, for
example a smaller value for improving the calculation speed. For more information on
defining a different value for this margin, see the Administrator Manual.
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
Mi ni mumThreshol d P
rec
Txi
tt ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
Mi ni mumThreshol d P
rec
Txi
tt ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
P
rec
Txi
tt ( )
Best
j i =
P
rec
Txj
tt ( ) ( ) M >
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
Mi ni mumThreshol d P
rec
Txi
tt ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
Forsk 2010 AT283_TRG_E2 135
Chapter 5: GSM GPRS EDGE Networks
And
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the second highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the second highest or within
a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 3
rd
best servers.
5.1.2.1.4 Best Signal Level per HCS Layer and a Margin
For each HCS layer, k, the service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.1.2.1.5 Second Best Signal Level per HCS Layer and a Margin
For each HCS layer, k, the service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the second highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the second highest or within
a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 3
rd
best servers.
5.1.2.1.6 HCS Servers and a Margin
The service area of Txi corresponds to the pixels where:
And
And the received exceeds the reception threshold defined per HCS layer.
P
rec
Txi
tt ( )
2
nd
Best
j i =
P
rec
Txj
tt ( ) ( ) M >
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
Mi ni mumThreshol d P
rec
Txi
tt ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
Mi ni mumThreshol d P
rec
Txi
tt ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
P
rec
Txi
BCCH ( )
2
nd
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
Mi ni mumThreshol d P
rec
Txi
tt ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
P
rec
Txi
tt ( )
136 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.1.2.1.7 Highest Priority HCS Server and a Margin
The service area of Txi corresponds to the pixels where:
And
And Txi belongs to the HCS layer with the highest priority. The highest priority is defined by the priority field (0: lowest).
And the received exceeds the reception threshold defined per HCS layer.
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.1.2.1.8 Best Idle Mode Reselection Criterion (C2)
Such type of coverage is useful :
To compare idle and dedicated mode best servers for voice traffic
Display the GPRS/EDGE best server map (based on GSM idle mode)
The path loss criterion C1 used for cell selection and reselection is defined by:
The path loss criterion (GSM03.22) is satisfied if .
The reselection criterion C2 is used for cell reselection only and is defined by:
Where is the Cell Reselect Offset defined for the transmitter.
The service area of Txi corresponds to the pixels where:
And
The Best function considers the highest value from a list of values.
On each pixel, the transmitter with the highest C2 value is kept. It corresponds to the best server in idle mode. C2 is defined
as an integer in the 3GPP specifications, therefore, the C2 values in the above calculations are rounded down to the
nearest integer.
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
Note:
In the case two layers have the same priority, the traffic is served by the transmitter for
which the difference between the received signal strength and the HCS threshold is the
highest. The way the competition is managed between layers with the same priority can be
modified. For more information, see the Administrator Manual.
Mi ni mumThreshol d P
rec
Txi
tt ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
P
rec
Txi
tt ( )
Note:
For pure signal level-based calculations (not C/I or C/(I+N)), can be replaced with
or .
C1 P
rec
Txi
BCCH ( ) Mi ni mumThreshol d BCCH ( ) =
C1 0 >
C2 C1 CELL_RESELECT_OFFSET + =
CELL_RESELECT_OFFSET
Mi ni mumThreshol d P
rec
Txi
BCCH ( ) s Maxi mumThreshol d <
P
rec
Txi
tt ( )
L
total
Txi
L
path
Txi
C2
Txi
BCCH ( )
Best
j
C2
Txj
BCCH ( ) ( ) =
Forsk 2010 AT283_TRG_E2 137
Chapter 5: GSM GPRS EDGE Networks
5.1.2.2 Coverage Display
5.1.2.2.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
5.1.2.2.2 Display Types
It is possible to display the coverage predictions with colours depending on any transmitter attribute or other criteria such
as:
Signal Level (in dBm, dBV, dBV/m)
Atoll calculates signal level received from the transmitter on each pixel of each transmitter service area. A pixel of a
service area is coloured if the signal level exceeds ( ) the defined minimum thresholds (pixel colour depends on signal
level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as
many layers as transmitter service areas. Each layer shows the different signal levels available in the transmitter service
area.
Best Signal Level (in dBm, dBV, dBV/m)
Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. When other
serviceWhen other service areas overlap the studied one, Atoll chooses the highest value. A pixel of a service area is
coloured if the signal level exceeds ( ) the defined thresholds (the pixel colour depends on the signal level). Coverage
consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as
defined thresholds. Each layer corresponds to an area where the signal level from the best server exceeds a defined
minimum threshold.
Path Loss (dB)
Atoll calculates path loss from the transmitter on each pixel of each transmitter service area. A pixel of a service area is
coloured if path loss exceeds ( ) the defined minimum thresholds (pixel colour depends on path loss). Coverage consists
of several independent layers whose visibility in the workspace can be managed. There are as many layers as service
areas. Each layer shows the different path loss levels in the transmitter service area.
Total Losses (dB)
Atoll calculates total losses from the transmitter on each pixel of each transmitter service area. A pixel of a service area
is coloured if total losses exceed ( ) the defined minimum thresholds (pixel colour depends on total losses). Coverage
consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as
service areas. Each layer shows the different total losses levels in the transmitter service area.
Best Server Path Loss (dB)
Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. When other service
areas overlap the studied one, Atoll determines the best transmitter and evaluates path loss from the best transmitter. A
pixel of a service area is coloured if the path loss exceeds ( ) the defined thresholds (pixel colour depends on path loss).
Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as defined thresholds. Each layer corresponds to an area where the path loss from the best server exceeds a
defined minimum threshold.
Best Server Total Losses (dB)
Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. Where service
areas overlap the studied one, Atoll determines the best transmitter and evaluates total losses from the best transmitter.
A pixel of a service area is coloured if the total losses exceed ( ) the defined thresholds (pixel colour depends on total
losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are
as many layers as defined thresholds. Each layer corresponds to an area where the total losses from the best server
exceed a defined minimum threshold.
Number of Servers
Atoll evaluates how many service areas cover a pixel in order to determine the number of servers. The pixel colour
depends on the number of servers. Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the number of
servers exceeds ( ) a defined minimum threshold.
>
>
>
>
>
>
>
138 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Cell Edge Coverage Probability (%)
On each pixel of each transmitter service area, the coverage corresponds to the pixels where the signal level from this
transmitter fulfils signal conditions defined in Conditions tab with different cell edge coverage probabilities. There is one
coverage area per transmitter in the explorer.
Best Cell Edge Coverage Probability (%)
On each pixel of each transmitter service area, the coverage corresponds to the pixels where the best signal level received
fulfils signal conditions defined in Conditions tab. There is one coverage area per cell edge coverage probability in the
explorer.
Best C2 (dBm)
Atoll calculates C2 values received from transmitters on each pixel of each transmitter service area. When other service
areas overlap the studied one, Atoll chooses the highest value. A pixel of a service area is coloured if the C2 value
exceeds ( ) the defined thresholds (the pixel colour depends on the C2 value). Coverage consists of several independent
layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the best C2 value exceeds a defined minimum threshold.
5.2 Interference-based Calculations
Interference-based calculations include all the calculations that involve the calculation of interference received from
interfering transmitters in addition to the signal level received from the server.
5.2.1 Carrier-to-Interference Ratio Calculation
MSA (Mobile Station Allocation) Definition
A wide-ranging definition of an MSA, Mobile Station Allocation, can be that it is a list of channels and an associated MAIO.
More precisely, for different frequency hopping modes, this definition can be:
Non-hopping (NH): An MSA is the channel assigned to a TRX used by a mobile.
Baseband hopping (BBH): An MSA is the Mobile Allocation List (MAL) and the TRX index.
Synthesised frequency hopping (SFH): An MSA is the Mobile Allocation List (MAL) and the Mobile Allocation
Index Offset (MAIO).
From the point of view of a mobile station, BBH and SFH work in the same way.
Notations and Assumptions
In the following description:
v is a victim transmitter,
MSAS(v) is the set of MSAs (Mobile Station Allocations) associated to v,
The number of MSAS(v) depends on TRX types to be analysed. You may study a given TRX type tt (there will be
as many MSA(v) as TRXs allocated to the subcell (v,tt)) or all the TRX types (the number of MSA(v) will correspond
to the number of TRXs allocated to v).
Several MSAs, m, are related to a transmitter. Therefore, Atoll calculates the C/I for each victim
transmitter v with MSA m (m e MSAS(v)).
>
TRX index Channel list MAIO MSA
1 53 - (53,-)
2 54 - (54,-)
TRX index Channel list MAIO MSA
1 53 * ([53,54,55],0)
2 54 * ([53,54,55],1)
3 55 * ([53,54,55],2)
TRX index Channel list MAIO MSA
1 53 54 55 56 2 ([53,54,55,56],2)
2 53 54 55 56 3 ([53,54,55,56],3)
C
v
m ( )
I
v
m ( )
-----------------
\ .
|
| |
Forsk 2010 AT283_TRG_E2 139
Chapter 5: GSM GPRS EDGE Networks
Atoll considers the most interfered MSA, therefore, the displayed C/I or C/(I+N) are or
, respectively. If the Detailed Results check box is selected, the C/I values for all
MSAs are displayed.
i is any potential interfering transmitter (TBC transmitters whose calculation areas intersect the service area of v),
MSAS(i) is the set of MSAs related to potential interferers i,
INT(v) is the set of transmitters that interfere v,
is the carrier power level received from v on m,
corresponds to the interference received from interfering transmitters i on m,
used in the C/I calculation is based on the C/I standard deviation.
Calculations
The carrier power level is the power received from the victim transmitter at the receiver.
If the interference conditions are based on C/(I+N), Atoll takes the total noise into account. The total noise is the sum
of the thermal noise (-121 dBm by default or user-defined), the noise figure NF, and the inter-technology
downlink noise rise .
Interference can be received from interfering transmitters i on co-channel and adjacent channels. Interference may also
be received from the transmitters of another technology.
Therefore,
Here, is the average power control gain defined for the interfering transmitter i.
Each interference component is explained below.
Co- and Adjacent Channel Interference:
is the interference received at v on m on co-channel, given by:
is the interference received at v on m on adjacent channels, given by:
Here, is the carrier power level received from i on n.
T
i
(n) is occupancy of the MSA n:
is the traffic load defined for the MSA n or i. It can be set to 100% in the coverage prediction properties.
is the activity factor defined for the MSA n of i. If the subcell (i,tt) supports DTX, the value specified in the
coverage prediction properties is used. Otherwise, the activity factor is 1.
Note:
The C/I shadowing margin is applied on the carrier power level. The interference levels are
not changed.
Note:
BCCH TRXs are always on. Therefore, DTX and traffic loads do not impact the interference
from BCCH. In other words, and for the BCCH TRXs of the
interferers.
C
I
----
\ .
| |
v
Mi n
k
C
v
m ( )
I
v
m ( )
-----------------
\ .
|
| |
=
C
I N
tot
+
------------------
\ .
| |
v
Mi n
k
C
v
m ( )
I
v
m ( ) N
tot
+
-------------------------------
\ .
|
| |
=
C
v
m ( )
I
v
m ( )
M
Shadowi ng
C
v
m ( ) P
rec
v
m ( ) =
N
tot
N
thermal
NR
i nter techno y log
v DL ,
N
tot
N
thermal
NF NR
i nter techno y log
v DL ,
+ + =
I
v
m ( ) I
co
v
m ( ) I
adj
v
m ( ) I
i nter techno y log
DL
G
PC
i
+ + =
G
PC
i
I
co
v
m ( )
I
co
v
m ( ) p
m n ,
v i ,
P
rec
i
n ( ) T
i
n ( )
n MSAS i ( ) e

\ .
|
| |
i INT v ( ) e

co
=
I
adj
v
m ( )
I
adj
v
m ( ) p
m n ,
v i ,
P
rec
i
n ( )
F
------------------- T
i
n ( )
n MSAS i ( ) e

\ .
|
| |
i INT v ( ) e

adj
=
P
rec
i
n ( )
T
i
n ( ) L
traffi c
i
n ( ) f
act
i
n ( ) =
L
traffi c
i
n ( )
f
act
i
n ( )
f
act
i
n ( ) 1 = L
traffi c
i
n ( ) 1 =
140 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the probability of having a co- or adjacent channel collision between MSAs n and m, depending on the
used frequency hopping mode.
- Collision Probability for Non Hopping Mode:
- Collision Probability for BBH and SFH Modes:
MSA m of v can be defined as the pair ([f
1
,f
2
,.f
n
], MAIO) and MSA n of i as the pair ([f
1
,f
2
,.f
n
], MAIO)
(where f and f are channels).
An occurence refers to the event when a channel f of m encounters a channel f of n during
hopping. A collision occurs when f and f are co- or adjacent channels:
such that
The probability of collision is the ratio of the number of collisions to the number of occurences:
The probibility of collision depends on the correlation between m and n. There can be two cases:
i. MSAs m and n are correlated
m and n must have identical HSN and synchronisation. The number of occurrences depends on the MAL
size, MAIO, and MAIO.
Example:
Here, the number of occurrences is 3, the number of co-channel collisions is 1, and the number of adjacent
channel collisions is 1. Therefore,
and
ii. MSAs m and n are not correlated
m and n do not have identical HSN and synchronisation. The probability of collision is the same for all the
channels.
Example:
Here, the number of occurrences is 9, the number of co-channel collisions is 1, and the number of adjacent
channel collisions is 3. Therefore,
and
Inter-technology Downlink Interference:
is the total inter-technology interference level on m due to transmitters in a linked Atoll document.
The interference from a transmitter Tx in a linked Atoll document is given as:
Schematic view of hopping
sequences
MSA m of v
([34 37 39], MAIO=0)
34 37 39
MSA n of i
([38 36 34], MAIO=2)
38 36 34
Schematic view of hopping
sequences
MSA m of v
([34 37 39], MAIO=0)
34 37 39
MSA n of i
([38 36 34], MAIO=2)
38 36 34
p
m n ,
v i ,
p
m n ,
v i ,
1 =
OCCUR f
m
v
f'
n
i
, ( )
Col l i si on OCCUR f
m
v
f'
n
i
, ( ) = f
m
v
f'
n
i
0 or 1 =
p
m n ,
v i ,
n
col l i si on
n
occurence
--------------------------- =
p
m n ,
v i ,
( )
co
1
3
--- = p
m n ,
v i ,
( )
adj
1
3
--- =
p
m n ,
v i ,
( )
co
1
9
--- = p
m n ,
v i ,
( )
adj
1
3
--- =
I
i nter techno y log
DL
I
i nter techno y log
DL
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
f ,
Tx

------------------------------------------
n
i

=
Forsk 2010 AT283_TRG_E2 141
Chapter 5: GSM GPRS EDGE Networks
Where is the frequency used by the transmitter Tx within its list of frequencies, is the total
transmitted Tx power on , are the total losses between the transmitter Tx and the receiver, and
is the inter-technology channel protection between the frequencies used by the transmitter Tx and the victim
transmitter v.
5.2.2 Point Analysis
Analysis provided in the Interference tab is based on path loss matrices. Therefore, it is possible to display the interference
levels received from TBC transmitters for which path loss matrices have been calculated over their calculation areas.
Atoll displays the following at the receiver:
The carrier power level received from the victim transmitter v on the most interfered MAS m,
Co-channel, adjacent channel, or both co- and adjacent channel interference received from interfering transmitters
i on MAS m (for further information about noise calculation, please refer to Signal to noise calculation: noise
calculation part),
Interferers are sorted in the order of descending carrier power levels.
5.2.3 Interference-based Coverage Predictions
Two interference-based coverage predictions are available:
Coverage by C/I Level: Provides a global analysis of the network quality.
Atoll calculates the C/I on each pixel within the service area of studied transmitters, determines the pixels where
the calculated C/I exceeds the defined minimum threshold, and colours these pixels depending on C/I value.
Interfered Zones: Shows the areas where a transmitter is interfered.
Atoll calculates the C/I on each pixel within the service area of studied transmitters, determines the pixels where
the calculated C/I is lower than the defined maximum threshold, and colours these pixels depending on colour of
the interfered transmitter.
For each TBC transmitter, Txi, Atoll calculates the selected parameter on each pixel inside the Txi calculation area. In
other words, each pixel inside the Txi calculation area is considered a probe (non-interfering) receiver.
Coverage prediction parameters to be set are:
The coverage conditions in order to determine the service area of each TBC transmitter,
The interference conditions to meet for a pixel to be covered, and
The display settings to select the displayed parameter and its shading levels.
The thermal noise (N = -121 dBm, by default) is used in the calculations if the coverage prediction is based on C/(I+N).
This value can be modified by the user.
5.2.3.1 Service Area Determination
Atoll uses parameters entered in the Condition tab of the coverage prediction properties dialogue to determine the areas
where coverage will be displayed. Service areas are determined in the same manner as for signal level-based coverage
predictions. See "Service Area Determination" on page 134 for more information.
5.2.3.2 Coverage Area Determination
For each victim transmitter v, coverage area corresponds to pixels where or is between the lower and upper
thresholds defined in the coverage prediction properties.
The two options defining the thresholds are explained below.
5.2.3.2.1 Interference Condition Satisfied by At Least One TRX
In this case, the coverage area of a transmitter Txi corresponds to the pixels where:
Notes:
In case of frequency hopping, the ICP value is weighted according to the fractional load.
In the ICP, the frequency gap is based on the defined base frequency for each technology
(e.g., 935 MHz in GSM 900)
i c
i
i
th
P
Transmi tted
Tx
i c
i
( )
i c
i
L
total
Tx
ICP
i c
i
f ,
Tx
Notes:
Neither DTX nor traffic load of TRXs are taken into account to evaluate interference levels.
Therefore, we have .
The C/I shadowing margin is applied on the carrier power level. The interference levels are
not changed.
T
i
n ( ) L
traffi c
i
n ( ) f
act
i
n ( ) 1 = =
C
I
----
\ .
| |
v
C
I N +
------------
\ .
| |
v
142 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
or
Where, TRX
j
is any TRX belonging to Txi.
5.2.3.2.2 Interference Condition Satisfied by The Worst TRX
In this case, the coverage area of a transmitter Txi corresponds to the pixels where:
or
Where, TRX
j
is the TRX (belonging to Txi) with the worst C/I or C/(I+N) at the pixel.
5.2.3.3 Coverage Display
5.2.3.3.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
5.2.3.3.2 Display Types
It is possible to display the coverage predictions with colours depending on any transmitter attribute or other criteria such
as:
C/I Level
Each pixel of the transmitter coverage area is coloured if the calculated C/I (or C/(I+N)) level exceeds ( ) the specified
minimum thresholds (pixel colour depends on C/I (or C/(I+N)) level). Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as transmitter coverage areas. Each layer
shows the different C/I levels available in the transmitter coverage area.
Max C/I Level
Atoll compares calculated C/I (or C/(I+N)) levels received from transmitters on each pixel of each transmitter coverage
area where coverage areas overlap the studied one and chooses the highest value. A pixel of a coverage area is coloured
if the C/I (or C/(I+N)) level exceeds ( ) the specified thresholds (the pixel colour depends on the C/I (or C/(I+N)) level).
Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as defined thresholds. Each layer corresponds to an area where the highest received C/I level exceeds a defined
minimum threshold.
Min C/I Level
Atoll compares C/I (or C/(I+N)) levels received from transmitters on each pixel of each transmitter coverage area where
the coverage areas overlap the studied one and chooses the lowest value. A pixel of a coverage area is coloured if the C/
I (or C/(I+N)) level exceeds ( ) the specified thresholds (the pixel colour depends on the C/I (or C/(I+N)) level). Coverage
consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as
defined thresholds. Each layer corresponds to an area where the lowest received C/I level exceeds a defined minimum
threshold.
5.3 GPRS/EDGE Calculations
GPRS/EDGE calculations include coding scheme selection and throughput calculation. Coding schemes may be selected
using ideal link adaptation or without it. Once coding schemes have been selected, throughputs corresponding to these
coding schemes are readily determined from the look-up tables.
The following sections describe the two categories of calculations, i.e., with and without ideal link adaptations. Ideal link
adaptation implies that the selected coding scheme corresponds to the highest available throughput under the given radio
conditions.
GPRS/EDGE calculations may be based on signal levels (C) alone, on C/I, or on C/(I+N). For calculating the noise, either
the noise figure defined for the calculations or that of the selected terminal type is used.
Different GPRS/EDGE configurations may be defined for transmitter and terminals. In this case, Atoll only selects the
coding schemes that are common in the two. If no terminal type is defined for the calculation, or if the terminal type does
not have any GPRS/EDGE configuration assigned to it, Atoll only uses the GPRS/EDGE configuration of the transmitter.
Similarly, if a transmitter does not have any GPRS/EDGE configuration assigned to it, Atoll only uses the GPRS/EDGE
configuration of the terminal type. If both the transmitter and the terminal type do not have any GPRS/EDGE configuration
assigned to them, no coding scheme selection and throughput calculation is carried out.
Minimum threshold
C
I
----
\ .
| |
v
TRX
j
s Maximum threshold < Minimum threshold
C
I N +
------------
\ .
| |
v
TRX
j
s Maximum threshold <
Minimum threshold
C
I
----
\ .
| |
v
TRX
j
s Maximum threshold < Minimum threshold
C
I N +
------------
\ .
| |
v
TRX
j
s Maximum threshold <
>
>
>
Forsk 2010 AT283_TRG_E2 143
Chapter 5: GSM GPRS EDGE Networks
In the following calculations, we assume that:
is the signal level received from the selected TRX type (tt) or on all the TRXs of Txi on each pixel of
the Txi coverage area,
is the Power Backoff defined for the subcell for 8PSK, 16QAM, or 32QAM modulations,
CS is the set of all available coding schemes,
are the values of reception thresholds for the coding schemes available in the GPRS/
EDGE configuration,
are the values of C/I thresholds for the coding schemes available in the GPRS/EDGE
configuration,
are the values of C/(I+N) thresholds for the coding schemes available in the GPRS/EDGE
configuration,
The priorities of the coding scheme lists are as follows: DBS > DAS > MCS > CS.
When the calculations are based on C/I and C/(I+N):
Atoll calculates the carrier-to-interference ratio for all the GPRS/EDGE TBC transmitters but takes into account
all the TBC transmitters (GSM and GPRS/EDGE) to evaluate the interference.
The reception thresholds given for signal level C are internally converted to C/N thresholds (where N is the thermal
noise defined in the document database at -121 dBm by default) in order to be indexed by C/(I+N) values. C/I
thresholds are also indexed by the C/(I+N) value.
For more information on interference (I) calculation, see "Carrier-to-Interference Ratio Calculation" on page 138.
5.3.1 Coding Scheme Selection and Throughput Calculation
Without Ideal Link Adaptation
5.3.1.1 Calculations Based on C
Coding Scheme Selection
Atoll selects a coding scheme, cs, from among the coding schemes available in the GPRS/EDGE configuration, such that:
For each TRX type, tt,
The selected coding scheme, cs, is the coding scheme with the lowest coding scheme number from the lowest priority
coding scheme list.
Throughput Calculation
Once the coding scheme cs is selected, Atoll reads the corresponding throughput value for the received signal level from
the Throughput=f(C) graph associated with cs.
5.3.1.2 Calculations Based on C/I
Coding Scheme Selection
Atoll selects two coding schemes from among the coding schemes available in the GPRS/EDGE configuration, such that:
For each TRX type, tt,
And,
cs
C
is the coding scheme determined from the signal level, and cs
C/I
is the coding scheme determined from the C/I level.
Both coding schemes are the coding schemes with the lowest coding scheme number from the lowest priority coding
scheme list.
The selected coding scheme, cs, is the coding scheme with the lower coding scheme number among cs
C
and cs
C/I
:
.
Throughput Calculation Based on the Worst Case Between C and C/I
For the coding scheme cs
C
determined above, a throughput value, TP
C
, corresponding to the signal level is determined
from the TP = f(C) graph.
P
rec
Txi
TRX ( )
P
Backoff
Txi
TRX ( )
Recepti on Threshold ( )
CS
C
I
---- Threshold
\ .
| |
CS
C
I N +
------------ Threshold
\ .
| |
CS
cs Lowest CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( ) Recepti on Threshold ( )
CS
>
\ .
| |
=
cs
C
Lowest CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( ) Recepti on Threshold ( )
CS
>
\ .
| |
=
cs
C I
Lowest CS
P
rec
Txi
TRX ( ) P
Backoff
Txi
TRX ( )
I
-----------------------------------------------------------------------------
C
I
---- Threshold
\ .
| |
CS
> \ .
|
|
| |
=
cs Mi n cs
C
cs
C I
, ( ) =
144 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For the coding scheme cs
C/I
determined above, a throughput value, TP
C/I
, corresponding to the C/I is determined from the
TP = f(C/I) graph.
The resulting throughput TP is the lower of the two values, TP
C
and TP
C/I
: .
5.3.1.3 Calculations Based on C/(I+N)
Coding Scheme Selection
Atoll selects two coding schemes from among the coding schemes available in the GPRS/EDGE configuration, such that:
For each TRX type, tt,
And,
cs
C/N
is the coding scheme determined from the C/N, and cs
C/(I+N)
is the coding scheme determined from the C/(I+N) level.
Both coding schemes are the coding schemes with the lowest coding scheme numbers from the lowest priority coding
scheme list.
The selected coding scheme, cs, is the coding scheme with the higher coding scheme number among cs
C/N
and cs
C/(I+N)
:
.
Throughput Calculation Based on Interpolation Between C/N and C/(I+N)
For the coding scheme cs
C/N
determined above, the TP = f(C) graph is internally converted to TP = f(C/N) graph. A
throughput value, TP
C/N
, corresponding to the C/(I+N) is determined from the TP = f(C/N) graph.
For the coding scheme cs
C/(I+N)
determined above, the TP = f(C/I) graph is internally converted to TP = f(C/(I+N)) graph.
A throughput value, TP
C/(I+N)
, corresponding to the C/(I+N) is determined from the TP = f(C/(I+N)) graph.
The final throughput is computed by interpolating between the throughput values obtained from these two graphs. The
throughput interpolation method consists in interpolating TP
C/N
and TP
C/(I+N)
according to the respective weights of I and
N values.
The resulting throughput TP is given by:
Where , pN is the thermal noise power (value in Watts), and p(I+N) is the interferences + thermal noise
power (value in Watts).
5.3.2 Coding Scheme Selection and Throughput Calculation With
Ideal Link Adaptation
5.3.2.1 Calculations Based on C
Throughput Calculation
For the received signal level, and coding schemes whose reception thresholds are lower than the received signal level,
Atoll determines the highest throughput from the graphs available in the GPRS/EDGE configuration.

Coding Scheme Selection
The selected coding scheme, cs, is the one corresponding to the highest throughput calculated above.
If there are more than one coding schemes providing the highest throughput at the pixel, the selected coding scheme, cs,
is the one with the lowest coding scheme number from the lowest priority coding scheme list.
5.3.2.2 Calculations Based on C/I
Throughput Calculation Based on Worst Case Between C and C/I
For the received signal level, and coding schemes whose reception thresholds are lower than the received signal level,
Atoll determines the highest throughput from the graphs available in the GPRS/EDGE configuration.
TP Mi n TP
C
TP
C I
, ( ) =
cs
C N
Lowest CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( )
N
-----------------------------------------------------------------------------
C
I N +
------------ Threshold
\ .
| |
CS
> \ .
|
|
| |
=
cs
C I N + ( )
Lowest CS
P
rec
Txi
TRX ( ) P
Backoff
Txi
TRX ( )
I N +
-----------------------------------------------------------------------------
C
I N +
------------ Threshold
\ .
| |
CS
> \ .
|
|
| |
=
cs Max cs
C N
cs
C I N + ( )
, ( ) =
TP o TP
C N
1 o ( ) TP
C I N + ( )
+ =
o
pN
p I N + ( )
--------------------- =
TP=f C ( )
TP
C
Hi ghest TP=f C P
rec
Txi
TRX ( ) P
Backoff
Txi
TRX ( ) = ( ) ( ) = CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( ) Recepti on Threshold ( )
CS
>
\ .
| |

TP=f C ( )
Forsk 2010 AT283_TRG_E2 145
Chapter 5: GSM GPRS EDGE Networks

For the received C/I, and coding schemes whose C/I thresholds are lower than the received C/I, Atoll determines the
highest throughput from the graphs available in the GPRS/EDGE configuration.

The resulting throughput TP is the lower of the two values, TP
C
and TP
C/I
.
Coding Scheme Selection
The selected coding scheme, cs, is the one corresponding to the lower of the two highest throughputs calculated above.
If there are more than one coding schemes providing the highest throughputs at the pixel, the selected coding scheme,
cs, is the one with the lowest coding scheme number from the lowest priority coding scheme list.
5.3.2.3 Calculations Based on C/(I+N)
Throughput Calculation Based on Interpolation Between C/N and C/(I+N)
Atoll internally converts the TP = f(C) graphs into TP = f(C/N) graphs. For the received C/(I+N), and coding schemes
whose C/(I+N) thresholds are lower than the received C/(I+N), Atoll determines the highest throughput from the TP = f(C/
N) graphs available in the GPRS/EDGE configuration.

Atoll internally converts the TP = f(C/I) graphs into TP = f(C/(I+N)) graphs. For the received C/(I+N), and coding schemes
whose C/(I+N) thresholds are lower than the received C/(I+N), Atoll determines the highest throughput from the TP = f(C/
(I+N)) graphs available in the GPRS/EDGE configuration.

The final throughput is computed by interpolating between the throughput values obtained from these two graphs. The
throughput interpolation method consists in interpolating TP
C/N
and TP
C/(I+N)
according to the respective weights of I and
N values.
The resulting throughput TP is given by:
Where , pN is the thermal noise power (value in Watts), and p(I+N) is the interferences + thermal noise
power (value in Watts).
Coding Scheme Selection
The selected coding scheme, cs, is the one corresponding to the higher of the two highest throughputs calculated above.
If there are more than one coding schemes providing the highest throughputs at the pixel, the selected coding scheme,
cs, is the one with the highest coding scheme number from the highest priority coding scheme list.
5.3.3 Application Throughput Calculation
Application throughput is calculated from the RLC/MAC throughput as follows:
Where is the RLC/MAC throughput, and and are the throughput offset (kbps) and the
throughput scaling factor (%) defined for the selected service.
TP
C
Hi ghest TP=f C P
rec
Txi
TRX ( ) P
Backoff
Txi
TRX ( ) = ( ) ( ) = CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( ) Recepti on Threshold ( )
CS
>
\ .
| |

TP=f C I ( )
TP
C I
Hi ghest TP=f C I
P
rec
Txi
TRX ( ) P
Backoff
Txi
TRX ( )
I
--------------------------------------------------------------------------- =
\ .
|
| |
\ .
|
| |
= CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( )
I
-----------------------------------------------------------------------------
C
I
---- Threshold
\ .
| |
CS
> \ .
|
|
| |

TP Mi n TP
C
TP
C I
, ( ) =
TP
C N
Hi ghest TP=f
C
N
----
P
rec
Txi
TRX ( ) P
Backoff
Txi
TRX ( )
I N +
--------------------------------------------------------------------------- =
\ .
|
| |
\ .
|
| |
= CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( )
I N +
-----------------------------------------------------------------------------
C
I N +
------------ Threshold
\ .
| |
CS
> \ .
|
|
| |

TP
C I N + ( )
Hi ghest TP=f
C
I N +
------------
P
rec
Txi
TRX ( ) P
Backoff
Txi
TRX ( )
I N +
--------------------------------------------------------------------------- =
\ .
|
| |
\ .
|
| |
= CS
P
rec
Txi
TRX ( ) P
Backof f
Txi
TRX ( )
I N +
-----------------------------------------------------------------------------
C
I N +
------------ Threshold
\ .
| |
CS
> \ .
|
|
| |

TP o TP
C N
1 o ( ) TP
C I N + ( )
+ =
o
pN
p I N + ( )
--------------------- =
TP
Appl i cati on
TP
RLC MAC
SF
100
---------- TP
Offset
=
TP
RLC MAC
TP
Offset
SF
146 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.3.4 BLER Calculation
Block error rate is calculated as follows:
Where TP is the throughput per timeslot calculated for a pixel and TP
MAX
is the maximum throughput per timeslot read
from the GPRS/EDGE configuration used for the calculations.
5.3.5 GPRS/EDGE Coverage Predictions
Two GPRS/EDGE coverage predictions are available:
GPRS/EDGE Coding Schemes: Shows the areas where various coding schemes are available.
Packet Throughput and Quality: Shows the throughputs corresponding to the coding schemes available.
For each TBC transmitter, Txi, Atoll calculates the selected parameter on each pixel inside the Txi calculation area. In
other words, each pixel inside the Txi calculation area is considered a probe (non-interfering) receiver.
Coverage prediction parameters to be set are:
The coverage conditions in order to determine the service area of each TBC transmitter,
The interference conditions to meet for a pixel to be covered, and
The display settings to select the displayed parameter and its shading levels.
The thermal noise (N = -121 dBm, by default) is used in the calculations if the coverage prediction is based on C/(I+N).
This value can be modified by the user.
5.3.5.1 Service Area Determination
Atoll uses parameters entered in the Condition tab of the coverage prediction properties dialogue to determine the areas
where coverage will be displayed.
We can distinguish eight cases as below. Let us assume that:
Each transmitter, Txi, belongs to a Hierarchical Cell Structure (HCS) layer, k, with a defined priority and a defined
reception threshold.
Each transmitter, Txi, is GPRS/EDGE-capable.
No max range is set.
5.3.5.1.1 All Servers
The service area of Txi corresponds to the pixels where:
5.3.5.1.2 Best Signal Level and a Margin
The service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.3.5.1.3 Second Best Signal Level and a Margin
The service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the second highest.
BLER
TP
TP
MAX
------------------ If TP TP
MAX
s ( )
0 If TP TP
MAX
> ( )

=
SubcellReceptionThreshold P
rec
Txi
tt ( ) s
SubcellReceptionThreshold P
rec
Txi
tt ( ) s
P
rec
Txi
tt ( )
Best
j i =
P
rec
Txj
tt ( ) ( ) M >
SubcellReceptionThreshold P
rec
Txi
tt ( ) s
P
rec
Txi
tt ( )
2
nd
Best
j i =
P
rec
Txj
tt ( ) ( ) M >
Forsk 2010 AT283_TRG_E2 147
Chapter 5: GSM GPRS EDGE Networks
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the second highest or within
a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 3
rd
best servers.
5.3.5.1.4 Best Signal Level per HCS Layer and a Margin
For each HCS layer, k, the service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.3.5.1.5 Second Best Signal Level per HCS Layer and a Margin
For each HCS layer, k, the service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the second highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the second highest or within
a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 3
rd
best servers.
5.3.5.1.6 HCS Servers and a Margin
The service area of Txi corresponds to the pixels where:
And
And the received exceeds the reception threshold defined per HCS layer.
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.3.5.1.7 Highest Priority HCS Server and a Margin
The service area of Txi corresponds to the pixels where:
And
And Txi belongs to the HCS layer with the highest priority. The highest priority is defined by the priority field (0: lowest).
And the received exceeds the reception threshold defined per HCS layer.
SubcellReceptionThreshold P
rec
Txi
tt ( ) s
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
SubcellReceptionThreshold P
rec
Txi
tt ( ) s
P
rec
Txi
BCCH ( )
2
nd
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
SubcellReceptionThreshold P
rec
Txi
tt ( ) s
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
P
rec
Txi
tt ( )
SubcellReceptionThreshold P
rec
Txi
tt ( ) s
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
P
rec
Txi
tt ( )
148 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.3.5.1.8 Best Idle Mode Reselection Criterion (C2)
Such type of coverage is useful:
To compare idle and dedicated mode best servers for voice traffic
Display the GPRS/EDGE best server map (based on GSM idle mode)
The path loss criterion C1 used for cell selection and reselection is defined by:
The path loss criterion (GSM03.22) is satisfied if .
The reselection criterion C2 is used for cell reselection only and is defined by:
Where is the Cell Reselect Offset defined for the transmitter.
The service area of Txi corresponds to the pixels where:
And
The Best function considers the highest value from a list of values.
On each pixel, the transmitter with the highest C2 value is kept. It corresponds to the best server in idle mode. C2 is defined
as an integer in the 3GPP specifications, therefore, the C2 values in the above calculations are rounded down to the
nearest integer.
5.3.5.2 Coverage Display
5.3.5.2.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
5.3.5.2.2 Display Types
It is possible to display the coverage predictions with colours depending on criteria such as:
GPRS/EDGE Coding Schemes: Coding Schemes
Only the pixels with a coding scheme assigned are coloured. The pixel colour depends on the assigned coding scheme.
Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many
layers as transmitter coverage areas. Each layer shows the coding schemes available in the transmitter coverage area.
GPRS/EDGE Coding Schemes: Best Coding Schemes
On each pixel, Atoll chooses the highest coding scheme available from the TRXs of different transmitters covering that
pixel. Only the pixels with a coding scheme assigned are coloured. The pixel colour depends on the assigned coding
scheme. Coverage consists of several independent layers whose visibility in the map window can be managed. There are
as many layers as possible coding schemes. Each layer shows the areas where a given coding scheme can be used.
Packet Throughput and Quality: RLC/MAC Throughput/Timeslot (kbps)
A pixel of the coverage area is coloured if the calculated RLC/MAC throughput per timeslot from any transmitter covering
that pixel exceeds the defined minimum threshold. The pixel colour depends on the RLC/MAC throughput per timeslot.
Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many
Note:
In the case two layers have the same priority, the traffic is served by the transmitter for
which the difference between the received signal strength and the HCS threshold is the
highest. The way the competition is managed between layers with the same priority can be
modified. For more information, see the Administrator Manual.
C1 P
rec
Txi
BCCH ( ) Mi ni mumThreshol d BCCH ( ) =
C1 0 >
C2 C1 CELL_RESELECT_OFFSET + =
CELL_RESELECT_OFFSET
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
C2
Txi
BCCH ( )
Best
j
C2
Txj
BCCH ( ) ( ) =
Forsk 2010 AT283_TRG_E2 149
Chapter 5: GSM GPRS EDGE Networks
layers as transmitter coverage areas and throughput display thresholds. Each layer shows the RLC/MAC throughput that
a transmitter can provide on one timeslot.
Packet Throughput and Quality: Best RLC/MAC Throughput/Timeslot (kbps)
A pixel of the coverage area is coloured if the calculated highest RLC/MAC throughput per timeslot from any transmitter
covering that pixel exceeds the defined minimum threshold. The pixel colour depends on the highest RLC/MAC throughput
per timeslot. Coverage consists of several independent layers whose visibility in the map window can be managed. There
are as many layers as throughput display thresholds. Each layer shows the best RLC/MAC throughput that any transmitter
can provide on one timeslot.
Packet Throughput and Quality: Average RLC/MAC Throughput/Timeslot (kbps)
A pixel of the coverage area is coloured if the calculated average RLC/MAC throughput per timeslot from all the
transmitters covering that pixel exceeds the defined minimum threshold. The pixel colour depends on the average RLC/
MAC throughput per timeslot. Coverage consists of several independent layers whose visibility in the map window can be
managed. There are as many layers as throughput display thresholds. Each layer shows the average RLC/MAC
throughput that all the transmitters can provide on one timeslot.
Packet Throughput and Quality: Application Throughput/Timeslot (kbps)
A pixel of the coverage area is coloured if the calculated application throughput per timeslot from any transmitter covering
that pixel exceeds the defined minimum threshold. The pixel colour depends on the application throughput per timeslot.
Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many
layers as transmitter coverage areas and throughput display thresholds. Each layer shows the application throughput that
a transmitter can provide on one timeslot.
Packet Throughput and Quality: Best Application Throughput/Timeslot (kbps)
A pixel of the coverage area is coloured if the calculated highest application throughput per timeslot from any transmitter
covering that pixel exceeds the defined minimum threshold. The pixel colour depends on the highest application
throughput per timeslot. Coverage consists of several independent layers whose visibility in the map window can be
managed. There are as many layers as throughput display thresholds. Each layer shows the best application throughput
that any transmitter can provide on one timeslot.
Packet Throughput and Quality: Average Application Throughput/Timeslot (kbps)
A pixel of the coverage area is coloured if the calculated average application throughput per timeslot from all the
transmitters covering that pixel exceeds the defined minimum threshold. The pixel colour depends on the average
application throughput per timeslot. Coverage consists of several independent layers whose visibility in the map window
can be managed. There are as many layers as throughput display thresholds. Each layer shows the average application
throughput that all the transmitters can provide on one timeslot.
Packet Throughput and Quality: Max Application Throughput (kbps)
A pixel of the coverage area is coloured if the calculated application throughput from any transmitter covering that pixel
exceeds the defined minimum threshold. The pixel colour depends on the application throughput for all the timeslots
supported by the selected terminal type (Number of Simultaneous Carriers x Number of DL Timeslots). Coverage consists
of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter
coverage areas and throughput display thresholds. Each layer shows the application throughput that a transmitter can
provide on all available timeslots in the terminal.
Packet Throughput and Quality: Best Max Application Throughput (kbps)
A pixel of the coverage area is coloured if the calculated highest application throughput from any transmitter covering that
pixel exceeds the defined minimum threshold. The pixel colour depends on the highest application throughput for all the
timeslots supported by the selected terminal type (Number of Simultaneous Carriers x Number of DL Timeslots). Coverage
consists of several independent layers whose visibility in the map window can be managed. There are as many layers as
throughput display thresholds. Each layer shows the highest application throughput that any transmitter can provide on all
available timeslots in the terminal.
Packet Throughput and Quality: Average Max Application Throughput (kbps)
A pixel of the coverage area is coloured if the calculated average application throughput from all the transmitters covering
that pixel exceeds the defined minimum threshold. The pixel colour depends on the average application throughput for all
the timeslots supported by the selected terminal type (Number of Simultaneous Carriers x Number of DL Timeslots).
Coverage consists of several independent layers whose visibility in the map window can be managed. There are as many
layers as throughput display thresholds. Each layer shows the average application throughput that all the transmitters can
provide on all available timeslots in the terminal.
Packet Throughput and Quality: User Throughput (kbps)
A pixel of the coverage area is coloured if the calculated user throughput from any transmitter covering that pixel exceeds
the defined minimum threshold. The pixel colour depends on the user throughput for all the timeslots supported by the
selected terminal type (Number of Simultaneous Carriers x Number of DL Timeslots). The user throughput is calculated
150 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
by applying the throughput reduction factor, determined using the selected dimensioning model, to the application
throughput. Coverage consists of several independent layers whose visibility in the map window can be managed. There
are as many layers as transmitter coverage areas and throughput display thresholds. Each layer shows the user
throughput that a transmitter can provide on all available timeslots in the terminal.
Packet Throughput and Quality: Max User Throughput (kbps)
A pixel of the coverage area is coloured if the calculated highest user throughput from any transmitter covering that pixel
exceeds the defined minimum threshold. The pixel colour depends on the highest user throughput for all the timeslots
supported by the selected terminal type (Number of Simultaneous Carriers x Number of DL Timeslots). The user
throughput is calculated by applying the throughput reduction factor, determined using the selected dimensioning model,
to the application throughput. Coverage consists of several independent layers whose visibility in the map window can be
managed. There are as many layers as throughput display thresholds. Each layer shows the highest user throughput that
any transmitter can provide on all available timeslots in the terminal.
Packet Throughput and Quality: Average User Throughput (kbps)
A pixel of the coverage area is coloured if the calculated average user throughput from all the transmitters covering that
pixel exceeds the defined minimum threshold. The pixel colour depends on the average user throughput for all the
timeslots supported by the selected terminal type (Number of Simultaneous Carriers x Number of DL Timeslots). The user
throughput is calculated by applying the throughput reduction factor, determined using the selected dimensioning model,
to the application throughput. Coverage consists of several independent layers whose visibility in the map window can be
managed. There are as many layers as throughput display thresholds. Each layer shows the average user throughput that
all the transmitters can provide on all available timeslots in the terminal.
Packet Throughput and Quality: BLER (%)
A pixel of the coverage area is coloured if the calculated BLER from any transmitter exceeds the defined minimum
threshold. The pixel colour depends on the BLER. Coverage consists of several independent layers whose visibility in the
map window can be managed. There are as many layers as transmitter coverage areas and BLER display thresholds.
Each layer shows the BLERs that the covered pixels experience on one timeslot.
Packet Throughput and Quality: Max BLER (%)
A pixel of the coverage area is coloured if the calculated highest BLER from all the transmitters exceeds the defined
minimum threshold. The pixel colour depends on the BLER. Coverage consists of several independent layers whose
visibility in the map window can be managed. There are as many layers as BLER display thresholds. Each layer shows
the BLER that the covered pixels experience on one timeslot.
5.4 Codec Mode Selection and CQI Calculations
Atoll supports FR, HR, EFR, and AMR codec modes. A codec configuration contains codec mode adaptation thresholds
and quality graphs for circuit quality indicators. Atoll has the following circuit quality indicators included by default:
FER or Frame Erasure Rate: The number of frames in error divided by the total number of frames. These frames
are usually discarded, in which case this can be called the Frame Erasure Rate.
BER or Bit Error Rate: BER is a measurement of the raw bit error rate in reception before the decoding process
begins. Any factor that impacts the decoding performance, such as frequency hopping, will impact the correlation
between BER and FER, or the perceived end-user voice quality.
MOS or Mean Opinion Score: Voice quality can be quantified using mean opinion score (MOS). MOS values can
only be measured in a test laboratory environment. MOS values range from 1 (bad) to 5 (excellent). Different voice
codecs have slightly different FER to MOS correlation since the smaller the voice codec bit rate is, the more
sensitive it becomes to frame erasures.
The default codec configurations in Atoll include default FER, BER, and MOS quality graphs with respect to the carrier to
interference ratio, and codec mode adaptation thresholds (calculated from the FER vs. C/I graphs for all codec modes at
5 % FER).
Forsk 2010 AT283_TRG_E2 151
Chapter 5: GSM GPRS EDGE Networks
Figure 5.1FER vs. C/I Graphs
Figure 5.2BER vs. C/I Graphs
Figure 5.3MOS vs. C/I Graphs
152 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.4.1 Circuit Quality Indicator Calculations
Circuit quality indicator calculations include codec mode selection and CQI calculation. Codec modes may be selected
using ideal link adaptation or without it. Once codec modes have been selected, CQI corresponding to these codec modes
are determined from the look-up tables.
The following sections describe the two categories of calculations, i.e., with and without ideal link adaptations. Ideal link
adaptation implies that the selected codec mode corresponds to the best value of the reference CQI under the given radio
conditions. Without ideal link adaptation, the codec mode is selected based on the codec adaptation thresholds.
CQI calculations may be based on C/N or on C/(I+N). For calculating the noise, either the noise figure defined for the
calculations or that of the selected terminal type is used.
Different codec configurations may be defined for transmitter and terminals. In this case, Atoll only selects the codec
modes that are common in the two. If no terminal type is defined for the calculation, or if the terminal type does not have
any codec configuration assigned to it, Atoll only uses the codec configuration of the transmitter. Similarly, if a transmitter
does not have any codec configuration assigned to it, Atoll only uses the codec configuration of the terminal type. If both
the transmitter and the terminal type do not have any codec configuration assigned to them, no codec mode selection and
CQI calculation is carried out.
If more than one codec modes satisfy the C/N or C/I conditions, Atoll selects the higher priority codec mode.
In the following calculations, we assume that:
is the signal level received from the selected TRX type (tt) or on all the TRXs of Txi on each pixel of
the Txi coverage area,
CM is the set of all available codec modes,
are the values of adaptation thresholds for the codec modes available in the codec
configuration,
The computed noise is compared to the codec configuration reference noise . If the values are the same,
the defined graphs are used as is, otherwise the graphs are downshifted by the difference .
When the calculations are based on C/(I+N):
Atoll calculates the carrier-to-interference ratio for all the TBC transmitters with codec configurations assigned,
but takes into account all the TBC transmitters (with and without codec configurations) to evaluate the interference.
For more information on interference (I) calculation, see "Carrier-to-Interference Ratio Calculation" on page 138.
Ideal link adaptation for circuit quality indicator studies is defined at the codec configuration level. If the ideal link adaptation
option is checked, Atoll will select the codec mode, for the transmitter under study, according to the codec quality graphs
(CQI = f(C/N) and CQI = f(C/I)) related to the defined reference CQI, which may be different from the CQI being calculated.
Otherwise, Atoll will use the adaptation thresholds defined in the Adaptation Thresholds tab to determine the codec mode
to be used in the studies.
5.4.2 CQI Calculation Without Ideal Link Adaptation
5.4.2.1 Calculations Based on C/N
Atoll selects the highest priority codec mode, cm, from among the codec modes available in the codec configuration:
For each TRX type, tt,
For , Atoll determines the CQI from the CQI=f(C/N) graph associated to the selected codec mode, cm.
5.4.2.2 Calculations Based on C/(I+N)
Atoll selects the highest priority codec mode, cm, from among the codec modes available in the codec configuration:
References:
The graphs are based on:
[1] T. Halonen, J. Romero, J. Melero; GSM, GPRS and EDGE performance Evolution towards 3G/UMTS, John Wiley
and Sons Ltd.
[2] J. Wigard, P. Mogensen; A simple mapping from C/I to FER and BER for a GSM type of air interface.
[3] 3GPP Specifications TR 26.975 V6.0.0; Performance characterization of the Adaptive Multi-Rate (AMR) speech
codec (Release 6)
P
rec
Txi
TRX ( )
Adaptati on Threshold ( )
CM
N N
Ref
N N
Ref

cm Highest Priority CM
P
rec
Txi
TRX ( )
N
------------------------------ Adaptati on Threshold ( )
CM
> \ .
|
|
| |
=
P
rec
Txi
TRX ( )
N
-----------------------------
Forsk 2010 AT283_TRG_E2 153
Chapter 5: GSM GPRS EDGE Networks
For each TRX type, tt,
For , Atoll determines the CQI from the CQI=f(C/I) graph associated to the selected codec mode, cm.
5.4.3 CQI Calculation With Ideal Link Adaptation
5.4.3.1 Calculations Based on C/N
Ideal link adaptation is used by a codec configuration according to a defined reference CQI (MOS by default).
Atoll calculates signal level received from Txi on each pixel of Txi coverage area and converts it into C/N values as
described earlier. Then, Atoll filters all the codec modes that satisfy the C/N criterion (defined by the CQI = f(C/N) graphs
for the reference CQI) and are common between the transmitter and the terminal type codec configuration.
The selected codec mode among these filtered codec modes will be,
For each TRX type, tt, , for MOS
Or, , for BER and FER
Where, cm is the codec mode with the highest priority among the set of codec modes CM for which the reference CQI
gives the highest or the lowest value at the received C/N level, .
If more than one codec mode graphs give the same value for reference CQI, then Atoll selects the codec mode with the
highest priority.
From the CQI = f(C/N) graph associated to the selected codec mode cm, Atoll evaluates the CQI for which the study was
performed corresponding to for the selected codec mode.
5.4.3.2 Calculations Based on C/(I+N)
Ideal link adaptation is used by a codec configuration according to a defined reference CQI (MOS by default).
Atoll calculates the C/I level received from the transmitter on each pixel of Txi coverage area, for each TRX and converts
it into C/(I+N). Then, Atoll filters all the codec modes that satisfy the C/(I+N) criteria (defined by the CQI = f(C/I) graphs
for the reference CQI) and are common between the transmitter and the terminal type codec configuration.
The selected codec mode among these filtered codec modes will be,
For each TRX type, tt, , for MOS
Or, , for BER and FER
Where, cm is the codec mode with the highest priority among the set of codec modes CM for which the reference CQI
gives the highest or the lowest value at the received C/(I+N) level, .
If more than one codec mode graphs give the same value for reference CQI, then Atoll selects the codec mode with the
highest priority.
From the CQI = f(C/I) graph associated to the selected codec mode cm (indexed with the C/(I+N) values), Atoll evaluates
the CQI for which the study was performed corresponding to for the selected codec mode.
cm Highest Priority CM
P
rec
Txi
TRX ( )
I N +
------------------------------ Adaptati on Threshold ( )
CM
> \ .
|
|
| |
=
P
rec
Txi
TRX ( )
I N +
-----------------------------
cm Highest Priority CM
CQI
Ref
Hi ghest CQI=f
C
N
---- =
P
rec
Txi
TRX ( )
N
t ot
------------------------------
\ .
|
| |
\ .
|
| |
=
\ .
|
|
|
| |
=
cm Highest Priority CM
CQI
Ref
Lowest CQI=f
C
N
----=
P
rec
Txi
TRX ( )
N
t ot
------------------------------
\ .
|
| |
\ .
|
| |
=
\ .
|
|
|
| |
=
P
rec
Txi
TRX ( )
N
tot
-----------------------------
P
rec
Txi
TRX ( )
N
tot
-----------------------------
cm Highest Priority CM
CQI
Ref
Hi ghest CQI=f
C
I
---- =
P
rec
Txi
TRX ( )
I N
t ot
+
------------------------------
\ .
|
| |
\ .
|
| |
=
\ .
|
|
|
| |
=
cm Highest Priority CM
CQI
Ref
Lowest CQI=f
C
I
----=
P
rec
Txi
TRX ( )
I N
t ot
+
------------------------------
\ .
|
| |
\ .
|
| |
=
\ .
|
|
|
| |
=
P
rec
Txi
TRX ( )
I N +
tot
-----------------------------
P
rec
Txi
TRX ( )
I N +
tot
-----------------------------
154 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.4.4 Circuit Quality Indicators Coverage Predictions
The Circuit Quality Indicators coverage predictions show the areas BER, FER, and MOS values in the transmitter coverage
areas.
For each TBC transmitter, Txi, Atoll calculates the selected parameter on each pixel inside the Txi calculation area. In
other words, each pixel inside the Txi calculation area is considered a probe (non-interfering) receiver.
Coverage prediction parameters to be set are:
The coverage conditions in order to determine the service area of each TBC transmitter,
The interference and quality indicator conditions to meet for a pixel to be covered, and
The display settings to select the displayed parameter and its shading levels.
The thermal noise (N = -121 dBm, by default) is used in the calculations if the coverage prediction is based on C/(I+N).
This value can be modified by the user.
5.4.4.1 Service Area Determination
Atoll uses parameters entered in the Condition tab of the coverage prediction properties dialogue to determine the areas
where coverage will be displayed.
We can distinguish seven cases as below. Let us assume that:
Each transmitter, Txi, belongs to a Hierarchical Cell Structure (HCS) layer, k, with a defined priority and a defined
reception threshold.
Each transmitter, Txi, has a codec configuration assigned.
No max range is set.
5.4.4.1.1 All Servers
The service area of Txi corresponds to the pixels where:
5.4.4.1.2 Best Signal Level and a Margin
The service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.4.4.1.3 Second Best Signal Level and a Margin
The service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the second highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the second highest or within
a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 3
rd
best servers.
5.4.4.1.4 Best Signal Level per HCS Layer and a Margin
For each HCS layer, k, the service area of Txi corresponds to the pixels where:
And
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
P
rec
Txi
BCCH ( )
2
nd
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
Forsk 2010 AT283_TRG_E2 155
Chapter 5: GSM GPRS EDGE Networks
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.4.4.1.5 Second Best Signal Level per HCS Layer and a Margin
For each HCS layer, k, the service area of Txi corresponds to the pixels where:
And
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the second highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the second highest or within
a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 3
rd
best servers.
5.4.4.1.6 HCS Servers and a Margin
The service area of Txi corresponds to the pixels where:
And
And the received exceeds the reception threshold defined per HCS layer.
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
5.4.4.1.7 Highest Priority HCS Server and a Margin
The service area of Txi corresponds to the pixels where:
And
And Txi belongs to the HCS layer with the highest priority. The highest priority is defined by the priority field (0: lowest).
And the received exceeds the reception threshold defined per HCS layer.
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received signal level from Txi is the highest.
If M = 2 dB, Atoll considers pixels where the received signal level from Txi is either the highest or within a 2 dB
margin from the highest.
If M = -2 dB, Atoll considers pixels where the received signal level from Txi is 2 dB higher than the signal levels
from transmitters which are 2
nd
best servers.
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
P
rec
Txi
BCCH ( )
2
nd
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
P
rec
Txi
BCCH ( )
Note:
In the case two layers have the same priority, the traffic is served by the transmitter for
which the difference between the received signal strength and the HCS threshold is the
highest. The way the competition is managed between layers with the same priority can be
modified. For more information, see the Administrator Manual.
SubcellReceptionThreshold P
rec
Txi
BCCH ( ) s
P
rec
Txi
BCCH ( )
Best
j i =
P
rec
Txj
BCCH ( ) ( ) M >
P
rec
Txi
BCCH ( )
156 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.4.4.2 Coverage Display
5.4.4.2.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
5.4.4.2.2 Display Types
It is possible to display the coverage predictions with colours depending on criteria such as:
BER
Only the pixels with a codec mode assigned are coloured. The pixel colour depends on the BER value. Coverage consists
of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter
coverage areas and BER display thresholds. Each layer shows the BER in the transmitter coverage area.
FER
Only the pixels with a codec mode assigned are coloured. The pixel colour depends on the FER value. Coverage consists
of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter
coverage areas and FER display thresholds. Each layer shows the FER in the transmitter coverage area.
MOS
Only the pixels with a codec mode assigned are coloured. The pixel colour depends on the MOS value. Coverage consists
of several independent layers whose visibility in the map window can be managed. There are as many layers as transmitter
coverage areas and MOS display thresholds. Each layer shows the MOS in the transmitter coverage area.
Max BER
Only the pixels with a codec mode assigned are coloured. The pixel colour depends on the highest BER value among the
BER values for all the transmitters covering the pixel. Coverage consists of several independent layers whose visibility in
the map window can be managed. There are as many layers as BER display thresholds. Each layer shows the BER value.
Max FER
Only the pixels with a codec mode assigned are coloured. The pixel colour depends on the highest FER value among the
FER values for all the transmitters covering the pixel. Coverage consists of several independent layers whose visibility in
the map window can be managed. There are as many layers as FER display thresholds. Each layer shows the FER value.
Max MOS
Only the pixels with a codec mode assigned are coloured. The pixel colour depends on the highest MOS value among the
MOS values for all the transmitters covering the pixel. Coverage consists of several independent layers whose visibility in
the map window can be managed. There are as many layers as MOS display thresholds. Each layer shows the MOS
value.
5.5 Traffic Analysis
When starting a traffic analysis, Atoll distributes the traffic from maps to transmitters of each layer according to the
compatibility criteria defined in the transmitter, services, mobility type, terminal type properties. Transmitters considered
in traffic analysis are the active and filtered transmitters that belong to the focus zone.
5.5.1 Traffic Distribution
5.5.1.1 Normal Cells (Nonconcentric, No HCS Layer)
5.5.1.1.1 Circuit Switched Services
A user with a given circuit switched service, c, a terminal, t, and a mobility type, m, will be distributed to the BCCH and
TCH subcells of a transmitter if:
The terminal, t, works on the frequency band used by the BCCH subcell,
Notes:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
For details of the average timeslot capacity calculation, see the Network Dimensioning
section (calculation of minimum reduction factor).
Forsk 2010 AT283_TRG_E2 157
Chapter 5: GSM GPRS EDGE Networks
The terminal, t, works on the frequency band used by the TCH subcell.
5.5.1.1.2 Packet Switched Services
A user with a given packet switched service, p, a terminal, t, and a mobility type, m, will be distributed to the BCCH and
TCH subcells of a transmitter if:
The transmitter is an GPRS/EDGE station (option specified in the transmitter property dialog),
The terminal, t, is technologically compatible with the transmitter,
The terminal, t, works on the frequency band used by the BCCH subcell,
The terminal, t, works on the frequency band used by the TCH subcell.
5.5.1.2 Concentric Cells
In case of concentric cells, TCH_INNER TRX type has the highest priority to carry traffic.
5.5.1.2.1 Circuit Switched Services
A user with a given circuit switched service, c, a terminal, t, and a mobility type, m, will be distributed to the TCH_INNER,
BCCH and TCH subcells of a transmitter if:
The terminal, t, works on the frequency band used by the BCCH subcell,
The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells.
5.5.1.2.2 Packet Switched Services
A user with a given packet switched service, p, a terminal, t, and a mobility type, m, will be distributed to the TCH_INNER,
BCCH and TCH subcells of a transmitter if:
The transmitter is an GPRS/EDGE station (option specified in the transmitter property dialog),
The terminal, t, is technologically compatible with the transmitter,
The terminal, t, works on the frequency band used by the BCCH subcell,
The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells.
5.5.1.3 HCS Layers
For each HCS layer, k, you may specify the maximum mobile speed supported by the transmitters of the layer.
5.5.1.3.1 Circuit Switched Services
A user with a given circuit switched service, c, a terminal, t, and a mobility type, m, will be distributed to the BCCH and
TCH subcells (and TCH_INNER in case of concentric cells) of a transmitter if:
The terminal, t, works on the frequency band used by the BCCH subcell,
The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells,
The users mobility, m, is less than the maximum speed supported by the layer, k.
5.5.1.3.2 Packet Switched Services
A user with a given packet switched service, p, a terminal, t, and a mobility type, m, will be distributed to the BCCH and
TCH subcells (and TCH_INNER in case of concentric cells) of a transmitter if:
The transmitter is an GPRS/EDGE station (option specified in the transmitter property dialog),
The terminal, t, is technologically compatible with the transmitter,
The terminal, t, works on the frequency band used by the BCCH subcell,
The terminal, t, works on the frequency band(s) used by the TCH_INNER and TCH subcells,
The user mobility, m, is less than the maximum speed supported by the layer, k.
5.5.2 Calculation of the Traffic Demand per Subcell
Here we assume that:
Users considered for evaluating the traffic demand fulfil the compatibility criteria defined in the transmitter,
services, mobility, terminal properties as explained above.
Atoll distributes traffic on subcell service areas, which are determined using the option Best signal level per HCS
layer with a 0dB margin and the subcell reception threshold as lower threshold.
Same traffic is distributed to the BCCH and TCH subcells.
5.5.2.1 User Profile Traffic Maps
5.5.2.1.1 Normal Cells (Nonconcentric, No HCS Layer)
Number of subscribers ( ) for each TCH subcell (Txi, TCH), per user profile up with a given mobility m, is inferred as:
Where S
up,m
is the TCH service area containing the user profile up with the mobility m and D is the user profile density.
X
up m ,
X
up m ,
Txi TCH , ( ) S
up m ,
Txi TCH , ( ) D =
158 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For each behaviour described in the user profile up, Atoll calculates the probability for the user to be connected with a
given service using a terminal t.
Circuit Switched Services
For a circuit switched service c, we have:
Where N
call
is the number of calls per hour and d is the average call duration (in seconds).
Then, Atoll evaluates the traffic demand, , in Erlangs for the subcell (Txi, TCH) service area.
Packet Switched Services (Max Rate)
For a max rate packet switched service p, we have:
Where N
call
is the number of calls per hour and V is the transmitted data volume per call (in Kbytes).
Then, Atoll evaluates the traffic demand, , in kbits/s for the subcell (Txi, TCH) service area.
Packet Switched Services (Constant Bit Rate)
For a constant bit packet switched service p, we have:
Where N
call
is the number of calls per hour and d is the average call duration (in seconds).
Then, Atoll evaluates the traffic demand, , in kbits/s for the subcell (Txi, TCH) service area.
5.5.2.1.2 Concentric Cells
In case of concentric cells, Atoll distributes a part of traffic on the TCH_INNER service area (TCH_INNER is the highest
priority traffic carrier) and the remaining traffic on the outer ring served by the TCH subcell. The traffic spread over the
TCH_INNER subcell may overflow to the TCH subcell. In this case, the traffic demand is the same on the TCH_INNER
subcell but increases on the TCH subcell.
Number of subscribers ( ) for each TCH_INNER (Txi, TCH_INNER) and TCH (Txi, TCH) subcell, per user profile up
with a given mobility m, is inferred as:
and respectively refer to the TCH_INNER and TCH subcell service areas
containing the user profile up with the mobility m. D is the user profile density.
p
up c t , ( )
N
cal l
d
3600
---------------------- =
D
up c t , ( ) m ,
D
up c t , ( ) m ,
Txi TCH , ( ) X
up m ,
Txi TCH , ( ) p
up c t , ( )
=
p
up p t , ( )
N
cal l
V 8
3600
-------------------------------- =
D
up p t , ( ) m ,
D
up p t , ( ) m ,
Txi TCH , ( ) X
up m ,
Txi TCH , ( ) p
up p t , ( )
=
p
up p t , ( )
N
cal l
d
3600
---------------------- =
D
up p t , ( ) m ,
D
up p t , ( ) m ,
Txi TCH , ( ) X
up m ,
Txi TCH , ( ) p
up p t , ( )
=
Note:
Traffic overflowing from the TCH_INNER to the TCH is not uniformly spread over the TCH
service area. It is still located on the TCH_INNER service area.
Figure 5.4Representation of a Concentric Cell TXi
X
up m ,
X
up m ,
Txi,TCH_INNER ( ) S
up m ,
Txi,TCH_INNER ( ) D =
X
up m ,
Txi,TCH ( ) S
up m ,
Txi,TCH ( ) S
up m ,
Txi,TCH_INNER ( ) | | D =
S
up m ,
Txi,TCH_INNER ( ) S
up m ,
Txi,TCH ( )
Forsk 2010 AT283_TRG_E2 159
Chapter 5: GSM GPRS EDGE Networks
Circuit Switched Services
For each user of the user profile up using a circuit switched service c with a terminal t, Atoll calculates the probability
( ) of the user being connected. Calculations are detailed in "Circuit Switched Services" on page 156.
Then, Atoll evaluates the traffic demand, , in Erlangs in the (Txi, TCH_INNER) and (Txi, TCH) subcell service
areas.
Where is the maximum rate of traffic overflow (in %) specified for the TCH_INNER subcell.
Packet Switched Services (Max Rate)
For each user of the user profile up using a max rate packet switched service p with a terminal t, probability of the user
being connected ( ) is calculated as explained in "Packet Switched Services" on page 157.
Atoll evaluates the traffic demand, , in kbits/s in the (Txi, TCH_INNER) and (Txi, TCH) subcell service areas.
Where is the maximum rate of traffic overflow (in %) specified for the TCH_INNER subcell.
Packet Switched Services (Constant Bit Rate)
For each user of the user profile up using a constant bit packet switched service p with a terminal t, probability of the user
being connected ( ) is calculated as explained in "Packet Switched Services" on page 157.
Atoll evaluates the traffic demand, , in kbits/s in the (Txi, TCH_INNER) and (Txi, TCH) subcell service areas.
Where is the maximum rate of traffic overflow (in %) specified for the TCH_INNER subcell.
5.5.2.1.3 HCS Layers
We assume two HCS layers: the micro layer has a higher priority than the macro layer. Txi belongs to the micro layer and
Txj to the macro. The traffic contained in the input traffic map can be assigned to all the HCS layers.
Normal Cells
Atoll distributes traffic on the TCH service areas. The traffic capture is calculated with the option Best signal level per
HCS layer meaning that there is an overlap between HCS layers service areas. Let denote this
area (TCH service area of the macro layer overlapped by the TCH service area of the micro layer). Traffic on the
overlapping area is distributed to the TCH subcell of the micro layer because it has a higher priority. On this area, traffic
of the micro layer may overflow to the macro layer. In this case, the traffic demand is the same on the TCH subcell of the
micro layer but increases on the TCH subcell of the macro layer.
Atoll evaluates the traffic demand on the micro layer (higher priority) as explained above. For further details, please refer
to formulas for normal cells. Then, it proceeds with the macro layer (lower priority).
p
up c t , ( )
D
up c t , ( ) m ,
D
up c t , ( ) m ,
Txi,TCH_INNER ( ) X
up m ,
Txi,TCH_INNER ( ) p
up c t , ( )
=
D
up c t , ( ) m ,
Txi,TCH ( ) X
up m ,
Txi,TCH ( ) p
up c t , ( )
D
up c t , ( ) m ,
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) + =
O
max
Txi,TCH_INNER ( )
p
up p t , ( )
D
up p t , ( ) m ,
D
up p t , ( ) m ,
Txi,TCH_INNER ( ) X
up m ,
Txi,TCH_INNER ( ) p
up p t , ( )
=
D
up p t , ( ) m ,
Txi,TCH ( ) X
up m ,
Txi,TCH ( ) p
up p t , ( )
D
up p t , ( ) m ,
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) + =
O
max
Txi,TCH_INNER ( )
p
up p t , ( )
D
up p t , ( ) m ,
D
up p t , ( ) m ,
Txi,TCH_INNER ( ) X
up m ,
Txi,TCH_INNER ( ) p
up p t , ( )
=
D
up p t , ( ) m ,
Txi,TCH ( ) X
up m ,
Txi,TCH ( ) p
up p t , ( )
D
up p t , ( ) m ,
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) + =
O
max
Txi,TCH_INNER ( )
Note:
Traffic overflowing to the macro layer is not uniformly spread over the TCH service area of
Txj. It is only located on the overlapping area.
Figure 5.5Representation of Micro and Macro Layers
S
overl appi ng
macro
Txj TCH , ( )
160 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Number of subscribers ( ) for each TCH subcell (Txj, TCH) of the macro layer, per user profile up with the mobility
m, is inferred as:
Where is the TCH service area of Txj containing the user profile up with the mobility m and D is the
profile density.
For each user described in the user profile up with the circuit switched service c and the terminal t, the probability for the
user being connected ( ) is calculated as explained in "Circuit Switched Services" on page 156.
Then, Atoll evaluates the traffic demand, , in Erlangs in the subcell (Txj, TCH) service area.
For each user described in the user profile up with the packet switched service p and the terminal t, probability for the user
to be connected ( ) is calculated as explained in "Packet Switched Services" on page 157.
Then, Atoll evaluates the traffic demand, , in kbits/s in the subcell (Txj, TCH) service area.
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi (micro
layer) and is the TCH service area of Txi containing the user profile up with the mobility m.
Concentric Cells
Atoll evaluates the traffic demand on the micro layer (higher priority HCS layer) as explained above. For further details,
please refer to formulas given in case of concentric cells. Then, it proceeds with the macro layer (lower priority HCS layer).
The traffic capture is calculated with the option Best signal level per HCS layer. It means that there are overlapping areas
between HCS layers where traffic is spread according to the layer priority. On these areas, traffic of the higher priority layer
may overflow.
The TCH_INNER service area of the macro layer is overlapped by the micro layer. This area consists of two parts: an area
overlapped by the TCH service area of the micro layer and another overlapped
by the TCH_INNER service area of the micro layer .
Let us consider three areas, S
1
, S
2
and S
3
.
Figure 5.6Concentric Cells
X
up m ,
macro
X
up m ,
macro
Txj TCH , ( ) S
up m ,
macro
Txj TCH , ( ) S
up m , overl appi ng
macro
Txj TCH , ( ) | | D =
S
up m ,
macro
Txj TCH , ( )
p
up c t , ( )
D
up c t , ( ) m ,
macro
D
up c t , ( ) m ,
macro
Txj TCH , ( ) X
up m ,
macro
Txj TCH , ( ) p
up c t , ( )
D
up c t , ( ) m ,
mi cro
Txi TCH , ( )
S
up m , overl appi ng
macro
Txj TCH , ( )
S
up m ,
mi cro
Txi TCH , ( )
--------------------------------------------------------------------------- O
max
Txi TCH , ( ) + =
p
up p t , ( )
D
up p t , ( ) m ,
macro
D
up p t , ( ) m ,
macro
Txj TCH , ( ) X
up m ,
macro
Txj TCH , ( ) p
up p t , ( )
D
up p t , ( ) m ,
mi cro
Txi TCH , ( )
S
up m , overl appi ng
macro
Txj TCH , ( )
S
up m ,
mi cro
Txi TCH , ( )
--------------------------------------------------------------------------- O
max
Txi TCH , ( ) + =
O
max
Txi TCH , ( )
S
up m ,
mi cro
Txi TCH , ( )
S
overl appi ng Txi TCH , ( )
macro
Txj,TCH_INNER ( )
S
overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH_INNER ( )
S
1
S
up m ,
macro
Txj,TCH_INNER ( ) S
up m , overl appi ng Txi TCH , ( )
macro
Txj,TCH_INNER ( ) =
S
2
S
up m , overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH_INNER ( ) =
S
3
S
up m , overl appi ng Txi TCH , ( )
macro
Txj,TCH_INNER ( ) S
2
=
Forsk 2010 AT283_TRG_E2 161
Chapter 5: GSM GPRS EDGE Networks
Where is the TCH_INNER subcell service area of Txj containing the user profile up with the
mobility m. We only consider the overlapping areas containing the user profile up with the mobility m.
On S
1
, the number of subscribers per user profile up with a given mobility m ( ) is inferred:
Where D is the user profile density.
The traffic spread over the TCH_INNER service area of the micro layer may overflow on the TCH subcell. The traffic
overflowing to the TCH subcell is located on the TCH_INNER service area. On S
2
, the TCH subcell traffic coming from the
TCH_INNER subcell traffic overflow may overflow proportional to R
2
.
The traffic spread over the ring served by the TCH subcell of the micro layer only may overflow on S
3
proportional to R
3
.
Where and are the TCH and TCH_INNER service areas of Txi respectively
containing the user profile up with the mobility m.
For each user described in the user profile up with a circuit switched service c and a terminal t, the probability for the user
being connected ( ) is calculated as explained in "Circuit Switched Services" on page 156. Then, Atoll evaluates
the traffic demand, , in Erlangs in the subcell (Txj, TCH_INNER) service area.
For each user described in the user profile up with a packet switched service p and a terminal t, probability for the user to
be connected ( ) is calculated as explained in "Packet Switched Services" on page 157.
Then, Atoll evaluates the traffic demand, , stated in kbits/s in the subcell (Txj, TCH_INNER) service area.
Where and are the maximum rates of traffic overflow (stated in %) specified
for the TCH and TCH_INNER subcells of Txi respectively.
The area of the TCH ring of the macro layer is overlapped by the micro layer. There are two parts: an area overlapped by
the TCH service area of the micro layer and another one by the
TCH_INNER service area of the micro layer .
Let us consider three areas, S
1
, S
2
and S
3
.
Where and are the TCH and TCH_INNER subcell service areas of Txj
respectively. We only consider the overlapping areas containing the user profile up with the mobility m.
On S
1
, the number of subscribers per user profile up with a given mobility m ( ) is inferred:
Where D is the user profile density.
S
up m ,
macro
Txj,TCH_INNER ( )
X
up m ,
macro
X
up m ,
macro
Txj,TCH_INNER ( ) S
1
D =
R
2
S
2
S
up m ,
mi cro
Txi,TCH_INNER ( )
----------------------------------------------------------------- =
R
3
S
3
S
up m ,
mi cro
Txi,TCH ( ) S
up m ,
mi cro
Txi,TCH_INNER ( )
------------------------------------------------------------------------------------------------------------------- =
S
up m ,
mi cro
Txi,TCH ( ) S
up m ,
mi cro
Txi,TCH_INNER ( )
p
up c t , ( )
D
up c t , ( ) m ,
macro
D
up c t , ( ) m ,
macro
Txj,TCH_INNER ( )
X
up m ,
macro
Txj,TCH_INNER ( ) p
up c t , ( )
+
R
2
D
up c t , ( ) m ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi,TCH ( ) +
R
3
X
up m ,
mi cro
Txi TCH , ( ) p
up c t , ( )
O
max
Txi TCH , ( )
=
p
up p t , ( )
D
up p t , ( ) m ,
macro
D
up p t , ( ) m ,
macro
Txj,TCH_INNER ( )
X
up m ,
macro
Txj,TCH_INNER ( ) p
up p t , ( )
+
R
2
D
up p t , ( ) m ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi,TCH ( ) +
R
3
X
up m ,
mi cro
Txi TCH , ( ) p
up p t , ( )
O
max
Txi TCH , ( )
=
O
max
Txi TCH , ( ) O
max
Txi,TCH_INNER ( )
S
overl appi ng Txi TCH , ( )
macro
Txj,TCH -- TCH_INNER ( )
S
overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH -- TCH_INNER ( )
S'
1
S
up m ,
macro
Txj,TCH ( ) S
up m ,
macro
Txj,TCH_INNER ( ) S
up m , overl appi ng Txi TCH , ( )
macro
Txj,TCH -- TCH_INNER ( ) =
S'
2
S
up m , overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH -- TCH_INNER ( ) =
S'
3
S
up m , overl appi ng Txi TCH , ( )
macro
Txj,TCH -- TCH_INNER ( ) S'
2
=
S
up m ,
macro
Txj,TCH ( ) S
up m ,
macro
Txj,TCH_INNER ( )
X
up m ,
macro
X
up m ,
macro
Txj,TCH ( ) S'
1
D =
162 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The traffic spread over the TCH_INNER service area of the micro layer may overflow on the TCH subcell. The traffic
overflowing on the TCH subcell is located on the TCH_INNER service area. On S
2
, the TCH subcell traffic coming from
the TCH_INNER subcell traffic overflow may overflow proportionally to R
2
.
The traffic spread over the ring served by the TCH subcell of the micro layer only may overflow on S
3
proportional to R
3
.
Where and are the TCH and TCH_INNER service areas of Txi respectively
containing the user profile up with the mobility m.
For each user described in the user profile up with a circuit switched service c and a terminal t, the probability for the user
being connected ( ) is calculated as explained in "Circuit Switched Services" on page 156.
Then, Atoll evaluates the traffic demand, , in Erlangs in the subcell (Txj, TCH) service area.
For each user described in the user profile up with a packet switched service p and a terminal t, the probability for the user
being connected ( ) is calculated as explained in "Packet Switched Services" on page 157.
Then, Atoll evaluates the traffic demand, , in kbits/s in the subcell (Txj, TCH) service area.
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi (micro
layer), the maximum rate of traffic overflow indicated for the TCH_INNER subcell of Txi (macro
layer), the maximum rate of traffic overflow indicated for the TCH_INNER subcell of Txj (macro
layer) and the number of subscribers with the user profile up and mobility m on the TCH service area
of Txi (as explained in "Concentric Cells" on page 157).
5.5.2.2 Sector Traffic Maps
We assume that the traffic map is built from a coverage by transmitter prediction calculated for the TCH subcells with
options:
HCS Servers and no margin if the network only consists of normal cells and concentric cells,
Highest Priority HCS Server and no margin in case of HCS layers.
When creating the traffic map, you have to specify the traffic demand per transmitter and per service (throughput for a max
rate packet switched service and Erlangs for a circuit switched or constant bit rate packet switched service) and the global
distribution of terminals and mobility types.
Let denote the Erlangs for the circuit switched service, c, on the TCH subcell of Txi.
Let denote the throughput of the packet switched service (Max Bit Rate), p, on the TCH subcell of Txi.
Let denote the Erlangs for the packet switched service (Constant Bit Rate), p, on the TCH subcell of Txi.
We assume that 100% of users have the terminal, t, and the mobility type, m.
5.5.2.2.1 Normal Cells (Nonconcentric, No HCS Layer)
For each circuit switched service, c, Atoll evaluates the traffic demand, D
c,t,m
, in Erlangs in the subcell (Txi, TCH) service
area.
R'
2
S'
2
S
up m ,
mi cro
Txi,TCH_INNER ( )
----------------------------------------------------------------- =
R'
3
S'
3
S
up m ,
mi cro
Txi,TCH ( ) S
up m ,
mi cro
Txi,TCH_INNER ( )
------------------------------------------------------------------------------------------------------------------- =
S
up m ,
mi cro
Txi,TCH ( ) S
up m ,
mi cro
Txi,TCH_INNER ( )
p
up c t , ( )
D
up c t , ( ) m ,
macro
D
up c t , ( ) m ,
macro
Txj TCH , ( )
X
up m ,
macro
Txj TCH , ( ) p
up c t , ( )
+
D
up c t , ( ) m ,
macro
Txj,TCH_INNER ( ) O
max
Txj,TCH_INNER ( ) +
R'
2
D
up c t , ( ) m ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi,TCH ( ) +
R'
3
X
up m ,
mi cro
Txi TCH , ( ) p
up c t , ( ) m ,
O
max
Txi TCH , ( )
=
p
up p t , ( )
D
up p t , ( ) m ,
macro
D
up p t , ( ) m ,
macro
Txj TCH , ( )
X
up m ,
macro
Txj TCH , ( ) p
up p t , ( )
+
D
up p t , ( ) m ,
macro
Txj,TCH_INNER ( ) O
max
Txj,TCH_INNER ( ) +
R'
2
D
up p t , ( ) m ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi,TCH ( ) +
R'
3
X
up m ,
mi cro
Txi TCH , ( ) p
up p t , ( ) m ,
O
max
Txi TCH , ( )
=
O
max
Txi,TCH ( )
O
max
Txi,TCH_INNER ( )
O
max
Txj,TCH_INNER ( )
X
up m ,
mi cro
Txi TCH , ( )
E
c
Txi TCH , ( )
T
p
Txi TCH , ( )
E
p
Txi TCH , ( )
D
c t m , ,
Txi TCH , ( ) E
c
Txi TCH , ( ) =
Forsk 2010 AT283_TRG_E2 163
Chapter 5: GSM GPRS EDGE Networks
For each packet switched service (Max Bit Rate), p, Atoll evaluates the traffic demand, D
p,t,m
, in kbits/s in the subcell (Txi,
TCH) service area.
For each packet switched service (Constant Bit Rate), p, Atoll evaluates the traffic demand, D
p,t,m
, in kbits/s in the subcell
(Txi, TCH) service area.
where is the guaranteed bit rate of the constant bit rate packet switched service p.
5.5.2.2.2 Concentric Cells
In case of concentric cells, Atoll distributes a part of traffic on the TCH_INNER service area (TCH_INNER is the highest
priority traffic carrier) and the remaining traffic, on the ring served by the TCH subcell only. The traffic spread over the
TCH_INNER subcell may overflow to the TCH subcell. In this case, the traffic demand is the same on the TCH_INNER
subcell and rises on the TCH subcell.
For each circuit switched service, c, Atoll evaluates the traffic demand, D
c,t,m
, in Erlangs in the subcell, (Txi, TCH_INNER)
and (Txi, TCH), service areas.
and
For each packet switched service (Max Bit Rate), p, Atoll evaluates the traffic demand, D
p,t,m
, in kbits/s in the subcell,
(Txi, TCH_INNER) and (Txi, TCH), service areas.
and
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell,
and are the TCH and TCH_INNER service areas of Txi respectively.
For each packet switched service (Constant Bit Rate), p, Atoll evaluates the traffic demand, D
p,t,m
, in kbits/s in the subcell,
(Txi, TCH_INNER) and (Txi, TCH), service areas.
and
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell,
and are the TCH and TCH_INNER service areas of Txi respectively.
5.5.2.2.3 HCS Layers
We assume we have two HCS layers: the micro layer has a higher priority and the macro layer has a lower one. Txi belongs
to the micro layer and Txj to the macro one. The traffic contained in the input traffic map can be assigned to all the HCS
layers.
Normal Cells
Atoll distributes traffic on the TCH service areas. The traffic capture is calculated with the option HCS Servers. It means
that there is an overlapping area between HCS layers. Let denote the TCH service area of the
macro layer overlapped by the TCH service area of the micro layer. Traffic on the overlapping area is distributed to the
D
p t m , ,
Txi TCH , ( ) T
p
Txi TCH , ( ) =
D
p t m , ,
Txi TCH , ( ) E
p
Txi TCH , ( ) TP
p GBR ,
=
TP
p GBR ,
Note:
Traffic overflowing from the TCH_INNER to the TCH is not uniformly spread over the TCH
service area. It is only located on the TCH_INNER service area.
D
c t m , ,
Txi,TCH_INNER ( )
S Txi,TCH_INNER ( )
S Txi TCH , ( )
----------------------------------------------------- E
c
Txi TCH , ( ) =
D
c t m , ,
Txi,TCH ( )
S Txi,TCH ( ) S Txi,TCH_INNER ( ) ( )
S Txi TCH , ( )
----------------------------------------------------------------------------------------------- E
c
Txi TCH , ( ) +
D
c t m , ,
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( )
=
D
p t m , ,
Txi,TCH_INNER ( )
S Txi,TCH_INNER ( )
S Txi TCH , ( )
----------------------------------------------------- T
p
Txi TCH , ( ) =
D
p t m , ,
Txi,TCH ( )
S Txi,TCH ( ) S Txi,TCH_INNER ( ) ( )
S Txi TCH , ( )
----------------------------------------------------------------------------------------------- T
p
Txi TCH , ( ) +
D
p t m , ,
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( )
=
O
max
Txi,TCH_INNER ( )
S Txi,TCH ( ) S Txi,TCH_INNER ( )
D
p t m , ,
Txi,TCH_INNER ( )
S Txi,TCH_INNER ( )
S Txi TCH , ( )
----------------------------------------------------- E
p
Txi TCH , ( ) TP
p GBR ,
=
D
p t m , ,
Txi,TCH ( )
S Txi,TCH ( ) S Txi,TCH_INNER ( ) ( )
S Txi TCH , ( )
----------------------------------------------------------------------------------------------- E
p
Txi TCH , ( ) TP
p GBR ,
+
D
p t m , ,
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( )
=
O
max
Txi,TCH_INNER ( )
S Txi,TCH ( ) S Txi,TCH_INNER ( )
S
overl appi ng
macro
Txj TCH , ( )
164 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
TCH subcell of the micro layer (higher priority layer). On this area, traffic of the micro layer may overflow to the macro layer.
In this case, the traffic demand is the same on the TCH subcell of the micro layer but rises on the TCH subcell of the macro
layer.
Atoll starts evaluating the traffic demand on the micro layer (highest priority HCS layer).
For each circuit switched service, c, Atoll calculates the traffic demand, , in Erlangs in the subcell (Txi, TCH) service
area.
For each packet switched service (Max Bit Rate), p, Atoll calculates the traffic demand, , in kbits/s in the subcell
(Txi, TCH) service area.
For each packet switched service (Constant Bit Rate), p, Atoll calculates the traffic demand, , in kbits/s in the
subcell (Txi, TCH) service area.
Then, Atoll proceeds with the macro layer (lower priority HCS layer).
For each circuit switched service, c, Atoll calculates the traffic demand, , in Erlangs in the subcell (Txj, TCH) service
area.
For each packet switched service (Max Bit Rate), p, Atoll calculates the traffic demand, , in kbits/s in the subcell
(Txj, TCH) service area.
Where is the maximum rate of traffic overflow (in %) specified for the TCH subcell of Txi (micro cell) and
the TCH service area of Txi.
For each packet switched service (Constant Bit Rate), p, Atoll calculates the traffic demand, , in kbits/s in the
subcell (Txj, TCH) service area.
Where is the maximum rate of traffic overflow (in %) specified for the TCH subcell of Txi (micro cell) and
the TCH service area of Txi.
Concentric Cells
Atoll evaluates the traffic demand on the micro layer as explained above in case of concentric cells and then proceeds
with the macro layer (lower priority layer).
The traffic capture is calculated with the option HCS Servers. It means that there is overlapping areas between HCS
layers where traffic is spread over according to the layer priority. On these areas, traffic of the higher priority layer may
overflow.
Note:
Traffic overflowing on the macro layer is not uniformly spread over the TCH service area of
Txj. It is only located on the overlapping area.
Note:
You can restrict the traffic assignement of each traffic map to a specific HCS layer in the
running options of the traffic capture. If you do so, no overflow occurs between HCS layers
and the only overflow which is considered occurs within concentric cells (See "Concentric
Cells" on page 157).
D
c t m , ,
mi cro
D
c t m , ,
mi cro
Txi TCH , ( ) E
c
Txi TCH , ( ) =
D
p t m , ,
mi cro
D
p t m , ,
mi cro
Txi TCH , ( ) T
p
Txi TCH , ( ) =
D
p t m , ,
mi cro
D
p t m , ,
mi cro
Txi TCH , ( ) E
p
Txi TCH , ( ) TP
p GBR ,
=
D
c t m , ,
macro
D
c t m , ,
macro
Txj TCH , ( ) E
c
Txj TCH , ( ) D
c t m , ,
mi cro
Txi TCH , ( )
S
overl appi ng
macro
Txj TCH , ( )
S
mi cro
Txi TCH , ( )
------------------------------------------------------------- O
max
Txi TCH , ( ) + =
D
p t m , ,
macro
D
p t m , ,
macro
Txj TCH , ( ) T
p
Txj TCH , ( ) D
p t m , ,
mi cro
Txi TCH , ( )
S
overl appi ng
macro
Txj TCH , ( )
S
mi cro
Txi TCH , ( )
------------------------------------------------------------- O
max
Txi TCH , ( ) + =
O
max
Txi TCH , ( )
S
mi cro
Txi TCH , ( )
D
p t m , ,
macro
D
p t m , ,
macro
Txj TCH , ( ) E
p
Txi TCH , ( ) TP
p GBR ,
D
p t m , ,
mi cro
Txi TCH , ( )
S
overl appi ng
macro
Txj TCH , ( )
S
mi cro
Txi TCH , ( )
------------------------------------------------------------- O
max
Txi TCH , ( ) + =
O
max
Txi TCH , ( )
S
mi cro
Txi TCH , ( )
Forsk 2010 AT283_TRG_E2 165
Chapter 5: GSM GPRS EDGE Networks
The TCH_INNER service area of the macro layer is overlapped by the micro layer. This area consists of two parts: an area
overlapped by the TCH service area of the micro layer and another overlapped
by the TCH_INNER service area of the micro layer .
Let us consider three areas, S
1
, S
2
and S
3
.
Where is the TCH_INNER subcell service area of Txj.
The traffic specified for Txj in the map description ( ) is spread over S
1
proportionally to R
1
.
is the TCH service area of Txj in the traffic map with the option Best signal level of the highest priority
layer.
The traffic spread over the TCH_INNER service area of the micro layer may overflow to the TCH subcell. The traffic
overflowing to the TCH subcell is located on the TCH_INNER service area. On S
2
, the TCH subcell traffic coming from the
TCH_INNER subcell traffic overflow may overflow proportional to R
2
.
The traffic spread over the ring only served by the TCH subcell of the micro layer may overflow on S
3
proportional to R
3
.
For each circuit switched service, c, Atoll calculates the traffic demand, , in Erlangs in the subcell (Txj,
TCH_INNER) service area.
For each packet switched service (Max Bit Rate), p, Atoll calculates the traffic demand, , in kbits/s in the subcell
(Txj, TCH_INNER) service area.
Figure 5.7Concentric Cells
S
overl appi ng Txi TCH , ( )
macro
Txj,TCH_INNER ( )
S
overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH_INNER ( )
S
1
S
macro
Txj,TCH_INNER ( ) S
overl appi ng Txi TCH , ( )
macro
Txj,TCH_INNER ( ) =
S
2
S
overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH_INNER ( ) =
S
3
S
overl appi ng Txi TCH , ( )
macro
Txj,TCH_INNER ( ) S
2
=
S
macro
Txj,TCH_INNER ( )
E
c
Txj TCH , ( )
R
1
S
1
S
map
Txj TCH , ( )
-------------------------------------------- =
S
map
Txj TCH , ( )
R
2
S
2
S
mi cro
Txi,TCH_INNER ( )
----------------------------------------------------------------- =
R
3
S
3
S
mi cro
Txi,TCH ( ) S
mi cro
Txi,TCH_INNER ( )
------------------------------------------------------------------------------------------------------------------- =
D
c t m , ,
macro
D
c t m , ,
macro
Txj,TCH_INNER ( )
R
1
E
c
Txj TCH , ( ) +
R
2
D
c t m , ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi TCH , ( ) +
R
3
S
mi cro
Txi TCH , ( ) S
mi cro
Txi,TCH_INNER ( ) ( )
S
mi cro
Txi TCH , ( )
--------------------------------------------------------------------------------------------------------------------------- E
c
Txi TCH , ( ) O
max
Txi TCH , ( )
=
D
p t m , ,
macro
166 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi,
is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell of Txi
and is the TCH subcell service area of Txi.
For each packet switched service (Constant Bit Rate), p, Atoll calculates the traffic demand, , in kbits/s in the
subcell (Txj, TCH_INNER) service area.
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi,
is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell of Txi
and is the TCH subcell service area of Txi.
The area of the TCH ring of the macro layer is overlapped by the micro layer. There are two parts: an area overlapped by
the TCH service area of the micro layer and another overlapped by the
TCH_INNER service area of the micro layer .
Let us consider three areas, S
1
, S
2
and S
3
.
Where and are the TCH and TCH_INNER subcell service areas of Txj
respectively.
The traffic specified for Txj in the map description ( ) is spread over S
1
proportional to R
1
.
is the TCH service area of Txj in the traffic map with the option Best signal level of the highest priority
layer.
The traffic spread over the TCH_INNER service area of the micro layer may overflow to the TCH subcell. The traffic
overflowing to the TCH subcell is located on the TCH_INNER service area. On S
2
, the TCH subcell traffic coming from
the TCH_INNER subcell traffic overflow may overflow proportional to R
2
.
The traffic spread over the ring only served by the TCH subcell of the micro layer may overflow on S
3
proportional to R
3
.
For each circuit switched service, c, Atoll calculates the traffic demand, , in Erlangs in the subcell (Txj, TCH)
service area.
D
p t m , ,
macro
Txj,TCH_INNER ( )
R
1
T
p
Txj TCH , ( ) +
R
2
D
p t m , ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi TCH , ( ) +
R
3
S
mi cro
Txi TCH , ( ) S
mi cro
Txi,TCH_INNER ( ) ( )
S
mi cro
Txi TCH , ( )
--------------------------------------------------------------------------------------------------------------------------- T
p
Txi TCH , ( ) O
max
Txi TCH , ( )
=
O
max
Txi TCH , ( )
O
max
Txi,TCH_INNER ( )
S
mi cro
Txi TCH , ( )
D
p t m , ,
macro
D
p t m , ,
macro
Txj,TCH_INNER ( )
R
1
E
p
Txi TCH , ( ) TP
p GBR ,
+
R
2
D
p t m , ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi TCH , ( ) +
R
3
S
mi cro
Txi TCH , ( ) S
mi cro
Txi,TCH_INNER ( ) ( )
S
mi cro
Txi TCH , ( )
---------------------------------------------------------------------------------------------------------------------------

E
p
Txi TCH , ( ) TP
p GBR ,
O
max
Txi TCH , ( )
\ .
|
|
|
|
|
| |

=
O
max
Txi TCH , ( )
O
max
Txi,TCH_INNER ( )
S
mi cro
Txi TCH , ( )
S
overl appi ng Txi TCH , ( )
macro
Txj,TCH -- TCH_INNER ( )
S
overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH -- TCH_INNER ( )
S'
1
S
macro
Txj TCH , ( ) S
macro
Txj,TCH_INNER ( ) S
overl appi ng Txi TCH , ( )
macro
Txj,TCH -- TCH_INNER ( ) =
S'
2
S
overl appi ng Txi,TCH_INNER ( )
macro
Txj,TCH -- TCH_INNER ( ) =
S'
3
S
overl appi ng Txi TCH , ( )
macro
Txj,TCH -- TCH_INNER ( ) S'
2
=
S
macro
Txj TCH , ( ) S
macro
Txj,TCH_INNER ( )
E
c
Txj TCH , ( )
R'
1
S'
1
S
map
Txj TCH , ( )
-------------------------------------------- =
S
map
Txj TCH , ( )
R'
2
S'
2
S
mi cro
Txi,TCH_INNER ( )
----------------------------------------------------------------- =
R'
3
S'
3
S
mi cro
Txi,TCH ( ) S
mi cro
Txi,TCH_INNER ( )
------------------------------------------------------------------------------------------------------------------- =
D
c t m , ,
macro
Forsk 2010 AT283_TRG_E2 167
Chapter 5: GSM GPRS EDGE Networks
For each packet switched service (Max Bit Rate), p,Atoll calculates the traffic demand, , in kbits/s in the subcell
(Txj, TCH) service area.
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell
of Txj, is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi,
is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell of Txi,
is the TCH subcell service area of Txi and is the TCH_INNER subcell service
area of Txi.
For each packet switched service (Constant Bit Rate), p,Atoll calculates the traffic demand, , in kbits/s in the
subcell (Txj, TCH) service area.
Where is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell
of Txj, is the maximum rate of traffic overflow (stated in %) specified for the TCH subcell of Txi,
is the maximum rate of traffic overflow (stated in %) specified for the TCH_INNER subcell of Txi,
is the TCH subcell service area of Txi and is the TCH_INNER subcell service
area of Txi.
5.6 Network Dimensioning
Atoll is capable of dimensioning a GSM GPRS EDGE network with a mixture of circuit and package switched services.
This section describes the technical details of Atolls dimensioning engine.
5.6.1 Dimensioning Models and Quality Graphs
In Atoll, a dimensioning model is an entity utilized by the dimensioning engine along with other inputs (traffic, limitations,
criteria, etc.) in the process of dimensioning. A dimensioning model defines the QoS KPIs to be taken into account when
dimensioning a network for both circuit and packet switched traffic. The user can define either to use Erlang B or Erlang
C queuing model for circuit switched traffic and can define which KPIs to consider when dimensioning the network for
packet switched traffic. The dimensioning engine will only utilize the quality curves of the KPI selected. The KPIs not
selected are supposed to be either already satisfactory or not relatively important.
D
c t m , ,
macro
Txj TCH , ( )
R'
1
E
c
Txj TCH , ( ) +
D
c t m , ,
macro
Txj,TCH_INNER ( ) O
max
Txj,TCH_INNER ( ) +
R'
2
D
c t m , ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi TCH , ( ) +
R'
3
S
mi cro
Txi,TCH ( ) S
mi cro
Txi,TCH_INNER ( ) ( )
S
mi cro
Txi,TCH ( )
------------------------------------------------------------------------------------------------------------------------ E
c
Txi TCH , ( ) O
max
Txi TCH , ( )
=
D
p t m , ,
macro
D
p t m , ,
macro
Txj TCH , ( )
R'
1
T
p
Txj TCH , ( ) +
D
c t m , ,
macro
Txj,TCH_INNER ( ) O
max
Txj,TCH_INNER ( ) +
R'
2
D
p t m , ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi TCH , ( ) +
R'
3
S
mi cro
Txi,TCH ( ) S
mi cro
Txi,TCH_INNER ( ) ( )
S
mi cro
Txi,TCH ( )
------------------------------------------------------------------------------------------------------------------------ T
p
Txi TCH , ( ) O
max
Txi TCH , ( )
=
O
max
Txj,TCH_INNER ( )
O
max
Txi TCH , ( )
O
max
Txi,TCH_INNER ( )
S
mi cro
Txi,TCH ( ) S
mi cro
Txi,TCH_INNER ( )
D
p t m , ,
macro
D
p t m , ,
macro
Txj TCH , ( )
R'
1
E
p
Txi TCH , ( ) TP
p GBR ,
+
D
c t m , ,
macro
Txj,TCH_INNER ( ) O
max
Txj,TCH_INNER ( ) +
R'
2
D
p t m , ,
mi cro
Txi,TCH_INNER ( ) O
max
Txi,TCH_INNER ( ) O
max
Txi TCH , ( ) +
R'
3
S
mi cro
Txi,TCH ( ) S
mi cro
Txi,TCH_INNER ( ) ( )
S
mi cro
Txi,TCH ( )
------------------------------------------------------------------------------------------------------------------------

E
p
Txi TCH , ( ) TP
p GBR ,
O
max
Txi TCH , ( )
\ .
|
|
|
|
|
| |

=
O
max
Txj,TCH_INNER ( )
O
max
Txi TCH , ( )
O
max
Txi,TCH_INNER ( )
S
mi cro
Txi,TCH ( ) S
mi cro
Txi,TCH_INNER ( )
168 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.6.1.1 Circuit Switched Traffic
The network dimensioning for circuit switched traffic is performed using the universally accepted and adopted Erlang B
and Erlang C formulas. The dimensioning criterion in these formulas is the Grade of Service or the allowed blocking
probability of the circuit switched traffic.
In the Erlang B approach, this Grade of Service is defined as the percentage of incoming circuit switched calls that are
blocked due to lack of resources or timeslots. This formula implies a loss system. The blocked calls are supposed to be
lost and the caller has to reinitiate it.
In the Erlang C approach, the Grade of Service is the percentage of incoming calls that are placed in a waiting queue when
there are no resources available, until some resources or timeslots are liberated. This queuing system has no lost calls.
As the load on the system increases, the average waiting time in the queue also increases.
These formulas and their details are available in many books. For example, Wireless Communications Principles and
Practice by Theodore S. Rappaport, Prentice Hall.
Following the common practice, network dimensioning in Atoll is based on the principle that a voice or GSM call has
priority over data transmission. Therefore, as explained later in the network dimensioning steps, Atoll first performs
network dimensioning according to the circuit switched traffic present in the subcell in order to ensure the higher priority
service availability before performing the same for the packet switched traffic.
5.6.1.2 Packet Switched Traffic
Since packet switched traffic does not occupy an entire timeslot the whole time, it is much more complicated to study than
circuit switched traffic. Packet traffic is intermittent and bursty. Whenever there is packet data to be transferred, a
Temporary Block Flow (TBF) is initiated for transferring these packets. Multiple TBFs can be multiplexed on the same
timeslot. This implies that there can be many packet switched service users that have the same timeslots assigned for
packet data transfer but at different intervals of time.
This multiplexing of a number of packet switched service users over the same timeslots incurs a certain reduction in the
throughput (data transfer rate) for each multiplexed user. This reduction in the throughput is more perceivable when the
system traffic load is high. The following parts describe the three most important Key Performance Indicators in GPRS/
EDGE networks and how they are modelled in Atoll.
5.6.1.2.1 Throughput
Throughput is defined as the amount of data delivered to the Logical Link Control Layer in a given unit of time. Each
temporary block flow (TBF), and hence each user, has an associated measured throughput sample in a given network.
Each network will have a different throughput probability distribution depending on the load and network configuration.
Instead of using the precise probability distributions, it is more practical to compute the average and percentile throughput
values.
In GPRS, the resources are shared between the users being served, and consequently, the throughput is reduced as the
number of active users increases. This reduction in user perceived throughput is modelled through a reduction factor. The
throughput experienced by a user accessing a particular service can be calculated as:
User throughput = Number of allocated timeslots x Timeslot capacity x Reduction Factor
Or
User throughput per allocated timeslot = Timeslot capacity x Reduction Factor
Timeslot Capacity
The timeslot capacity is the average throughput per fully utilized timeslot. It represents the average throughput from the
network point of view. It mainly depends on the networks propagation conditions and criteria in the coverage area of a
transmitter (carrier power, carrier-to-interference distribution, etc.). It is a measure of how much data the network is able
to transfer with 1 data Erlang, or in other words, how efficiently the hardware resources are being utilized by the network.
It may also depend on the RLC protocol efficiency.
Atoll computes the average timeslot capacity during the traffic analysis and is used to determine the minimum throughput
reduction factor. But since this information is displayed in the network dimensioning results (only due to relevance), this
information has been considered as a part of the network dimensioning process in this document.
Timeslot Utilisation
Timeslot utilization takes into account the average number of timeslots that are available for packet switched traffic. It is a
measure of how much the network is loaded with data services. Networks with timeslot utilisation close to 100% are close
to saturation and the end-user performance is likely to be very poor.
In Atoll this parameter is termed as the Load (Traffic load for circuit switched traffic and packet switched traffic load for
packet switched traffic). It is described in more detail in the Network dimensioning steps section.
Reduction Factor
Reduction factor takes into account the user throughput reduction due to timeslot sharing among many users. The figure
below shows how the peak throughput available per timeslot is reduced by interference and sharing.Reduction factor is a
function of the number of timeslots assigned to a user (N
u
), number of timeslots available in the system (N
s
) and the
average system packet switched traffic load (L
p
) (utilization of resources in the system). Data Erlangs or data traffic is given
by:
Forsk 2010 AT283_TRG_E2 169
Chapter 5: GSM GPRS EDGE Networks
More precisely, the reduction factor is a function of the ratio N
s
/N
u
(N
p
). N
p
models the equivalent timeslots that are
available for the packet switched traffic in the system. For example, a 24-timeslot system with each user assigned 3
timeslots per connection can be modelled by a single timeslot connection system with 8 timeslots in total.
The formula for reduction factor can be derived following the same hypotheses followed by Erlang in the derivation of the
blocking probability formulas (Erlang B and Erlang C).
Let X be a random variable that measures the reduction factor in a certain system state:
Where n is the instantaneous number of connections in the system. The throughput reduction factor is defined as:
Or,
Here, P(X=n) is the probability function of having n connections in the system. Under the same assumptions as those of
the Erlang formulas, the probability function can be written as:
Hence the reduction factor can finally be written as:
This formula is not directly applicable in any software application due to the summations up to infinity. Atoll uses the
following version of this formula that is exactly the same formula without the summation overflow problem.
Figure 5.8Reduction of Throughput per Timeslot
Data Erlangs L
P
N
S
=
X
0 if n = 0
1 if 0 < n N
P
s
N
P
n
------- if n > N
P

RF X
P X n = ( )
P X 0 = ( )
-----------------------
n 0 =

RF X
P X n = ( )
P
i 0 =

X i = ( )
-------------------------------
n 0 =

=
P X n = ( )
L
P
N
P
( )
n
n!
--------------------------
L
P
N
P
( )
i
i!
------------------------
i 0 =
N
P

L
P
N
P
( )
i
N
P
! N
P
i N
P
( )

---------------------------------
i N
P
1 + =

+
----------------------------------------------------------------------------------------------- = if 0 n N
P
s s
P X n = ( )
L
P
N
P
( )
n
N
P
! N
P
i N
P
( )

---------------------------------
L
P
N
P
( )
i
i!
------------------------
i 0 =
N
P

L
P
N
P
( )
i
N
P
! N
P
i N
P
( )

---------------------------------
i N
P
1 + =

+
----------------------------------------------------------------------------------------------- = if n > N
P
RF
L
P
N
P
( )
i
i!
------------------------
i 1 =
N
P

L
P
N
P
( )
i
N
P
! N
P
i N
P
( )

---------------------------------
i N
P
1 + =

N
P
i
-------
\ .
| |
+
L
P
N
P
( )
i
i!
------------------------
i 1 =
N
P

L
P
N
P
( )
i
N
P
! N
P
i N
P
( )

---------------------------------
i N
P
1 + =

+
----------------------------------------------------------------------------------------------------------------- =
170 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The default quality curves for the Reduction Factor have been derived using the above formula. Each curve is for a fixed
number of timeslots available for packet switched traffic (N
p
) describing the reduction factor at different values of packet
switched traffic load (L
p
). The figure below contains all the reduction factor quality curves in Atoll. The Maximum reduction
factor can be 1, implying a maximum throughput, and the minimum can be 0, implying a saturated system with no data
throughput.
Each curve in the above figure represents an equivalent number of packet switched timeslots, N
P
.
5.6.1.2.2 Delay
Delay is the time required for an LLC PDU to be completely transferred from the SGSN to the MS, or vice versa. As the
delay is a function of the delays and the losses incurred at the packet level, the network parameters, such as the packet
queue length, and different protocol properties, such as the size of the LLC PDU, become important. It is also quite
dependent upon the radio access round trip time (RA RTT) and has a considerable impact on the application level
performance viewed by the user.
The delay parameter is a user level parameter rather than being a network level quantity, like throughput per cell, timeslot
capacity, TBF blocking and reduction factor, hence it is difficult to model and is currently under study. Hence, no default
curve is presently available for delay in Atoll.
5.6.1.2.3 Blocking Probability
In GPRS, there is no blocking as in circuit switched connections. If a new temporary block flow (TBF) establishment is
requested and there are already M users per timeslot, M being the maximum limit of multiplexing per timeslot (Multiplexing
factor), the request is queued in the system to be established later when resources become available.
Supposing that M number of users can be multiplexed over a single timeslot (PDCH), we can have a maximum of M * N
p
users in the system. This implies that if a new TBF is requested when there are already M * N
p
users active, it will be
blocked and placed in a queue. So the blocking probability is the probability of having M * N
p
+ 1 users in the system or
more, meaning,
as in this case n is always greater than N
p
, we have,
Figure 5.9Reduction Factor for Different Packet Switched Traffic Loads (L
p
, X-axis)
RF
L
P
N
P
( )
n
n!
--------------------------
n 1 =
N
P

N
P
N
P
1 + ( )
N
P
!
--------------------- 1 L
P
( ) ln
L
P
n
n
------
n 1 =
N
P

+
\ .
|
|
| |

L
P
N
P
( )
n
n!
--------------------------
n 1 =
N
P

L
P
N
P
( )
N
P
N
P
!
-----------------------------
L
P
1 L
P

--------------- +
----------------------------------------------------------------------------------------------------------------------------------- =
P X n = ( ) for n M N
P
( ) 1 + =
Forsk 2010 AT283_TRG_E2 171
Chapter 5: GSM GPRS EDGE Networks
So, the Blocking Probability can be given as:
Eliminating the summations to infinity, the blocking probability can be stated in a simpler form:
The above formula has been used to generate the default quality curves for blocking probability in Atoll.
These graphs are generated for a user multiplexing factor of 8 users per timeslot. Each curve represents an equivalent
number of packet switched timeslots, N
P
.
The curves depict the blocking probabilities for different number of available connections (N
p
) at different packet switched
traffic loads (L
p
) for a fixed user multiplexing factor of 8. The figure below contains all the blocking probability curves for
packet switched traffic dimensioning in Atoll. The blocking probability increases with the packet switched traffic load,
which implies that as the packet switched traffic increases for a given number of timeslots, the system starts to get more
and more loaded, hence there is higher probability of having a temporary block flow placed in a waiting queue.
Figure 5.10Blocking Probability for Different Packet Switched Traffic Loads (L
p
, X-axis)
Reference:
T. Halonen, J. Romero, J. Melero; GSM, GPRS and EDGE performance Evolution towards 3G/UMTS, John Wiley
and Sons Ltd.
P X n = ( )
L
P
N
P
( )
n
N
P
! N
P
i N
P
( )

---------------------------------
L
P
N
P
( )
i
i!
------------------------
i 0 =
N
P

L
P
N
P
( )
i
N
P
! N
P
i N
P
( )

---------------------------------
i N
P
1 + =

+
----------------------------------------------------------------------------------------------- =
BP P X n = ( )
n M N 1 + =

L
P
N
P
( )
n
N
P
! N
P
1 N
P
( )

-----------------------------------
n M N
P
1 + =

L
P
N
P
( )
i
i!
------------------------
i 0 =
N
P

L
P
N
P
( )
i
N
P
! N
P
1 N
P
( )

-----------------------------------
i N
P
1 + =

+
------------------------------------------------------------------------------------------------ = =
BP
L
P
N
P
( )
M N
P

N
P
! N
P
M N
P
N
P
( )

---------------------------------------------
L
P
1 L
P

---------------
L
P
N
P
( )
i
i!
------------------------
i 0 =
N
P

L
P
N
P
( )
N
P
N
P
!
-----------------------------
L
P
1 L
P

--------------- +
------------------------------------------------------------------------------------------- =
172 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.6.2 Network Dimensioning Process
The network dimensioning process is described below in detail. As the whole dimensioning process is in fact a chain of
small processes that have there respective inputs and outputs, with outputs of a preceding one being the inputs to the
next, the best method is to detail each process individually in form of steps of the global dimensioning process.
5.6.2.1 Network Dimensioning Engine
During the dimensioning process, Atoll first computes the number of timeslots required to accommodate the circuit
switched traffic. Then it calculates the number of timeslots to add in order to satisfy the demand of packet switched traffic.
This is performed using the quality curves entered in the dimensioning model used. If the dimensioning model has been
indicated to take all three KPIs in to account (throughput reduction factor, delay and blocking probability), the number of
timeslots to be added is calculated such that:
3. The throughput reduction factor is greater than the minimum throughput reduction factor,
4. Delay is less than the maximum permissible delay defined in the service properties, and
5. The blocking probability is less than the maximum allowable blocking probability defined in the service properties.
The figure below depicts a simplified flowchart of the dimensioning engine in Atoll.
On the whole, following are the inputs and outputs of the network dimensioning process:
5.6.2.1.1 Inputs
Circuit switched traffic demand
Packet switched traffic demand
Timeslot configurations defined for each subcell
Target traffic overflow rate and Half-rate traffic ratio for each subcell
Service availability criteria: minimum required throughput per user, maximum permissible delay, maximum
allowable blocking probability etc.
Dimensioning model parameters: Maximum number of TRXs per transmitter, dimensioning model for circuit
switched traffic, number of minimum dedicated packet switched timeslots per transmitter, maximum number of
TRXs added for packet switched services, KPIs to consider, and their quality curves.
5.6.2.1.2 Outputs
Number of required TRXs per transmitter
Number of required shared, circuit switched and packet switched timeslots
Traffic load
Served circuit switched traffic
Served packet switched traffic
Effective rate of traffic overflow
Actual KPI values: throughput reduction factor, delay and blocking probability
5.6.2.2 Network Dimensioning Steps
This section describes the entire process step by step as it is actually performed in Atoll. Details of the calculations of the
parameters that are calculated during each step are described as well.
5.6.2.2.1 Step 1: Timeslots Required for CS Traffic
Atoll computes the number of timeslots required to accommodate the circuit switched traffic assigned to each subcell.
Atoll takes the circuit switched traffic demand (Erlangs) either user-defined or calculated in the traffic analysis and
assigned to the current subcell and the maximum blocking probability defined for the circuit switched service, and
computes the required number of timeslots to satisfy this demand using the Erlang B or Erlang C formula (as defined by
the user).
If the user-defined target rate of traffic overflow per subcell, O
Target
, is greater than the maximum blocking rate defined in
the services properties, it is going to be taken as the Grade of Service required for that subcell instead of the maximum
blocking rate of the service.
For the blocking probability GoS and circuit switched traffic demand TD
C
, Atoll determines the required number of
timeslots TS
req. C
for each subcell using formulas described below. In fact, Atoll searches for TS
req. C
value until the
defined grade of service is reached.
Figure 5.11Network Dimensioning Process
Forsk 2010 AT283_TRG_E2 173
Chapter 5: GSM GPRS EDGE Networks
For Erlang B, we have:
For Erlang C, we have:
Atoll considers the effect of half-rate circuit switched traffic by taking into account a user-defined percentage of half-rate
traffic. Atoll computes the effective equivalent number of full-rate timeslots that will be required to carry the total traffic with
the defined percentage of half-rate traffic.
If the number of timeslots required to accommodate the full-rate circuit switched traffic is TS
req. FR
, and the percentage of
half-rate traffic within the subcell is defined by HR, then the effective number of equivalent full-rate circuit switched
timeslots TS
eff.
that can carry this traffic mix is calculated by:
Atoll employs this simplified approach to integrating half-rate circuit switched traffic, which provides approximately the
same results as obtained by using the half-rate traffic charts.
5.6.2.2.2 Step 2: TRXs Required for CS Traffic and Dedicated PS Timeslots
This stage of the network dimensioning process computes the number of TRXs required to carry the circuit switched traffic
demand through the number of required timeslots calculated above and the timeslot configuration defined by the user in
the network settings. Atoll distributes the number of required circuit switched timeslots calculated in Step 1 taking into
account the presence of dedicated packet switched timeslots in each TRX according to the timeslot configurations.
If a timeslot configuration defines a certain number of dedicated packet switched timeslots pre-allocated in certain TRXs,
those timeslots will not be considered capable of carrying circuit switched traffic and hence will not be allocated. For
example, if 4 timeslots have been marked as packet switched timeslots in the first TRX and Atoll computes 8 timeslots for
carrying a certain circuit switched traffic demand, then the number of TRXs to be allocated cannot be 1 even if there is no
packet switched traffic considered yet.
The total numbers of timeslots that carry circuit switched and packet switched traffic respectively are the sums of
respective dedicated and shared timeslots:
and
5.6.2.2.3 Step 3: Effective CS Blocking, Effective CS Traffic Overflow and Served CS Traffic
In this step, the previously calculated number of required TRXs is used to compute the effective blocking rate for the circuit
switched traffic. This is performed by using the Erlang B or Erlang C formula with the circuit switched traffic demand and
the number of required TRXs as inputs and computing the Grade of Service (or blocking probability). It then calculates the
effective traffic overflow rate, O
eff.
.
In case of Erlang B formula, the effective rate of traffic overflow for the circuit switched traffic is the same as the circuit
switched blocking rate. While in case of the Erlang C model, the circuit switched traffic is supposed to be placed in an
infinite-length waiting queue. This implies that there is no overflow in this case.
From this data, it also computes the served circuit switched traffic. This is the difference of the circuit switched traffic
demand and the percentage of traffic that overflows from the subcell to other subcells calculated above. Hence, for an
effective traffic overflow rate of O
eff.
and the circuit switched traffic demand of TD
C
, the served circuit switched traffic ST
C
is computed as:
5.6.2.2.4 Step 4: TRXs to Add for PS Traffic
This step is the core of the dimensioning process for packet switched services. First of all, Atoll computes the number of
TRXs to be added to carry the packet switched traffic demand. This is the number of TRXs that contain dedicated packet
switched and shared timeslots.
To determine this number of TRXs, Atoll calculates the equivalent average packet switched traffic demand in timeslots by
studying each pixel covered by the transmitter. This calculation is in fact performed in the traffic analysis process or is user-
defined in the subcells table. Knowing the traffic demand per pixel of the covered area in terms of kbps and the maximum
attainable throughput per pixel (according to the C and/or C/I conditions and the coding scheme curves in the GPRS/EDGE
configuration), Atoll calculates the average traffic demand in packet switched timeslots by:
GoS
TD
C
( )
TS
reqC
TS
reqC
( )!
--------------------------------
TD
C
( )
k
k!
-------------------
k 0 =
TS
reqC

----------------------------------- =
GoS
TD
C
( )
TS
reqC
TD
C
( )
TS
reqC
TS
reqC
( )! 1
TD
C
TS
reqC
-------------------
\ .
| |
TD
C
( )
k
k!
-------------------
k 0 =
TS
reqC
1

+
------------------------------------------------------------------------------------------------------------------------------------------------------ =
TS
eff
TS
reqFR
1
HR
2
---------
\ .
| |
=
TS
P
TS
S
TS
P dedi cated ,
+ = TS
C
TS
S
TS
C dedi cated ,
+ =
ST
C
TD
C
1 O
eff
( ) =
174 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The average timeslot capacity of a transmitter is calculated by dividing the packet switched traffic demand over the entire
coverage area (in kbps) by the packet switched traffic demand in timeslots calculated above.
With the number of timeslots required to serve the circuit switched traffic, the timeslots required for packet switched traffic
and their respective distributions according to the timeslot configurations being known, Atoll calculates the number of
timeslots available for carrying the packet switched traffic demand. These timeslots can be dedicated packet switched
timeslots and the shared ones. So, following the principle that shared timeslots are potential carriers of both traffic types,
The packet switched traffic load is calculated by the formula:
The second important parameter for the calculation of Reduction Factor, Delay and Blocking Probability is the equivalent
number of available timeslots for packet switched traffic, i.e. N
P
. This is computed by dividing the total number of timeslots
available for carrying packet switched traffic by the number of downlink timeslots defined in the mobile terminal properties.
So, N
P
is calculated at this stage as:
Where, TS
Terminal
is the number of timeslots that a terminal will use in packet switched calls.
The number timeslots that a terminal can use in packet switched calls is the product of the number of available DL timeslots
for packet-switched services (on a frame) and the number of simultaneous carriers (in case of EDGE evolution).
The number of timeslots that a terminal will use in packet switched calls is determined by taking the lower of the maximum
number of timeslots for packet switched service defined in the service properties and the maximum number of timeslots
that a mobile terminal can use for packet switched services (see above).
and
Here, the min(X,Y) function yields the lower value among X and Y as result.
Now, knowing the packet switched traffic load, L
P
, and the equivalent number of available timeslots, N
P
, Atoll finds out
the KPIs that have been selected before launching the dimensioning process using the quality curves stored in the
dimensioning model.
This particular part of this step can be iterative if the KPIs to consider in dimensioning are not satisfied in the first try. If the
KPIs calculated above are within acceptable limits as defined by the user, it means that the dimensioning process has
acceptable results. If these KPIs are not satisfied, then Atoll increases the number of TRXs calculated for carrying packet
switched traffic by 1 (each increment adding 8 more timeslots for carrying packet switched traffic as the least unit that can
be physically added or removed is a TRX) and resumes the computations from Step 3. It then recalculates the packet
switched traffic load, L
P
, and the equivalent number of available timeslots, N
P
. Then it recomputes the KPIs with these
new values of L
P
and N
P
. If the KPIs are within satisfactory limits the results are considered to be acceptable. Otherwise,
Atoll performs another iteration to find the best possible results.
The calculated values of all the KPIs are compared with the ones defined in the service properties. The values for
maximum Delay and Blocking probability are defined directly in the properties but the minimum throughput reduction factor
is calculated by Atoll using the users inputs: minimum throughput per user and required availability. This calculation is in
fact performed during the traffic analysis process, but since it is relevant to the dimensioning procedure, it is displayed in
a column in the dimensioning results so that the user can easily compare the minimum requirement on the reduction factor
KPI with the resulting one. If dimensioning is not based on a traffic analysis, the minimum throughput reduction factor is a
user-defined parameter.
Minimum Throughput Reduction Factor Calculation
The minimum throughput reduction factor is computed using the input data: minimum required throughput per user defined
in the service properties, the average throughput per timeslot deduced from the throughput curves stored in the GPRS/
EDGE configuration properties for each coding scheme, the total number of downlink timeslots defined in the properties
of the mobile terminal (See defintion above) and the required availability defined in the service
properties.
It is at the stage of calculating the average timeslot capacity per transmitter that Atoll studies each covered pixel for carrier
power or carrier-to-interference ratio. According to the measured carrier power or carrier-to-interference ratio, Atoll
deduces the maximum throughput available on that pixel through the throughput vs. C or throughput vs. C/I curves of the
GPRS/EDGE configuration.
The throughput per timeslot per pixel TP
TS, Pixel
can be either a function of carrier power C, or carrier power C and the
carrier-to-interference ratio C/I, depending on the user-defined traffic analysis RF conditions criteria. Therefore,
TD
P
Ti mesl ots
Traffic demand per pixel (kbps)
Throughput per pixel (kbps)
----------------------------------------------------------------------------------
pi xel

=
TS
P
TS
S
TS
P dedi cated ,
+ =
TS
C
TS
S
TS
C dedi cated ,
+ =
L
P
ST
C
TS
C dedi cated ,
TD
P
Ti mesl ot s
+ ( )
TS
P
----------------------------------------------------------------------------------------------- =
N
P
TS
P
TS
Termi nal
---------------------------- =
TS
Termi nal
mi n TS
Max Servi ce ,
TS
Max Termi nal Type ,
, ( ) =
TS
Max Termi nal Type ,
TS
DL Termi nal Type ,
Carri ers
DL Termi nal Type ,
=
TS
Max Termi nal Type ,
Forsk 2010 AT283_TRG_E2 175
Chapter 5: GSM GPRS EDGE Networks
Or
and
The required availability parameter defines the percentage of pixels within the coverage area of the transmitter that must
satisfy the minimum throughput condition. This parameter renders user-manageable flexibility to the throughput
requirement constraint.
To calculate the minimum throughput reduction factor for the transmitter, Atoll computes the minimum throughput
reduction factor for each pixel using the formula:
Once the minimum reduction factor for each pixel is known, Atoll calculates the global minimum reduction factor that is
satisfied by the percentage of covered pixels defined in the required availability. The following example may help in
understanding the concept and calculation method.
Example: Let the total number of pixels, covered by a subcell S, be 1050. The reliability level set to 90%. This implies that
the required minimum throughput for the given service will be available at 90% of the pixels covered. This, in turn, implies
that there will be a certain limit on the reduction factor, i.e. if the actual reduction factor in that subcell becomes less than
a minimum required, the service will not be satisfactory.
Atoll computes the minimum reduction factor at each pixel using the formula mentioned above, and outputs the following
results:
So for a reliability level of 90%, the corresponding RF
min
will be the one provided at least 90% of the pixels covered, i.e.
945 pixels. The corresponding value of the resulting RF
min
in this example hence turns out to be 0.9, since this value
covers 962 pixels in total. Only 87 of the covered pixels imply an RF
min
of 0.98. These will be the pixels that do not provide
satisfactory service.
This calculation is performed for each service type available in the subcell coverage area. The final minimum throughput
reduction factor is the highest one amongst all calculated for each service separately.
The minimum throughput reduction factor RF
min
value is a minimum requirement that must be fulfilled by the network
dimensioning process when the Reduction Factor KPI is selected in the dimensioning model.
5.6.2.2.5 Step 5: Served PS Traffic
Atoll calculates the served packet switched traffic using the number of timeslots available to carry the packet switched
traffic demand. As the result of the above iterative step, Atoll always finds the best possible answer in terms of number of
timeslots required to carry the packet switched traffic demand unless the requirement exceeds the maximum limit on the
RF
min
Number of pixels
0.3 189
0.36 57
0.5 20
0.6 200
0.72 473
0.9 23
0.98 87
Figure 5.12Minimum Throughput Reduction Factor
TP
TS Pi xel ,
f C ( ) =
TP
TS Pi xel ,
f C ( ) = TP
TS Pi xel ,
f
C
i
----
\ .
| |
=
RF
mi n Pi xel ,
TP
user mi n ,
TP
TS Pi xel ,
TS
Termi nal

-------------------------------------------------------------- =
176 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
number of the packet switched traffic timeslots defined in the dimensioning model properties. Hence, there is no packet
traffic overflow unless the packet switched traffic demand requires more TRXs than the maximum allowed
5.6.2.2.6 Step 6: Total Traffic Load
This step calculates the final result of the dimensioning process, i.e. the total traffic load. The total traffic load L is calculated
as:
Where,
ST
C
is the served circuit switched traffic
ST
P
is the served packet switched traffic
TS
C, dedicated
is the number of dedicated circuit switched timeslots
TS
P, dedicated
is the number of dedicated packet switched timeslots
TS
S
is the number of shared timeslots
5.7 Key Performance Indicators Calculation
This feature calculates the current values for all circuit switched and packet switched Key Performance Indicators as a
measure of the current performance of the network. It can be used to evaluate an already dimensioned network in which
recent traffic changes have been made in limited regions to infer the possible problematic areas and then to improve the
network dimensioning with respect to these changes.
The concept of this computation is the inverse of that of the dimensioning process. In this case, Atoll has the results of
the dimensioning process already committed and known. Atoll then computes the current values for all the KPIs knowing
the number of required TRXs, the respective numbers of shared and dedicated timeslots and the circuit switched and
packet switched traffic demands.
The computation algorithm utilizes the parameters set in the dimensioning model properties and the quality curves for the
throughput reduction factor, delay and the blocking probability.
The following conventional relations apply:
If,
TS
C, dedicated
is the number of timeslots dedicated to the circuit switched traffic,
TS
P, dedicated
is the number of timeslots dedicated to the packet switched traffic,
TS
S
is the number of shared timeslots for a transmitter,
Then, the number of timeslots available for the circuit switched traffic, TS
C
, is defined as:
And the number of timeslots available for the packet switched traffic, TS
P
, is given by:
5.7.1 Circuit Switched Traffic
For each subcell, Atoll has already calculated the effective traffic overflow rate and the blocking rate during the
dimensioning process. Also knowing the circuit switched traffic demand, TD
C
, and the number of timeslots available for
circuit switched traffic, TS
C
, the blocking probability can be easily computed using the Erlang formulas or tables.
5.7.1.1 Erlang B
Under the current conditions of circuit switched traffic demand, TD
C
, and the number of timeslots available for the circuit
switched traffic, TS
C
, the percentage of blocked circuit switched traffic can be computed through:
In a network dimensioning based on Erlang B model, the circuit switched traffic overflow rate, O
C
, is the same as the
percentage of traffic blocked by the subcell calculated above.
5.7.1.2 Erlang C
Similarly, under the current conditions of circuit switched traffic demand, TD
C
, and the number of timeslots available for
the circuit switched traffic, TS
C
, the percentage of delayed circuit switched traffic can be computed through:
L
ST
C
ST
P
+
TS
C dedi cated ,
TS
P dedi cated ,
TS
S
+ +
------------------------------------------------------------------------------------------------ =
TS
C
TS
S
TS
C dedi cated ,
+ =
TS
P
TS
S
TS
P dedi cated ,
+ =
% of blocked traffic
TD
C
( )
TS
C
TS
C
( )!
--------------------------
TD
C
( )
k
k!
-------------------
k 0 =
TS
C

------------------------------ =
Forsk 2010 AT283_TRG_E2 177
Chapter 5: GSM GPRS EDGE Networks
If the circuit switched traffic demand, TD
C
, is higher than the number of timeslots available to accommodate circuit
switched traffic, the column for this result will be empty signifying that there is a percentage of circuit switched traffic
actually being rejected rather than just being delayed under the principle of Erlang C model.
The circuit switched traffic overflow rate, O
C
, will be 0 if the circuit switched traffic demand, TD
C
, is less than the number
of timeslots available for the circuit switched traffic, TS
C
.
If, on the other hand, the circuit switched traffic demand, TD
C
, is higher than the number of timeslots available to carry the
circuit switched traffic, TS
C
, then there will be a certain percentage of circuit switched traffic that will overflow from the
subcell. This circuit switched traffic overflow rate, O
C
, is calculated as:
5.7.1.3 Served Circuit Switched Traffic
The result of the above two processes will be a traffic overflow rate for the circuit switched traffic for each subcell, O
C
. The
served circuit switched traffic, ST
C
, is calculated as:
5.7.2 Packet Switched Traffic
Identifying the total traffic demand, TD
T
, (circuit switched traffic demand + packet switched traffic demand) as:
The following two cases can be considered.
5.7.2.1 Case 1: Total Traffic Demand > Dedicated + Shared Timeslots
In the case where the total number of timeslots available is less than the total traffic demand, there will be packet switched
data traffic that will be rejected by the subcell as it will not be able to accommodate it. The following results are expected
in this case:
5.7.2.1.1 Traffic Load
The traffic load will be 100%, as the subcell will have more traffic to carry than it can. This implies that the system will be
loaded to the maximum and even saturated. Hence the user level quality of service is bound to be very unsatisfactory.
5.7.2.1.2 Packet Switched Traffic Overflow
In a 100% loaded, or even saturated subcell, the packet switched data calls will start being rejected because of shortage
of available resources. Hence there will be a perceptible packet switched traffic overflow in this subcell, O
P
. This overflow
rate is calculated as show below:
5.7.2.1.3 Throughput Reduction Factor
The resulting throughput reduction factor for a 100% loaded or saturated subcell will be 0. Hence, the throughput perceived
by the packet switched service user will be 0, implying a very bad quality of service.
5.7.2.1.4 Delay
Again for a 100% loaded or saturated subcell, the delay at the packet switched service user end will be infinite as there is
no data transfer (throughput = 0).
5.7.2.1.5 Blocking Probability
All the data packets will be rejected by the system since it is saturated and has no free resources to allocate to incoming
data packets. Hence, the blocking probability will be 100%.
5.7.2.1.6 Served Packet Switched Traffic
With the packet switched data traffic overflowing from the subcell, there will be a part of that traffic that is not served. The
served packet switched data traffic, ST
P
, is calculated on the same principle as the served circuit switched traffic:
% of traffic delayed
TD
C
( )
TS
C
TD
C
( )
TS
C
TS
C
( )! 1
TD
C
TS
C
-----------
\ .
| |
TD
C
( )
k
k!
-------------------
k 0 =
TS
C
1

+
-------------------------------------------------------------------------------------------------------------------------- =
O
C
TD
C
TS
C

TD
C
----------------------------- =
ST
C
TD
C
1 O
C
( ) =
TD
T
TD
C
TD
P
+ =
O
P
1
TS
C dedi cated ,
TS
P dedi cated ,
TS
S
+ + ( ) ST
C
{ }
TD
P
----------------------------------------------------------------------------------------------------------------------------- 100 =
ST
P
TD
P
1 O
P
( ) =
178 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.7.2.2 Case 2: Total Traffic Demand < Dedicated + Shared Timeslots
In the case where the total traffic demand is less than the number of timeslots available to carry the traffic, the subcell will
not be saturated and there will be some deducible values for all the data KPIs. In a normally loaded subcell, the packet
switched data traffic will have no overflow percentage. This is due to the fact that the packet switched data traffic is rather
placed in a waiting queue than be rejected.
Therefore, there will be a within limits packet switched traffic load, L
P
, calculated as under:
The second parameter for computing the KPIs from the quality curves of the dimensioning model is the number of
equivalent timeslots available for the packet switched data traffic, N
P
, which is calculated in the same manner as in the
dimensioning process as well:
These parameters calculated, now Atoll can compute the required KPIs through their respective quality curves.
5.7.2.2.1 Traffic Load
The traffic load is computed knowing the total traffic demand and the total number of timeslots available to carry the entire
traffic demand:
5.7.2.2.2 Packet Switched Traffic Overflow
In a normally loaded subcell, no packet switched data calls will be rejected. The packet switched traffic overflow will,
therefore, be 0.
5.7.2.2.3 Throughput Reduction Factor
The resulting throughput reduction factor for a normally loaded subcell is calculated through the throughput reduction
factor quality curve for given packet switched traffic load, L
P
, and number of equivalent timeslots, N
P
.
5.7.2.2.4 Delay
The resulting delay the subcell is calculated through the delay quality curve for given packet switched traffic load, L
P
, and
number of equivalent timeslots, N
P
.
5.7.2.2.5 Blocking Probability
The resulting blocking probability for a normally loaded subcell is calculated through the blocking probability quality curve
for given packet switched traffic load, L
P
, and number of equivalent timeslots, N
P
.
5.7.2.2.6 Served Packet Switched Traffic
As there is no overflow of the packet switched traffic demand from the subcell under consideration, the served packet
switched traffic will be the same as the packet switched traffic demand:
5.8 Neighbour Allocation
The intra-technology neighbour allocation algorithm takes into account all the TBC transmitters. It means that all the TBC
transmitters of the .atl document are potential neighbours.
The transmitters to be allocated will be called TBA transmitters. They must fulfil the following conditions:
They are active,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone,
They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder
or a group of transmitters or a single transmitter.
Only TBA transmitters may be assigned neighbours.
L
P
ST
C
TS
C dedi cated ,
TD
P
Ti mesl ot s
+ ( )
TS
P
----------------------------------------------------------------------------------------------- =
N
P
TS
P
TS
Termi nal
---------------------------- =
Traffic Load
TD
T
TS
C dedi cated ,
TS
P dedi cated ,
TS
S
+ +
------------------------------------------------------------------------------------------------ =
ST
P
TD
P
=
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Forsk 2010 AT283_TRG_E2 179
Chapter 5: GSM GPRS EDGE Networks
5.8.1 Global Allocation for All Transmitters
We assume a reference transmitter A and a candidate neighbour, transmitter B.
When automatic allocation starts, Atoll checks following conditions:
6. The distance between both transmitters must be less than the user-definable maximum inter-site distance. If the
distance between the reference transmitter and the candidate neighbour is greater than this value, then the
candidate neighbour is discarded.
7. The calculation options,
Force co-site transmitters as neighbours: This option enables you to force transmitters located on the reference transmitter
site in the candidate neighbour list. This constraints can be weighted among the others and ranks the neighbours through
the importance field (see after).
Force adjacent transmitters as neighbours: This option enables you to force transmitters geographically adjacent to the
reference transmitter in the candidate neighbour list. This constraints can be weighted among the others and ranks the
neighbours through the importance field (see after).
Force neighbour symmetry: This option enables user to force the reciprocity of a neighbourhood link. Therefore, if the
reference transmitter is a candidate neighbour of another transmitter, the later will be considered as candidate neighbour
of the reference transmitter.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may
force/forbid a transmitter to be candidate neighbour of the reference transmitter.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours
and carries out a new neighbour allocation. If not selected, the existing neighbours are kept.
8. There must be an overlapping zone ( ) with a given cell edge coverage probability where:
S
A
is the area where the received signal level from the transmitter A is greater than a minimum signal level. S
A
is
the coverage area of reference transmitter A restricted between two boundaries; the first boundary represents the
start of the handover area (best server area of A plus the handover margin named handover start) and the
second boundary shows the end of the handover area (best server area of A plus the margin called handover
end)
S
B
is the coverage area where the candidate transmitter B is the best server.
Notes:
Adjacence criterion: Geographically adjacent transmitters are determined on the basis of
their Best Server coverages in 2G (GSM GPRS EDGE) projects. More precisely, a
transmitter TXi is considered adjacent to another transmitter TXj if there exists at least one
pixel of TXi Best Server coverage area where TXj is the 2nd Best Server. The ranking of
the adjacent neighbour transmitter increases with the number of these pixels. The figure
below shows the above concept.
When this option is checked, adjacent cells are sorted and listed from the most adjacent to
the least, depending on the above criterion. Adjacence is relative to the number of pixels
satisfying the criterion.
This criteria is only applicable to transmitters belonging to the same HCS layer. The
geographic adjacency criteria is not the same in 3G (UMTS HSPA, CDMA2000) projects.
S
A
S
B

180 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
Atoll calculates either the percentage of covered area ( ) if the option Take into account Covered Area is
selected, or the percentage of traffic covered on the overlapping area for the option Take into account Covered
Traffic. Then, it compares this value to the % minimum covered area (minimum percentage of covered area for the option
Take into account Covered Area or minimum percentage of covered traffic for the option Take into account Covered
Traffic). If this percentage is not exceeded, the candidate neighbour B is discarded.
The coverage condition can be weighted among the others and ranks the neighbours through the importance field (see
number 4 below).
9. The importance values are used by the allocation algorithm to rank the neighbours according to the allocation
reason, and to quantify the neighbour importance.
Atoll lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the
maximum number of neighbours to be allocated to each transmitter is exceeded. If we consider the case for which there
are 15 candidate neighbours and the maximum number of neighbours to be allocated to the reference transmitter is 8.
Among these 15 candidate neighbours, only 8 (having the highest importances) will be allocated to the reference
transmitter.
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value goes from 0
to 100%.
Except forced neighbour case (importance = 100%), priority assigned to each neighbourhood cause is now linked to the
(IF) Importance Function evaluation. The importance is evaluated through a function (IF), taking into account the following
3 factors:
Co-site factor (C) which is a Boolean factor,
Adjacency factor (A) which deals with the percentage of adjacency,
Overlapping factor (O) meaning the percentage of overlapping
Figure 5.13Overlapping Zones
Neighbourhood cause When
Importance
value
Existing neighbour
Only if the Delete existing neighbours option is not selected
and in case of a new allocation
Existing
importance
Exceptional pair Only if the Force exceptional pairs option is selected 100 %
Co-site transmitter
Only if the Force co-site transmitters as neighbours option is
selected
(IF) function
Adjacent transmitter
Only if the Force adjacent transmitters as neighbours option is
selected
(IF) function
Neighbourhood relationship that fulfils
coverage conditions
Only if the % minimum covered area is exceeded (IF) function
Symmetric neighbourhood
relationship
Only if the Force neighbour symmetry option is selected (IF) function
S
A
S
B

S
A
---------------------- 100
S
A
S
B

Forsk 2010 AT283_TRG_E2 181


Chapter 5: GSM GPRS EDGE Networks
The (IF) function is user-definable using the Min importance and Max importance fields.
The (IF) function is evaluated as follows:
Where Delta(x) = Max(x) - Min(x)
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site, adjacent, coverage or symmetric. For
neighbours accepted for co-site, adjacency and coverage reasons, Atoll displays the percentage of area meeting the
coverage conditions (or the percentage of covered traffic on this area) and the corresponding surface area (km
2
) (or the
traffic covered on the area in Erlangs), the percentage of area meeting the adjacency conditions and the corresponding
surface area (km
2
). Finally, if cells have previous allocations in the list, neighbours are marked as existing.
Factor
Min
importance
Default value
Max
importance
Default value
Overlapping factor (O) Min(O) 1% Max(O) 30%
Adjacency factor (A) Min(A) 30% Max(A) 60%
Co-site factor (C) Min(C) 60% Max(C) 100%
Neighbourhood cause
(IF) function
(IF) function with default Min
and Max default values
Co-site Adjacent
no no Min(O) + Delta(O)(O) 1% + 29%(O)
no yes
Min(A)+Delta(A){Max(O)(O)+(100%-
Max(O))(A)}
30% + 30%{30%(O) + 70%(A)}
yes yes
Min(C)+Delta(C){Max(O)(O)+(100%-
Max(O))(A)}
60% + 40%{30%(O )+ 70%(A)}
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in this order: first co-site neighbours, then adjacent
neighbours, and finally neighbours found on overlapping criterion.
If ranges of (IF) factors overlap each other, the neighbours may not be ranked by
neighbourhood cause.
The ranking between neighbours from the same category will depend on (A) and (O)
factors.
The default value of Min(O)= 1%, ensures that neighbours selected for symmetry will have
an importance greater than 0%. With a value of Min(O)= 0%, neighbours selected for
symmetry, will have an importance field greater than 0% only if there is some overlapping.
Notes:
No coverage prediction is needed to perform an automatic neighbour allocation. When
starting an automatic neighbour allocation, Atoll automatically calculates the path loss
matrices if not found.
Atoll uses traffic map(s) selected in the default traffic analysis in order to determine the
percentage of traffic covered in the overlapping area.
When the option Force adjacent transmitters as neighbours is used, the margin
handover start is not taken into account. Atoll considers a fixed value of 0 dB.
A forbidden neighbour must not be listed as neighbour except if the neighbourhood
relationship already exists and the Delete existing neighbours option is unchecked when
you start the new allocation. In this case, Atoll displays a warning in the Event viewer
indicating that the constraint on the forbidden neighbour will be ignored by algorithm
because the neighbour already exists.
The force neighbour symmetry option enables the users to consider the reciprocity of a
neighbourhood link. This reciprocity is allowed only if the neighbour list is not already full.
Thus, if transmitter B is a neighbour of the transmitter A while transmitter A is not a
neighbour of the transmitter B, two cases are possible:
1
st
case: There is space in the transmitter B neighbour list: the transmitter A will be added
to the list. It will be the last one.
2
nd
case: The transmitter B neighbour list is full: Atoll will not include transmitter A in the
list and will cancel the link by deleting transmitter B from the transmitter A neighbour list.
When the options Force exceptional pairs and Force symmetry are selected, Atoll
considers the constraints between exceptional pairs in both directions so as to respect
symmetry condition. On the other hand, if neighbourhood relationship is forced in one
direction and forbidden in the other one, symmetry cannot be respected. In this case, Atoll
displays a warning in the Event viewer.
182 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.8.2 Allocation for a Group of Transmitters or One Transmitter
In this case, Atoll allocates neighbours to:
TBA transmitters,
Neighbours of TBA transmitters marked as exceptional pair, adjacent and symmetric,
Neighbours of TBA transmitters that satisfy coverage conditions.
Automatic neighbour allocation parameters are described in "Global Allocation for All Transmitters" on page 179.
5.9 AFP Appendices
5.9.1 The AFP Cost Function
The notations listed hereafter are used to describe the cost function:
TRG: Group of TRXs
TRGs: Set of all the TRGs
: If and only if
: Size of any group g
ARFCN: Set of all the frequencies
: Set of all the subsets of frequencies
: The largest integer
: Number of times a group is assigned to TRG
i
in the assignment A
For example:
- When i is NH, g is a single member group containing one of the frequencies assigned at TRG
i
.
If |g| is not 1 or if g does not contain a frequency assigned at i, then .
- When i is BBH, can be either 0 or equal to the number of TRXs in TRG
i
.
= Number of TRXs in TRG
i
g is the set of frequencies assigned to TRXs of TRG
i
. (|g| = number of
TRXs in TRG
i
).
When we talk about "TRXs of i using g", and in the case of BBH, then there are |g| such virtual TRXs, each
using the entire group g and having a virtual MAIO [0, |g| - 1].
- When i is SFH, must be less than or equal to the umber of TRXs in TRG
i
. g is the set of
frequencies assigned to n TRXs of TRG
i
.
We assume all the groups assigned to TRG
i
to have the same length.
TS
i
: Number of timeslots available for each TRX in TRG
i
TL
i
: Traffic load of TRG
i
(calculated or user-defined)
of a single TRX in TRG
i
divided by TS
i
TSU
i
: Downlink timeslot use ratio (due to DTX) at TRG
i
CF
i
: Cost factor of TRG
i
(AFP Weight)
QMIN
i
: Minimum required quality (in C/I) at TRG
i
PMAX
i
: Percentage permitted to have quality lower than QMIN
i
at TRG
i
REQ
i
: Required number of TRXs at TRG
i
A communication uses the group g in TRG
i
if its mobile allocation is g. The probability to be interfered is denoted by
(i is the TRX index). Different TRX indexes may have different MAIOs. is a function of the whole
frequency assignment. The precise definition of the term to be interfered is provided afterwards. The probability penalty
due to violating a separation constraint is . It is a function of the whole frequency assignment as well.
The term Atom will be used in the following context:
For two TRGs, i and k,
i and k are synchronised, have the same HSN, the same MAL length and the same hopping mode.
In the Results, Atoll displays only the transmitters for which it finds new neighbours.
Therefore, if a transmitter has already reached its maximum number of neighbours before
starting the new allocation, it will not appear in the Results table.
g
2
ARFCN
x x s
A
i g ,
g 2
ARFCN
e
A
i g ,
1 =
A
i g ,
0 =
A
i g ,
A
i g ,
A
i g ,
A
i g ,
n =
TL
i
#Erlangs =
P
i i' g , ,
A ( ) P
i i' g , ,
A ( )
P
i i' g , ,
A ( )
ATOM i ( ) ATOM k ( )
Forsk 2010 AT283_TRG_E2 183
Chapter 5: GSM GPRS EDGE Networks
NH TRGs or BBH TRGs are always in separate atoms. If two TRGs interfere but are not in the same atom, these can be
taken as unsynchronised. The quality of unsynchronised TRGs is a function of all possible frequency combinations. For
synchronised TRGs, pairs of frequencies emitted at the same time are known.
5.9.1.1 Cost Function
The Atoll AFP cost function is a TRX based cost and not an interference matrix entry based cost. It counts the impaired
traffic of the network TRXs in weighted Erlangs.
The cost function is reported to the user during the AFP progress with the help of its 5 components: , ,
, and .
= + + + +
where,
represents the missing TRX cost component
represents the separation component
represents the additional cost component (interference, cost of changing a TRX)
represents the corrupted TRX cost component
represents the out-of-domain frequency assignment cost component
In the above equations,
i is the TRX index belonging to .
is the number of missing TRXs for the subcell i.
is the cost value for a missing TRX. This value can vary between 0 and 10. The default cost value is set to 1
and can be modified in the AFP module properties dialog.
is the number of corrupted TRXs for the subcell i.
is the cost value of a corrupted TRX. This value can vary between 0 and 10. The default cost value is set to 10
and can be modified in the AFP module properties dialog.
is the number of TRXs, for the subcell i, having out-of-domain frequencies assigned.
is the cost value of a TRX with out-of-domain frequencies assigned. This value can vary between 0 and 1. The
default cost value is set to 0.5 and can be modified in the AFP module properties dialog.
And, as mentioned earlier, a virtual TRX is considered in case of BBH.
If i is valid, the algorithm evaluates the cost of a valid TRX. This cost has two components, and
.
+ +
mi s
+
sep
+
comp
+
corr
+
dom
+ +
mi s
+
sep
+
comp
+
corr
+
dom
+
mi s
+
sep
+
comp
+
corr
+
dom
+
mi s
MIS_TRX
i
( ) TL
i
CF
i
TS
i

i TRGs e

=
+
corr
CORR_TRX
i
O ( ) TL
i
CF
i
TS
i

i TRGs e

=
+
dom
DOM_TRX
i
e ( ) TL
i
CF
i
TS
i

i TRGs e

=
+
sep
o'
i i' g , ,
A ( )
g 2
ARFCN
e
i' TRXs of i using g e

\ .
|
|
|
|
|
|
| |
TL
i
CF
i
TS
i

i TRGs e

=
+
comp
o''
i i' g , ,
A ( )
g 2
ARFCN
e
i' TRXs of i using g e

\ .
|
|
|
|
|
|
| |
TL
i
CF
i
TS
i

i TRGs e

=
0 1 ... A
i g ,
1 , , , { }
MIS_TRX
i
MIS_TRX
i
MAX 0 REQ
i
A
i g ,
g 2
ARFCN
e

, =

CORR_TRX
i
O
DOM_TRX
i
e
o'
i i' g , ,
A ( )
o''
i i' g , ,
A ( )
184 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the separation violation probability penalty.
is complementary probability penalty due to interference and the cost of modifying a TRX.
If the option Take into account the cost of all the TRXs available in the AFP module properties dialog is selected,
then,
and
Or if the option Do not include the cost of TRXs having reached their quality target available in the AFP module
properties dialog is selected, the algorithm compares with the quality target specified for i,
:
If ,
Then and .
Otherwise,
Both and will be equal 0.
is the same as (separation violation probability penalty) and the same as
(complementary probability penalty due to interference and the cost of modifying a TRX) in most cases. These are
explained in detail in the next sections.
5.9.1.2 Cost Components
Separation violation and interference cost components are described hereafter. Parameters considered in the cost
function components can be fully controlled by the user. Some of these parameters are part of the general data model
(quality requirements, percentage of interference allowed per subcell), while others (such as separation costs and diversity
gains) can be managed through the properties dialog of the Atoll AFP module.
5.9.1.2.1 Separation Violation Cost Component
The separation violation cost component is evaluated for each TRX. Estimation is based on costs specified for the required
separations.
Let denote the required separation constraint between TRG
i
and TRG
k
. Let denote the user
defined separation penalty for a required separation s and actual separation z. is used instead of
as abbreviation.
is considered to be the effect of a separation violation on the th TRX of TRG
i
assigned the group g, caused by
the th TRX of TRG
k
assigned the group .
denotes the overall weight of the separation violation cost component. This value can be between 0 and 1, set to 1 by
default. It can be modified in the AFP module properties dialog.
represents the weight of the specific separation constraint between i and k. This specific weight depends on the type
of separation violation and follows the following priority rule:
1. Exceptional pairs
2. Co-transmitters
3. Co-site
4. Neighbours
For example, if a pair of subcells are co-site and neighbours at the same time, they will be considered as co-site because
higher priority. Hence, of these subcells will be the weight of co-site relations. If only a neighbour relation exists
between two subcells, then will be further weighted by the neighbour relation importance. The value of remains
between 0 and 1. The default weights of each type of separation are available in the Separation cost tab.
If
Then , which is same for all values of k.
If
o'
i i' g , ,
A ( )
o''
i i' g , ,
A ( )
o'
i i' g , ,
A ( ) P'
i i' g , ,
A ( ) = o''
i i' g , ,
A ( ) P''
i i' g , ,
A ( ) =
P'
i i' g , ,
A ( ) P''
i i' g , ,
A ( ) +
P
MAX
P'
i i' g , ,
A ( ) P''
i i' g , ,
A ( ) + P
MAX
>
o'
i i' g , ,
A ( ) P'
i i' g , ,
A ( ) = o''
i i' g , ,
A ( ) P''
i i' g , ,
A ( ) =
o'
i i' g , ,
A ( ) o''
i i' g , ,
A ( )
P'
i i' g , ,
A ( ) o'
i i' g , ,
A ( ) P''
i i' g , ,
A ( ) o''
i i' g , ,
A ( )
Note:
The AFP module properties dialog takes probability percentages as inputs while this
document deals in probability values.
SEP_CONSTR
i k ,
Cost
s z ,
SEP
i k v , ,
Cost
SEP_CONSTR
i k ,
z ,

i i' kgg' k'


i'
k' g'

i k
i k
i k i k
ATOM i ( ) ATOM k ( ) =

i i' kgg' k'


i k
SEP
i k f f' , ,
f g e
f' g' e

g g'
---------------------------------------------- =
ATOM i ( ) ATOM k ( ) =
Forsk 2010 AT283_TRG_E2 185
Chapter 5: GSM GPRS EDGE Networks
Then
In the above equations, is the number of frames in the MAL g. .
Let denote the instantaneous frame number from 0 to .
While modulo and is the frequency in g,
And modulo and is the frequency in g.
In addition, frequencies belonging to a MAL with a low fractional load, and breaking a separation constraint, should not be
weighted equally as in a non-hopping separation breaking case. Therefore, the cost is weighted by an interferer diversity
gain.
The separation gain, denoted by is basically a function of the MAL length (and, of course, of the
hopping mode). With frequency hopping, the effects of DTX and traffic load become more significant (due to the
consideration of the average case instead of the worst case). For this reason, it is possible to consider these effects in
through the relevant option available in the Advanced tab of the AFP module properties dialog.
Without this option, the is:
is the user defined interferer diversity gain (dB) for a given MAL length. It is used in definition as well.
On the other hand, if this option is selected, the becomes,
Where ,
And
More than one separation violations may exist for a TRX. Many small and have to be combined to form
one cost element, the . This is done through iterating over all violating assignments and by summing up an
equivalent to the probability of not being violated while considering each separation violation as an independent probability
event. This sum is naturally limited to 100% of the TRX traffic, and is given by,
In the above formula, if , then , so that interference with itself is not taken into account.
5.9.1.2.2 Interference Cost Component
The interference cost component is evaluated for each TRX. Its estimation is based on interference histograms calculated
for pairs of subcells. In addition, it takes into account frequency and interferer diversity gains and models frequency
hopping and gain due to DTX.
When estimating , the following problems are encountered:
Note:
Since , we shortly denote the two as .

i i' kgg' k'


i k
SEP
i k g
u
g'
t
, ,
f_n 0 1 ... F_N 1 , , , { } e

F_N
------------------------------------------------------------------------------------- =
F_N g ( ) F_N g ( ) g =
F_N g ( ) F_N g' ( ) = F_N
f_n F_N
u f_n MAIO
A
i g i' , ,
+ ( ) = F_N g
u
u
th
t f_n MAIO
A
k g' k' , ,
+ ( ) = F_N g'
t
t
th
G

i k g g' , , ,
1
10
0.1 SEP_GAIN i k g g' , , , ( ) ( )
-------------------------------------------------------------------- =
SEP_GAIN i k g g' , , , ( )
SEP_GAIN i k g g' , , , ( )
SEP_GAIN i k g g' , , , ( )
SEP_GAIN i k g g' , , , ( ) I_DIV g ( ) =
I_DIV g ( ) P
i i' g , ,
A ( )
SEP_GAIN i k g g' , , , ( )
SEP_GAIN i k g g' , , , ( ) I_DIV g ( ) 0.5 TSU_GAIN k ( ) mi n 10 4 2 I_DIV g ( ) + ( )
2 ASYN_GAIN i k g' , , ( ) + ( )
4
-----------------------------------------------------------------------
\ .
| |
+ ,
\ .
| |

\ .
| |
+ =
TSU_GAIN k ( ) log
10
1
TL
k
TSU
k

-------------------------------
\ .
| |
=
ASYN_GAIN i k g' , , ( )
0 if ATOM(i) = ATOM(k)
I_DIV( g' ) Otherwise
=
G

i k g g' , , ,
'
i i' kgg'
P'
i i' g , ,
A ( )
P'
i i' g , ,
A ( )
1 1
i i' kgg' k'
G

i k g g' , , ,
( )
k TRGs e
g' 2
ARFCN
e
k' TRXs of k using g' e
[

\ .
|
|
|
|
|
|
|
| |
=
k i = ( ) k' i' = ( )
Note:
Interference histograms are described in User Manual (GSM GPRS EGPRS project
management, GSM GPRS EGPRS network optimisation, GSM GPRS EGPRS generic
AFP management). Interference histograms can also be exported to files. For further
description, refer to "Interferences" on page 190.
P''
i i' g , ,
A ( )
186 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The QMINi C/I quality indicator corresponds to the accumulated interference level of all interferers while the C/I
interference histograms correspond to pair-wise interferences.
Both QMINi and the histograms correspond to a single frequency. In case of a MAL containing more than one
frequencies, interferences on several different frequencies of a MAL must be combined.
This estimation, presented below, is the simplest possible as it solves the first problem by linear summation and
truncation at the value of 1 and it solves the second problem by averaging and adding the two diversity gains:
, the frequency diversity gain, and
, the interferer diversity gain.
Hereafter, denotes the global weight of interference cost component. This value can vary between 0 and 1 and is set
to 0.35 by default, which can be modified in the AFP module properties dialog.
Let be the number of frames in the MAL g. .
Let denote the instantaneous frame number from 0 to .
Let be the jth MAIO of , where j is one of the TRXs.
The value of is one of
If TRG
k
is NH, then .
If TRG
k
is BBH, then .
As said earlier, in case of BBH, we consider virtual TRXs, the jth TRX has the MAIO j.
Let be the ith frequency in the group g.
Similar to the definition of , is defined as an interference event. is the effect interference on the
th TRX of TRG
i
assigned the group g, caused by the th TRX of TRG
k
assigned the group .
If
Then
Where
If
Then,
Since , these are both represented by .
Where,
,
,
modulo ,
modulo ,
Therefore, we have,
In the above formula, if , then , so that interference with itself is not taken into account.
The sum is limited to 100% of the TRX traffic. is quite similar to . The
only difference is the frequency diversity gain, , added to .
F_DIV g ( )
I_DIV g ( )
o
F_N g ( ) F_N g ( ) g =
f_n F_N
MAIO
A
k g' j , ,
A
k g' ,
0 1 ... A
k g' ,
1 , , , { }
MAIO
A
k g' j , ,
0 1 ... g' , , , { }
MAIO
A
k g' j , ,
0 =
MAIO
A
k g' j , ,
j =
g'
g
i

i i' kgg' k'


'
i i' kgg' k'
'
i i' kgg' k'
i' k' g'
ATOM i ( ) ATOM k ( ) =
'
i i' kgg' k'
Probabi l i ty
C
I
i k
----- Q_UB
i k f f' , , ,
<
\ .
| |
g g'
--------------------------------------------------------------------------------
f g e f' g' e ,

=
Q_UB
i k f f' , , ,
QMIN
i
f f' ADJ_SUP INTERF_GAIN i k g g' , , , ( ) + =
ATOM i ( ) ATOM k ( ) =
F_N g ( ) F_N g' ( ) = F_N

i i' kgg' k'


Probabi l i ty
C
I
i k
----- Q_UB
i k f f' , , ,
<
\ .
| |
F_N
--------------------------------------------------------------------------------
)

`


f_n 0 1 ... F_N 1 , , , { } e

=
f g
u
=
f' g'
t
=
u f_n MAIO
A
i g i' , ,
+ ( ) = F_N
t f_n MAIO
A
k g' k' , ,
+ ( ) = F_N
Q_UB
i k f f' , , ,
QMIN
i
f f' ADJ_SUP INTERF_GAIN i k g g' , , , ( ) + =
P''
i i' g , ,
A ( ) 1 1 P'
i i' g , ,
A ( ) ( ) 1
i i' kgg' k'
( )
k TRGs e
g' 2
ARFCN
e
k' TRXs of k using g' e
[

)



`




P'
i i' g , ,
A ( ) =
i k = ( ) k' i' = ( )
INTERF_GAIN i k g g' , , , ( ) SEP_GAIN i k g g' , , , ( )
F_DIV g ( ) SEP_GAIN i k g g' , , , ( )
Forsk 2010 AT283_TRG_E2 187
Chapter 5: GSM GPRS EDGE Networks
5.9.1.2.3 I_DIV, F_DIV and Other Advanced Cost Parameters
When combining interference effects (or separation violation effects) on different frequencies belonging to a MAL, the
following considerations should be taken into account:
1. Non-linearity of Frame Error Rate (FER) with respect to average C/I conditions and MAL length.
2. Interference Diversity Gain. This factor represents that the effect of average negative effects over user geographic
location are directly proportional to the MAL length.
3. Frequency Diversity Gain. This factor models the gain due to diversity of multi-path effects and should be applied
to the interference cost component only.
4. The fact that long MALs with synthesized hopping permit discarding the worst case estimation and include a gain
due to DTX and low traffic load at the interferer end.
The Advanced properties tab shown in the figure below facilitates modelling these effects.
The Interference Diversity Gain table lists the values of I_DIV provided as a functions of MAL length. This gain is applied
to the interference cost component and to the separation constraint violation cost component. Therefore, it provides a
means to model the non-linear FER effects and interference diversity both. The default values in this table correspond to
the curve . This equation generates values somewhat lower than empirical best-found values (this is
because we prefer a slightly pessimistic cost function to be on the safe side).
The other table contains the F_DIV values, which are the same as the I_DIV values by default.
5.9.2 The AFP Blocked Traffic Cost
This section provides additional information on the AFP cost components used for the optimisation of the number of TRXs.
This optimisation is performed for each traffic pool in the network. In most cases, the traffic pool is equivalent to a
transmitter and corresponds to the BCCH and TCH subcells. In more complex cases, a traffic pool may include additional
subcells, and more than one traffic pools may exist per transmitter.
The cost component described below, and the recalculation of traffic loads, is only used when the AFP performs the
oprimisation of the number of TRXs.
The notations listed hereafter are used for the description.
{BCCH, TCH(1), TCH(2), , TCH(n)}: Subcells of a traffic pool.
For concentric cells, at least two traffic pools exist per transmitter. The BCCH subcell may not always be part of
the pools TRX types.
{d(0), d(1), d(2), , d(n)}: Number of required TRXs of
each TRX type in the pool
{ts(0), ts(1), ts(2), , ts(n)}: Numbers of traffic timeslots
Figure 5.14The Advanced tab of the AFP module Properties dialogue
y 2 log
10
x ( ) =
188 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
{L(0), L(1), L(2), , L(n)}: Traffic loads
{CF(0), CF(1), CF(2), , CF(n)}: AFP cost factors
CS (Erlangs): Overall circuit-switched traffic
demand of the traffic pool (Subcells table or traffic analysis results)
PS (Data Timeslots): Overall packet-switched traffic
demand of the traffic pool (Subcells table or traffic analysis results)
If CS or PS is less than 1, its value is set to 1 in order to avoid working with transmitters carrying no traffic.
{nb(0), nb(1), nb(2), , nb(n)}: Number of TRXs in the
frequency plan
{HR(0), HR(1), HR(2), , HR(n)}: TCH HR use ratios
5.9.2.1 Calculation of New Traffic Loads Including Blocked Traffic Loads
During the optimisation of the number of TRXs, traffic loads are calculated in order to determine the blocked traffic loads
. The blocked traffic load is then multiplied by the AFP cost weight and the number of timeslots to calculate the
blocked traffic cost.
Without the optimisation of the number of required TRXs, the networks weighted Erlangs are calculated as follows:
With the optimisation of the number of TRXs, the networks weighted Erlangs are calculated as follows:
and represent the load estimation and the blocked load estimation of the AFP. They are calculated at
traffic pool level for the vector {nb(0), nb(1), nb(2), , nb(n)} as follows:
Where
is determined from the above equation once is known. is obtained from the Erlang B equation
applied to the traffic pool demand and the total number of timeslots (TTS):
The Max() function above gives 1 timeslot when there is no TRX.
The above equations give the number of served circuit-switched timeslots (SCS):
The number of served packet-switched timeslots (SPS) is obtained as follows:
is given by:
is given by:
BL nb ( )
WE d i ( ) ts i ( ) L i ( ) CF i ( )
i 0 =
n

=
WE nb i ( ) ts i ( ) BL nb ( ) L nb ( ) + { } CF i ( )
i 0 =
n

=
BL nb ( ) L nb ( )
BL nb ( ) L nb ( ) +
PS CS 1
HR
2
---------------
\ .
| |

)
`

+
Max 1 nb i ( ) ts i ( )
i 0 =
n

,
\ .
|
|
| |
------------------------------------------------------------------- =
HR Max
i 0 =
n
HR i ( ) ( ) =
BL nb ( ) L nb ( ) L nb ( )
TTS Max 1
nb i ( ) ts i ( )
1
HR
2
---------------
\ .
| |
-------------------------------
i 0 =
n

,
\ .
|
|
|
| |
=
P
Bl ocki ng
Erl angB CS TTS , ( ) =
SCS 1
HR
2
---------------
\ .
| |
CS 1 P
Bl ocki ng
( ) =
SPS Mi n PS Max 1 nb i ( ) ts i ( )
i 0 =
n

,
\ .
|
|
| |
SCS ,
)

`


=
L nb ( )
L nb ( )
SCS SPS +
Max 1 nb i ( ) ts i ( )
i 0 =
n

,
\ .
|
|
| |
------------------------------------------------------------------ =
BL nb ( )
Forsk 2010 AT283_TRG_E2 189
Chapter 5: GSM GPRS EDGE Networks
Once and are known, replaces TLi in the cost function (See "The AFP Cost Function" on
page 182), and is used to generate a new cost component, the blocked Erlangs of the pool:
5.9.2.2 Recalculation of CS and PS From Traffic Loads
In earlier versions, the detailed traffic demand information is not available. In order to guide the AFP to generate it from
the loads, the following two equations with three variables must be solved. The equations are solvable due to the
monotone nature of the Erlang B function.
Inputs for a given traffic pool:
{d(0), d(1), d(2), , d(n)}: Number of required TRXs of each TRX type in the pool
L: Traffic load
:
MB: Maximum blocking rate (between 0 and 1).
The ratio of packet-switched demand is given by:
Here, we assume that a traffic load of 1 is generated by a demand of (1+MB)*TTS which generates a blocking rate of MB.
In other words, the ratio is calculated so that the worst case blocking rate is BM, giving a load of 1.
The following equations are solved to find PS, CS, and R, which are calculated for a traffic load of 1.
When the traffic load of a pool is not 1, PS is different from PS and CS is different from CS. Here, however, we assume
that R = R. This assumption implies that R is more or less the same as MB for big traffic pools and considerably larger
than MB for smaller pools.
The following equations are solved to find PS, CS, and R, which are calculated for the actual traffic loads.
The above five equations are solved to get the values of the five variables PS, PC, , SCS, SPS, and calculate
the cost.
BL nb ( )
PS CS 1
HR
2
---------------
\ .
| |
+
Max 1 nb i ( ) ts i ( )
i 0 =
n

,
\ .
|
|
| |
------------------------------------------------------------------ L nb ( ) =
L nb ( ) BL nb ( ) L nb ( )
BL nb ( )
nb i ( ) ts i ( ) BL nb ( ) CF i ( )
i 0 =
n

TTS' TTS' Max 1


d i ( ) ts i ( )
1
HR
2
---------------
\ .
| |
------------------------------
i 0 =
n

,
\ .
|
|
|
| |
=
R
PS
PS CS 1
HR
2
---------------
\ .
| |
+
------------------------------------------------------------ =
MB Erl angB CS' TTS' , ( ) =
R'
PS'
PS' CS' 1
HR
2
---------------
\ .
| |
+
-------------------------------------------------------------- =
1 MB + ( ) TTS'
PS'
1
HR
2
---------------
\ .
| |
------------------------------ CS' + =
R
PS
PS CS 1
HR
2
---------------
\ .
| |
+
------------------------------------------------------------ =
P
Bl ocki ng
Erl angB CS TTS' , ( ) =
SCS 1
HR
2
---------------
\ .
| |
CS 1 P
Bl ocki ng
( ) =
SPS Mi n PS Max 1 d i ( ) ts i ( )
i 0 =
n

,
\ .
|
|
| |
SCS ,
)

`


=
SCS SPS + d i ( ) ts i ( ) L i ( )
i 0 =
n

=
P
Bl ocki ng
190 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
5.9.2.3 Testing the Blocked Cost Using Traffic Analysis
As long as the conditions below hold truw, the blocked cost calculation in the AFP and the effective overflow calculation
in the KPI calculation and dimensioning use the same algorithm. The conditions are:
The AFP cost factors are 1,
The HR ratios are the same within the subcells of a traffic pool,
The dimensioning model is based on Erlang B,
The timeslot configurations are the default ones,
There exists at least one TRX in the traffic pool (and at least one Erlang of traffic),
All transmitters belong to the same HCS Layer.
Effective Overflow rate =
Output: New values for CS and PS.
5.9.3 Interferences
This appendix provides a high-level overview of interferences taken into account by the AFP.
5.9.3.1 Using Interferences
If interferences are to be taken into account by the AFP, they must be calculated or imported beforehand. In order to do
this, the user should previously decide to take interferences into account (enabling the loading of all the potential
interferers). Otherwise, Atoll does not allow performing their computation by disabling the histogram part in the
corresponding dialog.
5.9.3.2 Cumulative Density Function of C/I Levels
For each [interfered subcell, interfering subcell] pair, Atoll calculates a C/I value on each pixel of the interfered subcell
service area (as if the two subcells share the same channel). Then, Atoll integrates these C/I values to determine a C/I
distribution and transforms this distribution function into a cumulative density function in the normal way.
In Atoll, both the IM
co
and IM
adj
are represented by this Cumulative Density function This implies that each query for the
probability to have C/I conditions worse than X dB requires a single memory access: the co-channel interference
probability at X dB. In order to deduce the adjacent interference probability value, Atoll looks up the cumulative density
function at the value corresponding to X - Y dB, Y dB being the adjacency suppression value. The following example may
be helpful in further clarifying this concept:
Example: Let [TX1, BCCH] and [TX2, BCCH] be the interfered and interfering subcells respectively. The service
areas for both have been defined by Best Server with 0 dB margin. The interference probability is stated in
percentage of interfered area.
In this case, we observe that the probability for C/I (BCCH of TX2 effecting the BCCH of TX1) being greater than
0 is 100% (which is normal because TX1 is the Best Server). The probability of having a C/I value at least equal
to 31 dB is 31.1%. For a required C/I level of 12 dB on the BCCH of TX1, the interference probability is 6.5% (as
this requirement is fulfilled with a probability of 93.5%).
1
L nb ( )
L nb ( ) BL nb ( ) +
------------------------------------------
Figure 5.15The cumulative density of C/I levels between [TX1, BCCH] and [TX2, BCCH]
Note:
The subcell power offset does not enter the calculation results in the .clc file. It is added
later by the AFP interface. On the other hand, its influence on the subcell service zone is
taken into account in the .clc file.
Forsk 2010 AT283_TRG_E2 191
Chapter 5: GSM GPRS EDGE Networks
5.9.3.3 Precise Definition
is defined to be the probability of a communication (call) occupying a timeslot in subcell v (victim) to have
C/I conditions of C_I with respect to a co-channel interference from the BCCH TRX of cell n (neighbour). We assume C_I
values to be discrete and in dB. CDF(Pci) is the cumulative density function of Pci:

5.9.3.4 Precise Interference Distribution Strategy
Why does Atoll calculate and maintain precise interference distributions, while the most common solution (used by most
other tools) is rather to compress the information into two values: the co-channel and adjacent-channel interference
probabilities?
The reason is simply that it,
improves the AFP result,
introduces very little (or no) overhead, and
creates more generic interference information.
5.9.3.4.1 Direct Availability of Precise Interference Distribution to the AFP
In the presence of frequency hopping, and when one or more frequencies are common (or adjacent) in two interfering MAL
sequences, the hopping gain depends on following factors:
the MAL length,
the traffic load on the interferer TRX,
DTX level, and
the number of common (and adjacent) frequencies in the two MALs.
All these factors cannot be pre-calculated since it is the AFP that determines the MAL length and the MAL frequencies.
5.9.3.4.2 Efficient Calculation and Storage of Interference Distribution
In the innermost loop of the calculation process Atoll increments a counter each time a C/I level has a certain value. In
the case of a two-entry IM, there are only two counters for each [interfered, interferer] pair. In the case of precise
distribution information, there are about 40 counters per pair. In both cases, the number of operations is the same: one
increment of an integer value. Once Atoll finishes the counting for an [interfered, interferer] pair, it compresses the
information from the counters to a Cumulative Density Function (CDF) representation. In this way, access to interference
probability at a certain level is instantaneous. Thus, the only overheads are the read / write times to the files and the
memory occupation at running time. These two overheads are negligible and do not affect the calculations, the heaviest
part of the task.
5.9.3.4.3 Robustness of the IM
By having precise C/I distributions calculated and exported, the user is free to change the following settings without the
need for recalculating their interference distributions:
1. Quality requirements of network elements (required C/I, % Probability Max, ),
2. C/I weighting (the interference levels above and below the C/I target),
3. Separation requirements and/or neighbour relations,
4. Hopping gain values, DTX activities, traffic load levels, HSNs, synchronisation information,
5. Any frequency assignment setting (MAL length directives, frequency domains, assignment strategies, number of
required TRXs, cost function parameters, ), or
6. Remove equipment
By not mixing any of the elements above, the interference information keeps its original probability units and is easier to
check and validate. Therefore, the user spends less time on interference recalculations than in the case of a two-entry
matrix (where everything is included).
5.9.3.5 Traffic Load and Interference Information Discrimination
Atoll maintains the traffic load separate from the interference information. The reasons for implementing this strategy are
explained here.
Let us look at the possible alternatives to this strategy:
1. The mixed option: The interference information contains the traffic information as well. In this way, each IM entry
will contain the quantity of traffic interfered if a co-channel / adjacent channel reuse exists.
2. The separated option: The AFP has separate access to traffic load information and to interference probabilities
(As in Atoll).
Knowing the difference between the two alternative solutions explains why the second strategy has been opted for for
Atoll. However, in detail, this has been done because:
Option 2 is a superset that contains option 1. But option 1, being a subset, does not contain option 2 (i.e. once the
information are mixed they cannot be separated).
Pci v n C_I , , ( )
CDF Pci v n C_I , , ( ) ( ) Pci v n x , , ( )
x C_I >

=
192 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
It does not create any overhead (the size of the additional information is negligible compared to the size of the IM).
It helps keeping the unit definitions simpler.
It is facilitates merging IMs with different traffic units.
The traffic information can be used for weighting the separation violation component.
The traffic load can be used in deciding whether a TRX can be left uncreated.
For example, if there are too many TRXs at a site and the user wishes that the AFP remove one of them, in order
to be able to not violate site constraints, the AFP must know the traffic loads in order to choose a low load TRX to
be removed.
The gain introduced by the traffic load of the interferer depends on the hopping mode and the MAL size.
Incorporating this gain in the IM (as a result of the mixed option) means that the IMs become hopping-mode and
MAL-size dependent. This is a bad idea since the AFP should be able to change the MAL. And the user should
be able to change the hopping mode without recalculating the IM. In addition, an IM calculated externally to Atoll,
with a non-hopping BCCH can be used for the hopping TCH.
A third option also exists. Though, this option is so practically useless due to its inefficiency. It consists in mixing IM and
traffic but still keeping the traffic in its isolated form. This is again a bad idea because of the unit definition and the variety
of IM sources. It involves less benefits than the option chosen in Atoll.
Chapter 6
UMTS HSPA Networks
Forsk 2010 AT283_TRG_E2 195
Chapter 6: UMTS HSPA Networks
6 UMTS HSPA Networks
6.1 General Prediction Studies
6.1.1 Calculation Criteria
Three criteria can be studied in point analysis (Profile tab) and in common coverage studies. Study criteria are detailed in
the table below:
where,
EIRP is the effective isotropic radiated power of the transmitter,
ic is a carrier number,
is the loss on the transmitter-receiver path (path loss) calculated by the propagation model,
is the transmitter antenna attenuation (from antenna patterns),
is the shadowing margin. This parameter is taken into account when the option Shadowing taken into
account is selected,
are the indoor losses, taken into account when the option Indoor coverage is selected,
are the receiver losses,
is the receiver antenna gain,
is the transmitter antenna gain,
is the transmitter loss ( ). For information on calculating transmitter loss, see "UMTS, CDMA2000,
TD-SCDMA, WiMAX, and LTE Documents" on page 128.
6.1.2 Point Analysis
6.1.2.1 Profile Tab
Atoll displays either the signal level received from the selected transmitter on a carrier ( ), or the highest signal
level received from the selected transmitter on all the carriers.
6.1.2.2 Reception Tab
Analysis provided in the Reception tab is based on path loss matrices. So, you can study reception from TBC transmitters
for which path loss matrices have been computed on their calculation areas.
Study criteria Formulas
Signal level ( ) in dBm
Signal level received from a transmitter on a carrier (cell)
Path loss ( ) in dBm
Total losses ( ) in dBm
Notes:
( is the cell pilot power).
It is possible to analyse all the carriers. In this case, Atoll takes the highest pilot power of
cells to calculate the signal level received from a transmitter.
Atoll considers that and equal zero.
P
rec
P
rec
i c ( ) EIRP i c ( ) L
path
M
Shadowi ng model
L
Indoor
G
term
L
term
+ =
L
path
L
path
L
model
L
ant
Tx
+ =
L
total
L
total
L
path
L
Tx
L
term
L
i ndoor
M
Shadowi ng model
+ + + + ( ) G
Tx
G
term
+ ( ) =
L
model
L
ant
Tx
M
Shadowi ng model
L
Indoor
L
term
G
term
G
Tx
L
Tx
L
Tx
L
total DL
=
EIRP i c ( ) P
pi l ot
i c ( ) G
Tx
L
Tx
+ = P
pi l ot
i c ( )
G
term
L
term
Note:
For a selected transmitter, it is also possible to study the path loss, , or the total
losses, . Path loss and total losses are the same on any carrier.
P
rec
i c ( )
L
path
L
total
196 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For each transmitter, Atoll displays either the signal level received on a carrier, ( ), or the highest signal level
received on all the carriers.
Reception bars are displayed in a decreasing signal level order. The maximum number of reception bars depends on the
signal level received from the best server. Only reception bars of transmitters whose signal level is within a 30 dB margin
from the best server can be displayed.
6.1.3 Coverage Studies
For each TBC transmitter, Txi, Atoll determines the selected criterion on each pixel inside the Txi calculation area. In fact,
each pixel within the Txi calculation area is considered as a potential (fixed or mobile) receiver.
Coverage study parameters to be set are:
The study conditions in order to determine the service area of each TBC transmitter,
The display settings to select how to colour service areas.
6.1.3.1 Service Area Determination
Atoll uses parameters entered in the Condition tab of the coverage study property dialogue to predetermine areas where
it will display coverage.
We can distinguish three cases:
6.1.3.1.1 All Servers
The service area of Txi corresponds to the bins where:
6.1.3.1.2 Best Signal Level and a Margin
The service area of Txi corresponds to the bins where:
And
M is the specified margin (dB).
Best function: considers the highest value.
6.1.3.1.3 Second Best Signal Level and a Margin
The service area of Txi corresponds to the bins where:
And
M is the specified margin (dB).
2
nd
Best function: considers the second highest value.
Note:
For a selected transmitter, it is also possible to study the path loss, , or the total
losses, . Path loss and total losses are the same on any carrier.
You can use a value other than 30 dB for the margin from the best server signal level, for
example a smaller value for improving the calculation speed. For more information on
defining a different value for this margin, see the Administrator Manual.
P
rec
i c ( )
L
path
L
total
Mi ni mumThreshol d P
rec
Txi
i c ( ) or L
total
Txi
or L
path
Txi
( ) s Maxi mumThreshol d <
Notes:
If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi
is the highest.
If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi
is either the highest or 2dB lower than the highest.
If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi
is 2dB higher than the signal levels from transmitters, which are 2
nd
best servers.
Mi ni mumThreshol d P
rec
Txi
i c ( ) or L
total
Txi
or L
path
Txi
( ) s Maxi mumThreshol d <
P
rec
Txi
i c ( )
Best
j i =
P
rec
Txj
i c ( ) ( ) M >
Mi ni mumThreshol d P
rec
Txi
i c ( ) or L
total
Txi
or L
path
Txi
( ) s Maxi mumThreshol d <
P
rec
Txi
i c ( )
2
nd
Best
j i =
P
rec
Txj
i c ( ) ( ) M >
Forsk 2010 AT283_TRG_E2 197
Chapter 6: UMTS HSPA Networks
6.1.3.2 Coverage Display
6.1.3.2.1 Plot Resolution
Prediction plot resolution is independent of the matrix resolutions and can be defined on a per study basis. Prediction plots
are generated from multi-resolution path loss matrices using bilinear interpolation method (similar to the one used to
evaluate site altitude).
6.1.3.2.2 Display Types
It is possible to display the transmitter service area with colours depending on any transmitter attribute or other criteria
such as:
Signal Level (in dBm, dBV, dBV/m)
Atoll calculates signal level received from the transmitter on each pixel of each transmitter service area. A pixel of a
service area is coloured if the signal level exceeds ( ) the defined minimum thresholds (pixel colour depends on signal
level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as
many layers as transmitter service areas. Each layer shows the different signal levels available in the transmitter service
area.
Best Signal Level (in dBm, dBV, dBV/m)
Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. Where other
service areas overlap the studied one, Atoll chooses the highest value. A pixel of a service area is coloured if the signal
level exceeds ( ) the defined thresholds (the pixel colour depends on the signal level). Coverage consists of several
independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds.
Each layer corresponds to an area where the signal level from the best server exceeds a defined minimum threshold.
Path Loss (dB)
Atoll calculates path loss from the transmitter on each pixel of each transmitter service area. A pixel of a service area is
coloured if path loss exceeds ( ) the defined minimum thresholds (pixel colour depends on path loss). Coverage consists
of several independent layers whose visibility in the workspace can be managed. There are as many layers as service
areas. Each layer shows the different path loss levels in the transmitter service area.
Total Losses (dB)
Atoll calculates total losses from the transmitter on each pixel of each transmitter service area. A pixel of a service area
is coloured if total losses exceed ( ) the defined minimum thresholds (pixel colour depends on total losses). Coverage
consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as
service areas. Each layer shows the different total losses levels in the transmitter service area.
Best Server Path Loss (dB)
Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. Where other
service areas overlap the studied one, Atoll determines the best transmitter and evaluates path loss from the best
transmitter. A pixel of a service area is coloured if the path loss exceeds ( ) the defined thresholds (pixel colour depends
on path loss). Coverage consists of several independent layers whose visibility in the workspace can be managed. There
are as many layers as defined thresholds. Each layer corresponds to an area where the path loss from the best server
exceeds a defined minimum threshold.
Best Server Total Losses (dB)
Atoll calculates signal levels received from transmitters on each pixel of each transmitter service area. Where service
areas overlap the studied one, Atoll determines the best transmitter and evaluates total losses from the best transmitter.
A pixel of a service area is coloured if the total losses exceed ( ) the defined thresholds (pixel colour depends on total
losses). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are
as many layers as defined thresholds. Each layer corresponds to an area where the total losses from the best server
exceed a defined minimum threshold.
Notes:
If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi
is the second highest.
If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi
is either the second highest or 2dB lower than the second highest.
If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi
is 2dB higher than the signal levels from transmitters, which are 3
rd
best servers.
>
>
>
>
>
>
198 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Number of Servers
Atoll evaluates how many service areas cover a pixel in order to determine the number of servers. The pixel colour
depends on the number of servers. Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the number of
servers exceeds ( ) a defined minimum threshold.
Cell Edge Coverage Probability (%)
On each pixel of each transmitter service area, the coverage corresponds to the pixels where the signal level from this
transmitter fulfils signal conditions defined in Conditions tab with different Cell edge coverage probabilities. There is one
coverage area per transmitter in the explorer.
Best Cell Edge Coverage Probability (%)
On each pixel of each transmitter service area, the coverage corresponds to the pixels where the best signal level received
fulfils signal conditions defined in Conditions tab. There is one coverage area per cell edge coverage probability in the
explorer.
6.2 Definitions and Formulas
Input parameters and formulas used in simulations and predictions (coverage predictions and point analysis) are detailed
in the tables below.
6.2.1 Inputs
This table lists simulation and prediction inputs (calculation options, quality targets, active set management conditions,
etc.).
>
Name Value Unit Description
Clutter parameter None Orthogonality factor
Site equipment parameter None MUD factor
Terminal parameter - HSDPA properties None MUD factor
Frequency band parameter None Carrier number
Cell parameter None
Threshold for macro diversity
specified for a transmitter on a given
carrier ic
Mobility parameter None
Ec/I0 target on downlink for the best
server
Global parameter None
Pilot RSCP threshold for compressed
mode activation
Global parameter None
Ec/I0 threshold for compressed mode
activation
(Reception equipment, R99 bearer, Mobility) parameter None Eb/Nt target on downlink
Global parameter None
Downlink Eb/Nt target increase due to
compressed mode activation
(Reception equipment, R99 bearer, Mobility) parameter None Eb/Nt target on uplink
Global parameter None
Uplink Eb/Nt target increase due to
compressed mode activation
Site parameter None
Number of channel elements available
for a site on uplink
Site parameter None
Number of channel elements available
for a site on downlink
Simulation result None
Number of channel elements of a site
consumed by users on uplink
Simulation result None
Number of channel elements of a site
consumed by users on downlink
F
ortho
F
MUD
Tx
F
MUD
Term
i c
AS_Th Txi i c , ( )
Q
pi l ot
req
E
c
I
0
------
\ .
| |
threshol d
RSCP
pi l ot
CM acti vati on
Q
pi l ot
CM acti vati on
Q
req
DL
E
b
N
t
------
\ .
| |
req
DL
Q
req
DL
A
Q
req
UL
E
b
N
t
------
\ .
| |
req
UL
Q
req
UL
A
N
max
CE UL
N
I
( )
N
max
CE DL
N
I
( )
N
CE UL
N
I
( )
N
CE DL
N
I
( )
Forsk 2010 AT283_TRG_E2 199
Chapter 6: UMTS HSPA Networks
Site equipment parameter - UL overhead resources for common
channels/cell
None
Number of channel elements used by
the cell for common channels on
uplink
Site equipment parameter - DL overhead resources for common
channels/cell
None
Number of channel elements used by
the cell for common channels on
downlink
(R99 bearer, site equipment) parameter None
Number of channel elements used for
R99 traffic channels on uplink
(R99 bearer, site equipment) parameter None
Number of channel elements used for
R99 traffic channels on downlink
(HSUPA bearer, site equipment) parameter None
Number of channel elements
consumed by the HSUPA bearer on
uplink
Site parameter kbps
Maximum Iub backhaul throughput for
a site in the uplink
Site parameter kbps
Maximum Iub backhaul throughput for
a site in the downlink
Simulation result kbps
Iub backhaul throughput for a site in
the uplink
Simulation result kbps
Iub backhaul throughput for a site in
the downlink
Site equipment parameter kbps
Iub throughput required by the cell for
common channels in the downlink
Site equipment parameter % HSDPA Iub backhaul overhead
Site equipment parameter kbps
Throughput carried by an E1/T1/
Ethernet link
(R99 bearer, site equipment) parameter kbps
Iub backhaul throughput consumed by
the R99 bearer in the uplink
(R99 bearer, site equipment) parameter kbps
Iub backhaul throughput consumed by
the R99 bearer in the downlink
(HSUPA bearer, site equipment) parameter kbps
Iub backhaul throughput consumed by
the HSUPA bearer in the uplink
Simulation constraint None
Maximum number of 512 bit-length
OVSF codes available per cell (512)
Simulation result None
Number of 512 bit-length OVSF codes
used by the cell
Site equipment parameter - DL overhead resources for common
channels/cell
None
Number of 256 bit-length OVSF codes
used by the cell for common channels
Cell parameter (for HSDPA only) None
Maximum number of 16 bit-length
OVSF codes available per cell for HS-
PDSCH
Cell parameter (for HSDPA only) None
Minimum number of 16 bit-length
OVSF codes available per cell for HS-
PDSCH
Terminal parameter None Terminal Noise Figure
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
None Transmitter Noise Figure
K
1.38 10
-23
J/K Boltzman constant
T 293 K Ambient temperature
W 3.84 MHz Hz Spreading Bandwidth
Cell parameter None Inter-technology downlink noise rise
Cell parameter
Only used in uplink interference-based calculations of the Monte-Carlo
simulation
None Inter-technology uplink noise rise
Network parameter
If not defined, it is assumed that there is no inter-carrier interference
None
Interference reduction factor between
two adjacent carriers and
N
Overhead C E UL
N
Overhead C E DL
N
R99 T CH C E UL
N
R99 T CH C E DL
N
HSUPA C E
T
Iub m ax
UL
N
I
( )
T
Iub m ax
DL
N
I
( )
T
Iub
UL
N
I
( )
T
Iub
DL
N
I
( )
T
Iub
Overhead DL
Overhead
Iub
HSDPA
T
E1 T1 Ethernet
T
Iub
R99 T CH UL
T
Iub
R99 T CH DL
T
Iub
HSUPA
N
max
Codes
Txi i c , ( )
N
Codes
Txi i c , ( )
N
Overhead C odes
N
max
Codes HS PDSCH
Txi i c , ( )
N
mi n
Codes HS PDSCH
Txi i c , ( )
NF
term
NF
Tx
NR
i nter techno y log
Tx DL ,
NR
i nter techno y log
Tx UL ,
RF i c i c
adj
, ( )
i c i c
adj
200 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Network parameter
If not defined, it is assumed that there is no inter-technology downlink
interferences due to external transmitters
None
Inter-technology Channel Protection
between the signal transmitted by Tx
and received by m assuming the
frequency gap between (external
network) and
Cell parameter (user-defined or simulation result) % Total uplink load factor of the cell
Simulation result %
Uplink cell load contribution due to
R99 traffic
Cell parameter %
Uplink cell load contribution due to
HSUPA traffic
Simulation constraint (global parameter or cell parameter) % Maximum uplink load factor of the cell
Simulation constraint (global parameter or cell parameter) % Maximum percentage of used power
W Thermal noise at transmitter
W Thermal noise at terminal
W
bps Chip rate
Site equipment parameter None Uplink rake receiver efficiency factor
Terminal parameter None
Downlink rake receiver efficiency
factor
R99 bearer parameter kbps R99 bearer downlink nominal bit rate
R99 bearer parameter None
Downlink spreading factor for active
users
R99 bearer parameter None
Downlink spreading factor for inactive
users
R99 bearer parameter None
ratio between DPCCH and DPCH
transmission duration on downlink
DPCCH and DPCH respectively refer
to the Dedicated Physical Control
Channel and Dedicated Physical
Channel
Cell parameter kbps
Maximum connection rate per user on
downlink
R99 bearer parameter kbps R99 bearer uplink nominal bit rate
Service parameter kbps
Uplink activity factor on E-DPCCH
channels
Service parameter kbps
Downlink Activity factor on A-DPCH
channel
Service parameter kbps
Minimum required bit rate that the
service should have in order to be
available in the uplink
Service parameter kbps
Minimum required bit rate that the
service should have in order to be
available in the downlink
R99 bearer parameter None
ratio between the DPCCH and DPCH
powers transmitted on uplink
DPCCH and DPCH respectively refer
to the Dedicated Physical Control
Channel and Dedicated Physical
Channel
Cell parameter kbps
Maximum connection rate per user on
uplink
None Service downlink processing gain
None Service uplink processing gain
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
X
UL
X
R99
UL
X
HSUPA
UL
X
max
UL
%Power
max
DL
N
0
Tx
NF
Tx
K T W NR
i nter techno y log
Tx UL ,

N
0
Term
NF
Term
K T W NR
i nter techno y log
Tx DL ,

R
c W 10
3

f
rake efficiency
UL
f
rake efficiency
DL
R
nomi nal
DL
F
spreading
DL
Active user ( )
F
spreading
DL
Inactive user ( )
r
c
DL
R
max
DL
R
nomi nal
UL
f
act ADPCH
UL
f
act ADPCH
DL
R
Guaranteed
UL
R
Guaranteed
DL
r
c
UL
R
max
UL
G
p
DL
W
R
nomi nal
DL
----------------------
G
p
UL
W
R
nomi nal
UL
----------------------
Forsk 2010 AT283_TRG_E2 201
Chapter 6: UMTS HSPA Networks
HSDPA bearer parameter None
Index of the HSDPA bearer obtained
by the user in the cell (Txi,ic)
HSDPA bearer parameter kbps
RLC peak rate supported by the
HSDPA bearer
Without MIMO:
With MIMO (transmit diversity):
With MIMO (spatial multiplexing):
kbps
RLC peak rate provided to the user in
the cell (Txi,ic) in the downlink
HSDPA study result
For single-carrier HSDPA users
For dual-cell HSDPA users
kbps
RLC peak rate provided to the user in
the downlink
START HERE %
HSDPA bearer consumption for a
packet (HSPA - Constant Bit Rate)
service user
HSDPA study result kbps
RLC peak throughput supported by
the HSDPA bearer
HSDPA study result kbps
Average RLC throughput supported
by the HSDPA bearer
HSDPA study result kbps
MAC rate supported by the HSDPA
bearer
HSDPA study result kbps
MAC throughput supported by the
HSDPA bearer
HSDPA study result kbps
User application throughput on
downlink
HSUPA study result kbps User application throughput on uplink
HSUPA study result kbps
User average application throughput
on uplink
HSUPA Bearer parameter None
Index of the HSUPA bearer obtained
in the cell (Txi,ic)
HSUPA bearer selection parameter kbps
Maximum number of retransmissions
a HARQ process will perform for a
block of data before moving on to a
new block of data, for the HSUPA
bearer index
HSUPA bearer parameter kbps
RLC peak rate supported by the
HSUPA bearer
HSUPA study result
kbps
RLC peak rate provided to the user in
the cell (Txi,ic) in the uplink
%
HSUPA bearer consumption for a
packet (HSPA - Constant Bit Rate)
service user
HSUPA study result kbps
Minimum RLC throughput supported
by the HSUPA bearer
HSUPA study result kbps
Average RLC throughput supported
by the HSUPA bearer
HSUPA study result kbps
MAC rate supported by the HSUPA
bearer
Service parameter (for HSDPA only) kbps Throughput offset
Service parameter (for HSDPA only) % Scaling factor
I
HSDPABearer
R
RLC peak
DL
I
HSDPABearer
( )
R
RLC peak
DL
Tx i c , ( )
R
RLC peak
DL
I
HSDPABearer
( )
R
RLC peak
DL
I
HSDPABearer
( )
R
RLC peak
DL
I
HSDPABearer
( ) 1 f
SM Gai n
G
SM
Max
1 ( ) + ( ) )
R
RLC peak
DL
R
RLC peak
DL
Tx i c , ( )
R
RLC peak
DL
Tx i c , ( )
i c Tx e

C
HSDPABearer
R
Guaranteed
DL
R
RLC peak
DL
I
HSDPABearer
( )
---------------------------------------------------------------------
T
RLC peak
DL
T
RLC Av
DL
R
MAC
DL
T
MAC
DL
T
appl i cati on
DL
T
appl i cati on
UL
T
appl i cati on Av
UL
I
HSUPABearer
N
Rtx
I
HSUPABearer
( )
R
RLC peak
UL
I
HSUPABearer
( )
R
RLC peak
UL
R
RLC peak
UL
I
HSUPABearer
( )
C
HSUPABearer
R
Guaranteed
UL
R
RLC peak
UL
I
HSUPABearer
( )
---------------------------------------------------------------------
T
RLC Mi n
UL
T
RLC Av
UL
R
MAC
UL
AR
SF
Rate
202 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Transmitter parameter W
Maximum shared power
Available only if the inter-carrier power
sharing option is activated
Cell parameter W Cell synchronisation channel power
Cell parameter W
Cell other common channels (except
CPICH and SCH) power
Cell parameter W Cell pilot power
Cell parameter (user-defined or simulation result) (for HSDPA only)
W
Available cell HSDPA power
HSDPA: High Speed Downlink Packet
Access
Simulation result (for HSDPA only) W
Cell HS-PDSCH power
HS-PDSCH: High Speed Physical
Downlink Shared Channel
Cell parameter (for HSDPA only) W
Cell HS-SCCH power
HS-SCCH: High Speed Shared
Control Channel
Cell parameter (for HSDPA only)
number of HS-SCCH channels
managed by the cell
Cell parameter (for HSDPA only) W Cell headroom power
Cell parameter W Maximum Cell power
Simulation result W
R99 traffic channel power transmitted
on carrier ic
R99 bearer parameter W
Minimum power allowed on R99 traffic
data channel
R99 bearer parameter W
Maximum power allowed on R99
traffic data channel
Cell parameter W
Cell HSUPA power
HSUPA: High Speed Uplink Packet
Access
Simulation result W
Transmitter HSDPA power transmitted
on carrier ic
Simulation result
W
Transmitter R99 power transmitted on
carrier ic
Cell parameter (user-defined or simulation result)
W
Transmitter total power transmitted on
carrier ic
Simulation result W
Terminal power transmitted to obtain
the R99 radio bearer
Simulation result W
Terminal power transmitted to obtain
the HSUPA radio bearer
Simulation result
for HSPA users
for R99 users
W
Total power transmitted by the
terminal
Terminal parameter W Minimum terminal power allowed
Terminal parameter W Maximum terminal power allowed
BTS parameter %
Percentage of BTS signal correctly
transmitted
Terminal parameter %
Percentage of terminal signal correctly
transmitted
Clutter parameter %
Percentage of pilot finger - percentage
of signal received by the terminal pilot
finger
Antenna parameter None Transmitter antenna gain
P
max
Txi ( )
P
SCH
Txi i c , ( )
P
OtherCCH
Txi i c , ( )
P
pi l ot
Txi i c , ( )
P
HSDPA
Txi i c , ( )
P
HS PDSCH
Txi i c , ( ) n
HS SCCH
P
HS SCCH
Txi i c , ( ) +
P
HS PDSCH
Txi i c , ( )
P
HS SCCH
Txi i c , ( )
n
HS SCCH
P
Headroom
Txi i c , ( )
P
max
Txi i c , ( )
P
tch
Txi i c , ( )
P
tch
mi n
P
tch
max
P
HSUPA
Txi i c , ( )
P
tx H SDPA
Txi i c , ( )
P
tx R99
Txi i c , ( )
P
pi l ot
Txi i c , ( ) P
SCH
Txi i c , ( ) P
OtherCCH
Txi i c , ( ) + + +
P
tch
Txi i c , ( )
tch(ic) used for
R99 users

P
tch
Txi i c , ( ) f
act ADPCH
DL

tch(ic) used for


HSUPA users

+
P
tx
Txi i c , ( )
P
tx R99
Txi i c , ( ) P
tx H SDPA
Txi i c , ( ) P
HSUPA
Txi i c , ( ) + +
P
term R99
P
term HSUPA
P
term
P
term R99
f
act ADPCH
UL
P
term HSUPA
+
P
term R99
P
term
mi n
P
term
max

BTS

term
o
G
Tx
Forsk 2010 AT283_TRG_E2 203
Chapter 6: UMTS HSPA Networks
Terminal parameter None Terminal gain
R99 bearer parameter - Depends on the transmitter Tx diversity None Gain due to transmit diversity
R99 bearer parameter - Depends on the transmitter Rx diversity None Gain due to receive diversity
MIMO configuration parameter dB
Maximum spatial multiplexing gain for
a given number of transmission and
reception antennas
MIMO configuration parameter dB
Downlink Transmit Diversity gain for a
given number of transmission and
reception antenna ports
Clutter parameter None Spatial multiplexing gain factor
Clutter parameter dB Additional diversity gain in downlink
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
None
Transmitter loss
a
Service parameter None Body loss
Terminal parameter None Terminal loss
Clutter (and, optionally, frequency band) parameter Indoor loss
Propagation model result None Path loss
Result calculated from cell edge coverage probability and model
standard deviation
None
Model Shadowing margin
Only used in prediction studies
Result calculated from cell edge coverage probability and Ec/I0
standard deviation
None
Ec/I0 Shadowing margin
Only used in prediction studies
n=2 or 3
None
DL gain due to availability of several
pilot signals at the mobile
b
.
Result calculated from cell edge coverage probability and DL Eb/Nt
standard deviation
None
DL Eb/Nt Shadowing margin
Only used in prediction studies
Result calculated from cell edge coverage probability and UL Eb/Nt
standard deviation
None
UL Eb/Nt Shadowing margin
Only used in prediction studies
n=2 or 3
Global parameter (default value)
None
UL quality gain due to signal diversity
in soft handoff
c
.
Simulation result None
Random shadowing error drawn
during Monte-Carlo simulation
Only used in simulations
In prediction studies
d
For Ec/I0 calculation
For DL Eb/Nt calculation
For UL Eb/Nt calculation
In simulations
None Transmitter-terminal total loss
W Chip power received at terminal
W
Bit power received at terminal on
carrier ic
W
Total power received at terminal from
a transmitter on carrier ic
G
Term
G
Di v
DL
G
Di v
UL
G
SM
Max
G
TD
DL
f
SM Gai n
AG
TD
DL
L
Tx
L
body
L
Term
L
i ndoor
L
path
M
Shadowi ng model
M
Shadowi ng Ec Io
G
macro di versi ty
DL G
macro di versi ty
DL
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Ec Io
=
M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Eb Nt ( )
UL

G
macro di versi ty
UL
G
macro di versi ty
UL
M
Shadowi ng Eb Nt ( )
UL

npaths
M
Shadowi ng Eb Nt ( )
UL

=
E
Shadowi ng
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

---------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
DL


G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------
P
c
Txi i c , ( )
P
pi l ot
Txi i c , ( )
L
T
-----------------------------------
P
b
DL
Txi i c , ( )
P
tch
Txi i c , ( )
L
T
--------------------------------
P
tot
DL
Txi i c , ( )
P
tx
Txi i c , ( )
L
T
------------------------------
204 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
6.2.2 Ec/I0 Calculation
This table details the pilot quality ( or ) calculations.
6.2.3 DL Eb/Nt Calculation
This table details calculations of downlink traffic channel quality ( or ).
W
Total power received at terminal from
traffic channels of a transmitter on
carrier ic
W
Bit power received at transmitter on
carrier ic used by terminal
W
Bit power received at transmitter on
carrier ic used by terminal
W
Bit power received at transmitter on
DPDCH from a terminal on carrier ic
a. on uplink and on downlink. For information on calculating transmitter
losses on uplink and downlink, see "UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE Documents" on page 128.
b. corresponds to the shadowing margin evaluated from the shadowing error probability
density function (n paths) in case of downlink Ec/I0 modelling.
c. corresponds to the shadowing margin evaluated from the shadowing error probability
density function (n paths) in case of uplink soft handoff modelling.
d. In uplink prediction studies, only carrier power level is downgraded by the shadowing margin
( ). In downlink prediction studies, carrier power level and intra-cell interference are downgraded by
the shadowing model ( or ) while extra-cell interference level is not. Therefore,
or is set to 1 in downlink extra-cell interference calculation.
P
traf
DL
Txi i c , ( )
P
tch
Txi i c , ( )
L
T
--------------------------------
tch i c ( )

P
b
UL
i c ( )
P
term
L
T
--------------
P
b R99
UL
i c ( )
P
term R99
L
T
---------------------------
P
b DPDCH
UL
i c ( ) P
b R99
UL
i c ( ) 1 r
c
UL
( )
L
Tx
L
total UL
= L
Tx
L
total DL
=
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Eb Nt ( )
UL

npaths
M
Shadowi ng Eb Nt ( )
UL

M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Ec Io
M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Ec Io
Q
pi l ot
Ec Io
Name Value Unit Description
W
Downlink intra-cell interference at
terminal on carrier
W
Downlink extra-cell interference at
terminal on carrier
W
Downlink inter-carrier interference at
terminal on carrier
W
Downlink inter-technology interference
at terminal on carrier ic
a
Without Pilot:
Total noise:
W
Total received noise at terminal on
carrier
None
Quality level at terminal on pilot for
carrier
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
I
i ntra
DL
txi i c , ( )
P
tot
DL
txi i c , ( )

BTS
o
P
tot
DL
txi i c , ( )
P
SCH
txi i c , ( )
L
T
----------------------------------
\ .
| |

i c
I
extra
DL
i c ( )
P
tot
DL
txj i c , ( )
txj j i = ,

i c
I
i nter carri er
DL
i c ( )
P
tot
DL
txj i c
adj
, ( )
txj j ,

RF i c i c
adj
, ( )
-------------------------------------------------
i c
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

I
0
DL
i c ( )
I
i ntra
DL
txi i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) + + +
N
0
Term
1 o ( )
BTS
P
c
txi i c , ( ) +
P
tot
DL
txi i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) + +
I
i nter techno y log
DL
i c ( ) N
0
Term
+ +
i c
Q
pi l ot
txi i c , ( )
E
c
I
0
------
\ .
| |


BTS
o P
c
txi i c , ( )
I
0
DL
i c ( )
-------------------------------------------------------
i c
Q
tch
DL Eb
Nt
-------
\ .
| |
DL
Name Value Unit Description
Forsk 2010 AT283_TRG_E2 205
Chapter 6: UMTS HSPA Networks
6.2.4 UL Eb/Nt Calculation
This table details calculations of uplink traffic channel quality ( or ).
W
Downlink intra-cell interference at
terminal on carrier
W
Downlink extra-cell interference at
terminal on carrier
W
Downlink inter-carrier interference at
terminal on carrier
W
Downlink inter-technology interference
at terminal on carrier ic
a
W
Total received noise at terminal on
carrier ic
Without useful signal:
Total Noise:
None
Quality level at terminal on a traffic
channel from one transmitter on
carrier
b
None
Quality level at terminal using carrier
due to combination of all
transmitters of the active set (Macro-
diversity conditions).
None Soft handover gain on downlink
W
Required transmitter traffic channel
power to achieve Eb/Nt target at
terminal on carrier
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
b. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in
simulations. In point analysis and coverage studies, Atoll uses the option Total noise to evaluate DL and UL Eb/Nt.
I
i ntra
DL
txi i c , ( )
P
tot
DL
txi i c , ( )

BTS
F
ortho

P
tot
DL
txi i c , ( )
P
SCH
txi i c , ( )
L
T
----------------------------------
\ .
| |

i c
I
extra
DL
i c ( )
P
tot
DL
txj i c , ( )
txj j i = ,

i c
I
i nter carri er
DL
i c ( )
P
tot
DL
txj i c
adj
, ( )
txj j ,

RF i c i c
adj
, ( )
-------------------------------------------------
i c
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
Term
+ +
Q
tch
DL
txi i c , ( )
E
b
N
t
------
\ .
| |
DL

BTS
P
b
DL
txi i c , ( )
N
tot
DL
i c ( ) 1 F
ortho
( )
BTS
P
b
DL
txi i c , ( )
---------------------------------------------------------------------------------------------------------------- G
Di v
DL
G
p
DL

BTS
P
b
DL
txi i c , ( )
N
tot
DL
i c ( )
------------------------------------------------- G
Di v
DL
G
p
DL

i c
Q
DL
i c ( )
f
rake efficiency
DL
Q
tch
DL
tx
k
i c , ( )
tx
k
Acti veSet e

i c
G
SHO
DL
Q
DL
i c ( )
Q
tch
DL
BestServer i c , ( )
----------------------------------------------------------
P
tch
req
txi i c , ( )
Q
req
DL
Q
DL
i c ( )
--------------------- P
tch
txi i c , ( )
i c
Q
tch
UL Eb
Nt
-------
\ .
| |
UL
Name Value Unit Description
W
Total power received at transmitter
from intra-cell terminals using carrier
W
Total power received at transmitter
from extra-cell terminals using carrier
W
Uplink inter-carrier interference at
terminal on carrier
W
Total received interference at
transmitter on carrier
W
Total noise at transmitter on carrier
(Uplink interference)
I
tot
UL
i ntra
txi i c , ( )
P
b
UL
i c ( )
term
txi

i c
I
tot
UL
ext ra
txi i c , ( )
P
b
UL
i c ( )
term
txj j i = ,

i c
I
i nter carri er
UL
txi i c , ( )
P
b
UL
i c
adj
( )
term
txj j ,

RF i c i c
adj
, ( )
---------------------------------------
i c
I
tot
UL
txi i c , ( )
I
tot
UL
extra
txi i c , ( ) 1 F
MUD
Tx

term
( ) + I
tot
UL
i ntra
txi i c , ( ) I
i nter carri er
UL
txi i c , ( ) +
i c
N
tot
UL
txi i c , ( ) I
tot
UL
txi i c , ( ) N
0
tx
+
i c
206 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
6.3 Active Set Management
The mobiles active set (AS) is the list of the transmitters to which the mobile is connected. The active set may consist of
one or more transmitters; depending on whether the service supports soft handover and on the terminal active set size.
The terminal frequency bands are taken into account and transmitters in the mobiles active set must use a frequency band
supported by the terminal. Finally, the quality of the pilot (EcI0) is what determines whether or not a transmitter can belong
to the active set. The active set management is detailed hereafter. Cells entering a mobiles active set must satisfy the
following conditions:
The best server (first cell entering active set)
The pilot quality from the best serving cell must exceed the Ec/I0 threshold. Best server cell is the one with the
highest pilot quality.
Other cells in the active set
- Must use the same carrier as the best server,
- The pilot quality difference between other candidate cells and the best server must be less than the AS
threshold specified for the best server,
- Other candidate cells must belong to the neighbour list of the best server if it is located on a site where the
equipment imposes this restriction (the restricted to neighbours option selected in the equipment properties).
6.4 Simulations
The simulation process consists of two steps:
1. Obtaining a realistic user distribution
Atoll generates a user distribution using a Monte-Carlo algorithm, which requires traffic maps and data as input.
The resulting user distribution complies with the traffic database and maps provided to the algorithm.
Each user is assigned a service, a mobility type, and an activity status by random trial, according to a probability
law that uses the traffic database.
Without useful signal:
Total noise:
None
Quality level at transmitter on a traffic
channel for carrier
a
No HO:
Softer HO:
Soft, softer/soft HO (No MRC):
Softer/soft HO (MRC):
None
Quality level at site using carrier ic due
to combination of all transmitters of
the active set located at the same site
and taking into account increasing of
the quality due to macro-diversity
(macro-diversity gain).
In simulations .
None Soft handover gain on uplink
W
Required terminal power to achieve
Eb/Nt target at transmitter on carrier
a. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account
only in simulations. In point analysis and coverage studies, Atoll uses the option Total noise to evaluate DL and UL Eb/
Nt.
Q
tch
UL
txi i c , ( )
E
b
N
t
------
\ .
| |
UL

term
P
b DPDCH
UL
i c ( )
N
tot
UL
txi i c , ( ) 1 F
MUD
Tx
( )
term
P
b
UL
i c ( )
---------------------------------------------------------------------------------------------------------------- G
Di v
UL
G
p
UL

term
P
b DPDCH
UL
i c ( )
N
tot
UL
txi i c , ( )
---------------------------------------------------------- G
Di v
UL
G
p
UL

i c
Q
UL
i c ( )
Q
tch
UL
txi i c , ( )
f
rake efficiency
UL
Q
tch
UL
tx
k
i c , ( )
tx
k
Acti veSet e
samesi te ( )

Max
tx
k
Act i veSet e
Q
tch
UL
tx
k
i c , ( ) ( ) G
macro di versi ty
UL

Max


t x
k
t x
l
, Acti veSet e
tx
k
samesi t e e
tx
l
ot hersi te e
f
rake efficiency
UL
Q
tch
UL
tx
k
i c , ( )
tx
k

Q
tch
UL
tx
l
i c , ( ) ,
\ .
|
|
|
| |
G
macro di versi ty
UL

G
macro di versi ty
UL
1 =
G
SHO
UL
Q
UL
i c ( )
Q
tch
UL
BestServer i c , ( )
----------------------------------------------------------
P
term
req
i c ( )
Q
req
UL
Q
UL
i c ( )
--------------------- P
term

i c
Forsk 2010 AT283_TRG_E2 207
Chapter 6: UMTS HSPA Networks
The user activity status is an important output of the random trial and has direct consequences on the next step
of the simulation and on the network interferences. A user may be either active or inactive. Both active and inactive
users consume radio resources and create interference.
Then, Atoll randomly assigns a shadowing error to each user using the probability distribution that describes the
shadowing effect.
Finally, another random trial determines user positions in their respective traffic zone and whether they are indoors
or outdoors (according to the clutter weighting and the indoor ratio per clutter class defined for the traffic maps).
2. Power control simulation
6.4.1 Generating a Realistic User Distribution
During the simulation, a first random trial is performed to determine the number of users and their activity status. Four
activity status are modelled:
Active UL: the user is active on UL and inactive on DL
Active DL: the user is active on DL and inactive on UL
Active UL+DL: the user is active on UL and on DL
Inactive: the user is inactive on UL and on DL
The determination of the number of users and the activity status allocation depend on the type of traffic cartography used.
6.4.1.1 Simulations Based on User Profile Traffic Maps
User profile environment based traffic maps: Each pixel of the map is assigned an environment class which contains a list
of user profiles with an associated mobility type and a given density (number of subscribers with the same profile per km).
User profile traffic maps: Each polygon and line of the map is assigned a density of subscribers with given user profile and
mobility type. If the map is composed of points, each point is assigned a number of subscribers with given user profile and
mobility type.
The user profile models the behaviour of the different subscriber categories. Each user profile contains a list of services
and their associated parameters describing how these services are accessed by the subscriber.
From environment (or polygon) surface (S) and user profile density (D), a number of subscribers (X) per user profile is
inferred.
For each behaviour described in a user profile, according to the service, frequency use and exchange volume, Atoll
calculates the probability for the user being active in uplink and in downlink at an instant t.
6.4.1.1.1 Circuit Switched Service (i)
User profile parameters for circuit switched services are:
The used terminal (equipment used for the service (from the Terminals table)),
The average number of calls per hour ,
The average duration of a call (seconds) .
The number of users and their distribution per activity status is determined as follows:
10. Calculation of the service usage duration per hour ( : probability of a connection):
11. Calculation of the number of users trying to access the service i ( ):
Note:
Atoll follows a Poisson distribution to determine the total number of users attempting a
connection in each simulation. In order for Atoll to use a constant total number of users
attempting a connection, the following lines must be added to the Atoll.ini file:
[CDMA]
RandomTotalUsers=0
Notes:
When user profile traffic maps are composed of lines, the number of subscribers (X) per
user profile is calculated from the line length (L) and the user profile density (D) (nb of
subscribers per km) as follows:
The number of subscribers (X) is an input when a user profile traffic map is composed of
points.
X S D =
X L D =
N
cal l
d
p
0
p
o
N
cal l
d
3600
---------------------- =
n
i
n
i
X p
0
=
208 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Next, we can take into account activity periods during the connection in order to determine the activity status of each user.
12. Calculation of activity probabilities:
Probability of being inactive on UL and DL:
Probability of being active on UL only:
Probability of being active on DL only:
Probability of being active both on UL and DL:
Where, and are respectively the UL and DL activity factors defined for the circuit switched service i.
13. Calculation of number of users per activity status:
Number of inactive users on UL and DL:
Number of users active on UL and inactive on DL:
Number of users active on DL and inactive on UL:
Number of users active on UL and DL both:
Therefore, a user when he is connected can have four different activity status: either active on both links, or inactive on
both links, or active on UL only, or active on DL only.
6.4.1.1.2 Packet Switched Service (j)
User profile parameters for packet switched services are:
The used terminal (equipment used for the service (from the Terminals table)),
The average number of packet sessions per hour ,
The volume (in kbytes) which is transferred on the downlink and the uplink during a session.
A packet session consists of several packet calls separated by a reading time. Each packet call is defined by its size and
may be divided in packets of fixed size (1500 Bytes) separated by an inter arrival time.
In Atoll, a packet session is described by following parameters:
: Average number of packet calls on the uplink during a session,
: Average number of packet calls on the downlink during a session,
: Average time (millisecond) between two packets calls on the uplink ,
: Average time (millisecond) between two packets calls on the downlink ,
: Average time (millisecond) between two packets on the uplink ,
: Average time (millisecond) between two packets on the downlink ,
: Packet size (Bytes) on uplink,
: Packet size (Bytes) on downlink.
p
i nacti ve
1 f
act
UL
( ) 1 f
act
DL
( ) =
p
UL
f
act
UL
1 f
act
DL
( ) =
p
DL
f
act
DL
1 f
act
UL
( ) =
p
UL DL +
f
act
UL
f
act
DL
=
f
act
UL
f
act
DL
n
i
i nacti ve
n
i
p
i nacti ve
=
n
i
UL ( ) n
i
p
UL
=
n
i
DL ( ) n
i
p
DL
=
n
i
UL DL + ( ) n
i
p
UL DL +
=
Figure 6.1Description of a Packet Session
N
sess
V
DL
V
UL
N
packet c al l
UL
N
packet c al l
DL
AT
packet cal l
UL
AT
packet cal l
DL
AT
packet
UL
AT
packet
DL
S
packet
UL
S
packet
DL
Forsk 2010 AT283_TRG_E2 209
Chapter 6: UMTS HSPA Networks
The number of users and their distribution per activity status is determined as follows:
14. Calculation of the average packet call size (kBytes):
and
Where and are the UL and DL efficiency factors defined for the packet switched service j.
15. Calculation of the average number of packets per packet call:
and
16. Calculation of the average duration of inactivity within a packet call (s):
and
17. Calculation of the average duration of inactivity in a session (s):
and
18. Calculation of the average duration of activity in a session (s):
and
Where and are the uplink and downlink average requested rates defined for the service j.
Therefore, the average duration of a connection (in s) is:
and
19. Calculation of the service usage duration per hour (probability of a connection):
and
20. Calculation of the probability of being connected:
Therefore, the number of users who want to get the service j is:
As you can see on the picture above, we have to consider three possible cases when a user is connected:
1
st
case: At a given time, packets are downloaded and uploaded.
In this case, the probability of being connected is:
2
nd
case: At a given time, packet are uploaded (no packet is downloaded).
Here, the probability of being connected is:
3
rd
case: At a given time, packet are downloaded (no packet is uploaded).
In this case, the probability of being connected is:
Note:
For packet (HSDPA) and packet (HSPA) services, and are set to 1.
Note:
1kBytes = 1024Bytes.
S
packet c al l
UL
V
UL
N
packet c al l
UL
f
eff
UL

-------------------------------------------- = S
packet c al l
DL
V
DL
N
packet c al l
DL
f
eff
DL

-------------------------------------------- =
f
eff
UL
f
eff
DL
f
eff
UL
f
eff
DL
N
packet
UL
i nt
S
packet c al l
UL
S
packet
UL
1024
------------------------------------
\ .
|
| |
1 + = N
packet
DL
i nt
S
packet c al l
DL
S
packet
DL
1024
------------------------------------
\ .
|
| |
1 + =
D
Inacti vi ty
UL
( )
packet cal l
N
packet
UL
1 ( ) AT
packet
UL

1000
--------------------------------------------------------------- = D
Inacti vi ty
DL
( )
packet cal l
N
packet
DL
1 ( ) AT
packet
DL

1000
--------------------------------------------------------------- =
D
Inacti vi ty
UL
( )
sessi on
N
packet c al l
UL
D
Inacti vi ty
UL
( )
packet cal l
= D
Inacti vi ty
DL
( )
sessi on
N
packet c al l
DL
D
Inacti vi ty
DL
( )
packet cal l
=
D
Acti vi ty
UL
( )
sessi on
N
packet c al l
UL
N
packet
UL
S
packet
UL
8
R
average
UL
1000
------------------------------------------------------ = D
Acti vi ty
DL
( )
sessi on
N
packet c al l
DL
N
packet
DL
S
packet
DL
8
R
average
DL
1000
------------------------------------------------------ =
R
average
UL
R
average
DL
D
Connecti on
UL
D
Acti vi ty
UL
( )
sessi on
D
Inacti vi ty
UL
( )
sessi on
+ = D
Connecti on
DL
D
Acti vi ty
DL
( )
sessi on
D
Inacti vi ty
DL
( )
sessi on
+ =
p
Connecti on
UL
N
sess
3600
-------------- D
Connecti on
UL
= p
Connecti on
DL
N
sess
3600
-------------- D
Connecti on
DL
=
p
Connected
1 1 p
Connecti on
UL
( ) 1 p
Connecti on
DL
( ) =
n
j
X p
Connected
=
p
Connected
UL DL +
p
Connecti on
UL
p
Connecti on
DL

p
Connected
----------------------------------------------------------------- =
p
Connected
UL
p
Connecti on
UL
1 p
Connecti on
DL
( )
p
Connected
------------------------------------------------------------------------------- =
p
Connected
DL
p
Connecti on
DL
1 p
Connecti on
UL
( )
p
Connected
------------------------------------------------------------------------------- =
210 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Now, we have to take into account activity periods during the connection in order to determine the activity status of each
user.
21. Calculation of the probability of being active:
and
Therefore, we have:
1
st
case: At a given time, packets are downloaded and uploaded.
The user can be active on UL and inactive on DL; this probability is:
The user can be active on DL and inactive on UL; this probability is:
The user can be active on both links; this probability is:
The user can be inactive on both links; this probability is:
2
nd
case: At a given time, packet are uploaded (no packet is downloaded).
The user can be active on UL and inactive on DL; this probability is:
The user can be inactive on both links; this probability is:
3
rd
case: At a given time, packet are downloaded (no packet is uploaded).
The user can be active on DL and inactive on UL; this probability is:
The user can be inactive on both links; this probability is:
22. Calculation of number of users per activity status
Number of inactive users on UL and DL:
Number of users active on UL and inactive on DL:
Number of users active on DL and inactive on UL:
Number of users active on UL and DL:
Therefore, a user when he is connected can have four different activity status: either active on both links, or inactive on
both links, or active on UL only, or active on DL only.
6.4.1.2 Simulations Based on Sector Traffic Maps
Sector traffic maps can be based on live traffic data from OMC (Operation and Maintenance Centre). Traffic is spread over
the best server coverage area of each transmitter and each coverage area is assigned either the throughputs in the uplink
and in the downlink or the number of users per activity status or the total number of users (including all activity statuses).
Note:
The user distribution per service and the activity status distribution between the users are
average distributions. And the service and the activity status of each user are randomly
drawn in each simulation. Therefore, if you compute several simulations at once, the
average number of users per service and average numbers of inactive, active on UL, active
on DL and active on UL and DL users, respectively, will correspond to calculated
distributions. But if you check each simulation, the user distribution between services as
well as the activity status distribution between users is different in each of them.
f
UL
D
Acti vi ty
UL
( )
sessi on
D
Inacti vi ty
UL
( )
sessi on
D
Acti vi ty
UL
( )
sessi on
+ ( )
------------------------------------------------------------------------------------------------------ = f
DL
D
Acti vi ty
DL
( )
sessi on
D
Inacti vi ty
DL
( )
sessi on
D
Acti vi ty
DL
( )
sessi on
+ ( )
------------------------------------------------------------------------------------------------------ =
p
UL
1
f
UL
1 f
DL
( ) p
Connected
UL DL +
=
p
DL
1
f
DL
1 f
UL
( ) p
Connected
UL DL +
=
p
UL DL +
1
f
UL
f
DL
p
Connected
UL DL +
=
p
i nacti ve
1
1 f
UL
( ) 1 f
DL
( ) p
Connected
UL DL +
=
p
UL
2
f
UL
p
Connected
UL
=
p
i nacti ve
2
1 f
UL
( ) p
Connected
UL
=
p
DL
3
f
DL
p
Connected
DL
=
p
i nacti ve
3
1 f
DL
( ) p
Connected
DL
=
n
j
i nacti ve
n
j
p
i nacti ve
1
p
i nacti ve
2
p
i nacti ve
3
+ + ( ) =
n
j
UL ( ) n
j
p
UL
1
p
UL
2
+ ( ) =
n
j
DL ( ) n
j
p
DL
1
p
DL
3
+ ( ) =
n
j
UL DL + ( ) n
j
p
UL DL +
1
=
Forsk 2010 AT283_TRG_E2 211
Chapter 6: UMTS HSPA Networks
6.4.1.2.1 Throughputs in Uplink and Downlink
When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in the uplink and downlink
for each sector and for each listed service.
Atoll calculates the number of users active in uplink and in downlink in the Txi cell using the service (N
UL
and N
DL
) as
follows:
and
is the kbits per second transmitted in UL in the Txi cell to supply the service.
is the kbits per second transmitted in DL in the Txi cell to supply the service.
is the downlink average requested rate defined for the service,
is the uplink average requested rate defined for the service.
N
UL
and N
DL
values include:
Users active in uplink and inactive in downlink (n
i
(UL)),
Users active in downlink and inactive in uplink (n
i
(DL)),
And users active in both links (n
i
(UL+DL)).
Atoll takes into account activity periods during the connection in order to determine the activity status of each user.
Activity probabilities are calculated as follows:
Probability of being inactive in UL and DL:
Probability of being active in UL only:
Probability of being active in DL only:
Probability of being active both in UL and DL:
Where, and are respectively the UL and DL activity factors defined for the service i.
Then, Atoll calculates the number of users per activity status:
We have:
Therefore, we have:
Number of users active in UL and DL both:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of inactive users in UL and DL:
Therefore, a connected user can have four different activity status: either active in both links, or inactive in both links, or
active in UL only, or active in DL only.
6.4.1.2.2 Total Number of Users (All Activity Statuses)
When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users for each
sector and for each listed service ( ).
Atoll takes into account activity periods during the connection in order to determine the activity status of each user.
Activity probabilities are calculated as follows:
Probability of being inactive in UL and DL:
Note:
For packet (HSDPA) and packet (HSPA) services, and are set to 1.
N
UL
R
t
UL
R
average
UL
---------------------- = N
DL
R
t
DL
R
average
DL
---------------------- =
R
t
UL
R
t
DL
R
average
DL
R
average
UL
p
i nacti ve
1 f
act
UL
( ) 1 f
act
DL
( ) =
p
UL
f
act
UL
1 f
act
DL
( ) =
p
DL
f
act
DL
1 f
act
UL
( ) =
p
UL DL +
f
act
UL
f
act
DL
=
f
act
UL
f
act
DL
f
act
UL
f
act
DL
p
UL
p
UL DL +
+ ( ) n
j
UL ( ) n
j
DL ( ) n
j
UL DL + ( ) + + ( ) N
UL
=
p
DL
p
UL DL +
+ ( ) n
j
UL ( ) n
j
DL ( ) n
j
UL DL + ( ) + + ( ) N
DL
=
n
i
UL DL + ( ) mi n
N
UL
p
UL DL +

p
UL
p
UL DL +
+
-------------------------------------
N
DL
p
UL DL +

p
DL
p
UL DL +
+
------------------------------------- ,
\ .
| |
=
n
i
UL ( ) N
UL
n
i
UL DL + ( ) =
n
i
DL ( ) N
DL
n
i
UL DL + ( ) =
n
i
i nacti ve
n
j
UL ( ) n
j
DL ( ) n
j
UL DL + ( ) + + ( )
1 p
i nacti ve

-------------------------------------------------------------------------------------- p
i nacti ve
=
n
i
p
i nacti ve
1 f
act
UL
( ) 1 f
act
DL
( ) =
212 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Probability of being active in UL only:
Probability of being active in DL only:
Probability of being active both in UL and DL:
Where, and are respectively the UL and DL activity factors defined for the service i.
Then, Atoll calculates the number of users per activity status:
Number of inactive users in UL and DL:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of users active in UL and DL both:
Therefore, a connected user can have four different activity status: either active in both links, or inactive in both links, or
active in UL only, or active in DL only.
6.4.1.2.3 Number of Users per Activity Status
When selecting Number of Users per Activity Status, you can directly input the number of inactive users ( ), the
number of users active in the uplink ( ), in the downlink ( ) and in the uplink and downlink ( ), for
each sector and for each service.
6.4.2 Power Control Simulation
The power control algorithm simulates the way a UMTS network regulates itself by using uplink and downlink power
controls in order to minimize interference and maximize capacity.
HSDPA users (i.e., Packet (HSDPA), Packet (HSPA) and Packet (HSPA - Constant Bit Rate) service users) are linked to
the A-DPCH radio bearer (an R99 radio bearer). Therefore, the network uses a A-DPCH power control on UL and DL and
then it performs fast link adaptation on DL in order to select an HSDPA radio bearer. For HSUPA users (i.e., Packet
(HSPA) and Packet (HSPA - Constant Bit Rate) service users), the network first uses a E-DPCCH/A-DPCH power control
on UL and DL, checks that there is an HSDPA connection on downlink and then carries out noise rise scheduling in order
to select an HSUPA radio bearer on uplink. Atoll simulates these network regulation mechanisms with an iterative
algorithm and calculates, for each user distribution, network parameters such as cell power, mobile terminal power, active
set and handoff status for each terminal. During each iteration of the algorithm, all the users (i.e., Circuit (R99), Packet
(R99), Packet (HSDPA), Packet (HSPA) and Packet (HSPA - Constant Bit Rate) service users) selected during the user
distribution generation (1
st
step) attempt to connect one by one to network transmitters. The process is repeated until the
network is balanced, i.e., until the convergence criteria (on UL and DL) are satisfied.
Note:
For packet (HSDPA) and packet (HSPA) services, and are set to 1.
p
UL
f
act
UL
1 f
act
DL
( ) =
p
DL
f
act
DL
1 f
act
UL
( ) =
p
UL DL +
f
act
UL
f
act
DL
=
f
act
UL
f
act
DL
f
act
UL
f
act
DL
n
i
i nacti ve
n
i
p
i nacti ve
=
n
i
UL ( ) n
i
p
UL
=
n
i
DL ( ) n
i
p
DL
=
n
i
UL DL + ( ) n
i
p
UL DL +
=
Note:
The activity status distribution between users is an average distribution. In fact, in each
simulation, the activity status of each user is randomly drawn. Therefore, if you compute
several simulations at once, average numbers of inactive, active on UL, active on DL and
active on UL and DL users correspond to the calculated distribution. But if you check each
simulation, the activity status distribution between users is different in each of them.
n
i
i nacti ve
n
i
UL ( ) n
i
DL ( ) n
i
UL DL + ( )
Forsk 2010 AT283_TRG_E2 213
Chapter 6: UMTS HSPA Networks
As shown in Figure 6.2 on page 213, the simulation algorithm is divided in three parts. All users are evaluated by the R99
part of the algorithm. HSDPA and HSUPA bearer users, unless they have been rejected during the R99 part of the
algorithm, are then evaluated by the HSDPA part of the algorithm. Finally, HSUPA bearer users, unless they have been
rejected during the R99 or HSDPA parts of the algorithm, are then evaluated by the HSUPA part of the algorithm.
The steps of this algorithm are detailed below.
6.4.2.1 Algorithm Initialization
The total power transmitted by the base station txi on the carrier , , is initialised to
.
Uplink powers received by the base station txi on carrier , , and
are initialised to 0 W (i.e. no connected mobile).
Therefore, we have:
Figure 6.2UMTS HSPA Power Control Algorithm
R99 part
Initialisation
Mi Best Server Determination
Mi Active Set Determination
UL and DL Interference Update
For each R99, HSDPA
and HSUPA mobile, Mi
DL Power Control
UL Power Control
Congestion and Radio Resource Control
For HSDPA users, this part of
the algorithm is performed for
the A-DPCH bearer (R99 bearer)
For HSUPA users, this part is
performed for the E-DPCCH/A-
DPCH bearer (R99 bearer)
HSDPA part
Fast Link Adaptation
Mobile Scheduling
Radio Resource Control
For each HSDPA and
HSUPA mobile, Mi
HSUPA part
Admission Control
For each HSUPA
mobile, Mi
Radio Resource Control
Convergence Study
Noise Rise Scheduling
i c
m
P
Tx
txi i c
m
, ( )
P
pi l ot
txi i c
m
, ( ) P
SCH
txi i c
m
, ( ) P
otherCCH
txi i c
m
, ( ) P
HSDPA
txi i c
m
, ( ) P
HSUPA
txi i c , ( ) + + + +
i c
m
I
tot
UL
i ntra
txi i c
m
, ( ) I
tot
UL
ext ra
txi i c
m
, ( )
I
i nter carri er
UL
txi i c
m
, ( )
X
R99
UL
txi i c
m
, ( ) ( )
k
I
tot
UL
txi i c
m
, ( )
N
tot
UL
txi i c
m
, ( )
---------------------------------- 0 = =
214 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
6.4.2.2 R99 Part of the Algorithm
The algorithm is detailed for any iteration k. X
k
is the value of the X (variable) at the iteration k. In the algorithm, all
and thresholds depend on the user mobility type and are defined in the R99 bearer property dialogue. All variables
are described in Definitions and formulas part. The bearer downgrading is not dealt with.
The algorithm applies to single frequency band networks and to dual-band networks. Dual-band terminals can have the
following configurations:
- Configuration 1: The terminal can work on f1 and f2 without any priority (select "All" as main frequency band
in the terminal property dialogue).
- Configuration 2: The terminal can work on f1 and f2 but f1 has a higher priority (select "f1" as main frequency
band and "f2" as secondary frequency band in the terminal property dialogue).
For each mobile M
b
Determination of M
b
s Best Server
For each transmitter txi containing M
b
in its calculation area and working on the main frequency band supported by the
M
b
s terminal (i.e. either f1 for a single frequency band network, or f1 or f2 for a dual-band terminal with the configuration
1, or f1 for a dual-band terminal with the configuration 2).
Calculation of
If user selects without Pilot
Determination of the best transmitter, tx
BS
, for each carrier ic.
For each carrier ic, selection of the transmitter with the highest , .
Analysis of candidate cells, (tx
BS
,ic).
For each pair (tx
BS
,ic), calculation of the uplink load factor:

corresponds to the load rise due to the mobile. For information on how this parameter is calculated, see "Admission
Control in the R99 Part" on page 252.
Rejection of bad candidate cells if the pilot is not received or if the uplink load factor is exceeded during the admission load
control (if simulation respects a loading factor constraint and M
b
was not connected in previous iteration)
If then (tx
BS
,ic) is rejected by M
b
If , then (tx
BS
,ic) is rejected by M
b
Else
Keep (tx
BS
,ic) as good candidate cell
For dual band terminals with the configuration 1 or terminals working on one frequency band only, if no good candidate
cell has been selected, M
b
has failed to be connected to the network and is rejected.
For dual band terminals with the configuration 2, if no good candidate cell has been selected, try to connect M
b
to
transmitters txi containing M
b
in their calculation area and working on the secondary frequency band supported by the M
b
s
terminal (i.e. f2). If no good candidate cell has been selected, M
b
has failed to be connected to the network and is rejected.
For each NodeB having candidate cells, determination of the best carrier, ic
BS
, within the set of candidate cells
of the NodeB.
For DC-HSDPA users, this carrier is referred to as the "anchor" carrier.
If a given carrier is specified for the service requested by M
b
is the carrier specified for the service
Else the carrier selection mode defined for the site equipment is considered.
If carrier selection mode is Min. UL Load Factor
Q
req
UL
Q
req
DL
Q
pi l ot
k
txi i c Mb , , ( )
o
BTS
P
c
txi M
b
i c , , ( )
P
tot
DL
txi i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
Term
+ +
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
txi i c Mb , , ( )
o
BTS
P
c
txi M
b
i c , , ( )
I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) + + +
N
0
Term
1 o ( )
BTS
P
c
txi M
b
i c , , ( ) + \ .
|
|
| |
----------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
txi M
b
i c , , ( ) tx
BS
M
b
( )
X
R99
UL
tx
BS
i c , ( ) ( )
k
I
tot
UL
tx
BS
i c , ( )
N
tot
UL
tx
BS
i c , ( )
----------------------------------- AX
UL
+ =
AX
UL
Q
pi l ot
k
tx
BS
M
b
i c , , ( ) Q
req
pi l ot
Mobi l i ty M
b
( ) ( ) <
X
R99
UL
tx
BS
i c , ( ) ( )
k
X
max
UL
>
i c
BS
M
b
( )
Forsk 2010 AT283_TRG_E2 215
Chapter 6: UMTS HSPA Networks
is the carrier where we obtain the lowest
Else if carrier selection mode is Min. DL Total Power
is the carrier where we obtain the lowest
Else if carrier selection mode is Random
is randomly selected
Else if carrier selection mode is "Sequential"
is the first carrier where
Endif
is the best serving cell ( ) and its pilot quality is
In the following lines, we will consider as the carrier used by the best serving cell
Selection of the second serving cell for DC-HSDPA (Dual-cell HSDPA) users
If M
b
is a DC-HSDPA user and if tx
BS
supports DC-HSDPA and has several carriers, selection of the second carrier, ic
2
.
For each carrier other than the best serving carrier, ic
p
,

calculation of
Selection of the carrier, ic
2
, with the highest
If then (tx
BS
,ic
2
) is rejected by M
b
Else
Keep (tx
BS
,ic
2
) as second serving cell
Active Set Determination
For each station txi containing M
b
in its calculation area, using , and, if neighbours are used, neighbour of
Calculation of
If user selects without Pilot
Rejection of txi from the active set if difference with the best server is too high
If then txi is rejected
Else txi is included in the M
b
active set
Rejection of a station if the mobile active set is full
Station with the lowest in the active set is rejected
EndFor
Uplink Power Control
Calculation of the terminal power required by M
b
to obtain the R99 radio bearer:
For each cell (txi,ic) of the M
b
active set
Calculation of quality level on M
b
traffic channel at (txi,ic), with the minimum power allowed on traffic channel for the M
b
service
i c
BS
M
b
( ) X
R99
UL
tx
BS
i c , ( ) ( )
k
i c
BS
M
b
( ) P
tx
tx
BS
i c , ( )
k
i c
BS
M
b
( )
i c
BS
M
b
( ) X
R99
UL
tx
BS
i c , ( ) ( )
k
X
max
UL
s
tx
BS
i c
BS
( , )
k
M
b
( ) BestCel l
k
M
b
( ) Q
pi l ot
k
max
M
b
( )
i c
Q
pi l ot
k
tx
BS
i c
p
M
b
, , ( )
Q
pi l ot
k
tx
BS
i c
p
M
b
, , ( )
Q
pi l ot
k
tx
BS
i c
2
M
b
, , ( ) Q
req
pi l ot
Mobi l i ty M
b
( ) ( ) <
i c
BestCel l
k
M
b
( )
Q
pi l ot
k
txi M
b
i c , , ( )
o
BTS
P
c
txi M
b
i c , , ( )
P
tot
DL
txi i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N
0
Term
+ + + +
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
txi M
b
i c , , ( )
o
BTS
P
c
txi M
b
i c , , ( )
I
i ntra
DL
txi i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) + + +
N
0
Term
1 o ( )
BTS
P
c
txi M
b
i c , , ( ) + \ .
|
|
| |
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
max
M
b
( ) Q
pi l ot
k
txi M
b
i c , , ( ) AS_Th BestCel l
k
M
b
( ) ( ) >
Q
pi l ot
k
P
term
R99 req
M
b
i c , ( )
k
P
b R99
UL
txi M
b
i c , , ( )
P
term R99
req
M
b
i c , ( )
k 1
L
T
txi M
b
, ( )
--------------------------------------------------------- =
P
b DPDCH
UL
txi M
b
i c , , ( ) P
b R99
UL
txi M
b
i c , , ( ) 1 r
c
UL
( ) =
P
b DPCCH
UL
txi M
b
i c , , ( ) P
b R99
UL
txi M
b
i c , , ( ) r
c
UL
=
216 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
if the user is active,
if the user is inactive,
If user selects "Total noise",
End For
If (M
b
is in not in handoff)
Else if (M
i
is in softer handoff)
Else if (M
b
is in soft, or softer/soft without MRC)
Else if (M
b
is in soft/soft)
Else if (M
b
is in softer/soft with MRC)
End If
If compressed mode is operated,
If then
If then M
b
cannot select any cell and its active set is cleared
If then M
b
cannot be connected
Endif
Downlink Power Control
If (mobile does not use a packet switched service that is inactive on the downlink)
Note:
Compressed mode is operated if:
- M
i
and S
j
support compressed mode,
And
- Either if the Ec/I0 Active option is selected,
- Or if the RSCP Active option is selected.
P
b R99
UL
txi M
b
i c , , ( ) P
b DPCCH
UL
txi M
b
i c , , ( ) P
b DPDCH
UL
txi M
b
i c , , ( ) + =
P
b R99
UL
txi M
b
i c , , ( ) P
b DPCCH
UL
txi M
b
i c , , ( ) =
Q
tch
UL
txi M
b
i c , , ( )
k

term
P
b DPDCH
UL
txi M
b
i c , , ( )
k
N
tot
UL
txi i c , ( ) 1 F
MUD
Tx
( )
term
P
b R99
UL
txi M
b
i c , , ( )
k 1

-------------------------------------------------------------------------------------------------------------------------------------------------------- G
p
UL
Servi ce M
b
( ) ( ) G
di v
UL
=
Q
tch
UL
txi M
b
i c , , ( )
k

term
P
b DPDCH
UL
txi M
b
i c , , ( )
k
N
tot
UL
txi i c , ( )
--------------------------------------------------------------------------------- G
p
UL
Servi ce M
b
( ) ( ) G
di v
UL
=
Q
k
UL
M
b
( ) Q
tch
UL
txi M
b
i c , , ( )
k
=
Q
k
UL
M
b
( ) f
rake efficiency
UL
Q
tch
UL
txi M
b
i c , , ( )
k
txi Acti veSet e

=
Q
k
UL
M
b
( )
Max


txi Acti veSet e
Q
tch
UL
txi M
b
i c , , ( )
k
( ) G
macro di versi ty
UL
( )
2 links
=
Q
k
UL
M
b
( )
Max


txi Acti veSet e
Q
tch
UL
txi M
b
i c , , ( )
k
( ) G
macro di versi ty
UL
( )
3 links
=
Q
k
UL
M
b
( ) Max f
rake efficiency
UL
Q
tch
UL
i c ( )
txi Acti veSet e
samesi te ( )

Q
other site
tch
UL
i c ( ) ,
\ .
|
|
|
| |
G
macro di versi ty
UL
( )
2 links
=
P
term R99
req
M
b
i c , ( )
k
Q
req
UL
Servi ce M
b
( ) Mobi l i ty M
b
( ) , ( )
Q
k
UL
M
b
( )
-------------------------------------------------------------------------------------------- P
term R99
req
M
b
i c , ( )
k 1
=
Q
pi l ot
k
Resul ti ng
txi M
b
i c , , ( ) Q
pi l ot
CM acti vati on
s
P
c
txi M
b
i c , , ( ) RSCP
pi l ot
CM acti vati on
s
P
term R99
req
M
b
i c , ( )
k
Q
req
UL
Servi ce M
b
( ) Mobi l i ty M
b
( ) , ( ) AQ
req
UL
Servi ce M
b
( ) Mobi l i ty M
b
( ) , ( ) ( )
Q
k
UL
M
b
( )
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- P
term R99
req
M
b
i c , ( )
k 1
=
P
term R99
req
M
b
i c , ( )
k
P
term
mi n
M
b
( ) < P
term R99
req
M
b
i c , ( )
k
P
term
mi n
txi M ,
b
( ) =
P
term R99
req
M
b
i c , ( )
k
P
term
max
M
b
( ) >
R
nomi nal
UL
M
b
( ) R
max
UL
txi i c , ( ) >
Forsk 2010 AT283_TRG_E2 217
Chapter 6: UMTS HSPA Networks
For each cell (tx
i
,ic) in M
b
active set
Calculation of quality level on (txi,ic) traffic channel at M
b
with the minimum power allowed on traffic channel for the M
b
service
If the user selects the option "Total noise"
End For
Do
For each cell (txi,ic) in M
b
active set
Calculation of the required power for DL traffic channel between (txi,ic) and M
b
:
If compressed mode is operated.
If then is set to
Recalculation of a decreased (a part of the required quality is managed by the cells set to )
If the user is inactive, then his contribution to interference in the calculation of is .
EndFor
While and M
b
active set is not empty
If then M
b
cannot be connected
Endif
Uplink and Downlink Interference Update
Update of interference on active mobiles only (old contributions of mobiles and stations are replaced by the new ones).
For each cell (txi,ic)
Note:
Compressed mode is operated if:
- M
i
and S
j
support compressed mode,
And
- Either if the Ec/I0 Active option is selected,
- Or if the RSCP Active option is selected.
P
b
DL
txi M
b
i c , , ( )
P
tch
mi n
Servi ce M
b
( ) ( )
L
T
txi M
b
, ( )
----------------------------------------------------- =
Q
tch
DL
txi M
b
i c , , ( )
k

BTS
P
b
DL
txi M
b
i c , , ( )
k
N
tot
DL
i c ( ) 1 F
ortho
( )
BTS
P
b
DL
txi M
b
i c , , ( )
k 1

------------------------------------------------------------------------------------------------------------------------------------ G
p
DL
Servi ce M
b
( ) ( ) G
di v
DL
=
Q
tch
DL
txi M
b
i c , , ( )
k

BTS
P
b
DL
txi M
b
i c , , ( )
k
N
tot
DL
i c ( )
-------------------------------------------------------------- G
p
DL
Servi ce M
b
( ) ( ) G
di v
DL
=
Q
k
DL
M
b
( ) f
rake efficiency
DL
Q
tch
DL
txi M
b
i c , , ( )
k
txi Acti veSet e

=
P
tch
req
txi M
b
i c , , ( )
k
Q
req
DL
Servi ce M
b
( ) Mobi l i ty M
b
( ) , ( )
Q
k
DL
M
b
( )
-------------------------------------------------------------------------------------------- P
tch
mi n
Servi ce M
b
( ) ( ) =
P
tch
req
txi M
b
i c , , ( )
k
Q
req
DL
Servi ce M
b
( ) Mobi l i ty M
b
( ) , ( ) AQ
req
DL
Servi ce M
b
( ) Mobi l i ty M
b
( ) , ( ) ( )
Q
k
DL
M
b
( )
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- P
tch
mi n
Servi ce M
b
( ) ( ) =
Q
pi l ot
k
Resul ti ng
txi M
b
i c , , ( ) Q
pi l ot
CM acti vati on
s
P
c
txi M
b
i c , , ( ) RSCP
pi l ot
CM acti vati on
s
P
tch
req
txi M
b
i c , , ( )
k
P
tch
max
Servi ce M
b
( ) ( ) > txi i c , ( ) P
tch
max
Q
req
DL
P
tch
max
P
b
DL
txi M
b
i c , , ( )
P
tch
req
Servi ce M
b
( ) ( )
L
T
txi M
b
, ( )
---------------------------------------------------- =
Q
tch
DL
txi M
b
i c , , ( )
k

BTS
P
b
DL
txi M
b
i c , , ( )
N
tot
DL
i c ( ) 1 F
ortho
( )
BTS
P
b
DL
txi M
b
i c , , ( )
--------------------------------------------------------------------------------------------------------------------------- G
p
DL
Servi ce M
b
( ) ( ) G
di v
DL
=
N
tot
DL
i c ( ) P
b
DL
txi M
b
i c , , ( ) r
c
DL

Q
k
DL
M
b
( ) f
rake efficiency
DL
Q
tch
DL
txi M
b
i c , , ( )
k
txi Acti veSet e

=
Q
k
DL
M
b
( ) Q
req
DL
Servi ce M
b
( ) Mobi l i ty M
b
( ) , ( ) <
R
nomi nal
DL
M
b
( ) R
max
DL
txi i c , ( ) >
218 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Update of
EndFor
For each mobile M
i
Update of
EndFor
EndFor
Control of Radio Resource Limits (OVSF Codes, Cell Power, Channel Elements, Iub Backhaul
Throughput)
For each cell (txi,ic)
While
Rejection of the mobile with the lowest service priority starting from the last admitted
EndFor
For each cell (txi,ic)
While
Rejection of the mobile with the lowest service priority starting from the last admitted
EndFor
For each NodeB, Ni
While
Rejection of the mobile with the lowest service priority starting from the last admitted
While
Rejection of the mobile with the lowest service priority starting from the last admitted
EndFor
For each NodeB, Ni
While
Rejection of the mobile with the lowest service priority starting from the last admitted
While
Rejection of the mobile with the lowest service priority starting from the last admitted
EndFor
Uplink Load Factor Control
For each cell (txi,ic) with
Rejection of the mobile with the lowest service priority starting from the last admitted
EndFor
While at least one cell with exists.
6.4.2.3 HSDPA Part of the Algorithm
Packet (HSDPA) and packet (HSPA) service users active on DL as well as all packet (HSPA - Constant Bit Rate) service
users (i.e., active and incative), unless they have been rejected during the R99 part of the algorithm, are then evaluated
by the HSDPA part of the algorithm.
6.4.2.3.1 HSDPA Power Allocation
The total transmitted power of the cell ( ) is the sum of the transmitted R99 power, the HSUPA power and the
transmitted HSDPA power.
In case of a static HSDPA power allocation strategy, Atoll checks in the simulation that:
N
tot
UL
txi i c , ( )
N
tot
DL
i c ( )
P
tx
txi i c , ( )
k
P
max
------------------------------ %Power
max
DL
>
N
Codes
txi i c , ( )k N
max
Codes
txi i c , ( ) >
N
CE DL
N
i
( )
k
N
max
CE DL
N
i
( ) >
N
CE UL
N
i
( )
k
N
max
CE UL
N
i
( ) >
T
Iub
DL
N
I
( )
k
T
Iub m ax
DL
N
I
( ) >
T
Iub
UL
N
I
( )
k
T
Iub m ax
UL
N
I
( ) >
X
R99
UL
txi i c , ( ) X
max
UL
>
X
R99
UL
txi i c , ( ) X
max
UL
>
P
tx
i c ( )
P
tx
i c ( ) P
tx R99
i c ( ) P
tx H SDPA
i c ( ) P
HSUPA
i c ( ) + + =
P
tx
i c ( ) P
max
i c ( ) %Power
max
DL
s
Forsk 2010 AT283_TRG_E2 219
Chapter 6: UMTS HSPA Networks
where:
is the maximum DL load allowed.
Therefore, if the maximum DL load is set to 100%, we have:
In case of dynamic HSDPA power allocation strategy, Atoll checks in the simulation that:
And it calculates the available HSDPA power as follows:
6.4.2.3.2 Number of HS-SCCH Channels and Maximum Number of HSDPA Bearer Users
The number of HS-SCCH channels ( ) is the maximum number of HS-SCCH channels that the cell can manage.
This parameter is used to manage the number of packet (HSDPA) and packet (HSPA) service users simultaneously
connected to an HSDPA bearer. This parameter is not taken into account for packet (HSPA - Constant Bit Rate) service
users as HS-SCCH-less operation (i.e., HS-DSCH transmissions without any accompanying HS-SCCH) is performed.
Each packet (HSDPA) and packet (HSPA) service user consumes one HS-SCCH channel. Therefore, at a time (over a
transmission time interval), the number of these users connected to an HSDPA bearer cannot exceed the number of HS-
SCCH channels per cell.
The maximum number of HSDPA users ( ) corresponds to the maximum number of HSDPA bearer users that the cell
can support. Here, all HSDPA bearer users, i.e., packet (HSDPA) service users, packet (HSPA) service users and packet
(HSPA - Constant Bit Rate) service users, are taken into consideration.
Let us assume there are 30 HSDPA bearer users in the cell:
10 packet (HSPA - Constant Bit Rate) service users with any activity status.
20 packet (HSDPA) and packet (HSPA) service users active on DL.
All users are connected to the A-DCH R99 bearer. Finally, the number of HS-SCCH channels and the maximum number
of HSDPA users respectively equal 4 and 25.
The scheduler manages the maximum number of users within each cell. Packet (HSPA - Constant Bit Rate) service users
have the highest priority and are processed first, in the order established during the generation of the user distribution.
After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler ranks the remaining HSDPA bearer
users (i.e., packet (HSDPA) and packet (HSPA) service users) according to the selected scheduling technique. Users are
treated as described in the figure below.
All packet (HSPA - Constant Bit Rate) service users may be served if there are enough HSDPA power, Iub
backhaul throughput and OVSF codes available in order for them to obtain the lowest HSDPA bearer that provides
a RLC peak rate higher or equal to the guaranted bit rate defined for the service. In this case, they will be
connected. Else, they will be rejected.
Then, among the packet (HSDPA) and packet (HSPA) service users:
- The first four users may be simultaneously served if there are enough HSDPA power, Iub backhaul throughput
and OVSF codes available in order for them to obtain an HSDPA bearer. In this case, they will be connected.
Else, they will be delayed.
- The next eleven ones will be delayed since there are no longer HS-SCCH channels available. Their
connection status will be "HS-SCCH Channels Saturation".
- Finally, the last five users will be rejected beacuse the maximum number of HSDPA user has been fixed to
25. Their connection status will be "HSDPA Scheduler Saturation".
6.4.2.3.3 HSDPA Bearer Allocation Process
The HSDPA bearer allocation process depends on the type of service requested by the user. As explained before, packet
(HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established during
the generation of the user distribution. After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler
ranks the remaining HSDPA bearer users (i.e., packet (HSDPA) and packet (HSPA) service users) and shares the cell
radio resources between them.
Packet (HSPA - Constant Bit Rate) Service Users
Let us focus on the ten packet (HSPA - Constant Bit Rate) service users mentionned in the example of the previous
paragraph "Number of HS-SCCH Channels and Maximum Number of HSDPA Bearer Users" on page 219. Fast link
%Power
max
DL
P
tx
i c ( ) P
max
i c ( ) s
P
tx R99
i c ( ) P
HSUPA
i c ( ) + P
max
i c ( ) %Power
max
DL
s
P
HSDPA
i c ( ) P
max
i c ( ) P
Headroom
i c ( ) P
tx R99
i c ( ) P
HSUPA
i c ( ) =
Figure 6.3Connection status of HSDPA bearer users
n
HS SCCH
n
max
220 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
adaptation is carried out on these users in order to determine if they can obtain an HSDPA bearer that provides a RLC
peak rate higher or equal to the service guaranteed bit rate. As HS-SCCH less operation is performed, only HSDPA
bearers using the QPSK modulation and two HS-PDSCH channels at the maximum can be selected and allocated to the
users. The users are processed in the order established during the generation of the user distribution and the cells
available HSDPA power is shared between them as explained below. Several Packet (HSPA - Constant Bit Rate) service
users can share the same HSDPA bearer. Then, Atoll calculates the HSDPA bearer consumption ( in %) for each user
and takes into account this parameter when it determines the resources consumed by the user (i.e., the HSDPA power
used, the number of OVSF codes and the Iub backhaul throughput).
In the bearer allocation process shown below, the 10 packet (HSPA - Constant Bit Rate) service users are represented by
M
j
, with j = 1 to 10. And, the initial values of their respective HSDPA powers is 0, i.e. P
HSDPA
(B(M
X
)) = 0, where X = 0 to
10. These power values are assigned one by one by the scheduler, so that with their allocated values, looped back to the
starting point, are used in successive steps.
Packet (HSDPA) and Packet (HSPA) Service Users
After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler share the cells remaining resources
between packet (HSDPA) and packet (HSPA) service users. Let us focus on the packet (HSDPA) and packet (HSPA)
service users, especially on the first four users mentionned in the example of the previous paragraph, "Number of HS-
SCCH Channels and Maximum Number of HSDPA Bearer Users" on page 219. A new fast link adaptation is carried out
on these users in order to determine if they can obtain an HSDPA bearer. They are processed in the order defined by the
For the user, M
j
, with j varying from 1 to 10:
Figure 6.4HSDPA Bearer Allocation Process for Packet (HSPA - Constant Bit Rate) Service Users
C
Forsk 2010 AT283_TRG_E2 221
Chapter 6: UMTS HSPA Networks
scheduler and the cells HSDPA power available after all Packet (HSPA - Constant Bit Rate) service users have been
served is shared between them as explained below.
In the bearer allocation process shown below, the 4 packet (HSDPA) and packet (HSPA) service users are represented
by M
j
, with j = 1 to 4. And, the initial values of their respective HSDPA powers is 0, i.e. P
HSDPA
(B(M
X
)) = 0, where X = 0
to 4. These power values are assigned one by one by the scheduler, so that with their allocated values, looped back to
the starting point, are used in successive steps.
6.4.2.3.4 Fast Link Adaptation Modelling
Fast link adaptation (or Adaptive Modulation and Coding) is used in HSDPA. The power on the HS-DSCH channel is
transmitted at a constant power while the modulation, the coding and the number of codes are changed to adapt to the
radio conditions variations. Based on the reported channel quality indicator (CQI), the node-B may change every 2ms the
modulation (QPSK, 16QAM, 64QAM), the coding and the number of codes during a communication.
Atoll calculates for each user either the best pilot quality (CPICH Ec/Nt) or the best HS-PDSCH quality (HS-PDSCH Ec/
Nt); this depends on the option selected in Global parameters (HSDPA part): CQI based on CPICH quality or CQI based
on HS-PDSCH quality (CQI means channel quality indicator). Then, it determines the HS-PDSCH CQI, calculates the best
bearer that can be used and selects the suitable bearer so as to comply with cell and terminal user equipment HSDPA
For the user, M
j
, with j varying from 1 to 4:
Figure 6.5HSDPA Bearer Allocation Process for Packet (HSDPA) and Packet (HSPA) Service Users
222 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
capabilities. Once the bearer selected, Atoll finds the highest downlink rate that can be provided to the user and may
calculate the application throughput.
CQI Based on CPICH Quality
When the option CQI based on CPICH quality is selected, Atoll proceeds as follows.
1. CPICH Quality Calculation
Let us assume the following notation: corresponds to the CPICH quality.
Two options, available in Global parameters, may be used to calculate Nt: option Without useful signal or option Total
noise.
Therefore, we have:
for the total noise option,
And
for the without useful signal option.
With
ic
adj
is a carrier adjacent to ic.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on ic.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
(
3
)
, and are defined in "Inputs" on page 198.
3. In the HSDPA coverage prediction, is calculated as follows:
)
Ec
Nt
------- i c ( )
\ .
| |
pi l ot
Ec
Nt
------- i c ( )
\ .
| |
pi l ot

BTS
o P
c
i
i c ( )
N
tot
DL
i c ( )
---------------------------------------------- =
Ec
Nt
------- i c ( )
\ .
| |
pi l ot

BTS
o P
c
i
i c ( )
N
tot
DL
i c ( ) 1 o ( )
BTS
P
c
i
i c ( )
--------------------------------------------------------------------------------------- =
N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
+ + =
I
i ntra
DL
i c ( )
P
tot
DL
i c ( )
txi

BTS
1 F
MUD
term
( ) 1 o ( ) +
P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |

BTS

P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |
=
I
extra
DL
i c ( ) P
tot
DL
i c ( )
txj j i = ,

=
I
i nter carri er
DL
i c ( )
P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------- =
RF i c i c
adj
, ( )
I
i nter techno y log
DL
i c ( )
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
P
c
i
i c ( )
P
pi l ot
i c ( )
L
T
i
----------------------- =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------- =
L
T
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------------------------- =

BTS
o N
0
term
Forsk 2010 AT283_TRG_E2 223
Chapter 6: UMTS HSPA Networks
2. CPICH CQI Determination
Let us assume the following notation: corresponds to the CPICH CQI. is read in the table
. This table is defined for the terminal reception equipment and the selected mobility.
3. HS-PDSCH Quality Calculation
Atoll proceeds as follows:
1
st
step: Atoll calculates the HS-SCCH power ( ).
is the HS-SCCH power on carrier ic. It is either fixed by the user (when the option HS-SCCH Power
Dynamic Allocationin the cell property dialogue is unchecked) or dynamically calculated (when the option HS-SCCH
Power Dynamic Allocation is selected).
In this case, the HS-SCCH power is controlled so as to reach the required HS-SCCH Ec/Nt (noted ). It
is specified in mobility properties.
We have:
for the total noise option,
And
for the without useful signal option.
With
ic
adj
is a carrier adjacent to ic.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on ic.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
Note:
Atoll performs intra-cell interference computations based on the total power. You can
instruct Atoll to use maximum power by adding the following lines in the Atoll.ini file:
[CDMA]
PmaxInIntraItf = 1
In this case, Atoll considers the following formula:
I
i ntra
DL
i c ( )
P
max
i c ( )
L
T
-----------------------
BTS
1 F
MUD
term
( ) 1 o ( ) +
P
max
i c ( ) P
SCH
i c ( )
L
T
------------------------------------------------------
\ .
| |

BTS

P
max
i c ( ) P
SCH
i c ( )
L
T
------------------------------------------------------
\ .
| |
=
CQI ( )
pi l ot
CQI ( )
pi l ot
CQI ( )
pi l ot
f
Ec
Nt
------- i c ( )
\ .
| |
pi l ot
\ .
| |
=
P
HS SCCH
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( )
------------------------------------ =
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( ) 1 F
ortho
( ) 1 F
MUD
term
( )
BTS
P
c
i
i c ( )
--------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N
0
term
+ + + + =
I
i ntra
DL
i c ( )
P
tot
DL
i c ( )
txi

BTS
1 F
MUD
term
( ) 1 F
ortho
( ) +
P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |

BTS

P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |
=
I
extra
DL
i c ( ) P
tot
DL
i c ( )
txj j i = ,

=
I
i nter carri er
DL
i c ( )
P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------- =
RF i c i c
adj
, ( )
I
i nter techno y log
DL
i c ( )
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
224 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
and
(
4
)
, , and are defined in "Inputs" on page 198.
Therefore,
for the total noise option,
And
for the without useful signal option.
2
nd
step: Atoll calculates the HS-PDSCH power ( ).
is the power available for HSDPA on the carrier ic. This parameter is either a simulation output, or a user-
defined cell input.
Therefore, we have:
is the number of HS-SCCH channels.
3
rd
step: Then, Atoll evaluates the HS-PDSCH quality
Let us assume the following notation: corresponds to the HS-PDSCH quality.
We have:
for the total noise option,
And
for the without useful signal option.
Here, Atoll works on the assumption that five HS-PDSCH channels are used (n=5).
With
4. In the HSDPA coverage prediction, is calculated as follows:
)
P
c
i
i c ( )
P
HS SCCH
i c ( )
L
T
i
--------------------------------------- =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------- =
L
T
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
ortho
F
MUD
term
N
0
term
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
N
tot
DL
i c ( )

BTS
---------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
i
=
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
N
tot
DL
i c ( )

BTS
1 1 F
ortho
( ) 1 F
MUD
term
( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
+
\ .
| |

----------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
i
=
P
HS PDSCH
P
HSDPA
i c ( )
P
HSDPA
i c ( ) P
HS PDSCH
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) + =
P
HS PDSCH
i c ( ) P
HSDPA
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) =
n
HS SCCH
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( )
------------------------------------ =
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( ) 1 F
ortho
( ) 1 F
MUD
term
( )
BTS
P
c
i
i c ( )
n
-----------------
--------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
+ + =
I
i ntra
DL
i c ( )
P
tot
DL
i c ( )
txi

BTS
1 F
MUD
term
( ) 1 F
ortho
( ) +
P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |

BTS

P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |
=
I
extra
DL
i c) ( ) P
tot
DL
i c ( )
txj j i = ,

=
I
i nter carri er
DL
i c ( )
P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------- =
Forsk 2010 AT283_TRG_E2 225
Chapter 6: UMTS HSPA Networks
ic
adj
is a carrier adjacent to ic.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on ic.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
And
(
5
)
, , and are defined in "Inputs" on page 198.
4. HS-PDSCH CQI Determination
The best bearer that can be used depends on the HS-PDSCH CQI. Let us assume the following notation:
corresponds to the HS-PDSCH CQI. Atoll calculates as follows:
5. HSDPA Bearer Selection
Atoll selects the HSDPA bearer associated to this CQI (in the table Best Bearer=f(HS-PDSCH CQI) defined for the
terminal reception equipment and the user mobility) and compatible with the user equipment and cell capabilities.
HSDPA bearers can be classified into two categories:
HSDPA bearers using QPSK and 16QAM modulations: They can be selected for all users connected to HSPA and
HSPA+ capable cells. The number of HS-PDSCH channels required by the bearer must not exceed the maximum
number of HS-PDSCH codes available for the cell.
For packet (HSPA - Constant Bit Rate) service users, HS-SCCH-less operation (i.e., HS-DSCH transmissions
without any accompanying HS-SCCH) is performed. In this case, the UE is not informed about the transmission
format and has to revert to blind decoding of the transport format used on the HS-DSCH. Complexity of blind
detections in the UE is decreased by limiting the transmission formats that can be used (i.e., the HSDPA bearers
available). Therefore, only HSDPA bearers using the QPSK modulation and two HS-PDSCH channels at the
maximum can be selected and allocated to these users. Additionally, the selected HSDPA bearer must provide a
RLC peak rate higher or equal to the guaranted bit rate defined for the service.
HSDPA bearers using 64QAM modulation (improvement introduced by the release 7 of the 3GPP UTRA
specifications, referred to as HSPA+): These HSDPA bearers can be allocated to packet (HSDPA) and packet
(HSPA) users connected to cells with HSPA+ capabilities only. The number of HS-PDSCH channels required by
the bearer must not exceed the maximum number of HS-PDSCH codes available for the cell. These HSDPA
bearers cannot be allocated to packet (HSPA - Constant Bit Rate) service users.
Atoll considers an HSDPA bearer as compatible with the user equipment if:
The transport block size does not exceed the maximum transport block size supported by the user equipment.
5. In the HSDPA coverage prediction, is calculated as follows:
)
Note:
Atoll performs intra-cell interference computations based on the total power. You can
instruct Atoll to use maximum power by adding the following lines in the Atoll.ini file:
[CDMA]
PmaxInIntraItf = 1
In this case, Atoll considers the following formula:
RF i c i c
adj
, ( )
I
i nter techno y log
DL
i c ( )
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
P
c
i
i c ( )
P
HS PDSCH
i c ( )
L
T
i
------------------------------------------ =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------- =
L
T
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
ortho
F
MUD
term
N
0
term
I
i ntra
DL
i c ( )
P
max
i c ( )
L
T
-----------------------
BTS
1 F
MUD
term
( ) 1 F
ortho
( ) +
P
max
i c ( ) P
SCH
i c ( )
L
T
------------------------------------------------------
\ .
| |

BTS

P
max
i c ( ) P
SCH
i c ( )
L
T
------------------------------------------------------
\ .
| |
=
CQI ( )
HS PDSCH
CQI ( )
HS PDSCH
CQI ( )
HS PDSCH
CQI ( )
pi l ot
P
pi l ot
P
HS PDSCH
+ =
226 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The number of HS-PDSCH channels required by the bearer does not exceed the maximum number of HS-PDSCH
channels that the terminal can use.
The modulation is supported by the user equipment.
When there are several HSDPA bearers compatible, Atoll selects the HSDPA bearer that provides the highest RLC peak
rate. When several HSDPA bearers can supply the same RLC peak rate, Atoll chooses the HSDPA bearer with the
highest modulation scheme. Finally, if no HSDPA bearer is compatible, Atoll allocates a lower HSDPA bearer compatible
with the user equipment and cell capabilities which needs fewer resources.
Lets consider the following examples.
Example1: One packet (HSDPA) user with category 13 user equipment and a 50km/h mobility.
The user equipment capabilities are:
Maximum transport block size: 35280 bits
Maximum number of HS-PDSCH channels: 15
Highest modulation supported: 64QAM
MIMO Support: No
The cell to which the user is connected supports HSPA+ functionalities (i.e. 64QAM modulation in the DL and MIMO
systems) and the maximum number of HS-PDSCH channels is 15.
1
st
case: The CQI experienced by the user equals 26. Therefore, Atoll can choose between two HSDPA bearers, the
bearer indexes 26 and 31.
Characteristics of the bearer index 26 are:
Transport block size: 17237 bits
Number of HS-PDSCH channels used: 12
16QAM modulation is used
RLC Peak Rate: 8.32 Mb/s
Characteristics of the bearer index 31 are:
Transport block size: 15776 bits
Number of HS-PDSCH channels used: 10
64QAM modulation is used
RLC Peak Rate: 7.36 Mb/s
Both HSDPA bearers are compatible with the user equipment and cell capabilities. Atoll selects the HSDPA bearer that
provides the highest RLC peak rate, i.e. the bearer index 26.
Figure 6.6HSDPA UE Categories Table
Forsk 2010 AT283_TRG_E2 227
Chapter 6: UMTS HSPA Networks
2
nd
case: The CQI experienced by the user equals 27. Therefore, Atoll can choose between two HSDPA bearers, the
bearer indexes 27 and 32.
Characteristics of the bearer index 27 are:
Transport block size: 21754 bits
Number of HS-PDSCH channels used: 15
16QAM modulation is used
RLC Peak Rate: 10.24 Mb/s
Characteristics of the bearer index 32 are:
Transport block size: 21768 bits
Number of HS-PDSCH channels used: 12
64QAM modulation is used
RLC Peak Rate: 10.24 Mb/s
Both HSDPA bearers are compatible with the user equipment and cell capabilities and the RLC peak rate they provide is
the same. Atoll selects the HSDPA bearer using the highest modulation scheme, i.e. the bearer index 32.
Example 2: One packet (HSDPA) user experiencing a CQI of 26.
Therefore, Atoll can choose between two HSDPA bearers, the bearer indexes 26 and 31.
Characteristics of the bearer index 26 are:
Transport block size: 17237 bits
Number of HS-PDSCH channels used: 12
16QAM modulation is used
RLC Peak Rate: 8.32 Mb/s
Characteristics of the bearer index 31 are:
Transport block size: 15776 bits
Number of HS-PDSCH channels used: 10
64QAM modulation is used
RLC Peak Rate: 7.36 Mb/s
1
st
case: The user equipment category is 9. The cell to which the user is connected supports HSPA+ functionalities (i.e.
64QAM modulation in the DL and MIMO systems) and the maximum number of HS-PDSCH channels is 15.
The user equipment characteristics are the following:
Maximum transport block size: 20251 bits
Maximum number of HS-PDSCH channels: 15
Highest modulation supported: 16QAM
MIMO Support: No
The bearer index 31 cannot be selected because it requires a modulation scheme not supported by the terminal. Only the
bearer index 26 is compatible with the user equipment capabilities. Atoll selects it.
Figure 6.7HSDPA Radio Bearers Table
228 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
2
nd
case: The user equipment category is 8. The cell to which the user is connected supports HSPA+ functionalities (i.e.
64QAM modulation in the DL and MIMO systems) and the maximum number of HS-PDSCH channels is 15.
The user equipment characteristics are the following:
Maximum transport block size: 14411 bits
Maximum number of HS-PDSCH channels: 10
Highest modulation supported: 16QAM
MIMO Support: No
Here, none of HSDPA bearers are compatible with the user equipment capabilities.
The bearer index 31 cannot be selected because it requires a modulation scheme not supported by the terminal. With the
bearer index 26, the number of HS-PDSCH channels (12) exceeds the maximum number of HS-PDSCH channels the
terminal can use (10), and the transport block size (17237 bits) exceeds the maximum transport block size (14411 bits)
the terminal can carried.
In the HSDPA Radio Bearer table, Atoll selects a lower HSDPA bearer compatible with cell and UE category capabilities.
It selects the bearer index 25.
The number of HS-PDSCH channels (10) does not exceed the maximum number of HS-PDSCH channels the
terminal can use (10) and the maximum number of HS-PDSCH channels available at the cell level (15),
The transport block size (14411 bits) does not exceed the maximum transport block size (14411 bits) the terminal
can carried.
16QAM modulation is supported by the terminal and the cell.
3
rd
case: The user equipment category is 13. The cell to which the user is connected supports HSPA functionalities and
the maximum number of HS-PDSCH channels is 15.
The user equipment capabilities are:
Maximum transport block size: 35280 bits
Maximum number of HS-PDSCH channels:15
Highest modulation supported: 64QAM
MIMO Support: No
The bearer index 31 cannot be selected because it requires a modulation scheme not supported by the cell. On the other
hand, the bearer index 26 is compatible with cell and UE category capabilities. Therefore, it is allocated.
6. HS-PDSCH Quality Update
Once the bearer selected, Atoll exactly knows the number of HS-PDSCH channels. Therefore, when the method Without
useful signal is used, it may recalculate the HS-PDSCH quality with the real number of HS-PDSCH channels (A default
value (5) was taken into account in the first HS-PDSCH quality calculation).
CQI Based on HS-PDSCH Quality
When the option CQI based on HS-PDSCH quality is selected, Atoll proceeds as follows.
1. HS-PDSCH Quality Calculation
Atoll proceeds as follows:
1
st
step: Atoll calculates the HS-SCCH power ( ).
is the HS-SCCH power on carrier ic. It is either fixed by the user (when the option HS-SCCH Power
Dynamic Allocationin the cell property dialogue is unchecked) or dynamically calculated (when the option HS-SCCH
Power Dynamic Allocation is selected).
In this case, the HS-SCCH power is controlled so as to reach the required HS-SCCH Ec/Nt (noted ). It
is specified in mobility properties.
We have:
for the total noise option,
And
for the without useful signal option.
With
P
HS SCCH
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( )
------------------------------------ =
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( ) 1 F
ortho
( ) 1 F
MUD
term
( )
BTS
P
c
i
i c ( )
--------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
+ + =
I
i ntra
DL
i c ( )
P
tot
DL
i c ( )
txi

BTS
1 F
MUD
term
( ) 1 F
ortho
( ) +
P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |

BTS

P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |
=
Forsk 2010 AT283_TRG_E2 229
Chapter 6: UMTS HSPA Networks
ic
adj
is a carrier adjacent to ic.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on ic.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
And
(
6
)
, , and are defined in "Inputs" on page 198.
Therefore,
for the total noise option,
And
for the without useful signal option.
2
nd
step: Atoll calculates the HS-PDSCH power ( )
is the power available for HSDPA on the carrier ic. This parameter is either a simulation output, or a user-
defined cell input.
Therefore, we have:
is the number of HS-SCCH channels.
3
rd
step: Then, Atoll evaluates the HS-PDSCH quality
Let us assume the following notation: corresponds to the HS-PDSCH quality.
Two options, available in Global parameters, may be used to calculate Nt: option Without useful signal or option Total
noise.
We have:
6. In the HSDPA coverage prediction, is calculated as follows:
)
I
extra
DL
i c ( ) P
tot
DL
i c ( )
txj j i = ,

=
I
i nter carri er
DL
i c ( )
P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------- =
RF i c i c
adj
, ( )
I
i nter techno y log
DL
i c ( )
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
P
c
i
i c ( )
P
HS SCCH
i c ( )
L
T
i
--------------------------------------- =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------- =
L
T
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
ortho
F
MUD
term
N
0
term
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
N
tot
DL
i c ( )

BTS
---------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
i
=
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
N
tot
DL
i c ( )

BTS
1 1 F
ortho
( ) 1 F
MUD
term
( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
req
+
\ .
| |

----------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
i
=
P
HS PDSCH
P
HSDPA
i c ( )
P
HSDPA
i c ( ) P
HS PDSCH
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) + =
P
HS PDSCH
i c ( ) P
HSDPA
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) =
n
HS SCCH
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
230 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
for the total noise option,
And
for the without useful signal option.
Here, Atoll works on the assumption that five HS-PDSCH channels are used (n=5). Then, it calculates the HS-PDSCH
CQI and the bearer to be used. Once the bearer selected, Atoll exactly knows the number of HS-PDSCH channels and
recalculates the HS-PDSCH quality with the real number of HS-PDSCH channels.
With
ic
adj
is a carrier adjacent to ic.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on ic.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
And
(
7
)
, , and are defined in "Inputs" on page 198.
2. HS-PDSCH CQI Determination
7. In the HSDPA coverage prediction, is calculated as follows:
)
Note:
Atoll performs intra-cell interference computations based on the total power. You can
instruct Atoll to use maximum power by adding the following lines in the Atoll.ini file:
[CDMA]
PmaxInIntraItf = 1
In this case, Atoll considers the following formula:
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( )
------------------------------------ =
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( ) 1 F
ortho
( ) 1 F
MUD
term
( )
BTS
P
c
i
i c ( )
n
-----------------
--------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
+ + =
I
i ntra
DL
i c ( )
P
tot
DL
i c ( )
txi

BTS
1 F
MUD
term
( ) 1 F
ortho
( ) +
P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |

BTS

P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |
=
I
extra
DL
i c) ( ) P
tot
DL
i c ( )
txj j i = ,

=
I
i nter carri er
DL
i c ( )
P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------- =
RF i c i c
adj
, ( )
I
i nter techno y log
DL
i c ( )
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
P
c
i
i c ( )
P
HS PDSCH
i c ( )
L
T
i
------------------------------------------ =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------- =
L
T
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
ortho
F
MUD
term
N
0
term
I
i ntra
DL
i c ( )
P
max
i c ( )
L
T
-----------------------
BTS
1 F
MUD
term
( ) 1 F
ortho
( ) +
P
max
i c ( ) P
SCH
i c ( )
L
T
------------------------------------------------------
\ .
| |

BTS

P
max
i c ( ) P
SCH
i c ( )
L
T
------------------------------------------------------
\ .
| |
=
Forsk 2010 AT283_TRG_E2 231
Chapter 6: UMTS HSPA Networks
Let us assume the following notation: corresponds to the HS-PDSCH CQI. is read in
the table . This table is defined for the terminal reception equipment and the
specified mobility.
3. HSDPA Bearer Selection
The bearer is selected as described in "HSDPA Bearer Selection" on page 225.
6.4.2.3.5 MIMO Modelling
MIMO - Transmit Diversity
If the user is connected to a cell that supports HSPA+ with transmit diversity and if he has a MIMO-capable terminal (i.e.,
a terminal with an HSDPA UE category supporting MIMO), he will benefit from downlink diversity gain on the HS-PDSCH
Ec/Nt.
in dB
Where
is the downlink transmit diversity gain (in dB) corresponding to the numbers of transmission and reception antenna
ports (respectively defined in the transmitter and terminal properties).
is the additional diversity gain in downlink (in dB). It is defined for the clutter class of the user.
MIMO - Spatial Multiplexing
If the user is connected to a cell that supports HSPA+ with spatial multiplexing and if he has a MIMO-capable terminal (i.e.,
a terminal with an HSDPA UE category supporting MIMO), he will benefit from the spatial multiplexing gain in its RLC peak
rate.
In this case, the RLC peak rate obtained by the user is the following:
Where
is the RLC peak rate that the selected HSDPA bearer ( ) can provide
in the cell (Txi, ic). It is read in the HSDPA Radio Bearer table.
is the maximum spatial multiplexing gain (in dB) for a given number of transmission and reception antennas
(respectively defined in the transmitter and terminal properties).
is the spatial multiplexing gain factor defined for the clutter
6.4.2.3.6 Scheduling Algorithms
The scheduler manages the maximum number of users within each cell. Packet (HSPA - Constant Bit Rate) service users
have the highest priority and are processed first, in the order established during the generation of the user distribution.
After processing the packet (HSPA - Constant Bit Rate) service users, the scheduler ranks the remaining HSDPA bearer
users (i.e., packet (HSDPA) and packet (HSPA) service users) according to the selected scheduling technique.Three
scheduling algorithms are available , Max C/I, Round Robin and Proportional Fair. Impact they have on the simulation
result is described in the tables below.
Let us consider a cell with 16 packet (HSDPA) and packet (HSPA) service users. All of them are active on DL and
connected to the A-DCH R99 bearer. There is no packet (HSPA - Constant Bit Rate) service user in the cell and the
number of HS-SCCH channels and the maximum number of HSDPA users have been respectively set to 4 and 15.
Max C/I
15 users (where 15 corresponds to the maximum number of HSDPA users defined) enters the scheduler in the same order
as in the simulation. Then, they are sorted in descending order by the channel quality indicator (CQI), i.e. in a best bearer
descending order.
CQI ( )
HS PDSCH
CQI ( )
HS PDSCH
CQI ( )
HS PDSCH
f
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
\ .
| |
=
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
G
TD
DL
AG
TD
DL
+ + =
G
TD
DL
AG
TD
DL
R
RLC peak
DL
R
RLC peak
DL
Index
HSDPABearer
( ) 1 f
SM Gai n
G
SM
Max
1 ( ) + ( ) =
R
RLC peak
DL
Index
HSDPABearer
( ) Index
HSDPABearer
G
SM
Max
f
SM Gai n
Mobiles Simulation Rank
Best Bearer
(kbps)
DL Obtained Rate
(kbps)
Connection
Status
M1 2 2400 2400+3.4 Connected
M2 15 2400 1440+3.4 Connected
M3 8 2080 160+3.4 Connected
M4 9 2080 3.4 Delayed
M5 10 2080 3.4 Delayed
232 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Round Robin
Users are taken into account in the same order than the one in the simulation (random order).
Proportional Fair
15 users (where 15 corresponds to the maximum number of HSDPA users defined) enters the scheduler in the same order
as in the simulation. Then, they are sorted in an ascending order according to a new random parameter which corresponds
to a combination of the user rank in the simulation and the channel quality indicator (CQI).
For a user i, the random parameter is calculated as follows:
Where,
is the user rank in the simulation.
is the user rank according to the CQI.
M6 12 2080 3.4 Delayed
M7 13 2080 3.4 Delayed
M8 14 2080 3.4 Delayed
M9 7 1920 3.4 Delayed
M10 1 1600 3.4 Delayed
M11 3 1600 3.4 Delayed
M12 4 1600 3.4 Delayed
M13 5 1600 3.4 Delayed
M14 6 1600 3.4 Delayed
M15 11 1440 3.4 Delayed
M16 16 2080 0 Scheduler Saturation
Mobiles Simulation Rank
Best Bearer
(kbps)
DL Obtained Rate
(kbps)
Connection
Status
M1 1 1600 1600+3.4 Connected
M2 2 2400 960+3.4 Connected
M3 3 1600 3.4 Delayed
M4 4 1600 3.4 Delayed
M5 5 1600 3.4 Delayed
M6 6 1600 3.4 Delayed
M7 7 1920 3.4 Delayed
M8 8 2080 3.4 Delayed
M9 9 2080 3.4 Delayed
M10 10 2080 3.4 Delayed
M11 11 1440 3.4 Delayed
M12 12 2080 3.4 Delayed
M13 13 2080 3.4 Delayed
M14 14 2080 3.4 Delayed
M15 15 2400 3.4 Delayed
M16 16 2080 0 Scheduler Saturation
Note:
You can change the default weights by editing the atoll.ini file. For more information, see
the Administrator Manual.
Mobiles
Simulation
Rank
CQI Rank RP
Best Bearer
(kbps)
DL Obtained
Rate (kbps)
Connection
Status
M1 2 1 150 2400 2400 Connected
RP
i
RP
i
50 R
i
Si mu
50 R
i
CQI
+ =
R
i
Si mu
R
i
CQI
Forsk 2010 AT283_TRG_E2 233
Chapter 6: UMTS HSPA Networks
6.4.2.3.7 Dual-Cell HSDPA
For transmitters that support dual-cell HSDPA mode, the sheduler manages a single queue of users at the Node B. All
users belonging to the transmitter, i.e., dual-cell HSDPA and single-carrier HSDPA users, are ranked together in a unique
list. Dual-cell HSDPA users are considered twice in the list as they may be assigned two different HSDPA bearers in the
two cells.
Packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established
during the generation of the user distribution. After processing the packet (HSPA - Constant Bit Rate) service users, the
scheduler ranks the remaining HSDPA bearer users (i.e., packet (HSDPA) and packet (HSPA) service users) according
to the selected scheduling technique (Max C/I, Round Robin and Proportional Fair). After the HSDPA users have been
ranked, the scheduler allocates HSDPA resources to each user following the calculated order as long as there are
resources available. Even if there is a unique list of users at the transmitter level, the resources of each cell are not shared
and each carrier has its own pool of resources (number of HS-SCCH channels, maximum number of HSDPA users,
HSDPA power, number of OVSF codes). Only site-level resources (such as the Iub throughput and the channel elements)
are shared between the users of the two cells.
Let us consider a dual-cell HSDPA transmitter with 16 packet (HSDPA) and packet (HSPA) service users. There is no
packet (HSPA - Constant Bit Rate) service user. All users are active in DL and connected to the A-DCH R99 bearer.
Among the users, there are 6 dual-cell HSDPA users (i.e., terminal with UE categories 21 to 24).
In each cell, the number of HS-SCCH channels and the maximum number of HSDPA bearer users have been respectively
set to 4 and 7.
The scheduling algorithms defined for the two cells are the same as the one selected for the transmitter.
M2 1 10 550 1600 960 Connected
M3 8 3 550 2080 160 Connected
M4 9 4 650 2080 3.4 Delayed
M5 3 11 700 1600 3.4 Delayed
M6 10 5 750 2080 3.4 Delayed
M7 4 12 800 1600 3.4 Delayed
M8 7 9 800 1920 3.4 Delayed
M9 15 2 850 2400 3.4 Delayed
M10 5 13 900 1600 3.4 Delayed
M11 12 6 900 2080 3.4 Delayed
M12 6 14 1000 1600 3.4 Delayed
M13 13 7 1000 2080 3.4 Delayed
M14 14 8 1100 2080 3.4 Delayed
M15 11 15 1300 1440 3.4 Delayed
M16 16 - - 2080 0
Scheduler
Saturation
Simulation Rank Dual-cell HSDPA Support Carriers Comments
1 Yes 1 and 2 Anchor carrier: 2
2 No 2
3 No 1
4 Yes 1 and 2 Anchor carrier: 2
5 No 1
6 No 2
7 No 1
8 No 2
9 Yes 1 and 2 Anchor carrier: 1
10 No 1
11 No 2
12 Yes 1 and 2 Anchor carrier: 1
13 No 2
14 Yes 1 and 2 Anchor carrier: 1
15 No 1
16 Yes 1 and 2 Anchor carrier: 2
234 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Each dual-cell HSDPA user is counted twice, once in each cell, as he may be assigned two different HSDPA bearers in
the two cells. Therefore, the scheduler manages the users ranked 1
st
to 11
th
(i.e. 4 single-carrier users connected to the
first carrier, 4 single-carrier users connected to the second carrier and 3 dual-cell users). Users ranked 12
th
to 16
th
are
rejected because the maximum number of HSDPA bearer users that the scheduler can manage in a cell is exceeded.
Impact the scheduling algorithms have on the simulation results is described in the tables below.
Max C/I
7 users from each cell (where 7 corresponds to the maximum number of HSDPA users defined for each cell), i.e., a total
of 14 users enter the scheduler in the same order as in the simulation. Then, they are sorted in the order of decreasing
channel quality indicator (CQI), i.e. in a best bearer descending order.
The scheduled dual-cell HSDPA users have the following status:
The user ranked 4
th
(here M2) is connected to an HSDPA bearer in each cell. He obtains a total DL data rate of
4323.4 kbps (2403.4+1920).
The user ranked 9
th
(here M4) is connected to an HSDPA bearer in each cell. He obtains a total DL data rate of
2083.4 kbps (963.4+1120).
The first user (here M9) is delayed in the two cells. He obtains a total DL data rate of 3.4 kbps.
Round Robin
7 users from each cell (where 7 corresponds to the maximum number of HSDPA users defined for each cell), i.e., a total
of 14 users enter the scheduler in the same order as in the simulation.
Mobiles Carrier
Simulation
Rank
CQI
Best Bearer
(kbps)
DL Obtained
Rate (kbps)
Connection
Status
M1 1 5 21 3040 3040+3.4 Connected
M2
(DC-HSDPA)
2 4 19 2400 2400+3.4 Connected
M3 2 8 18 2080 1440+3.4 Connected
M2
(DC-HSDPA)
1 4 17 1920 1920 Connected
M4
(DC-HSDPA)
1 9 17 1920 960+3.4 Connected
M5 1 3 16 1600 3.4 Delayed
M4
(DC-HSDPA)
2 9 16 1600 1120 Connected
M6 2 2 15 1440 3.4 Delayed
M7 1 7 14 1120 3.4 Delayed
M8 1 10 14 1120 3.4 Delayed
M9
(DC-HSDPA)
2 1 13 960 3.4 Delayed
M10 2 6 13 960 3.4 Delayed
M9
(DC-HSDPA)
1 1 12 800 0 Delayed
M11 2 11 12 800 3.4 Delayed
M12
(DC-HSDPA)
1
2
12
14
15
1120
1440
0 Scheduler Saturation
M13 2 13 17 1920 0 Scheduler Saturation
M14
(DC-HSDPA)
1
2
14
13
15
960
1440
0 Scheduler Saturation
M15 1 15 17 1920 0 Scheduler Saturation
M16
(DC-HSDPA)
1
2
16
12
14
800
1120
0 Scheduler Saturation
Mobiles Carrier
Simulation
Rank
CQI
Best Bearer
(kbps)
DL Obtained
Rate (kbps)
Connection
Status
Forsk 2010 AT283_TRG_E2 235
Chapter 6: UMTS HSPA Networks
The scheduled dual-cell HSDPA users have the following status:
The first user (here M1) is connected to an HSDPA bearer in each cell. He obtains a total DL data rate of 1763.4
kbps (800+963.4).
The user ranked 4
th
(here M4) is connected to an HSDPA bearer in each cell. He obtains a total DL data rate of
2563.4 kbps (1603.4+960).
The user ranked 9
th
(here M9) is delayed in the two cells. He obtains a total DL data rate of 3.4 kbps.
Proportional Fair
7 users from each cell (where 7 corresponds to the maximum number of HSDPA users defined for each cell), i.e., a total
of 14 users enter the scheduler in the same order as in the simulation. Then, they are sorted in an ascending order
according to a new random parameter which corresponds to a combination of the user rank in the simulation and the
channel quality indicator (CQI).
For a user i, the random parameter is calculated as follows:
Where,
is the user rank in the simulation.
is the user rank according to the CQI.
M1
(DC-HSDPA)
1 1 12 800 800 Connected
M1
(DC-HSDPA)
2 1 13 960 960+3.4 Connected
M2 2 2 15 1440 1440+3.4 Connected
M3 1 3 16 1600 1600+3.4 Connected
M4
(DC-HSDPA)
2 4 19 2400 1600+3.4 Connected
M4
(DC-HSDPA)
1 4 17 1920 960 Connected
M5 1 5 21 3040 480+3.4 Connected
M6 2 6 13 960 160+3.4 Connected
M7 1 7 14 1120 3.4 Delayed
M8 2 8 18 2080 3.4 Delayed
M9
(DC-HSDPA)
2 9 16 1600 0 Delayed
M9
(DC-HSDPA)
1 9 17 1920 3.4 Delayed
M10 1 10 14 1120 3.4 Delayed
M11 2 11 12 800 3.4 Delayed
M12
(DC-HSDPA)
1
2
12
14
15
1120
1440
0 Scheduler Saturation
M13 2 13 17 1920 0 Scheduler Saturation
M14
(DC-HSDPA)
1
2
14
13
15
960
1440
0 Scheduler Saturation
M15 1 15 17 1920 0 Scheduler Saturation
M16
(DC-HSDPA)
1
2
16
12
14
800
1120
0 Scheduler Saturation
Note:
You can change the default weights by editing the atoll.ini file. For more information, see
the Administrator Manual.
RP
i
RP
i
50 R
i
Si mu
50 R
i
CQI
+ =
R
i
Si mu
R
i
CQI
236 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The scheduled dual-cell HSDPA users have the following status:
The user ranked 4
th
(here M1) is connected to an HSDPA bearer in each cell. He obtains a total DL data rate of
3843.4 kbps (2403.4+1440).
The first user (here M6) is connected to an HSDPA bearer in his anchor cell and delayed in the other cell. He
obtains a total DL data rate of 483.4 kbps (483.4+0).
The user ranked 9
th
(here M7) is delayed in the two cells. He obtains a total DL data rate of 3.4 kbps.
6.4.2.4 HSUPA Part of the Algorithm
Packet (HSPA) service users active in the UL as well as all packet (HSPA - Constant Bit Rate) service users (i.e., active
and incative), unless they have been rejected during the R99 or HSDPA parts of the algorithm, are then evaluated by the
HSUPA part of the algorithm. Atoll manages the maximum number of users within each cell. Packet (HSPA - Constant
Bit Rate) service users have the highest priority and are processed first, in the order established during the generation of
the user distribution. Then, Atoll considers packet (HSPA) service users in the order established during the generation of
the user distribution.
Let us assume there are 12 HSUPA bearer users in the cell:
3 packet (HSPA - Constant Bit Rate) service users with any activity status. All of them have been connected to an
HSDPA bearer.
9 packet (HSPA) service users active on UL. The first four packet (HSPA) have been connected to an HSDPA
bearer, the last one has been rejected and the remaining four have been delayed in the HSDPA part.
Finally, the maximum number of HSUPA users equals 10.
In this case, Atoll will consider the first ten HSUPA bearer users only and will reject the last two users in order not to
exceed the maximum number of HSUPA users allowed in the cell (their connection status is "HSUPA scheduler
saturation").
Mobiles Carrier
Simulation
Rank
CQI
CQI
Rank
RP
Best
Bearer
(kbps)
DL Obtained
Rate (kbps)
Connection
Status
M1
DC-HSDPA
2 4 19 2 300 2400 2400+3.4 Connected
M2 1 5 21 1 300 3040 3040+3.4 Connected
M1
DC-HSDPA
1 4 17 4 400 1920 1440 Connected
M3 1 3 16 6 450 1600 800+3.4 Connected
M4 2 2 15 8 500 1440 1120+3.4 Connected
M5 2 8 18 3 550 2080 800+3.4 Connected
M6
DC-HSDPA
2 1 13 11 600 960 480+3.4 Connected
M6
DC-HSDPA
1 1 12 13 700 800 0 Delayed
M7
DC-HSDPA
1 9 17 5 700 1920 3.4 Delayed
M8 1 7 14 9 800 1120 3.4 Delayed
M7
DC-HSDPA
2 9 16 7 800 1600 0 Delayed
M9 2 6 13 12 900 960 3.4 Delayed
M10 1 10 14 10 1000 1120 3.4 Delayed
M11 2 11 12 14 1250 800 3.4 Delayed
M12
(DC-HSDPA)
1
2
12
14
15
1120
1440
0
Scheduler
Saturation
0
Scheduler
Saturation
M13 2 13 17 1920 0
Scheduler
Saturation
0
Scheduler
Saturation
M14
(DC-HSDPA)
1
2
14
13
15
960
1440
0
Scheduler
Saturation
0
Scheduler
Saturation
M15 1 15 17 1920 0
Scheduler
Saturation
0
Scheduler
Saturation
M16
(DC-HSDPA)
1
2
16
12
14
800
1120
0
Scheduler
Saturation
0
Scheduler
Saturation
Forsk 2010 AT283_TRG_E2 237
Chapter 6: UMTS HSPA Networks
6.4.2.4.1 Admission Control
During admission control, Atoll selects a list of HSUPA bearers for each user. The selected HSUPA bearers have to be
compatible with the user equipment and capabilities of each HSUPA cell of the active set. For packet (HSPA - Constant
Bit Rate) service users, the list is restricted to HSUPA bearers that provide a RLC peak rate higher than the guaranteed
bit rate.
Let us focus on one packet (HSPA) service user with category 3 user equipment and a 50km/h mobility. This user is
connected to one cell only. The cell supports HSPA+ functionalities, i.e the cell supports QPSK and 16QAM modulations
in the UL.
HSUPA user equipment categories are provided in the HSUPA User Equipment Categories table. The capabilities of the
category 3 user equipment are:
Maximum Number of E-DPDCH codes: 2
TTI 2 ms: No so it supports 10 ms TTI
Minimum Spreading Factor: 4
Maximum Block Size for a 2ms TTI: no value
Maximum Block Size for a 10ms TTI: 14484 bits
Highest Modulation Supported: QPSK
HSUPA bearer characteristics are provided in the HSUPA Bearer table. An HSUPA bearer is described with following
characteristics:
Radio Bearer Index: The bearer index number.
TTI Duration (ms): The TTI duration in ms. The TTI can be 2 or 10 ms.
Transport Block Size (Bits): The transport block size in bits.
Number of E-DPDCH Codes: The number of E-DPDCH channels used.
Minimum Spreading Factor: The smallest spreading factor used.
Modulation: the modulation used (QPSK or 16QAM)
RLC Peak Rate (bps): The RLC peak rate represents the peak rate without coding (redundancy, overhead,
addressing, etc.).
Mobiles Service
Simulation
Rank
HSDPA
Connection
Status
Evaluation by
the HSUPA
part of the
algorithm
M1 Packet (HSPA - Constant Bit Rate) 4 Connected Yes
M2 Packet (HSPA - Constant Bit Rate) 7 Connected Yes
M3 Packet (HSPA - Constant Bit Rate) 9 Connected Yes
M4 Packet (HSPA) 1 Connected Yes
M5 Packet (HSPA) 2 Connected Yes
M6 Packet (HSPA) 3 Connected Yes
M7 Packet (HSPA) 5 Connected Yes
M8 Packet (HSPA) 6 Delayed Yes
M9 Packet (HSPA) 8 Delayed Yes
M10 Packet (HSPA) 10 Delayed Yes
M11 Packet (HSPA) 11 Delayed No
M12 Packet (HSPA) 12 Rejected No
Figure 6.8HSUPA UE Categories Table
238 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
HSUPA bearers can be classified into two categories:
HSUPA bearers using QPSK modulation: They can be selected for users connected to HSPA and HSPA+ capable
cells.
HSUPA bearers using 16QAM modulation (improvement introduced by the release 7 of the 3GPP UTRA
specifications, referred to as HSPA+). These HSUPA bearers can be allocated to users connected to cells with
HSPA+ capabilities only.
Atoll considers an HSUPA bearer as compatible with the category 3 user equipment if:
The TTI duration used by the bearer is supported by the user equipment (10 ms).
The transport block size does not exceed the maximum transport block size supported by the user equipment
(14484 bits):
The number of E-DPDCH channels required by the bearer does not exceed the maximum number of E-DPDCH
channels that the terminal can use (2).
The minimum spreading factor used by the bearer is not less than the smallest spreading factor supported by the
terminal (4).
The modulation required by the bearer is supported by the terminal.
The HSUPA bearers compatible with category 3 user equiment are framed in red:
Then, during admission control, Atoll checks that the lowest compatible bearer in terms of the required E-DPDCH EcNt
does not require a terminal power higher than the maximum terminal power allowed.
Atoll uses the HSUPA Bearer Selection table. Among the compatible HSUPA bearers, Atoll chooses the one with the
lowest required Ec/Nt threshold.
Here, this is the index 1 HSUPA bearer; the required Ec/Nt threshold to obtain this bearer is -21.7dB.
Then, from the required Ec/Nt threshold, , Atoll calculates the required terminal power, .
With
(
8
)
, , , , and are defined in "Inputs" on page 198.
Figure 6.9HSUPA Radio Bearers Table
8. In the HSUPA coverage prediction, is calculated as follows:
)
Ec
Nt
-------
\ .
| |
E DPDCH
req
P
term HSUPA
req
P
term HSUPA
req Ec
Nt
-------
\ .
| |
=
E DPDCH
req
L
T
N
tot
UL

N
tot
UL
i c ( ) 1 F
MUD
tx

term
( ) I
tot
UL
i nt ra
i c ( ) I
tot
UL
ext ra
i c ( ) I
i nter carri er
UL
i c ( ) N +
0
tx
+ + =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------- =
L
T
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =

term
F
MUD
tx
I
tot
UL
i ntra
I
tot
UL
ext ra
I
i nter carri er
UL
N
0
tx
Forsk 2010 AT283_TRG_E2 239
Chapter 6: UMTS HSPA Networks
Atoll rejects the user if the terminal power required to obtain the lowest compatible HSUPA bearer ( )
exceeds the maximum terminal power (his connection status is "HSUPA Admission Rejection").
At the end of this step, the number of non-rejected HSUPA bearer users is . All of them will be connected to an
HSUPA bearer at the end.
6.4.2.4.2 HSUPA Bearer Allocation Process
The HSUPA bearer allocation process depends on the type of service requested by the user. As explained before, packet
(HSPA - Constant Bit Rate) service users have the highest priority and are processed first, in the order established during
the generation of the user distribution. After the admission control on packet (HSPA - Constant Bit Rate) service users,
Atoll performs a noise rise scheduling, followed by a radio resource control. Then, it repeats the same steps on packet
(HSPA) service users.
Packet (HSPA - Constant Bit Rate) Service Users
Let us focus on the three packet (HSPA - Constant Bit Rate) service users mentionned in the example of the previous
paragraph "HSUPA Part of the Algorithm" on page 236. We assume that all of them have been admitted. Noise rise
scheduling and radio resource control are carried out on each user in order to determine the best HSUPA bearer that the
user can obtain. Several Packet (HSPA - Constant Bit Rate) service users can share the same HSUPA bearer. Then, Atoll
calculates the HSUPA bearer consumption ( in %) for each user and takes into account this parameter when it
determines the resources consumed by the user (i.e., the terminal power used, the number of channel elements and the
Iub backhaul throughput).
In the bearer allocation process shown below, the 3 packet (HSPA - Constant Bit Rate) service users are represented by
M
j
, with j = 1 to 3.
Figure 6.10HSUPA Bearer SelectionTable
P
term HSUPA
req
n
HSUPA
C
240 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Packet (HSPA) Service Users
Let us focus on the seven packet (HSPA) service users mentionned in the example of the previous paragraph "HSUPA
Part of the Algorithm" on page 236. We assume that all of them have been admitted. Noise rise scheduling and radio
resource control are carried out on each user in order to determine the best HSUPA bearer that the user can obtain.
In the bearer allocation process shown below, the 7 packet (HSPA) service users are represented by M
j
, with j = 1 to 7.
6.4.2.4.3 Noise Rise Scheduling
Determination of the Obtained HSUPA Bearer
The obtained HSUPA radio bearer is the bearer that the user obtains after noise rise scheduling and radio resource control.
Packet (HSPA - Constant Bit Rate) service users have the highest priority and are processed first. Therefore, after the
admission control, the noise rise scheduling algorithm attempts to evenly share the remaining cell load between the packet
For the user, M
j
, with j varying from 1 to 3:
Figure 6.11HSUPA Bearer Allocation Process for Packet (HSPA - Constant Bit Rate) Service Users
For the user, M
j
, with j varying from 1 to 7:
Figure 6.12HSUPA Bearer Allocation Process for Packet (HSPA) Service Users
Forsk 2010 AT283_TRG_E2 241
Chapter 6: UMTS HSPA Networks
(HSPA - Constant Bit Rate) service users admitted in admission control; in terms of HSUPA, each user is allocated a right
to produce interference. The remaining cell load factor on uplink ( ) depends on the maximum load
factor allowed on uplink and how much uplink load is produced by the served R99 traffic. It can be expressed as follows:
Then, Atoll evenly shares the remaining cell load factor between the packet (HSPA - Constant Bit Rate) service users
admitted during the previous step ( ).
From this value, Atoll calculates the maximum E-DPDCH EcNt allowed ( ) for each packet (HSPA -
Constant Bit Rate) service user. For further information on the calculation, see "Uplink Load Factor Due to One User" on
page 257.
for the Without useful signal option
for the Total noise option
Then, it selects an HSUPA bearer. The allocation depends on the maximum E-DPDCH EcNt allowed and on UE and cell
capabilities. Atoll selects the best HSUPA bearer from the HSUPA compatible bearers. This is the HSUPA bearer
( ) with the highest potential throughput ( ) where:

And
When several HSUPA bearers are available, Atoll selects the one with the lowest .
After the noise rise scheduling, Atoll carries out radio resource control, verifying if enough channel elements and Iub
backhaul throughput are available for the HSUPA bearer assigned to the user. For information on radio resource control,
see "Radio Resource Control" on page 244.
After processing all packet (HSPA - Constant bit rate) service users, Atoll carries out noise rise scheduling and radio
resource control on packet (HSPA) service users. During the noise rise scheduling, Atoll distributes the remaining cell
load factor available after all packet (HSPA - Constant Bit Rate) service users have been served. It can be expressed as
follows:
The remaining cell load factor is shared equally between the admitted packet (HSPA) service users ( ).
From this value, Atoll calculates the maximum E-DPDCH EcNt allowed ( ) as explained above and selects
an HSUPA bearer for each packet (HSPA) service user. After the noise rise scheduling, Atoll carries out radio resource
control on packet (HSPA) service users. For information on radio resource control, see "Radio Resource Control" on
page 244.
Example: We have a cell with six packet (HSPA) service users and no packet (HSPA - Constant Bit Rate) user. All packet
(HSPA) service users have been admitted.
The remaining cell load factor equal to 0.6 is shared between the packet (HSPA) service users. Therefore, the UL load
factor alloted to each user is 0.1. Lets take the cell UL reuse factor equal to 1.5. Atoll calculates the maximum E-DPDCH
EcNt allowed (the Without useful signal option is selected).
We have:
Here, the obtained HSUPA bearer is the index 5 HSUPA bearer. It provides a potential throughput of 128 kbps and
requires E-DPDCH EcNt of -13 dB (lower than -11.5 dB) and a terminal power lower than the maximum terminal power
allowed.
AX
HSPA CBR
UL
txi i c , ( )
AX
HSPA CBR
UL
txi i c , ( ) X
max
UL
txi i c , ( ) X
R99
UL
txi i c , ( ) =
n
HSPA CBR
AX
user
UL
txi i c , ( )
AX
HSPA CBR
UL
txi i c , ( )
n
HSPA CBR
-------------------------------------------------------- =
Ec
Nt
-------
\ .
| |
E DPDCH
max
Ec
Nt
-------
\ .
| |
E DPDCH
max
1
F
UL
txi i c , ( )
AX
user
UL
txi i c , ( )
-------------------------------------- 1
----------------------------------------------- =
Ec
Nt
-------
\ .
| |
E DPDCH
max
AX
user
UL
F
UL
------------------ =
Index
HSUPABearer
R
RLC peak
UL
Index
HSUPABearer
( )
N
Rtx
Index
HSUPABearer
( )
------------------------------------------------------------------------------------
Ec
Nt
-------
\ .
| |
E DPDCH
req
Ec
Nt
-------
\ .
| |
E DPDCH
max
s
P
term HSUPA
req
P s
term
max
Ec
Nt
-------
\ .
| |
E DPDCH
req
AX
HSPA
UL
txi i c , ( ) X
max
UL
txi i c , ( ) X
R99
UL
txi i c , ( ) X
HSPA CBR
UL
txi i c , ( ) =
n
HSPA
AX
user
UL
txi i c , ( )
AX
HSPA
UL
txi i c , ( )
n
HSPA
----------------------------------------- =
Ec
Nt
-------
\ .
| |
E DPDCH
max
Ec
Nt
-------
\ .
| |
E DPDCH
max
-11.5 dB =
242 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
.
Noise Rise Scheduling in Soft Handover
With HSUPA, uplink soft handover impacts the scheduling operation. While HSDPA sends data from one cell only, with
HSUPA all cells in the active set receive the transmission from the terminal. Therefore, all the cells are impacted by the
transmission in terms of noise rise.
For each HSUPA capable cell of the active set , Atoll calculates the maximum E-DPDCH EcNt allowed
( ) as explained in "HSUPA Bearer Allocation Process" on page 239.
For each cell of the active set , Atoll calculates the maximum terminal power allowed to obtain an HSUPA radio
bearer ( ).
With
(
9
)
, , , , and are defined in "Inputs" on page 198.
As HSUPA bearer users in soft handover use the lowest granted noise rise, Atoll chooses the lowest of maximum terminal
power allowed for each cell of the active set .
Once Atoll knows the selected maximum terminal power ( ), it recalculates the maximum E-DPDCH EcNt
allowed ( ) for each HSUPA capable cell of the active set.
Then, Atoll calculates the maximum E-DPDCH EcNt allowed ( ) after signal recombination of all HSUPA
capable cells of the active set
10
.
For softer (1/2) and softer-softer (1/3) handovers, we have:
HSUPA Bearers
Index
Required Ec/Nt
Threshold (dB)
Nb of
Retransmissions
RLC Peak Rate
(kbps)
Potential
Throughput
(kbps)
1 -21.7 2 32 16
2 -19 2 64 32
3 -16.1 2 128 64
4 -13.9 2 192 96
5 -13 2 256 128
6 -10.1 2 512 256
7 -8 2 768 384
8 -7 2 1024 512
9. In the HSUPA coverage prediction, is calculated as follows:
)
tx
k
i c , ( )
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
tx
k
i c , ( )
P
term HSUPA
max
tx
k
i c , ( )
P
term HSUPA
max
tx
k
i c , ( ) mi n
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( ) L
T
N
tot
UL

\ .
| |
P
term
max
,
\ .
| |
=
N
tot
UL
i c ( ) 1 F
MUD
tx

term
( ) I
tot
UL
i nt ra
i c ( ) I
tot
UL
ext ra
i c ( ) I
i nter carri er
UL
i c ( ) N +
0
tx
+ + =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------- =
L
T
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =

term
F
MUD
tx
I
tot
UL
i ntra
I
tot
UL
ext ra
I
i nter carri er
UL
N
0
tx
tx
k
i c , ( )
P
term HSUPA
max
mi n
tx
k
AS e
P
term HSUPA
max
tx
k
i c , ( ) ( ) =
P
term HSUPA
max
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
P
term HSUPA
max
L
T
N
tot
UL

----------------------------------- =
Ec
Nt
-------
\ .
| |
E DPDCH
max
Forsk 2010 AT283_TRG_E2 243
Chapter 6: UMTS HSPA Networks

For soft (2/2) and soft-soft (3/3) handovers, we have:
For softer-soft handover (2/3), it depends on if the MRC option is selected (option available in Global parameters). If se-
lected, we have:
Else, we have:
Then, Atoll selects an HSUPA bearer as previously explained in "HSUPA Bearer Allocation Process" on page 239. The
allocation depends on the maximum E-DPDCH EcNt allowed and on UE and cell capabilities. Atoll selects the best
HSUPA bearer from the HSUPA compatible bearers. This is the HSUPA bearer ( ) with the highest po-
tential throughput ( ) where:

10. In HSUPA coverage predictions, we have the following:


For softer (1/2) and softer-softer (1/3) handovers:
For soft handover (2/2):
For soft-soft handover (3/3):
For softer-soft handover (2/3), it depends on if the MRC option is selected (option available in Global parameters). If se-
lected, we have:
Else, we have:
Ec
Nt
-------
\ .
| |
E DPDCH
max
f
rake efficiency
UL Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
tx
k
Acti veSet e
samesi te ( )

=
Ec
Nt
-------
\ .
| |
E DPDCH
max
Max


tx
k
Act i veSet e
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
\ .
| |
G
macro di versi ty
UL
( )
2l i nks
=
Ec
Nt
-------
\ .
| |
E DPDCH
max
Max


tx
k
Act i veSet e
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
\ .
| |
G
macro di versi ty
UL
( )
3l i nks
=
Ec
Nt
-------
\ .
| |
E DPDCH
max
Max


tx
k
tx
l
, Act i veSet e
t x
k
samesi te e
tx
l
othersi te e
f
rake efficiency
UL Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
tx
k

Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
l
i c , ( ) ,
\ .
|
|
|
| |
G
macro di versi ty
UL
( )
2l i nks

=
Ec
Nt
-------
\ .
| |
E DPDCH
max
Max


tx
k
Act i veSet e
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
\ .
| |
G
macro di versi ty
UL
( )
2l i nks
=
Ec
Nt
-------
\ .
| |
E DPDCH
max
f
rake efficiency
UL Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
tx
k
Acti veSet e
samesi te ( )

=
Ec
Nt
-------
\ .
| |
E DPDCH
max
Max


tx
k
Act i veSet e
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
\ .
| |
=
Ec
Nt
-------
\ .
| |
E DPDCH
max
Max


tx
k
tx
l
, Act i veSet e
t x
k
samesi te e
tx
l
othersi te e
f
rake efficiency
UL Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
tx
k

Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
l
i c , ( ) ,
\ .
|
|
|
| |
=
Ec
Nt
-------
\ .
| |
E DPDCH
max
Max


tx
k
Act i veSet e
Ec
Nt
-------
\ .
| |
E DPDCH
max
tx
k
i c , ( )
\ .
| |
=
Index
HSUPABearer
R
RLC peak
UL
Index
HSUPABearer
( )
N
Rtx
Index
HSUPABearer
( )
------------------------------------------------------------------------------------
Ec
Nt
-------
\ .
| |
E DPDCH
req
Ec
Nt
-------
\ .
| |
E DPDCH
max
s
244 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
When several HSUPA bearers are available, Atoll selects the one with the lowest .
Determination of the Requested HSUPA Bearer
The requested HSUPA radio bearer is selected from the HSUPA bearers compatible with the user equipment. Atoll
determines the HSUPA bearer the user would obtain by considering the entire remaining load of the cell. The user is
treated as if he is the only user in the cell. Therefore, if we go on with the previous example, the maximum E-DPDCH EcNt
allowed is equal to -1.8 dB and the requested HSUPA bearer is the index 7 HSUPA bearer. It requires E-DPDCH EcNt of
-8 dB (lower than -1.8 dB) and a terminal power lower than the maximum terminal power allowed.
6.4.2.4.4 Radio Resource Control
Atoll checks to see if enough channel elements are available and if the Iub backhaul throughput is sufficient for the HSUPA
bearer assigned to the user (taking into account the maximum number of channel elements defined for the site and the
maximum Iub backhaul throughput allowed on the site in the uplink). If not, Atoll allocates a lower HSUPA bearer
("downgrading") which needs fewer channel elements and consumes lower Iub backhaul throughput. If no channel
elements are available, the user is rejected. On the same hand, if the maximum Iub backhaul throughput allowed on the
site in the uplink is still exceeded even by using the lowest HSDPA bearer, the user is rejected.
6.4.2.5 Convergence Criteria
The convergence criteria are evaluated for each iteration, and can be written as follow:
Atoll stops the algorithm if:
1
st
case: Between two successive iterations, and are lower ( ) than their respective thresholds (defined when
creating a simulation).
The simulation has reached convergence.
Example: Let us assume that the maximum number of iterations is 100, UL and DL convergence thresholds are set to 5.
If and between the 4
th
and the 5
th
iteration, Atoll stops the algorithm after the 5
th
iteration. Convergence
has been reached.
2
nd
case: After 30 iterations, and/or are still higher than their respective thresholds and from the 30
th
iteration,
and/or do not decrease during the next 15 successive iterations.
The simulation has not reached convergence (specific divergence symbol).
Examples: Let us assume that the maximum number of iterations is 100, UL and DL convergence thresholds are set to 5.
1. After the 30
th
iteration, and/or equal 100 and do not decrease during the next 15 successive iterations:
Atoll stops the algorithm at the 46
th
iteration. Convergence has not been reached.
2. After the 30
th
iteration, and/or equal 80, they start decreasing slowly until the 40
th
iteration (without going
under the thresholds) and then, do not change during 15 successive iterations: Atoll stops the algorithm at the
56
th
iteration without reaching convergence.
3
rd
case: After the last iteration.
If and/or are still strictly higher than their respective thresholds, the simulation has not reached convergence
(specific divergence symbol).
If and are lower than their respective thresholds, the simulation has reached convergence.
6.4.3 Results
6.4.3.1 R99 Related Results
This table contains some R99 specific simulation results provided in the Cells and Mobiles tabs of the simulation property
dialogue.
Ec
Nt
-------
\ .
| |
E DPDCH
req
A
DL
max i nt
max
Stati ons
P
tx
i c ( )
k
P
tx
i c ( )
k 1

P
tx
i c ( )
k
---------------------------------------------------------------------------------------- 100
\ .
|
| |
i nt
max
Stat i ons
N
user
DL
i c ( )
k
N
user
DL
i c ( )
k 1

N
user
DL
i c ( )
k
---------------------------------------------------------------------------------------------------- 100
\ .
|
|
| |
,
\ .
|
|
| |
=
A
UL
max i nt
max
Stati ons
I
tot
UL
i c ( )
k
I
tot
UL
i c ( )
k 1

I
tot
UL
i c ( )
k
---------------------------------------------------------------------------------------- 100
\ .
|
|
| |
i nt
max
St ati ons
N
user
UL
i c ( )
k
N
user
UL
i c ( )
k 1

N
user
UL
i c ( )
k
---------------------------------------------------------------------------------------------------- 100
\ .
|
|
| |
,
\ .
|
|
| |
=
A
UL
A
DL
s
A
UL
5 s A
DL
5 s
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
Forsk 2010 AT283_TRG_E2 245
Chapter 6: UMTS HSPA Networks
Name Value Unit Description
None
Number of E1/T1/Ethernet links
required by the site
None
Downlink intra-cell interference at
terminal on carrier
W
Downlink extra-cell interference at
terminal on carrier
W
Downlink inter-carrier interference at
terminal on carrier
W
Downlink inter-technology interference
at terminal on carrier ic
a
W
Total effective interference at terminal
on carrier (after unscrambling)
W
Total received noise at terminal on
carrier
W
Total power received at transmitter
from intra-cell terminals using carrier
W
Total power received at transmitter
from extra-cell terminals using carrier
W
Uplink inter-carrier interference at
terminal on carrier
W
Total received interference at
transmitter on carrier
W
Total noise at transmitter on carrier
(Uplink interference)
None Cell uplink load factor on carrier
None Cell uplink reuse factor on carrier
None
Cell uplink reuse efficiency factor on
carrier
Simulation result available per cell
with
Simulation result available per mobile
None Downlink load factor on carrier
Nb
E1 T1 Ethernet RoundUp Max T
Iub
DL
N
I
( ) T
E1 T1 Ethernet
T
Iub
UL
N
I
( ) T
E1 T1 Ethernet
, ( ) ( )
I
i ntra
DL
txi i c , ( )
P
tot
DL
txi i c , ( )
F
ortho

BTS

P
tot
DL
txi i c , ( )
txi
P
SCH
txi i c , ( )
L
T
----------------------------------
\ .
|
|
| |

1 F
ortho
( )
BTS
P
b
DL
txi i c , ( )
i c
I
extra
DL
i c ( )
P
tot
DL
txj i c , ( )
txj j i = ,

i c
I
i nter carri er
DL
i c ( )
P
tot
DL
txj i c
adj
, ( )
txj j ,

RF i c i c
adj
, ( )
-------------------------------------------------
i c
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
n
i
i c ,
Tx m ,

------------------------------------------
n
i

I
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) + + +
i c
N
tot
DL
i c ( ) I
tot
DL
i c ( ) N
0
Term
+
i c
I
tot
UL
i ntra
txi i c , ( )
P
b
UL
i c ( )
term
txi

i c
I
tot
UL
ext ra
txi i c , ( )
P
b
UL
i c ( )
term
txj j i = ,

i c
I
i nter carri er
UL
txi i c , ( )
P
b
UL
i c
adj
( )
term
txj j ,

RF i c i c
adj
, ( )
---------------------------------------
i c
I
tot
UL
txi i c , ( )
I
tot
UL
extra
txi i c , ( ) 1 F
MUD
Tx

term
( ) + I
tot
UL
i ntra
txi i c , ( ) I
i nter carri er
UL
txi i c , ( ) +
i c
N
tot
UL
txi i c , ( ) I
tot
UL
txi i c , ( ) N
0
tx
+
i c
X
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
N
tot
UL
txi i c , ( )
------------------------------ i c
F
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
I
tot
UL
i ntra
txi i c , ( ) 1 F
MUD
Tx

term
( )
-------------------------------------------------------------------------------------------
i c
E
UL
txi i c , ( )
1
F
UL
txi i c , ( )
------------------------------
i c
X
DL
txi i c , ( )
I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) + ( ) L
T

P
Tx
DL
txi i c , ( )
---------------------------------------------------------------------------------------- 1 F
ortho

BTS
+
1
CI
req
DL
------------- 1 F
ortho

BTS
( ) +
-------------------------------------------------------------------------------------------------------------------------------------------
tch

CI
req
DL
Q
req
DL
G
p
DL
------------ =
I
tot
DL
i c ( )
N
tot
DL
i c ( )
--------------------
i c
246 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
6.4.3.2 HSPA Related Results
At the end of the R99 part, packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users can be:
Either connected and in this case, they obtain the requested R99 bearer,
Or rejected exactly for the same reasons as R99 users.
Only connected packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users are considered in
the HSDPA part. At the end of the HSDPA part, packet (HSDPA) and packet (HSPA) service users can be:
Either connected if they obtain an HSDPA bearer,
Or rejected if the maximum number of HSDPA users per cell is exceeded,
Or delayed in case of lack of resources (HSDPA power, HS-SCCH power, HS-SCCH channels, OVSF codes).
Packet (HSPA - Constant Bit Rate) service users can be:
Either connected if they obtain an HSDPA bearer,
Or rejected for the following reasons: the maximum number of HSDPA users per cell is exceeded, the lowest
HSDPA bearer the user can obtain does not provide a RLC peak rate higher than the guaranted bit rate, the HS-
SCCH signal quality is not sufficient, there are no more OVSF codes available, the maximum Iub backhaul
throughput allowed on the site in the downlink is exceeded.
In the HSUPA part, Atoll processes packet (HSPA) service users and packet (HSPA - Constant Bit Rate) service users
who are connected to an HSDPA bearer or were delayed in the previous step. At the end, they can be:
Either connected if they obtain an HSUPA bearer,
Or rejected for the following reasons: the maximum number of HSUPA users per cell is exceeded, the terminal
power required to obtain the lowest compatible HSUPA bearer exceeds the maximum terminal power, there are
no more channel elements available, the maximum Iub backhaul throughput allowed on the site in the uplink is
exceeded, the lowest compatible HSUPA bearer they can obtain does not provide a RLC peak rate higher than
the guaranted bit rate (only for packet (HSPA - Constant Bit Rate) service users).
In the following parts, a dual-cell HSDPA user refers to a user which has a dual-cell HSDPA-capable terminal and which
is simultaneously connected to two HSDPA cells of a transmitter supporting dual-cell HSDPA mode.
6.4.3.2.1 Statistics Tab
In the Statistics tab, Atoll displays as results:
The number of rejected users.
The number of delayed users.
The number of R99 bearer users connected to a cell (result of the R99 part). This figure includes R99 users as
well as HSDPA and HSUPA bearer users since all of them request an R99 bearer.
- The number of R99 bearer users per frequency band.
- The number of R99 bearer users per activity status.
- The downlink and uplink rates ( and ) generated by their connection to R99 bearers. Only active
users are considered.
and
is the downlink nominal rate of the user R99 radio bearer and is the uplink
nominal rate of the user R99 radio bearer.
The number of connected users with an HSDPA bearer (result of the HSDPA part) and the downlink rate they
generate. Packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users are considered
since they all request an HSDPA bearer. On the other hand, only active users are taken into consideration in the
downlink rate calculation ( ).
is the RLC peak rate provided in the downlink.
None Downlink reuse factor on a carrier
dB Noise rise on downlink
dB Noise rise on uplink
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
F
DL
txi i c , ( )
I
tot
DL
i c ( )
I
i ntra
DL
txi i c , ( )
-------------------------------- i c
NR
DL
txi i c , ( ) 10 1 X
DL
txi i c , ( ) ( ) log
NR
UL
txi i c , ( ) 10 1 X
UL
txi i c , ( ) ( ) log
R
R99
DL
R
R99
UL
R
R99
DL
R
nomi nal
DL
R99 Bearer ( )
Acti ve
users

= R
R99
UL
R
nomi nal
UL
R99 Bearer ( )
Acti ve
users

=
R
nomi nal
DL
R99 Bearer ( ) R
nomi nal
UL
R99 Bearer ( )
R
HSDPA
DL
R
HSDPA
DL
R
RLC peak
DL
Acti ve
users

=
R
RLC peak
DL
Forsk 2010 AT283_TRG_E2 247
Chapter 6: UMTS HSPA Networks
The number of connected HSUPA bearer users (result of the HSUPA part). Only packet (HSPA) and packet
(HSPA - Constant Bit Rate) service users are considered.
In addition, Atoll indicates the uplink data rate generated by active users connected with an HSUPA bearer
( ):
is the RLC peak rate provided in the uplink.
6.4.3.2.2 Mobiles Tab
In the Mobiles tab, Atoll indicates for each user:
The uplink and downlink total requested rates in kbps (respectively, and )
For circuit and packet (R99) service users, the DL and UL total requested rates correspond to the DL and UL nominal rates
of the R99 bearer associated to the service.
For packet (HSDPA) service users, the uplink requested rate corresponds to the nominal rate of ADPCH R99 radio bearer
and the downlink requested rate is the sum of the ADPCH radio bearer nominal rate and the RLC peak rate(s) that the
selected HSDPA radio bearer(s) can provide. Here, the user is treated as if he is the only user in the cell and then, Atoll
determines the HSDPA bearer the user would obtain by considering the entire HSDPA power available of the cell.
for single-carrier users
for dual-carrier users
For HSUPA bearer users (i.e., packet (HSPA) and packet (HSPA - Constant Bit Rate) service users), the uplink requested
rate is equal to the sum of the ADPCH-EDPCCH radio bearer nominal rate and the RLC peak rate of the requested HSUPA
radio bearer. The requested HSUPA radio bearer is selected from the HSUPA bearers compatible with the user
equipment. Here, the user is treated as if he is the only user in the cell and then, Atoll determines the HSUPA bearer the
user would obtain by considering the entire remaining load of the cell. The downlink requested rate is the sum of the
ADPCH-EDPCCH radio bearer nominal rate and the RLC peak rate(s) that the requested HSDPA radio bearer(s) can
provide. The requested HSDPA radio bearer is determined as explained in the previous paragraph.
for single-carrier users
for dual-carrier
users
The uplink and downlink total obtained rates in kbps (respectively, and )
For circuit and packet (R99) service users, the obtained rate is the same as the requested rate if he is connected without
being downgraded. Otherwise, the obtained rate is lower (it corresponds to the nominal rate of the selected R99 bearer).
If the user is rejected, the obtained rate is zero.
In the downlink, HSDPA bearer users can be connected to a single cell or to two cells of the same transmitter when the
user has a dual-cell HSDPA-capable terminal and when the transmitter supports the dual-cell HSDPA mode.
For a single-carrier packet (HSDPA) service user connected to an HSDPA bearer, the downlink obtained rate corresponds
to the instantaneous rate; this is the sum of the A-DPCH radio bearer nominal rate and the RLC peak rate provided by the
selected HSDPA radio bearer after scheduling and radio resource control. If the user is delayed (he is only connected to
an R99 radio bearer), downlink obtained rate corresponds to the downlink nominal rate of the ADPCH radio bearer. Finally,
if the user is rejected either in the R99 part or in the HSDPA part (i.e., because the HSDPA scheduler is saturated), the
downlink obtained rate is zero.
For a dual-carrier packet (HSDPA) service user connected to two HSDPA bearers, the downlink obtained rate corresponds
to the instantaneous rate; this is the sum of the nominal rate provided by the A-DPCH radio bearer in the anchor cell and
the RLC peak rates provided by the selected HSDPA radio bearers after scheduling and radio resource control. If the user
is connected to one cell and delayed in the other cell, the downlink obtained rate is the sum of the nominal rate provided
by the A-DPCH radio bearer in the anchor cell and the RLC peak rate provided by the selected HSDPA radio bearer after
scheduling and radio resource control. If the user is delayed in the two cells (he is only connected to an R99 radio bearer
R
HSUPA
UL
R
HSUPA
UL
R
RLC peak
UL
Acti ve
users

=
R
RLC peak
UL
R
requested
UL
M
b
( ) R
requested
DL
M
b
( )
R
requested
DL
M
b
( ) R
nomi nal
DL
R99 Bearer ( ) =
R
requested
UL
M
b
( ) R
nomi nal
UL
R99 Bearer ( ) =
R
requested
DL
M
b
( ) R
nomi nal
DL
ADPCH R99 Bearer ( ) R
RLC peak
DL
+ =
R
requested
DL
M
b
( ) R
nomi nal
DL
ADPCH R99 Bearer ( )
AnchorCel l
R
RLC peak
DL
c ( )
c Serving Cells e

+ =
R
requested
UL
M
b
( ) R
nomi nal
UL
ADPCH R99 Bearer ( ) =
R
requested
DL
M
b
( ) R
nomi nal
DL
ADPCH EDPCCH R99 Bearer ( ) R
RLC peak
DL
+ =
R
requested
DL
M
b
( ) R
nomi nal
DL
ADPCH EDPCCH R99 Bearer ( )
AnchorCel l
R
RLC peak
DL
c ( )
c Serving cells e

+ =
R
requested
UL
M
b
( ) R
nomi nal
UL
ADPCH EDPCCH R99 Bearer ( ) R
RLC peak
UL
+ =
R
obtai ned
UL
M
b
( ) R
obtai ned
DL
M
b
( )
248 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
in the anchor cell), the downlink obtained rate corresponds to the downlink nominal rate of the ADPCH radio bearer in the
anchor cell. Finally, if the user is rejected either in the R99 part or in the HSDPA part (i.e., because the HSDPA scheduler
is saturated), the downlink obtained rate is zero.
In the uplink, packet (HSDPA) service users can only have a single-carrier connection. When the user is either connected
or delayed, the uplink obtained rate corresponds to the uplink nominal rate of the ADPCH radio bearer. If the user is
rejected either in the R99 part or in the HSDPA part (i.e., because the HSDPA scheduler is saturated), the uplink obtained
rate is zero.
For a single-carrier packet (HSPA) service user, on downlink, if the user is connected to an HSDPA bearer, the downlink
obtained rate corresponds to the instantaneous rate. The instantaneous rate is the sum of the ADPCH-EDPCCH radio
bearer nominal rate and the RLC peak rate provided by the selected HSDPA radio bearer after scheduling and radio
resource control. If the user is delayed, the downlink obtained rate corresponds to the downlink nominal rate of ADPCH-
EDPCCH radio bearer. If the user is rejected, the downlink obtained rate is "0."
For a dual-carrier packet (HSPA) service user connected to two HSDPA bearers, the downlink obtained rate corresponds
to the instantaneous rate; this is the sum of the nominal rate provided by the ADPCH-EDPCCH radio bearer in the anchor
cell and the RLC peak rates provided by the selected HSDPA radio bearers after scheduling and radio resource control.
If the user is connected to one cell and delayed in the other cell, the downlink obtained rate is the sum of the nominal rate
provided by the ADPCH-EDPCCH radio bearer in the anchor cell and the RLC peak rate provided by the selected HSDPA
radio bearer after scheduling and radio resource control. If the user is delayed in the two cells (he is only connected to an
R99 radio bearer in the anchor cell), the downlink obtained rate corresponds to the downlink nominal rate of the ADPCH-
EDPCCH radio bearer in the anchor cell. Finally, if the user is rejected, the downlink obtained rate is zero.
In uplink, packet (HSPA) service users can only have a single-carrier connection. When the user is connected to an
HSUPA bearer, the uplink obtained rate is the sum of the ADPCH-EDPCCH radio bearer nominal rate and the RLC peak
rate provided by the selected HSUPA radio bearer after noise rise scheduling. If the user is rejected, the uplink obtained
rate is zero.
For a connected packet (HSPA - Constant Bit Rate) service user, the uplink and downlink total obtained rates are the sum
of the ADPCH-EDPCCH radio bearer nominal rate and the guaranteed bit rate defined for the service. If the user is
rejected, the uplink and downlink total obtained rates are "0".
The mobile total power ( )
for packet (HSPA) service users
for packet (HSPA - Constant Bit Rate) service users
And
for circuit and packet (R99) service users and packet (HSDPA) service users
The HSDPA application throughput in kbps ( )
This is the net HSDPA throughput without coding (redundancy, overhead, addressing, etc.).
Where:
is the RLC peak rate provided to the user by the selected HSDPA radio bearer after scheduling and radio
resource control.
is read in the quality graph defined for the triplet reception equipment-selected bearer-mobility (HSDPA
Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of
the measured quality (HS-PDSCH Ec/Nt). Knowing the HS-PDSCH Ec/Nt, Atoll calculates the corresponding BLER.
and represent the scaling factor between the application throughput and the RLC (Radio Link Control)
throughput and the throughput offset respectively. These two parameters model the header information and other
supplementary data that does not appear at the application level. They are defined in the service properties.
is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user
equipment category properties.
The number of OVSF codes
This is the number of 512-bit length OVSF codes consumed by the user.
The required HSDPA power in dBm ( )
Note:
For packet (HSPA - Constant Bit Rate) service users, .
P
term
P
term
P
term R99
f
act EDPCCH
UL
= P
term HSUPA
+
P
term
P
term R99
f
act EDPCCH
UL
= P
term HSUPA
C
HSDPABearer
+
f
act EDPCCH
UL
0.1 =
P
term
P
term R99
=
T
appl i cati on
DL
M
b
( )
T
appl i cati on
DL
M
b
( )
R
RLC peak
DL
c ( )
c Serving cells e

1 BLER
HSDPA
( )
ATTI
------------------------------------------------------------------------------------------------------------------------------- SF
Rate
AR =
R
RLC peak
DL
BLER
HSDPA
SF
Rate
AR
ATTI
P
HSDPA
( )
requi red
Forsk 2010 AT283_TRG_E2 249
Chapter 6: UMTS HSPA Networks
It corresponds to the HSDPA power required to provide the HSDPA bearer user with the downlink requested rate. The
downlink requested rate is the data rate the user would obtain if he was the only user in the cell. In this case, Atoll
determines the HSDPA bearer the user would obtain by considering the entire HSDPA power available of the cell.
is the HS-PDSCH power required to obtain the selected HSDPA bearer (in dBm). If the HSDPA bearer
allocated to the user is the best one, corresponds to the available HS-PDSCH power of the cell. On
the other hand, if the HSDPA bearer has been downgraded in order to be compliant with cell and UE capabilities or for
another reason, will be lower than the available HS-PDSCH power of the cell.
The served HSDPA power in dBm ( )
This is the HSDPA power required to provide the HSDPA bearer user with the downlink obtained rate. The downlink
obtained rateis the data rate experienced by the user after scheduling and radio resource control.
for packet (HSDPA) and packet (HSPA) service users
And
for packet (HSPA - Constant Bit Rate) service users
Where
is the HS-PDSCH power required to obtain the selected HSDPA bearer.
The No. of HSUPA Retransmissions (Required)
The maximum number of retransmissions in order to have the requested HSUPA radio bearer with a given BLER.
The No. of HSUPA Retransmissions (Obtained)
The maximum number of retransmissions in order to have the obtained HSUPA radio bearer with a given BLER.
The HSUPA application throughput in kbps ( )
This is the net HSUPA throughput without coding (redundancy, overhead, addressing, etc.).
Where:
is the RLC peak rate provided by the selected HSUPA radio bearer after noise rise scheduling.
is the residual BLER after retransmissions. It is read in the quality graph defined for the quartet
reception equipment-selected bearer-number of retransmissions-mobility (HSUPA Quality Graphs tab in the Reception
equipment properties). This graph describes the variation of BLER as a function of the measured quality (E-DPDCH Ec/
Nt). Knowing the E-DPDCH Ec/Nt, Atoll calculates the corresponding BLER.
and respectively represent the scaling factor between the application throughput and the RLC (Radio Link
Control) throughput and the throughput offset. These two parameters model the header information and other
supplementary data that does not appear at the application level. They are defined in the service properties.
is the maximum number of retransmissions for the obtained HSUPA bearer. This figure is read in the HSUPA Bearer
Selection table.
The following columns appear if, when creating the simulation, you select "Detailed information about mobiles":
The uplink and downlink requested RLC peak rates (kbps)
Downlink and uplink requested RLC peak rates are not calculated for circuit and packet (R99) service users.
For packet (HSDPA) service users, the uplink RLC peak rate is not calculated and the downlink requested RLC peak rate
is the data rate that the selected HSDPA radio bearer(s) can provide. Here, the user is treated as if he is the only user in
the cell and then, Atoll determines the HSDPA bearer he would obtain by considering the entire HSDPA power available
of the cell.
For HSUPA bearer users (i.e., packet (HSPA) and packet (HSPA - Constant Bit Rate) service users), the requested uplink
RLC peak rate is the data rate of the requested HSUPA radio bearer. The requested HSUPA radio bearer is selected from
the HSUPA bearers compatible with the user equipment. Here, the user is treated as if he is the only user in the cell and
then, Atoll determines the HSUPA bearer the user would obtain by considering the entire remaining load of the cell. If the
user is connected to one or two HSDPA bearers in the downlink, the downlink requested RLC peak rate is the rate that
the requested HSDPA radio bearer(s) can provide. The requested HSDPA radio bearer is determined as explained in the
previous paragraph.
The uplink and downlink obtained RLC peak rate (kbps)
Downlink and uplink obtained RLC peak rates are not calculated for circuit and packet (R99) service users.
P
HSDPA
( )
requi red
P
HS PDSCH
( )
used
n
HS SCCH
P
HS SCCH
+ =
P
HS PDSCH
( )
used
P
HS PDSCH
( )
used
P
HS PDSCH
( )
used
P
HSDPA
( )
served
P
HSDPA
( )
served
P
HS PDSCH
( )
used
n
HS SCCH
P
HS SCCH
+ =
P
HSDPA
( )
served
P
HS PDSCH
( )
used
C
HSDPABearer
=
P
HS PDSCH
( )
used
T
appl i cati on
UL
M
b
( )
T
appl i cati on
UL
M
b
( )
R
RLC peak
UL
M
b
( ) 1 BLER
HSUPA
( ) SF
Rate
AR
N
Rtx
----------------------------------------------------------------------------------------------------------------------------------------- =
R
RLC peak
UL
BLER
HSUPA
N
Rtx
SF
Rate
AR
N
Rtx
250 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For a packet (HSDPA) service user connected to one or two HSDPA bearers, the uplink obtained RLC peak rate is not
calculated, and the downlink obtained RLC peak rate is the data rate provided by the selected HSDPA radio bearer(s) after
scheduling and radio resource control.
For a connected packet (HSPA) service user, on uplink, if the user is connected to an HSUPA bearer, the obtained uplink
RLC peak rate is the rate provided by the selected HSUPA radio bearer after noise rise scheduling. On downlink, if the
user is connected to one or two HSDPA bearers, the downlink obtained RLC peak rate is the rate provided by the selected
HSDPA radio bearer(s) after scheduling and radio resource control.
For a connected packet (HSPA - Constant Bit Rate) service user, the uplink and downlink obtained RLC peak rates are
the uplink and downlink guaranteed bit rates defined for the service.
6.4.3.2.3 Cells Tab
In the Cells tab, Atoll gives:
The available HSDPA power in the cell, c, in dBm ( ):
This is:
- Either a fixed value in case of a static HSDPA power allocation strategy,
- Or a simulation result when the option "HSDPA Power Dynamic Allocation" is selected. We have:
with
The transmitted HSDPA power in the cell, c, in dBm ( ):
It corresponds to the HSDPA power used to serve HSDPA bearer users.
The number of HSDPA users in the cell
They are the connected and delayed HSDPA bearer users. This figure includes packet (HSDPA), packet (HSPA) and
packet (HSPA - Constant Bit Rate) users. Dual-carrier HSDPA bearer users are accounted for once in each serving cell.
The number of simultaneous HSDPA users in the cell ( )
It corresponds to the number of connected HSDPA bearer users that the cell supports at a time, i.e. within one
transmission time interval. All these users are connected to the cell at the end of the HSDPA part of the simulation; they
have a connection with the R99 bearer and an HSDPA bearer. Dual-carrier HSDPA bearer users are accounted for once
in each serving cell.
The instantaneous HSDPA rate in the cell, c, in kbps ( )
This is the number of kilobits per second that the cell supports on downlink to provide simultaneous connected HSDPA
bearer users with an HSDPA bearer. We will differentiate single-carrier users (M
s
) from dual-cell users (M
d-HSDPA
, M
d-
HSPA
and M
d-HSPA-CBR
stand for packet (HSDPA) service users, packet (HSPA) service users and packet (HSPA-Constant
Bit Rate) service users, respectively).
P
HSDPA
c ( )
P
HSDPA
c ( ) P
max
c ( ) P
Headroom
c ( ) P
tx R99
c ( ) P
HSUPA
c ( ) =
P
tx R99
c ( ) P
pi l ot
c ( ) P
SCH
c ( ) P
OtherCCH
c ( ) P
tch
c ( ) P
tch
c ( ) f
act ADPCH
DL

tch used for


HSPA users

+
tch used for
R99 users

+ + + =
P
tx H SDPA
c ( )
P
tx H SDPA
c ( ) P
HSDPA
M
b
( ) ( )
served
M
b
c e

=
n
M
b
R
Inst
DL
c ( )
R
Inst
DL
cel l ( )
R
obtai ned
DL
M
s
( ) R
nomi nal
DL
R99 Bearer ( ) R
RLC peak
DL
M
d HSDPA
( ) + ( )
M
d HSDPA
c e
c is the anchor cell

+
M
s
c e

R
RLC peak
DL
M
d HSDPA
( ) +
M
d HSDPA
c e
c is the secondary cell

+
R
nomi nal
DL
R99 Bearer ( ) R
RLC peak
DL
M
d HSPA
( ) + ( )
M
d HSPA
c e
c is the anchor cell

R
RLC peak
DL
M
d HSPA
( ) R
Guaranteed
DL
M
d HSPA CBR
( )
M
d HSPA CBR
c e
cis the secondary cell

+
M
d HSPA
c e
c is the secondary cell

R
nomi nal
DL
R99 Bearer ( ) R
Guaranteed
DL
M
d HSPA CBR
( ) + ( )
M
d HSPA CBR
c e
c is the anchor cell

+
=
Forsk 2010 AT283_TRG_E2 251
Chapter 6: UMTS HSPA Networks
is the RLC peak rate provided by the selected HSDPA radio bearer after scheduling and radio resource
control.
is the nominal rate of the ADPCH radio bearer if the user is a packet (HSDPA) service user. For
packet (HSPA) and packet (HSPA - Constant Bit Rate) service users, it corresponds to the ADPCH-EDPCCH radio bearer.
The instantaneous HSDPA MAC Throughput in the cell, c, in kbps ( )
Where,
is the transport block size (in kbits) of the HSDPA bearer selected by the user; it is defined for each HSDPA
bearer in the HSDPA Radio Bearers table.
is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal
user equipment category properties.
is the TTI duration, i.e. (2000 TTI in one second). This value is specified by the 3GPP.
The average instantaneous HSDPA rate in the cell, c, in kbps ( )
The HSDPA application throughput in the cell, c, in kbps ( )
Either if the scheduling algorithm is Round
Robin or Proportional Fair,
Or if the scheduling algorithm is Max C/I.
is the user with the highest in the cell.
is the RLC peak rate provided by the selected HSDPA radio bearer after scheduling and radio resource
control.
is read in the quality graph defined for the triplet reception equipment-selected bearer-mobility (HSDPA
Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of
the measured quality (HS-PDSCH Ec/Nt). Knowing the HS-PDSCH Ec/Nt, Atoll calculates the corresponding BLER.
and respectively represent the scaling factor between the application throughput and the RLC (Radio Link
Control) throughput and the throughput offset. These two parameters model the header information and other
supplementary data that does not appear at the application level. They are defined in the service properties.
is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user
equipment category properties.
The minimum HSDPA RLC peak rate in kbps ( )
It corresponds to the lowest of RLC peak rates obtained by HSDPA bearer users connected to the cell.
The maximum HSDPA RLC peak rate in kbps ( )
It corresponds to the highest of RLC peak rates obtained by HSDPA bearer users connected to the cell.
The number of HSUPA users in the cell ( ):
They are the HSDPA bearer users connected to the cell.
The HSUPA application throughput in the cell, c, in kbps ( )
The uplink cell load factor due to HSUPA traffic ( ):
R
RLC peak
DL
R
nomi nal
DL
R99 Bearer ( )
T
MAC
DL
c ( )
T
MAC
DL
c ( )
S
bl ock
M
b
( )
T
TTI
A TTI M
b
( )
--------------------------------------------
M
b
c e

=
S
bl ock
M
b
( )
ATTI M
b
( )
T
TTI
2
3
10 s
R
Av Inst
DL
c ( )
R
Av Inst
DL
c ( )
R
Inst
DL
c ( )
n
M
b
--------------------- =
T
appl i cati on
DL
c ( )
T
appl i cati on
DL
c ( )
R
RLC peak
DL
M
b
( ) 1 BLER
HSDPA
( ) SF
Rate
AR
ATTI
--------------------------------------------------------------------------------------------------------------------------------------
M
b
c e

=
T
appl i cati on
DL
c ( )
R
RLC peak
DL
M
b
maxC I ( ) ( ) 1 BLER
HSDPA
( ) SF
Rate
AR
ATTI
------------------------------------------------------------------------------------------------------------------------------------------------------------------ =
M
b
maxC I ( ) C I
R
RLC peak
DL
BLER
HSDPA
SF
Rate
AR
ATTI
m
M
b
cel l e
i n R
RLC peak
DL
M
b
( ) ( )
m
M
b
cel l e
ax R
RLC peak
DL
M
b
( ) ( )
n
M
c
T
appl i cati on
UL
c ( )
T
appl i cati on
UL
c ( ) T
appl i cati on
UL
M
b
( )
M
b
c e

=
X
HSUPA
UL
c ( )
252 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where
is the total interference at transmitter received from HSUPA bearer users.
6.4.3.2.4 Sites Tab
In the Sites tab, Atoll displays:
The instantaneous HSDPA rate carried by the site in kbps ( )
The instantaneous HSDPA MAC Throughput carried by the site in kbps ( in kbps)
The HSUPA rate carried by the site in kbps ( )
6.4.4 Appendices
6.4.4.1 Admission Control in the R99 Part
During admission control in the R99 part of the simulation, Atoll calculates the uplink load factor of a considered cell
assuming the mobile concerned is connected to it. Here, activity status assigned to users is not taken into account. So
even if the mobile is not active on UL, it can be rejected due to cell load saturation. To calculate the cell UL load factor,
either Atoll takes into account the mobile power determined during power control if mobile was connected in previous
iteration, or it estimates a load rise due to the mobile and adds it to the current load. The load rise ( ) is calculated
as follows:
6.4.4.2 Resources Management
6.4.4.2.1 OVSF Codes Management
OVSF codes are managed in the downlink during the simulation since this resource is downlink limited only. Atoll checks
the availability of this resource during the simulation, first in the R99 part and then in the HSDPA part. It determines the
number of codes that will be consumed by each cell.
OVSF codes form a binary tree. Codes of longer lengths are generated from codes of a shorter length. Length-k OVSF
codes are generated from length-k/2 OVSF codes. Therefore, if one channel needs 1 length-k/2 OVSF code, it is
equivalent to use 2 length-k OVSF codes, or 4 length-2k OVSF codes and so on.
512 512-bit-length codes per cell are available in UMTS HSPA projects.
In the R99 part, during the resource control, Atoll determines the number of 512 bit-length codes that will be consumed
for each cell.
If the cell supports HSUPA, Atoll allocates codes for the DL channels used for HSUPA:
A 128 bit-length code for the E-HICH and E-RGCH channels (i.e. four 512 bit-length OVSF codes), for each cell.
Therefore, Atoll will take four 512-bit-length codes,
A 256 bit-length code for the E-AGCH channel (i.e. two 512 bit-length OVSF codes), for each cell. Therefore, Atoll
will take two 512-bit-length codes,
If the cell supports HSDPA, Atoll reserves for potential HSDPA bearer users:
The minimum number of HS-PDSCH codes defined for the cell, . They are 16-bit length OVSF
codes (i.e. thirty-two 512 bit-length OVSF codes). Therefore, Atoll will take 512-bit-
length codes,
X
HSUPA
UL
c ( )
I
tot
UL
c ( ) ( )
HSUPA
N
tot
UL
c ( )
-------------------------------------- =
I
tot
UL
c ( ) ( )
HSUPA
R
Inst
DL
si te ( )
R
Inst
DL
si te ( ) R
Inst
DL
c ( )
c si te e

=
T
MAC
DL
si te ( )
T
MAC
DL
si te ( ) T
MAC
DL
c ( )
c si te e

=
R
UL
si te ( )
R
UL
si te ( ) R
obtai ned
UL
M
c
( )
M
c
si te e

=
AX
UL
AX
UL 1
1
W
Q
req
UL
R
nomi nal
UL

---------------------------------------- +
-------------------------------------------------- =
N
mi n
Codes HS PDSCH
32 N
mi n
Codes HS PDSCH

Forsk 2010 AT283_TRG_E2 253


Chapter 6: UMTS HSPA Networks
A 128 bit-length code per HS-SCCH channel (i.e. four 512 bit-length OVSF codes), for each cell. Therefore, Atoll
will take 512-bit-length codes,
Then, it allocates to the cell OVSF codes to support R99 bearers required by users:
A 256 bit-length code per common channel (i.e. two 512 bit-length OVSF codes), for each cell. Therefore, Atoll
will take 512-bit-length codes,
A code per cell-receiver link, for TCH (traffic channels). The length of code to be allocated, Code_Length, depends
on the user activity. We have:
Either when the user is active,
Or if the user is inactive.
The number of 512 bit-length OVSF codes needed is calculated from the length of the code to be allocated
as follows:
The OVSF code allocation follows the Buddy algorithm, which guarantees that:
If a k-length OVSF code is used, all of its children with lengths 2k, 4k, , cannot be used as they will not be
orthogonal.
If a k-length OVSF code is used, all of its ancestors with lengths k/2, k/4, , cannot be used as they will not be
orthogonal.
Example: We consider a user with a service requiring the UDD64 R99 radio bearer. This user is active on DL while
connected to a cell (which does not support HSDPA). The spreading factor for active users has been set to 64 and site
equipment requires four overhead downlink channel elements per cell. Atoll will consume four 256 bit-length OVSF codes
for common channels (i.e. eight 512 bit-length OVSF codes) and a 64 bit-length OVSF code for traffic channels (i.e. eight
additional 512 bit-length OVSF codes).
In the HSDPA part, packet (HSDPA), packet (HSPA) and packet (HSPA - Constant Bit Rate) service users are assigned
an HSDPA bearer (Fast link adaptation).
Therefore, Atoll allocates to the cell:
16-bit length OVSF codes per cell-HSDPA receiver, for HS-PDSCH. This figure depends on the HSDPA bearer
assigned to the user and on the type of service.
For packet (HSDPA) and packet (HSPA) service users, Atoll needs 512-bit-length
codes for each user connected to the cell. is the number of HS-PDSCH channels required by
the HSDPA bearer.
Figure 6.13OVSF Code Tree Indices (Not OVSF Code Numbers)
Notes:
In the R99 part, the OVSF code allocation follows the mobile connection order (mobile
order in the Mobiles tab).
In dual-cell HSDPA, A-DPCH is only transmitted in the anchor carrier. Therefore, a dual-
cell HSDPA user requires R99 resources in the best serving cell only and consumes the
same amount of R99 resources as a single-cell HSDPA user.
The OVSF code and channel element management is differently dealt with in case of
softer handover. Atoll allocates OVSF codes for each cell-mobile link while it globally
assigns channel elements to a site.
4 n
HS SCCH

2 N
Overhead Codes
Code_Length F
spreading
DL
Active user ( ) =
Code_Length F
spreading
DL
Inactive user ( ) =
N
Codes-TCH
N
Codes-TCH 512
Code_Length
------------------------------------ =
32 N
Codes HS PDSCH

N
Codes HS PDSCH
254 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For packet (HSPA - Constant Bit Rate) service users, Atoll needs 512-
bit-length codes for each user connected to the cell. is the number of HS-PDSCH channels
required by the HSDPA bearer.
Dual-cell HSDPA users have two HSDPA bearers, one for each serving cell. Therefore, one dual-cell HSDPA user
consumes OVSF codes in both cells.
6.4.4.2.2 Channel Elements Management
Channel elements are controlled in the R99 and the HSUPA parts of the simulation. Atoll checks the availability of this
resource in the uplink and downlink.
In the R99 part, during the resource control, Atoll determines the number of channel elements required by each site for
R99 bearer users in the uplink and downlink. Then, in the HSUPA part, Atoll carries out another resource control after
allocating HSUPA bearers. It takes into account the channel elements consumed by HSUPA bearer users in the uplink
and recalculates the number of channel elements required by each site in the uplink.
In the uplink, Atoll consumes channel elements for each cell j on a site N
I
. This figure includes:
Channel elements for R99 bearers:
- channel elements for control channels,
- per cell-receiver link, for R99 TCH (traffic channels).
Channel elements for HSUPA bearers:
- per cell-receiver link, for packet (HSPA) service users.
- per cell-receiver link, for packet (HSPA - Constant Bit Rate) service users.
Therefore, the number of channel elements required in the uplink at the site level, , is:
In the downlink, Atoll consumes channel elements for each cell j on a site N
I
. This figure includes:
Channel elements for R99 bearers
- channel elements for control channels (Pilot channel, Synchronisation channel, common
channels),
- per cell-receiver link, for R99 TCH (traffic channels).
Therefore, the number of channel elements required in the downlink at the site level, , is:
6.4.4.2.3 Iub Backhaul Throughput
The Iub backhaul throughput is controlled in the R99, the HSDPA and the HSUPA parts of the simulation. Atoll checks
the availability of this resource in the uplink and downlink.
In the R99 part, during the resource control, Atoll determines the Iub throughput required by each site for R99 bearer users
in the uplink and downlink. Then, in the HSDPA part, Atoll performs a resource control in the downlink after allocating
HSDPA bearers. It takes into account the Iub backhaul throughput consumed by HSDPA bearer users in the downlink and
recalculates the Iub backhaul throughput required by each site in the downlink. Finally, in the HSUPA part, Atoll carries
out a resource control in the uplink after allocating HSUPA bearers. It takes into account the Iub backhaul throughput
Note:
When HSDPA bearer users (at least one) are connected to the cell, Atoll gives the cell
back the minimum number of OVSF codes reserved for HS-PDSCH ( ).
On the other hand, if no HSDPA bearer user is connected, Atoll still keeps these codes
and the codes for HS-SCCH too. This is the same with HSUPA bearer users. Even if no
HSUPA bearer user is connected to the cell, Atoll still keeps the codes for E-HICH, E-
RGCH and E-AGCH channels.
32 N
Codes HS PDSCH
C
HSDPABearer

N
Codes HS PDSCH
N
mi n
Codes HS PDSCH
Notes:
In dual-cell HSDPA, A-DPCH is only transmitted on the anchor carrier. Therefore, a dual-
cell HSDPA user requires R99 resources in the best serving cell only and consumes the
same amount of R99 resources as a single-cell HSDPA user.
In case of softer handover (the mobile has several links with co-site cells), Atoll allocates
channel elements for the best serving cell-mobile link only.
N
CE UL
j ( )
N
Overhead CE UL
N
R99 T CH CE UL
N
HSUPA CE
N
HSUPA CE
C
HSUPABearer

N
CE UL
N
I
( )
N
CE UL
N
I
( ) N
CE UL
j ( )
j N
I
e

=
N
CE DL
j ( )
N
Overhead CE DL
N
R99 T CH CE DL
N
CE DL
N
I
( )
N
CE DL
N
I
( ) N
CE DL
j ( )
j N
I
e

=
Forsk 2010 AT283_TRG_E2 255
Chapter 6: UMTS HSPA Networks
consumed by HSUPA bearer users in the uplink and updates the Iub backhaul throughput required by each site in the
uplink.
In the uplink, the Iub backhaul throughput consumed by each cell j on a site N
I
, , includes:
The Iub backhaul throughput required for R99 bearers:
- per cell-receiver link, for R99 TCH (traffic channels).
The Iub backhaul throughput required for HSUPA bearers:
- per cell-receiver link, for packet (HSPA) service users.
- per cell-receiver link, for packet (HSPA - Constant Bit Rate) service users.
Therefore, the Iub backhaul throughput required on uplink at the site level, , is:
In the downlink, the Iub backhaul throughput consumed by each cell j on a site N
I
, , includes:
The Iub backhaul throughput required for R99 bearers:
- for R99 control channels (Pilot channel, Synchronisation channel, common channels).
- per cell-receiver link, for R99 TCH (traffic channels).
The Iub backhaul throughput required for HSDPA bearers:
- per cell-receiver link, for packet (HSDPA) and packet (HSPA) service users.
- per cell-receiver link, for packet (HSPA - Constant Bit Rate) service users.
With
Therefore, the Iub backhaul throughput required on downlink at the site level, , is:
6.4.4.3 Downlink Load Factor Calculation
Atoll calculates a downlink load factor for each cell (available in the Cells tab of any simulation result) and each connected
mobile (available in the Mobiles tab of any given simulation result).
6.4.4.3.1 Downlink Load Factor per Cell
Approach for downlink load factor evaluation is highly inspired by the downlink load factor defined in the book WCDMA
for UMTS by Harry Holma and Antti Toskala.
Let be the required quality.
and are the processing gain on downlink and the Eb/Nt target on downlink respectively.
In case of soft-handoff, required quality is limited to the effective contribution of the transmitter.
where
Notes:
In dual-cell HSDPA, A-DPCH is only transmitted on the anchor carrier. Therefore, a dual-
cell HSDPA user requires R99 resources in the best serving cell only and consumes the
same amount of R99 resources as a single-cell HSDPA user. On the other hand, the dual-
cell HSDPA user has two HSDPA bearers (one for each serving cell) and consumes
HSDPA resources in both cells.
In case of softer handover (the mobile has several links with co-site cells), Iub backhaul
throughput is consumed by the best serving cell-mobile link only.
T
Iub
UL
j ( )
T
Iub
R99 T CH UL
T
Iub
HSUPA
T
Iub
HSUPA
C
HSUPABearer

T
Iub
UL
N
I
( )
T
Iub
UL
N
I
( ) T
Iub
UL
j ( )
j N
I
e

=
T
Iub
DL
j ( )
T
Iub
Overhead DL
T
Iub
R99 T CH DL
T
Iub
HSDPA
T
Iub
HSDPA
C
HSDPABearer

T
Iub
HSDPA
R
RLC peak
DL
Overhead
Iub
HSDPA
R
RLC peak
DL
+ =
T
Iub
DL
N
I
( )
T
Iub
DL
N
I
( ) T
Iub
DL
j ( )
j N
I
e

=
CI
req
Q
req
DL
G
p
DL
------------ =
G
p
DL
Q
req
DL
P
tx
DL
c ( ) P
pi l ot
c ( ) P
SCH
c ( ) P
otherCCH
c ( ) P
tch
c ( )
tch

+ + + =
P
tx
DL
c ( ) P
CCH
ortho
c ( ) P
CCH
nonOrtho
c ( ) P
tch
c ( )
tch

+ + =
256 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
At mobile level, we have a required power, P
tch
:
With when the user is active on the downlink and when the user is inactive. In case of an HSDPA bearer
user, .
is the total power received at the receiver from the cell with which it is connected.
is the total power received at the receiver from other cells.
is the inter-carrier interference received at the terminal.
is the inter-technology interference received at the terminal from an external transmitter.
We have:
Therefore, the downlink load factor can be expressed as:
P
CCH
ortho
c ( ) P
pi l ot
c ( ) P
otherCCH
c ( ) + =
P
CCH
nonOrtho
c ( ) P
SCH
c ( ) =
P
tch
c ( ) CI
req
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) I
i ntra
c ( ) N
0
term
+ + + + ( ) L
T
r =
r 1 = r r
c
DL
=
r f
act ADPCH
DL
=
P
tch
c ( ) CI
req
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) + +
1 F
ortho

BTS
( ) +
P
tx
DL
c ( ) P
CCH
nonOrtho
c ( ) P
tch
c ( ) ( )
L
T
----------------------------------------------------------------------------------------
P
CCH
nonOrtho
c ( )
L
T
--------------------------------- N
0
term
+ +
\ .
|
|
|
|
| |
L
T
r =
P
tch
i c ( )
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) + + ( ) L
T
r 1 F
ortho

BTS
( ) P
tx
DL
c ( ) r +
F
ortho

BTS
P
CCH
nonOrtho
c ( ) r N
0
term
L
T
r +
+
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
I
i ntra
c ( )
I
extra
c ( )
I
i nter carri er
c ( )
I
i nter techno y log
c ( )
P
tx
DL
c ( )
P
CCH
ortho
c ( ) P
CCH
nonOrtho
c ( ) +
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) + + ( ) L
T
r
1 F
ortho

BTS
( ) P
tx
DL
c ( ) r F
ortho

BTS
P
CCH
nonOrtho
c ( ) r N
0
term
L
T
r + + +
\ .
|
|
| |
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
|
|
|
|
| |
tch

+
=
P
tx
DL
c ( )
P
CCH
ortho
c ( ) P
CCH
nonOrtho
c ( )
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) + + ( ) L
T
r
P
tx
DL
c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------- P
tx
DL
c ( )
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
tch

+ +
+ =
1 F
ortho

BTS
( ) P
tx
DL
c ( ) r
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
----------------------------------------------------------------------------------
tch

F
ortho

BTS
P
CCH
nonOrtho
c ( ) r N
0
term
L
T
r +
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
---------------------------------------------------------------------------------------------------------------------------
tch

+
P
tx
DL
c ( )
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) + + ( ) L
T
r
P
tx
DL
c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------- 1 F
ortho

BTS
r +
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
|
| |
tch

P
tx
DL
i c ( )
P
CCH
ortho
c ( ) P
CCH
nonOrtho
c ( )
F
ortho

BTS
P
CCH
nonOrtho
c ( ) r N
0
term
L
T
r +
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
---------------------------------------------------------------------------------------------------------------------------
tch

+ + =
P
tx
DL
c ( )
P
CCH
ortho
c ( ) P
CCH
nonOrtho
c ( )
F
ortho

BTS
P
CCH
nonOrtho
c ( ) r N
0
term
L
T
r +
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
---------------------------------------------------------------------------------------------------------------------------
tch

+ +
1
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) + + ( ) L
T
r
P
tx
DL
c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------- 1 F
ortho

BTS
r +
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
|
| |
tch

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 257
Chapter 6: UMTS HSPA Networks
The downlink load factor represents the signal degradation in relation to the reference interference (thermal noise plus
synchronisation channel power).
6.4.4.3.2 Downlink Load Factor per Mobile
Atoll evaluates the downlink load factor for any connected mobile as follows:
6.4.4.4 Uplink Load Factor Due to One User
This part details how Atoll calculates the contribution of one user to the UL load factor ( ).
In this calculation, we assume that the cell UL reuse factor ( ) is constant.
The result depends on the option used to calculate Nt (Without useful signal or Total noise that you may select in Global
parameters).
Without Useful Signal Option
We note
As , we have:
X
DL
I
extra
c ( ) I
i nter carri er
c ( ) I
i nter techno y log
c ( ) + + ( ) L
T
r
P
tx
DL
c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------- 1 F
ortho

BTS
r +
1
CI
req
r
---------------------- 1 F
ortho

BTS
( ) +
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
tch

=
X
DL
I
tot
DL
c ( )
N
tot
DL
c ( )
------------------ =
AX
k
UL
F
UL
txi i c , ( )
Q
req
UL
k ( )
W
R
nomi nal
UL
k ( )
------------------------------
P
b
UL
k ( ) ( )
req
I
i ntra
P
b
UL
k ( ) ( )
req
I +
extra
I
i nter carri er
N
0
tx
+ +
------------------------------------------------------------------------------------------------------------------------- =
Q
req
UL
k ( )
W
R
nomi nal
UL
k ( )
------------------------------
P
b
UL
k ( ) ( )
req
I
i ntra
F
UL
P
b
UL
k ( ) ( )
req
N
0
tx
+
-------------------------------------------------------------------------------- =
P
b
UL
k ( ) ( )
req
1 Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ +
\ .
|
| |
Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ I
i ntra
F
UL
N
0
tx
+ ( ) =
P
b
UL
k ( ) ( )
req
Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ I
i ntra
F
UL

1 Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ +
--------------------------------------------------------------------------------------------
Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ N
0
tx

1 Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ +
------------------------------------------------------------------------ + =
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ =
P
b
UL
k ( ) ( )
req
I
i ntra
F
UL

1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
--------------------------------------------------------------
N
0
tx
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
-------------------------------------------------------------- + =
I
i ntra
P
b
UL
k ( ) ( )
req
K

=
I
i ntra
I
i ntra
F
UL 1
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
--------------------------------------------------------------
K

N
0
tx 1
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
--------------------------------------------------------------
K

+ =
258 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Therefore, we have:
So, we can conclude that the contribution of one user to the UL load is defined as:
Total Noise Option
We note
As , we have:
I
i ntra
N
0
tx 1
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
--------------------------------------------------------------
K

1 F
UL 1
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
--------------------------------------------------------------
K


------------------------------------------------------------------------------------------------ =
I
i ntra
N
0
tx
F
UL

1
F
UL 1
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
--------------------------------------------------------------
K

-------------------------------------------------------------------------------------- 1
------------------------------------------------------------------------------------------------ =
X
UL
I
i ntra
I +
extra
I
i nter carri er
+
I
i ntra
I +
extra
I
i nter carri er
N
0
tx
+ +
------------------------------------------------------------------------------------
I
i ntra
F
UL

I
i ntra
F
UL
N
0
tx
+
-------------------------------------------
1
1
N
0
tx
I
i ntra
F
UL

---------------------------- +
-------------------------------------- = = =
X
UL
F
UL 1
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
--------------------------------------------------------------
K

=
AX
k
UL
F
UL 1
1
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
---------------------------------------------- 1 +
\ .
|
|
|
| |
-------------------------------------------------------------- =
Q
req
UL
k ( )
W
R
nomi nal
UL
k ( )
------------------------------
P
b
UL
k ( ) ( )
req
I
i ntra
I +
extra
I
i nter carri er
N
0
tx
+ +
------------------------------------------------------------------------------------ =
Q
req
UL
k ( )
W
R
nomi nal
UL
k ( )
------------------------------
P
b
UL
k ( ) ( )
req
I
i ntra
F
UL
N
0
tx
+
------------------------------------------- =
P
b
UL
k ( ) ( )
req
Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ I
i ntra
F
UL
N
0
tx
+ ( ) =
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
Q
req
UL
k ( )
R
nomi nal
UL
k ( )
W
------------------------------ =
P
b
UL
k ( ) ( )
req
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
I
i ntra
F
UL
N
0
tx
+ ( ) =
I
i ntra
P
b
UL
k ( ) ( )
req
K

=
I
i ntra
I
i ntra
F
UL
N
0
tx
+ ( )
Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
K

=
I
i ntra
N
0
tx Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
K

1 F
UL

--------------------------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 259
Chapter 6: UMTS HSPA Networks
Therefore, we have:
So, we can conclude that the contribution of one user to the UL load is defined as:
6.4.4.5 Inter-carrier Power Sharing Modelling
Inter-carrier power sharing enables the network to dynamically allocate available power from R99-only and HSDPA
carriers among HSDPA carriers.
In this part, we will consider the most common scenario, a network consisting of an R99-only carrier (c
1
) and an HSDPA
carrier with dynamic power allocation (c
2
) (c
2
does not support HSUPA).
As explained in The User Manual, the maximum power of the HSDPA cell must be set to the same value as the maximum
shared power in order to use power sharing efficiently. In this case, the HSDPA cell can use 100% of the available power,
i.e, all of the R99-only cells unused power can be allocated to the HSDPA cell.
Lets take the following example to measure the impact of the inter-carrier power sharing.
1
st
case: Inter-carrier power sharing is not activated
On c
1
, we have: and .
On c
2
, we have: , and .
Therefore,
2
nd
case: Inter-carrier power sharing is activated and
On c
1
, we have: and .
On c
2
, we have: , and .
Therefore,
6.4.4.6 Best Server Determination in Monte Carlo Simulations - Old Method
Before Atoll 2.8.0, best server determination used to be performed by selecting the best carrier within transmitters
according to the selected method (site equipment) and then the best transmitter using the best carrier. To switch back to
this method, add the following lines in the Atoll.ini file:
The method is described below:
For each station txi containing M
b
in its calculation area and using the main frequency band supported by the M
b
s terminal
(i.e. either f1 for a single frequency band network, or f1 or f2 for a dual-band terminal without any priority on frequency
bands, or f1 for a dual-band terminal with f1 as main frequency band).
Determination of .
If a given carrier is specified for the service requested by M
b
and if it is used by txi
is the carrier specified for the service.
Else the carrier selection mode defined for txi is considered.
If carrier selection mode is Min. UL Load Factor
For each carrier ic used by txi, we calculate current loading factor:
EndFor
is the carrier with the lowest
X
UL
I
i ntra
I +
extra
I
i nter carri er
+
I
i ntra
I +
extra
I
i nter carri er
N
0
tx
+ +
------------------------------------------------------------------------------------
I
i ntra
F
UL

I
i ntra
F
UL
N
0
tx
+
-------------------------------------------
1
1
N
0
tx
I
i ntra
F
UL

---------------------------- +
-------------------------------------- = = =
X
UL
F
UL Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
K

=
AX
k
UL
F
UL Ec
Nt
------- k ( )
\ .
| |
E DPDCH
req
=
P
max
Tx c ,
1
( ) 43dBm = P
tx R99
Tx c
1
, ( ) 39.1dBm =
P
max
Tx c ,
2
( ) 43dBm = P
tx R99
Tx c
2
, ( ) 36.1dBm = P
Headroom
Tx c
2
, ( ) 0dB =
P
HSDPA
Tx c ,
2
( ) P
max
Tx c ,
2
( ) P
tx R99
Tx c
2
, ( ) P
Headroom
Tx c
2
, ( ) = 42dBm =
P
max
Tx ( ) 46dBm =
P
max
Tx c ,
1
( ) 43dBm = P
tx R99
Tx c
1
, ( ) 39.1dBm =
P
max
Tx c ,
2
( ) 46dBm = P
tx R99
Tx c
2
, ( ) 36.1dBm = P
Headroom
Tx c
2
, ( ) 0dB =
P
HSDPA
Tx c ,
2
( ) P
max
Tx ( ) P
tx R99
Tx c
1
, ( ) P
tx R99
Tx c
2
, ( ) P
Headroom
Tx c
2
, ( ) = 44.4dBm =
[CDMA]
MultiBandSimu = 0
BestCarri er
k
txi M
b
, ( )
BestCarri er
k
txi M
b
, ( )
X
k
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
N
tot
UL
txi i c , ( )
------------------------------ AX
UL
+ =
BestCarri er
k
txi M
b
, ( ) X
k
UL
txi i c , ( )
260 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Else if carrier selection mode is Min. DL Total Power
is the carrier with the lowest
Else if carrier selection mode is Random
is randomly selected
Else if carrier selection mode is "Sequential"
is the first carrier so that
Calculation of
If user selects without Pilot
Rejection of station txi if the pilot is not received
If then txi is rejected by M
b
If
Admission control (If simulation respects a loading factor constraint and M
b
was not connected in previous iteration).
If , then txi is rejected by M
b
Else
Endif
EndFor
If no Tx
BS
has been selected and M
b
s terminal can work on one frequency band only, M
b
has failed to be connected to
the network and is rejected.
If no Tx
BS
has been selected and M
b
s terminal can work on another frequency band.
Determination of for each station txi containing M
b
in its calculation area and using another
frequency band supported by the M
b
s terminal (i.e. f1 or f2 for a dual-band terminal without any priority on frequency
bands, or f2 for a dual-band terminal with f2 as secondary frequency band)
If a given carrier is specified for the service requested by M
b
and if it is used by txi
is the carrier specified for the service.
Else the carrier selection mode defined for txi is considered.
If carrier selection mode for txi is Min. UL Load Factor
For each carrier ic used by txi, we calculate current loading factor:
EndFor
is the carrier with the lowest
Else if carrier selection mode is Min. DL Total Power
is the carrier with the lowest
Else if carrier selection mode is Random
BestCarri er
k
txi M
b
, ( ) P
tx
txi i c , ( )
k
BestCarri er
k
txi M
b
, ( )
BestCarri er
k
txi M
b
, ( ) X
k
UL
txi i c , ( ) X
max
UL
s
Q
pi l ot
k
txi BestCarri er , ( )
o
BTS
P
c
txi M
b
BestCarri er , , ( )
P
tot
DL
txi BestCarri er
k
txi M
b
, ( ) , ( ) I
extra
DL
BestCarri er
k
txi M
b
, ( ) ( ) + +
I
i nter carri er
DL
BestCarri er
k
txi M
b
, ( ) ( ) I
i nter techno y log
DL
BestCarri er
k
txi M
b
, ( ) ( ) N
0
Term
+ + \ .
|
|
| |
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
txi BestCarri er , ( )
o
BTS
P
c
txi M
b
BestCarri er , , ( )
P
tot
DL
txi BestCarri er
k
txi M
b
, ( ) , ( ) I
extra
DL
BestCarri er
k
txi M
b
, ( ) ( ) +
I +
i nter carri er
DL
BestCarri er
k
txi M
b
, ( ) ( ) I
i nter techno y log
DL
BestCarri er
k
txi M
b
, ( ) ( ) +
N
0
Term
1 o ( )
BTS
P
c
txi M
b
BestCarri er , , ( ) +
\ .
|
|
|
|
|
| |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
txi M
b
BestCarri er , , ( ) Q
req
pi l ot
Mobi l i ty M
b
( ) ( ) <
Q
pi l ot
k
txi M
b
BestCarri er , , ( ) Q
pi l ot
k
max
M
b
( ) >
X
k
UL
txi BestCarri er txi M
b
, ( ) , ( ) X
max
UL
>
Q
pi l ot
k
max
M
b
( ) Q
pi l ot
k
txi M
b
BestCarri er , , ( ) =
Tx
BS
M
b
( ) txi =
BestCarri er
k
txi M
b
, ( )
BestCarri er
k
txi M
b
, ( )
X
k
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
N
tot
UL
txi i c , ( )
------------------------------ AX
UL
+ =
BestCarri er
k
txi M
b
, ( ) X
k
UL
txi i c , ( )
BestCarri er
k
txi M
b
, ( ) P
tx
txi i c , ( )
k
Forsk 2010 AT283_TRG_E2 261
Chapter 6: UMTS HSPA Networks
is randomly selected
Else if carrier selection mode is "Sequential"
is the first carrier so that
Calculation of
If user selects without Pilot
Rejection of station txi if the pilot is not received
If then txi is rejected by M
b
If
Admission control (If simulation respects a loading factor constraint and M
b
was not connected in previous iteration).
If , then txi is rejected by M
b
Else
Endif
EndFor
If no Tx
BS
has been selected, M
b
has failed to be connected to the network and is rejected.
6.5 UMTS HSPA Prediction Studies
6.5.1 Point Analysis
6.5.1.1 AS Analysis Tab
Let us suppose a receiver with a terminal, a service and a mobility type. This receiver does not create any interference.
You can make the prediction for a specific carrier or for all carriers of the main frequency band for the selected terminal.
If you have selected a dual-band terminal, you can make the coverage prediction on a specific carrier or on all carriers of
any frequency band for the selected terminal, or for all the carriers of all the frequency bands. If you have selected a dual-
cell HSDPA user, the analysis must be made on all carriers. The analysis is based on the following parameters:
The uplink load factor and the downlink total power of cells,
The available HSDPA power of the cell in case of an HSDPA bearer user,
The cell UL reuse factor, the cell UL load factor due to HSUPA and the maximum cell UL load factor for HSUPA
bearer users.
These parameters can be results of a given simulation, average values calculated from a group of simulations, or user-
defined cell inputs. In the last case, when no value is defined in the Cells table, Atoll uses the following default values:
Total transmitted power = 50% of the maximum power (i.e, 40 dBm if the maximum power is set to 43 dBm)
Uplink load factor = 50%.
Uplink reuse factor = 1
Uplink load factor due to HSUPA = 0%
Maximum uplink load factor = 75%
On the other hand, no default value is used for the HSDPA power; this parameter must be defined by the user.
6.5.1.1.1 Bar Graph and Pilot Sub-Menu
We can consider the following cases:
BestCarri er
k
txi M
b
, ( )
BestCarri er
k
txi M
b
, ( ) X
k
UL
txi i c , ( ) X
max
UL
s
Q
pi l ot
k
txi BestCarri er , ( )
o
BTS
P
c
txi M
b
BestCarri er , , ( )
P
tot
DL
txi BestCarri er
k
txi M
b
, ( ) , ( ) I
extra
DL
BestCarri er
k
txi M
b
, ( ) ( ) + +
I
i nter carri er
DL
BestCarri er
k
txi M
b
, ( ) ( ) I
i nter techno y log
DL
BestCarri er
k
txi M
b
, ( ) ( ) N
0
Term
+ + \ .
|
|
| |
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
txi BestCarri er , ( )
o
BTS
P
c
txi M
b
BestCarri er , , ( )
P
tot
DL
txi BestCarri er
k
txi M
b
, ( ) , ( ) I
extra
DL
BestCarri er
k
txi M
b
, ( ) ( ) +
I +
i nter carri er
DL
BestCarri er
k
txi M
b
, ( ) ( ) I
i nter techno y log
DL
BestCarri er
k
txi M
b
, ( ) ( ) +
N
0
Term
1 o ( )
BTS
P
c
txi M
b
BestCarri er , , ( ) +
\ .
|
|
|
|
|
| |
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
txi M
b
BestCarri er , , ( ) Q
req
pi l ot
Mobi l i ty M
b
( ) ( ) <
Q
pi l ot
k
txi M
b
BestCarri er , , ( ) Q
pi l ot
k
max
M
b
( ) >
X
k
UL
txi BestCarri er txi M
b
, ( ) , ( ) X
max
UL
>
Q
pi l ot
k
max
M
b
( ) Q
pi l ot
k
txi M
b
BestCarri er , , ( ) =
Tx
BS
M
b
( ) txi =
262 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
1
st
case: Analysis based on a specific carrier
The carrier that can be used by transmitters is fixed. In this case, for each transmitter i containing the receiver in its
calculation area and using the selected carrier, Atoll calculates the pilot quality at the receiver on this carrier. Then, it
determines the best serving transmitter using the selected carrier ic.
2
nd
case: Analysis based on all carriers
Atoll determines the best carrier for each transmitter i which contains the receiver in its calculation area and uses a
frequency band supported by the receivers terminal. The best carrier selection depends on the option selected for the site
equipment (UL minimum noise, DL minimum power, random, sequential). Then, Atoll calculates the pilot quality at the
receiver from these transmitters on their best carriers (ic) and defines the best server (on its best carrier).
3
rd
case: Analysis based on all carriers of any frequency band (for dual-band terminals with priority defined on frequency
bands only)
The frequency band that can be used is fixed. Atoll determines the best carrier for each transmitter i containing the
receiver in its calculation area and using the selected frequency band. The best carrier selection depends on the option
selected for the site equipment (UL minimum noise, DL minimum power, random, sequential). Then, Atoll calculates the
pilot quality at the receiver from these transmitters on their best carriers (ic) and defines the best server (on its best carrier).
Ec/I0 (or ) Evaluation
Let us assume that ic is either the best carrier or the selected carrier of a transmitter i containing the receiver in its radius
calculation and ic
adj
is another carrier adjacent to ic. An interference reduction factor, , is defined between ic
and ic
adj
and set to a value different from 0.
Two ways may be used to calculate I0.
Option Total noise: Atoll considers the noise generated by all the transmitters and the thermal noise.
Option Without pilot: Atoll considers the total noise deducting the pilot signal.
Calculation option may be selected in Global parameters.
Therefore, we have:
With,
for the total noise option,
And
for the without
pilot option.
1st step: calculation for each cell (i,ic)
is the pilot power of a transmitter i on carrier ic at the receiver.
is the total loss between transmitter i and receiver.
2
nd
step: , and calculations
We have:
and
Q
pi l ot
i c ( )
RF i c i c
adj
, ( )
Q
pi l ot
i i c , ( )

BTS
o P
c
i i c , ( )
I
0
DL
i c ( )
-------------------------------------------------- =
I
0
DL
i c ( ) P
tot
DL
i i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
+ + =
I
0
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) + I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
1 o ( )
BTS
P
c
i i c , ( ) + =
P
c
i i c , ( )
P
c
i i c , ( )
P
c
i i c , ( )
P
pi l ot
i i c , ( )
L
T
I
---------------------------- =
L
T
I
L
T
I
L
Tx
L
path
L
term
L
body
L
Indoor
M
Shadowi ng Ec Io

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------------------------- =
P
tot
DL
j i c , ( ) P
tot
DL
i i c , ( ) P
tot
DL
j i c
adj
, ( )
I
extra
DL
i c ( ) P
tot
DL
j i c , ( )
txj j i = ,

=
I
i ntra
DL
i c ( ) P
tot
DL
i i c , ( )
BTS
o P
tot
DL
i i c , ( )
P
SCH
i c ( )
L
T
------------------------
\ .
| |
=
I
i nter carri er
DL
i c ( )
P
tot
DL
j i c
adj
, ( )
txj j ,

RF i c i c
adj
, ( )
------------------------------------------- =
Forsk 2010 AT283_TRG_E2 263
Chapter 6: UMTS HSPA Networks
For each transmitter of the network, is the total power received at the receiver from the transmitter on the best
carrier ic of the transmitter i.
is the total power transmitted by the transmitter on the best carrier. Total power transmitted by each cell is either
a simulation result (provided in Simulation properties (Cells tab)) or a value user-defined in Cell properties.
For each transmitter of the network, is the total power received at the receiver from the transmitter on the
carrier ic
adj
. This carrier is adjacent to ic.
is the total power transmitted by the transmitter on the carrier ic
adj
. Total power transmitted by each cell is either
a simulation result (provided in Simulation properties (Cells tab)) or a value user-defined in Cell properties.
3
rd
step: calculation
4
th
step: and evaluation using formulas described above
5
th
step: calculation
The macro-diversity gain, , models the decrease in shadowing margin due to the fact there are several
available pilot signals at the mobile.
is the shadowing margin when the mobile receives n pilot signals (not necessarily from transmitters
belonging to the mobile active set).
6
th
step: Determination of active-set
Atoll takes the transmitter i with the highest and calculates the best pilot quality received with a fixed cell edge
coverage probability, .
If , it means pilot quality at the receiver exceeds x% of time (x is the fixed cell edge
coverage probability). The cell whose is the highest one enters the active set as best server ( )
and the best carrier (ic
BS
) of the best server, BS, will be the carrier used by other transmitters of the active set (when active
set size is greater than 1). Pilot is available.
If , no cell (i,ic) can enter the active set. Pilot is unavailable.
Then, pilot qualities at the receiver from transmitters i (except the best server) on the best carrier of the best server, ic
BS
,
are recalculated to determine the entire receiver active set (when active set size is greater than 1). Same formulas and
calculation method are used to update value and determine .
We have:
With,
for the total noise option,
And
Note:
This parameter is determined from cell edge coverage probability and Ec/I0 standard
deviation. When the Ec/I0 standard deviation is set to 0, the macro-diversity gain equals 0.
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
P
tot
DL
i c ( )
P
tot
DL
i c ( )
P
Tx
i c ( )
L
T
------------------- =
P
Tx
i c ( )
P
tot
DL
i c
adj
( )
P
tot
DL
i c
adj
( )
P
Tx
i c
adj
( )
L
T
-------------------------- =
P
Tx
i c
adj
( )
N
0
term
N
0
term
NF
Term
K T W NR
i nter techno y log
Tx DL ,
=
I
0
DL
i c ( ) Q
pi l ot
i i c , ( )
G
macro di versi ty
DL
G
macro di versi ty
DL
G
macro di versi ty
DL
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Ec Io
=
M
Shadowi ng Ec Io
npaths
Q
pi l ot
i i c , ( )
Q
pi l ot
Resul ti ng
i c ( )
Q
pi l ot
Resul ti ng
i c ( ) G
macro di versi ty
DL
max Q
pi l ot
i i c , ( ) ( ) =
Q
pi l ot
Resul ti ng
Q
pi l ot
req
> Q
pi l ot
Resul ti ng
i c ( )
Q
pi l ot
i i c , ( ) Q
pi l ot
BS i c , ( )
Q
pi l ot
Resul ti ng
Q
pi l ot
req
<
I
0
DL
i c
BS
( ) Q
pi l ot
i i c
BS
, ( )
Q
pi l ot
i i c , ( )

BTS
o P
c
i i c , ( )
I
0
DL
i c ( )
-------------------------------------------------- =
I
0
DL
i c ( ) P
tot
DL
i i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N
0
term
+ + + + =
264 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
for the without
pilot option.
Other cells (i,ic
BS
) in the active set must satisfy the following criteria:
(optionally)
Number of Cells in Active Set
This is a user-specified input in the Terminal properties. It corresponds to the active set size.
Thermal Noise
This parameter is calculated as described above (3
rd
step).
I0 (Best Server)
I0 (Best server) is the total noise received at the receiver on ic
BS
. The notation Best server refers to the best server of
active set. This is relevant when using the calculation option Without pilot. In this case, it informs that the pilot signal of
the best server (BS,ic
BS
) is deducted from the total noise.
Downlink Macro-Diversity Gain
This parameter is calculated as described above (5
th
step).
6.5.1.1.2 Downlink Sub-Menu
The Downlink sub-menu may contain R99-related results and HSDPA-related results when an HSPA bearer user is
modelled and the HS-SCCH quality is sufficient.
For dual-cell HSDPA users with an R99 connection to a transmitter that supports the dual-cell HSDPA mode, Atoll
determines the best HSDPA bearers obtained in the two serving cells whether you have selected a specific carrier or all
of them. Result is available for a single carrier when the HS-SCCH quality in one cell is not sufficient.
R99-related Results
Atoll calculates the traffic channel quality from each cell (k,ic
BS
) of the receivers active set at the receiver. No power
control is performed as in simulations. Here, Atoll determines the downlink traffic channel quality at the receiver for the
maximum allowed traffic channel power per transmitter. Then, after combination, the total downlink traffic channel quality
is evaluated and compared with the specified target quality.
Eb/Nt Target
Eb/Nt target ( ) is defined for a given R99 bearer, a mobility type and a reception equipment. This parameter is
available in the R99 Bearer Selection table.
Required transmitter power on traffic channels
The calculation of the required transmitter power on traffic channels ( ) may be divided into three steps.
1
st
step: evaluation for each cell
Let us assume the following notation: Eb/Nt max corresponds to
Therefore, for each cell (k,ic
BS
), we have:
I
0
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) + I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
1 o ( )
BTS
P
c
i i c , ( ) + =
Q
pi l ot
i i c
BS
, ( ) Q
pi l ot
BS i c
BS
, ( ) AS_threshold i
BS
i c
BS
, ( ) >
i i c
BS
, ( ) neighbour list i
BS
i c
BS
, ( ) e
Notes:
Compressed mode is operated when:
- A mobile supporting compressed mode is connected to a cell located on a site with a
compressed-mode-capable equipment
And
- Either the received Ec/I0 is lower than the Ec/I0 activation threshold (Global parameters):
,
- Or the pilot RSCP is lower than the pilot RSCP activation threshold (Global parameters):
.
When compressed mode is activated, the downlink Eb/Nt target is increased by the value
user-defined for the DL Eb/Nt target increase field (Global parameters), .
Q
req
DL
Q
pi l ot
Resul ti ng
Q
pi l ot
CM acti vati on
s
P
c
RSCP
pi l ot
CM acti vati on
s
AQ
req
DL
P
tch
req
Q
max
DL
k i c
BS
, ( )
Q
max
DL
Forsk 2010 AT283_TRG_E2 265
Chapter 6: UMTS HSPA Networks
With
and
Where
is the maximum power allowed on traffic channels. This parameter is user-defined in the R99 Radio Bearers table.
is the total noise at the receiver on the best carrier of the best server.
is the intra-cell interference at the receiver on the best carrier of the best server.
is the extra-cell interference at the receiver on the best carrier of the best server.
is the inter-carrier interference at the receiver on the best carrier of the best server.
ic
adj
is a carrier adjacent to ic
BS
.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on the best carrier of the best server.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
2
nd
step: Calculation of the total traffic channel quality
is the traffic channel quality at the receiver on ic
BS
after signal combination of all the transmitters k of the active set.
On downlink, if there is no handoff, we have:
For any other handoff status, we have:
Where
is the downlink rake efficiency factor defined in Terminal properties.
3
rd
step: calculation
Notes:
Q
max
DL
k i c
BS
, ( )

BTS
P
b max
DL
k i c
BS
, ( )
N
tot
DL
i c
BS
( )
-------------------------------------------------------------- G
p
DL
G
Di v
DL
=
P
b max
DL
k i c
BS
, ( )
P
tch
max
L
T
k
------------- =
N
tot
DL
i c
BS
( ) I
i ntra
DL
i c
BS
( ) I
extra
DL
i c
BS
( ) I
i nter carri er
DL
i c
BS
( ) I
i nter techno y log
DL
i c
BS
( ) N
0
term
+ + + + =
P
tch
max
N
tot
DL
i c
BS
( )
I
i ntra
DL
i c
BS
( )
I
i ntra
DL
i c
BS
( )
P
tot
DL
k i c
BS
, ( )

BTS
F
ortho

P
tot
DL
k i c
BS
, ( )
P
SCH
k i c
BS
, ( )
L
T
-------------------------------------
\ .
| |
=
I
extra
DL
i c
BS
( )
I
extra
DL
i c
BS
( ) P
tot
DL
j i c
BS
, ( )
j j k = ,

=
I
i nter carri er
DL
i c
BS
( )
I
i nter carri er
DL
i c
BS
( )
P
tot
DL
j i c
adj
, ( )
txj j ,

RF i c
BS
i c
adj
, ( )
------------------------------------------- =
RF i c
BS
i c
adj
, ( )
I
i nter techno y log
DL
i c
BS
( )
I
i nter techno y log
DL
i c
BS
( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c
BS
,
Tx m ,

----------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c
BS
,
Tx m ,
i c
i
i c
BS
Q
MAX
DL
Q
MAX
DL
i c
BS
( ) Q
max
DL
k i c
BS
, ( ) =
Q
MAX
DL
i c
BS
( ) f
rake efficiency
DL
Q
max
DL
k i c
BS
, ( )
k

=
f
rake efficiency
DL
P
tch
req
P
tch
req
Q
req
DL
Q
MAX
DL
i c
BS
( )
-------------------------------- P
tch
max
=
266 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Eb/Nt Max for Each Cell of Active Set
For each cell (k,ic
BS
), we have:
With
Where
is the required transmitter power on traffic channels.
Eb/Nt Max
is the traffic channel quality at the receiver on ic
BS
after signal combination of all the transmitters k of the active set.
On downlink, if there is no handoff, we have:
For any other handoff status, we have:
Where
is the downlink rake efficiency factor defined in Terminal properties.
Therefore, the service on the downlink traffic channel is available if (or
when compressed mode is activated).
Compressed mode is operated when:
- A mobile supporting compressed mode is connected to a cell located on a site with a
compressed-mode-capable equipment
And
- Either the received Ec/I0 is lower than the Ec/I0 activation threshold (Global parameters):
.
- Or the pilot RSCP is lower than the pilot RSCP activation threshold (Global parameters):
When compressed mode is activated, the downlink Eb/Nt target is increased by the value
user-defined for the DL Eb/Nt target increase field (Global parameters), . In this
case, we have:
Q
pi l ot
Resul ti ng
Q
pi l ot
CM acti vati on
s
P
c
RSCP
pi l ot
CM acti vati on
s
AQ
req
DL
P
tch
req
Q
req
DL
AQ
req
DL

Q
MAX
DL
i c
BS
( )
---------------------------------- P
tch
max
=
Q
max
DL
k i c
BS
, ( )

BTS
P
b max
DL
k i c
BS
, ( )
N
tot
DL
i c
BS
( )
-------------------------------------------------------------- G
p
DL
G
Di v
DL
=
P
b max
DL
k i c
BS
, ( )
P
tch
max
L
T
k
------------- =
N
tot
DL
i c
BS
( ) I
i ntra
DL
i c
BS
( ) I
extra
DL
i c
BS
( ) I
i nter carri er
DL
i c
BS
( ) I
i nter techno y log
DL
i c
BS
( ) N
0
term
+ + + + =
I
i ntra
DL
i c
BS
( )
P =
tot
DL
k i c
BS
, ( )

BTS
F
ortho

P
tot
DL
k i c
BS
, ( )
P
SCH
k i c
BS
, ( )
L
T
-------------------------------------
\ .
| |
1
BTS
( ) max
P
tch
max
P
tch
req

L
T
k
------------------------------ 0 ( , )
I
extra
DL
i c
BS
( ) P
tot
DL
j i c
BS
, ( )
j j k = ,

=
I
i nter carri er
DL
i c
BS
( )
P
tot
DL
j i c
adj
, ( )
txj j ,

RF i c
BS
i c
adj
, ( )
------------------------------------------- =
I
i nter techno y log
DL
i c
BS
( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c
BS
,
Tx m ,

----------------------------------------------
n
i

=
P
tch
req
Q
MAX
DL
Q
MAX
DL
i c
BS
( ) Q
max
DL
k i c
BS
, ( ) =
Q
MAX
DL
i c
BS
( ) f
rake efficiency
DL
Q
max
DL
k i c
BS
, ( )
k

=
f
rake efficiency
DL
Q
MAX
DL
i c
BS
( ) Q
req
DL
> Q
MAX
DL
i c
BS
( ) Q
req
DL
AQ
req
DL
>
Forsk 2010 AT283_TRG_E2 267
Chapter 6: UMTS HSPA Networks
Effective Eb/Nt
is the effective traffic channel quality at the receiver on ic
BS
.
(or when compressed mode is activated).
Downlink Soft Handover Gain
corresponds to the DL soft handover gain.
corresponds to the highest value.
HSDPA-related Results
Atoll determines the best HSDPA bearer that the user can obtain. The HSDPA bearer user is processed as if he is the
only user in the cell i.e. he uses the entire HSDPA power available in the cell.
For dual-cell HSDPA users with an R99 connection to a dual-cell HSDPA transmitter, Atoll determines the best HSDPA
bearers that the user can obtain in the anchor and secondary cells. In each cell, the user is processed as if he is the only
user in the cell.
For further information on the fast link adaptation modelling, see "Fast Link Adaptation Modelling" on page 221.
HS-PDSCH Ec/Nt
Atoll calculates the best HS-PDSCH quality (HS-PDSCH Ec/Nt). The way of calculating it depends on the selected option
in the transmitters global parameters (HSDPA part): CQI based on CPICH quality or CQI based on HS-PDSCH quality.
For dual-cell HSDPA users, Atoll determines the best HS-SCCH quality (HS-PDSCH Ec/Nt) for each serving cell (i.e., the
anchor and the secondary cells).
For further details on the HS-PDSCH quality calculation, see either "HS-PDSCH Quality Calculation" on page 223 if the
selected option is "CQI based on CPICH quality" or "HS-PDSCH Quality Calculation" on page 228 if the selected option
is "CQI based on HS-PDSCH quality".
HS-SCCH Ec/Nt
Atoll displays the obtained HS-SCCH quality. For dual-cell HSDPA users, it provides the HS-SCCH quality for each
serving cell (i.e., the anchor and the secondary cells).
When the HS-SCCH power allocation strategy is dynamic, this parameter corresponds to the HS-SCCH Ec/Nt threshold
defined for the selected mobility type.
When the HS-SCCH power allocation strategy is static, the HS-SCCH Ec/Nt is calculated from the fixed HS-SCCH power.
We have:
for the total noise option,
And
for the without useful signal option.
With
ic
adj
is a carrier adjacent to ic.
Q
eff
DL
Q
eff
DL
mi n Q
MAX
DL
Q
req
DL
, ( ) = Q
eff
DL
mi n Q
MAX
DL
Q
req
DL
AQ
req
DL
, ( ) =
G
SHO
DL
G
SHO
DL
Q
MAX
DL
i c
BS
( )
max Q
max
DL
k i c
BS
, ( ) ( )
------------------------------------------------------ =
max Q
max
DL
k i c
BS
, ( ) ( ) Q
max
DL
k i c
BS
, ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( )
------------------------------------ =
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
P
c
i
i c ( )
N
tot
DL
i c ( ) 1 F
ortho
( ) 1 F
MUD
term
( )
BTS
P
c
i
i c ( )
--------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
+ + =
I
i ntra
DL
i c ( )
P
tot
DL
i c ( )
txi

BTS
1 F
MUD
term
( ) 1 F
ortho
( ) +
P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |

BTS

P
tot
DL
i c ( )
txi
P
SCH
i c ( )
L
T
------------------------
\ .
|
|
| |
=
I
extra
DL
i c ( ) P
tot
DL
i c ( )
txj j i = ,

=
I
i nter carri er
DL
i c ( )
P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------- =
268 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on ic.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
And
, , and are defined in "Inputs" on page 198.
CQI
It corresponds to the HS-PDSCH CQI. For dual-cell HSDPA users, Atoll determines the HS-PDSCH CQI for each serving
cell (i.e., the anchor and the secondary cells).
The way of calculating it depends on the selected option in the transmitters global parameters (HSDPA part): CQI based
on CPICH quality or CQI based on HS-PDSCH quality.
For further details on the HS-PDSCH quality calculation, see either "HS-PDSCH CQI Determination" on page 225 if the
selected option is "CQI based on CPICH quality" or "HS-PDSCH CQI Determination" on page 230 if the selected option is
"CQI based on HS-PDSCH quality".
RLC Peak Rate
Knowing the HS-PDSCH CQI, Atoll calculates the best HSDPA bearer that can be used and selects a bearer compatible
with cell and terminal user equipment HSDPA capabilities. Once the bearer selected, Atoll determines the RLC peak rate
that can be provided to the user .
For dual-cell HSDPA users, Atoll determines the HSDPA bearers obtained in the two cells and displays the total data rate
that can be provided.
For further details on the HSDPA bearer selection, see "HSDPA Bearer Selection" on page 225.
Bearer Consumption
Atoll provides this result for packet (HSPA - Constant Bit Rate) service users only. The minimum bit rate required by the
service is allocated to these users. Therefore, they parly consume the HSDPA bearer. The bearer consumption expressed
in %, , is calculated as follows:
6.5.1.1.3 Uplink Sub-Menu
The Uplink sub-menu may contain R99-related results and HSUPA-related results when an HSPA bearer user is modelled.
R99-related Results
For each cell (k,ic
BS
) in the receivers active set, Atoll calculates uplink traffic channel quality from receiver. No power
control is performed as in simulations. Here, Atoll determines the uplink traffic channel quality at the cell for the maximum
terminal power allowed. Then, the total uplink traffic channel quality is evaluated with respect to the receiver handover
status. From this value, Atoll calculates the terminal power required to obtain the R99 bearer and compares it to the
maximum terminal power allowed.
Max Terminal Power
Max terminal power ( ) is an input user-defined for each terminal. It corresponds to the terminals maximum power.
RF i c i c
adj
, ( )
I
i nter techno y log
DL
i c ( )
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
P
c
i
i c ( )
P
HS SCCH
i c ( )
L
T
i
--------------------------------------- =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
ortho
F
MUD
term
N
0
term
R
RLC peak
DL
R
RLC peak
DL
R
RLC peak
DL
Txi i c , ( )
i c Txi e

=
C
HSDPABearer
C
HSDPABearer
R
Guaranteed
DL
R
RLC peak
DL
I
HSDPABearer
( )
--------------------------------------------------------------------- =
P
term
max
Forsk 2010 AT283_TRG_E2 269
Chapter 6: UMTS HSPA Networks
Required Terminal Power
The calculation of the terminal power required to obtain an R99 bearer ( ) may be divided into three steps.
1
st
step: evaluation for each cell
For each cell (k,ic
BS
) in the receivers active set, we have:
With
is the total noise at the transmitter on the best carrier of the best server. This value is calculated from the
cell uplink load factor .
is the transmitter thermal noise.
2
nd
step: Calculation of the total traffic channel quality
is the traffic channel quality at the transmitter on ic
BS
after signal combination of all the transmitters k of the
active set.
If there is no handoff (1/1):
For soft handoff (2/2):
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
corresponds to the highest value.
For soft-soft handoffs (3/3):
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
For softer and softer-softer handoffs (1/2 and 1/3):
For softer-soft handoffs (2/3), there are two possibilities. If the MRC option is selected (option available in Global
parameters), we have:
Else,
3
rd
step: calculation
is the required terminal power.
P
term R99
req
Q
max
UL
k i c
BS
, ( )
Q
max
UL
k i c
BS
, ( )

term
P
b max
UL
k i c
BS
, ( )
N
tot
UL
k i c
BS
, ( )
--------------------------------------------------------------- G
p
UL
G
Di v
UL
=
P
b max
UL
k i c
BS
, ( )
P
term
max
1 r
c
UL
( )
L
T
k
------------------------------------------- =
N
tot
UL
k i c
BS
, ( )
X
UL
k i c
BS
, ( )
N
tot
UL
k i c
BS
, ( )
N
0
tx
1 X
UL
k i c
BS
, ( )
------------------------------------------ =
N
0
tx
Q
MAX
UL
i c
BS
( )
Q
MAX
UL
i c
BS
( ) Q
max
UL
k i c
BS
, ( ) =
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max Q
max
UL
k i c
BS
, ( ) ( ) =
G
macro di versi ty
UL
( )
2 links
max Q
max
UL
k i c
BS
, ( ) ( ) Q
max
UL
k i c
BS
, ( )
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
3 links
max Q
max
UL
k i c
BS
, ( ) ( ) =
G
macro di versi ty
UL
( )
3 links
Q
MAX
UL
i c
BS
( ) f
rake efficiency
UL
Q
max
UL
k i c
BS
, ( ) ( )
k

=
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
k i c
BS
, ( ) ( )
k on the same site

Q
max
k on the same site
UL
k i c
BS
, ( ) ,
\ .
|
| |
=
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max Q
max
UL
k i c
BS
, ( ) ( ) =
P
term R99
req
P
term R99
req
P
term R99
req
Q
req
UL
Q
MAX
UL
i c
BS
( )
-------------------------------- P
term
max
=
270 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the uplink traffic quality target defined by the user for a given reception equipment, a given R99 bearer and a given
mobility type. This parameter is available in the R99 Bearer Selection table.
Therefore, the service on the uplink traffic channel is available if .
Eb/Nt Max
For each cell (k,ic
BS
) in the receivers active set, we have:
With
is the total noise at the transmitter on the best carrier of the best server. This value is calculated from the
cell uplink load factor .
is the transmitter thermal noise.
is the traffic channel quality at the transmitter on ic
BS
after signal combination of all the transmitters k of the
active set.
If there is no handoff (1/1):
For soft handoff (2/2):
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
corresponds to the highest value.
For soft-soft handoffs (3/3):
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
For softer and softer-softer handoffs (1/2 and 1/3):
Notes:
Compressed mode is operated when:
- A mobile supporting compressed mode is connected to a cell located on a site with a
compressed-mode-capable equipment, and
- The received Ec/I0 is lower than the Ec/I0 activation threshold (Global parameters):
.
- The pilot RSCP is lower than the pilot RSCP activation threshold (Global parameters):
When compressed mode is activated, the uplink Eb/Nt target is increased by the value
user-defined for the UL Eb/Nt target increase field (Global parameters), . In this
case, we have:
Q
req
UL
Q
pi l ot
Resul ti ng
Q
pi l ot
CM acti vati on
s
P
c
RSCP
pi l ot
CM acti vati on
s
AQ
req
UL
P
term R99
req
Q
req
UL
AQ
req
UL

Q
MAX
UL
i c
BS
( )
---------------------------------- P
term
max
=
P
term R99
req
P
term
max
s
Q
max
UL
k i c
BS
, ( )

term
P
b max
UL
k i c
BS
, ( )
N
tot
UL
k i c
BS
, ( )
--------------------------------------------------------------- G
p
UL
G
Di v
UL
=
P
b max
UL
k i c
BS
, ( )
P
term
max
1 r
c
UL
( )
L
T
k
------------------------------------------- =
N
tot
UL
k i c
BS
, ( )
X
UL
k i c
BS
, ( )
N
tot
UL
k i c
BS
, ( )
N
0
tx
1 X
UL
k i c
BS
, ( )
------------------------------------------ 1
term
( ) max
P
term
max
P
term R99
req

L
T
k
----------------------------------------------- 0 ( , ) + =
N
0
tx
Q
MAX
UL
i c
BS
( )
Q
MAX
UL
i c
BS
( ) Q
max
UL
k i c
BS
, ( ) =
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max Q
max
UL
k i c
BS
, ( ) ( ) =
G
macro di versi ty
UL
( )
2 links
max Q
max
UL
k i c
BS
, ( ) ( ) Q
max
UL
k i c
BS
, ( )
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
3 links
max Q
max
UL
k i c
BS
, ( ) ( ) =
G
macro di versi ty
UL
( )
3 links
Q
MAX
UL
i c
BS
( ) f
rake efficiency
UL
Q
max
UL
k i c
BS
, ( ) ( )
k

=
Forsk 2010 AT283_TRG_E2 271
Chapter 6: UMTS HSPA Networks
For softer-soft handoffs (2/3), there are two possibilities. If the MRC option is selected (option available in Global
parameters), we have:
Else,
Effective Eb/Nt
is the effective traffic channel quality at the transmitter on ic
BS
.
(or when compressed mode is activated).
Uplink Soft Handover Gain
corresponds to the uplink soft handover gain.
corresponds to the highest value.
HSUPA-related Results
Atoll determines the best HSUPA bearer that the user can obtain. The HSUPA bearer user is processed as if he is the
only user in the cell i.e. he uses the entire remaining load of the cell.
For further information on the HSUPA bearer selection, see "HSUPA Bearer Allocation Process" on page 239.
Required E-DPDCH Ec/Nt
It corresponds to the E-DPDCH Ec/Nt required to obtain the HSUPA bearer ( ). This value is defined for an
HSUPA bearer ( ) and a number of retransmissions ( ) in the HSUPA Bearer Selection table.
Required Terminal Power
From , Atoll calculates the terminal power required to obtain the HSUPA bearer, .
With
, , , , and are defined in "Inputs" on page 198.
RLC Peak Rate
Atoll selects the best HSUPA bearer from the HSUPA compatible bearers. This is the HSUPA bearer with the highest
potential throughput ( ) where:

And
With
: the maximum E-DPDCH EcNt allowed.
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
k i c
BS
, ( ) ( )
k on the same site

Q
max
k on the same site
UL
k i c
BS
, ( ) ,
\ .
|
| |
=
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max Q
max
UL
k i c
BS
, ( ) ( ) =
Q
eff
UL
Q
eff
UL
mi n Q
MAX
UL
Q
req
UL
, ( ) = Q
eff
UL
mi n Q
MAX
UL
Q
req
UL
Q A
req
UL
, ( ) =
G
SHO
UL
G
SHO
UL
Q
MAX
UL
i c
BS
( )
max Q
max
UL
k i c
BS
, ( ) ( )
------------------------------------------------------ =
max Q
max
UL
k i c
BS
, ( ) ( ) Q
max
UL
k i c
BS
, ( )
Ec
Nt
-------
\ .
| |
E DPDCH
req
Index
HSUPABearer
N
Rtx
Ec
Nt
-------
\ .
| |
E DPDCH
req
P
term HSUPA
req
P
term HSUPA
req Ec
Nt
-------
\ .
| |
=
E DPDCH
req
L
T
N
tot
UL

N
tot
UL
i c ( ) 1 F
MUD
tx

term
( ) I
tot
UL
i nt ra
i c ( ) I
tot
UL
ext ra
i c ( ) I
i nter carri er
UL
i c ( ) N +
0
tx
+ + =
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =

term
F
MUD
tx
I
tot
UL
i ntra
I
tot
UL
ext ra
I
i nter carri er
UL
N
0
tx
R
RLC peak
UL
Index
HSUPABearer
( )
N
Rtx
Index
HSUPABearer
( )
------------------------------------------------------------------------------------
Ec
Nt
-------
\ .
| |
E DPDCH
req
Ec
Nt
-------
\ .
| |
E DPDCH
max
s
P
term HSUPA
req
P s
term
max
Ec
Nt
-------
\ .
| |
E DPDCH
max
272 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: the maximum terminal power allowed.
After selecting the HSUPA bearer, Atoll determines the corresponding RLC peak rate, .
Application Throughput
Atoll displays the provided application throughput ( ). The application throughput represents the net throughput
after deduction of coding (redundancy, overhead, addressing, etc.). This one is calculated as follows:
Where:
is the residual BLER after retransmissions. It is read in the quality graph defined for the quartet
reception equipment-selected bearer-number of retransmissions-mobility (HSUPA Quality Graphs tab in the Reception
equipment properties). This graph describes the variation of BLER as a function of the measured quality (E-DPDCH Ec/
Nt). Knowing the E-DPDCH Ec/Nt, Atoll finds the corresponding BLER.
and respectively represent the scaling factor between the application throughput and the RLC (Radio Link
Control) throughput and the throughput offset. These two parameters model the header information and other
supplementary data that does not appear at the application level. They are defined in the service properties.
Bearer Consumption
Atoll provides this result for packet (HSPA - Constant Bit Rate) service users only. The minimum bit rate required by the
service is allocated to these users. Therefore, they parly consume the HSUPA bearer. The bearer consumption expressed
in %, , is calculated as follows:
6.5.2 Coverage Studies
Let us assume each pixel on the map corresponds to a probe receiver with a terminal, a mobility type and a service. This
receiver does not create any interference. You can make the coverage prediction for a specific carrier or for all carriers of
the main frequency band for the selected terminal. If you have selected a dual-band terminal, you can make the coverage
prediction on a specific carrier or on all carriers of any frequency band for the selected terminal, or for all the carriers of all
the frequency bands. Coverage predictions are based on parameters that can be either simulation results, or user-defined
cell inputs.
6.5.2.1 Pilot Reception Analysis
For further details of calculation formulas and methods, please refer to Definitions and formulas part, and Point analysis
AS analysis tab Pilot sub-menu part.
We consider the following cases:
1
st
case: Analysis Based on a Specific Carrier
The carrier that can be used by transmitters is fixed. In this case, for each transmitter i containing the receiver in its
calculation area and using the selected carrier, Atoll calculates the pilot quality at the receiver on this carrier ic
given
. Then,
it determines the best serving transmitter BS using the carrier ic
given
( ) and calculates the best pilot quality
received with a fixed cell edge coverage probability, .
Atoll displays the best pilot quality received with a fixed cell edge coverage probability.
2
nd
case: Analysis Based on All Carriers
Atoll proceeds as in point predictions. It determines the best carrier of each transmitter i containing the receiver in its
calculation area and using a frequency band supported by the receivers terminal. The best carrier selection depends on
the option selected for the site equipment (UL minimum noise, DL minimum power, random, sequential) and is based on
the UL load percentage and the downlink total power of cells (simulation results or cell properties). Atoll calculates the
pilot quality at the receiver from these transmitters on their best carriers and determines the best serving transmitter BS
on its best carrier ic
BS
( ). Then, it calculates the best pilot quality received with a fixed cell edge coverage
probability, .
Atoll displays the best pilot quality received with a fixed cell edge coverage probability.
3
rd
case: Analysis based on all carriers of any frequency band (for dual-band terminals with priority defined on frequency
bands only)
P
term
max
R
RLC peak
UL
T
appl i cati on
UL
T
appl i cati on
UL
M
b
( )
R
RLC p eak
UL
1 BLER
HSUPA
( ) SF
Rate
AR
N
Rtx
-------------------------------------------------------------------------------------------------------------------------- =
BLER
HSUPA
N
Rtx
SF
Rate
AR
C
HSUPABearer
C
HSUPABearer
R
Guaranteed
UL
R
RLC peak
UL
I
HSUPABearer
( )
--------------------------------------------------------------------- =
Q
pi l ot
BS
i c
gi ven
( )
Q
pi l ot
Resul ti ng
i c
gi ven
( )
Q
pi l ot
BS
i c
BS
( )
Q
pi l ot
Resul ti ng
i c
BS
( )
Forsk 2010 AT283_TRG_E2 273
Chapter 6: UMTS HSPA Networks
The frequency band that can be used is fixed. Atoll determines the best carrier of each transmitter i containing the receiver
in its calculation area and using the selected frequency band. The best carrier selection depends on the option selected
for the site equipment (UL minimum noise, DL minimum power, random, sequential) and is based on the UL load
percentage and the downlink total power of cells (simulation results or cell properties). Then, Atoll calculates the pilot
quality at the receiver from these transmitters on their best carriers and determines the best serving transmitter BS on its
best carrier ic
BS
( ). Then, it calculates the best pilot quality received with a fixed cell edge coverage
probability, .
Atoll displays the best pilot quality received with a fixed cell edge coverage probability.
6.5.2.1.1 Prediction Study Inputs
The Pilot Reception Analysis depends on the downlink total transmitted power of cells. This parameter can be either a
simulation output, or a user-defined cell input. In the last case, when no value is defined in the Cells table for the total
transmitted power, Atoll considers 50% of the maximum power as default value (i.e. 40 dBm if the maximum power is set
to 43 dBm).
6.5.2.1.2 Study Display Options
Single colour
Atoll displays a coverage if . Coverage consists of a single layer with a unique colour
( ). is a target value defined in the Mobility table by the user.
Colour per transmitter
Atoll displays a coverage if ( ). Coverage consists of several layers with
associated colours. There is a layer per transmitter with no intersection between layers. Layer colour is the colour assigned
to the best serving transmitter BS.
Colour per mobility
In this case, receiver is not completely defined and no mobility is assigned.
Coverage consists of several layers with a layer per user-defined mobility defined in Mobility sub-folder. For each layer,
area is covered if ( ). Each layer is assigned a colour and displayed with
intersections between layers.
Colour per probability
This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations
and the All option in the Simulation tab of prediction properties). Coverage consists of several layers with a layer per
user-defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if
( ) in the required number of simulations. Each layer is assigned a colour and
displayed with intersections between layers.
Colour per cell edge coverage probability
Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display
tab (Prediction properties). For each layer, area is covered if ( ). Each layer
is assigned a colour and displayed with intersections between layers.
Colour per quality level (Ec/I0)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if ( ). Each layer is
assigned a colour and displayed with intersections between layers.
Colour per quality margin (Ec/I0 margin)
Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction
properties). For each layer, area is covered if ( ). Each layer is
assigned a colour and displayed with intersections between layers.
6.5.2.2 Downlink Service Area Analysis
As in point predictions, Atoll calculates traffic channel quality at the receiver for each cell (k,ic) (with ic=ic
BS
or ic
given
) in
the receivers active set. No power control is performed as in simulations. Here, Atoll determines downlink traffic channel
Q
pi l ot
BS
i c
BS
( )
Q
pi l ot
Resul ti ng
i c
BS
( )
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
>
i c i c
BS
or i c
gi ven
= Q
pi l ot
req
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c p , ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
( )
threshol d
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
Q
pi l ot
( )
m i n arg
> i c i c
BS
or i c
gi ven
=
274 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
quality at the receiver for a maximum allowed traffic channel power for transmitters. Then, the total downlink traffic channel
quality ( ) is evaluated after recombination.
Atoll displays traffic channel quality at the receiver for transmitters in active set on the carrier ic ( or ).
For further details of calculation formulas and methods, see "Downlink Sub-Menu" on page 264.
6.5.2.2.1 Prediction Study Inputs
The Downlink Service Area Analysis depends on the downlink total transmitted power of cells. This parameter can be
either a simulation output, or a user-defined cell input. In the last case, when no value is defined in the Cells table for the
total transmitted power, Atoll considers 50% of the maximum power as default value (i.e. 40 dBm if the maximum power
is set to 43 dBm).
6.5.2.2.2 Study Display Options
Single colour
Atoll displays a coverage with a unique colour if (or if compressed mode is
activated).
is the downlink traffic quality target defined by the user for a given reception equipment, a given R99 bearer and a
given mobility type. This parameter is available in the R99 Bearer Selection table.
is the DL Eb/Nt target increase; this parameter is user-defined in the Global parameters.
Colour per transmitter
Atoll displays a coverage if (or if compressed mode is activated). Coverage
consists of several layers with associated colours. There is a layer per transmitter with no intersection between layers.
Layer colour is the colour assigned to best serving transmitter.
Colour per mobility
In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a
layer per user-defined mobility defined in Mobility sub-folder. For each layer, area is covered if (or
if compressed mode is activated). Each layer is assigned a colour and displayed with
intersections between layers.
Colour per service
In this case, receiver is not completely defined and no service is assigned. Coverage consists of several layers with a layer
per user-defined service defined in Services sub-folder. For each layer, area is covered if (or
if compressed mode is activated). Each layer is assigned a colour and displayed with
intersections between layers.
Colour per probability
This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations
and the All option in the Simulation tab of prediction properties). Coverage consists of several layers with a layer per
user-defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if
in the required number of simulations. Each layer is assigned a colour and displayed with intersections
between layers.
Colour per cell edge coverage probability
Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display
tab (Prediction properties). For each layer, area is covered if (or if
compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers.
Note:
Best server and active set determination is performed as in point prediction (AS analysis).
Q
MAX
DL
i c ( )
i c
BS
i c
gi ven
Q
MAX
DL
i c ( ) Q
req
DL
> Q
MAX
DL
i c ( ) Q
req
DL
Q A
req
DL
>
Q
req
DL
AQ
req
DL
Q
MAX
DL
i c ( ) Q
req
DL
> Q
MAX
DL
i c ( ) Q
req
DL
Q A
req
DL
>
Q
MAX
DL
i c ( ) Q
req
DL
>
Q
MAX
DL
i c ( ) Q
req
DL
Q A
req
DL
>
Q
MAX
DL
i c ( ) Q
req
DL
>
Q
MAX
DL
i c ( ) Q
req
DL
Q A
req
DL
>
Q
MAX
DL
i c ( ) Q
req
DL
>
Q
MAX
DL
i c p , ( ) Q
req
DL
> Q
MAX
DL
i c ( ) Q
req
DL
Q A
req
DL
>
Forsk 2010 AT283_TRG_E2 275
Chapter 6: UMTS HSPA Networks
Colour per maximum quality level (max Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
Colour per effective quality level (Effective Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers. (or when
compressed mode is activated).
Colour per quality margin (Eb/Nt margin)
Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction
properties). For each layer, area is covered if (or when
compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers.
Colour per required power
Atoll calculates the downlink required power, , as follows:
Where
is the Eb/Nt target on downlink. This parameter, available in the R99 Bearer Selection table, is user-defined for a
given R99 bearer, a given reception equipment and a mobility type.
is a user-defined input for each bearer related to a service. It corresponds to the maximum allowable traffic channel
power for a transmitter.
When compressed mode is activated, we have: .
Coverage consists of several layers with a layer per user-defined required power threshold defined in the Display tab
(Prediction properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
Colour per required power margin
Coverage consists of several layers with a layer per user-defined power margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
6.5.2.3 Uplink Service Area Analysis
As in point prediction, Atoll calculates uplink traffic channel quality from receiver for each cell (k,ic) (with ic=ic
BS
or ic
given
)
in receiver active set. No power control simulation is performed. Atoll determines uplink traffic channel quality at the
transmitter for the maximum terminal power allowed. Then, the total uplink traffic channel quality ( ) is evaluated
with respect to receiver handover status.
Atoll displays traffic channel quality at transmitters in active set on the carrier ic ( or ) received from the
receiver.
For further details of calculations formulas and methods, see "Uplink Sub-Menu" on page 268.
6.5.2.3.1 Prediction Study Inputs
The Uplink Service Area Analysis depends on the UL load factor of cells. This parameter can be either a simulation output,
or a user-defined cell input. In the last case, when no value is defined in the Cells table for the uplink load factor, Atoll
uses 50% as default value.
Q
MAX
DL
i c ( ) Threshol d >
Q
eff
DL
i c ( ) Threshol d >
Q
eff
DL
i c ( ) mi n Q
MAX
DL
i c ( ) Q
req
DL
, ( ) = Q
eff
DL
i c ( ) mi n Q
MAX
DL
i c ( ) Q
req
DL
AQ
req
DL
, ( ) =
Q
MAX
DL
i c ( ) Q
req
DL
M i n arg > Q
MAX
DL
i c ( ) Q
req
DL
Q A
req
DL
M i n arg >
P
tch
req
i c ( )
P
tch
req
i c ( )
Q
req
DL
Q
MAX
DL
i c ( )
------------------------- P
tch
max
=
Q
req
DL
P
tch
max
P
tch
req
i c ( )
Q
req
DL
Q A
req
DL

Q
MAX
DL
i c ( )
---------------------------------- P
tch
max
=
P
tch
req
i c ( ) Threshol d >
P
tch
req
i c ( ) P
tch
max
M i n arg >
Note:
Best server and active set determination is performed as in point prediction (AS analysis).
Q
MAX
UL
i c ( )
i c
BS
i c
gi ven
276 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
6.5.2.3.2 Study Display Options
Single colour
Atoll displays a coverage if (or if compressed mode is activated). Coverage
colour is unique.
is defined for a reception equipment, a R99 bearer and a mobility type. This parameter is available in the R99 Bearer
Selection table.
is the UL Eb/Nt target increase; this parameter is user-defined in the Global parameters.
Colour per transmitter
Atoll displays a coverage if (or if compressed mode is activated). Coverage
consists of several layers with associated colours. There is a layer per transmitter with no intersection between layers.
Layer colour is the colour assigned to best server transmitter.
Colour per mobility
In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a
layer per user-defined mobility defined in Mobility sub-folder. For each layer, area is covered if (or
if compressed mode is activated). Each layer is assigned a colour and displayed with
intersections between layers.
Colour per service
In this case, receiver is not completely defined and no service is assigned. Coverage consists of several layers with a layer
per user-defined service defined in Services sub-folder. For each layer, area is covered if (or
if compressed mode is activated). Each layer is assigned a colour and displayed with
intersections between layers.
Colour per probability
This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations
and the All option in the Simulation tab of prediction properties). Coverage consists of several layers with a layer per
user-defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if
(or if compressed mode is activated) in the required number of simulations.
Each layer is assigned a colour and displayed with intersections between layers.
Colour per maximum quality level (Max Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
Colour per effective quality level (Effective Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
(or when compressed mode is activated).
Colour per quality margin (Eb/Nt margin)
Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction
properties). For each layer, area is covered if (or if
compressed mode is activated). Each layer is assigned a colour and displayed with intersections between layers.
Colour per required power
Coverage consists of several layers with a layer per user-defined power threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
Q
MAX
UL
i c ( ) Q
req
UL
> Q
MAX
UL
i c ( ) Q
req
UL
Q A
req
UL
>
Q
req
UL
AQ
req
UL
Q
MAX
UL
i c ( ) Q
req
UL
> Q
MAX
UL
i c ( ) Q
req
UL
Q A
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
Q A
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
Q A
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
> Q
MAX
UL
i c ( ) Q
req
UL
Q A
req
UL
>
Q
MAX
UL
i c ( ) Threshol d >
Q
effecti ve
UL
i c ( ) Threshol d >
Q
eff
UL
i c ( ) mi n Q
MAX
UL
i c ( ) Q
req
UL
, ( ) = Q
eff
UL
i c ( ) mi n Q
MAX
UL
i c ( ) Q
req
UL
AQ
req
UL
, ( ) =
Q
MAX
UL
i c ( ) Q
req
UL
M i n arg > Q
MAX
UL
i c ( ) Q
req
UL
Q A
req
UL
M i n arg >
P
term R99
req
i c ( ) Threshol d >
Forsk 2010 AT283_TRG_E2 277
Chapter 6: UMTS HSPA Networks
Colour per required power margin
Coverage consists of several layers with a layer per user-defined power margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
Colour per soft handover gain
Coverage consists of several layers with a layer per soft handover gain value defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
6.5.2.4 Downlink Total Noise Analysis
Atoll determines the downlink total noise generated by cells.
Downlink noise rise, , is calculated from the downlink total noise, , as follows:
6.5.2.4.1 Study Inputs
The Downlink Total Noise Analysis depends on the downlink total transmitted power of cells. This parameter can be either
a simulation output, or a user-defined cell input. In the last case, when no value is defined in the Cells table for the total
transmitted power, Atoll considers 50% of the maximum power as default value (i.e. 40 dBm if the maximum power is set
to 43 dBm).
6.5.2.4.2 Analysis on All Carriers
If all the carriers are selected, Atoll determines DL total noise for all the carriers. Then, allows the user to choose different
colours.
Colour per minimum noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
Colour per maximum noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
Colour per average noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
Colour per minimum noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-defined
noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
Colour per maximum noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-defined
noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
P
term R99
req
i c ( ) P
term
max
M i n arg >
G
SHO
UL
Threshol d >
N
tot
DL
i c ( ) P
tot
DL
i c ( )
txj j ,

P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
---------------------------------------
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

N
0
term
+ + + =
NR
DL
i c ( ) N
tot
DL
NR
DL
i c ( ) 10
N
0
term
N
tot
DL
--------------
\ .
|
| |
log =
mi nN
tot
i c
DL
i c ( ) Threshol d >
maxN
tot
i c
DL
i c ( ) Threshol d >
averageN
tot
i c
DL
i c ( ) Threshol d >
mi nNR
DL
i c
i c ( ) Threshol d >
maxNR
DL
i c
i c ( ) Threshol d >
278 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Colour per average noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-
defined noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
6.5.2.4.3 Analysis on a Specific Carrier
When only one carrier is analysed, Atoll determines DL total noise or DL noise rise on this carrier. In this case, the
displayed coverage is the same for any selected display per noise level (average, minimum, maximum) or any display per
noise rise (average, minimum, maximum).
Colour per noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
Colour per noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-defined
noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
6.5.2.5 HSDPA Prediction Study
When calculating the HSDPA coverage prediction, either you can take all the possible HSDPA radio bearers into
consideration, or you can study a certain HSDPA radio bearer. Then, available display options depend on what you have
selected.
When considering all the HSDPA radio bearers, you can set display parameters:
To analyse the uplink and downlink A-DPCH qualities on the map,
To analyse the HS-SCCH quality/power,
To model fast link adaptation for a single HSDPA bearer user or for a defined number of HSDPA bearer users.
When studying a certain HSDPA radio bearer, you can display areas where a certain RLC peak rate is available with
different cell edge coverage probabilities (i.e. the probability of having a certain RLC peak rate). This type of analysis is
not relevant when modelling a dual-cell HSDPA user.
Let us assume each pixel on the map corresponds to one or several users with HSDPA capable terminal, mobility and
HSDPA service.The user does not create any interference. Each user may be using a specific carrier or all of them. If you
are modelling a dual-cell HSDPA user, you have to make the analysis on all carriers. In this case, Atoll determines the
best and the secondary carriers of dual-cell HSDPA transmitters according to the carrier selection criterion defined in the
site equipment.
Note that the HSDPA service area is limited by the pilot quality, the A-DPCH quality and the HS-SCCH quality.
6.5.2.5.1 Prediction Study Inputs
Parameters used as input for the HSDPA prediction study are:
The available HSDPA power of the cell,
The downlink total transmitted power of the cell,
The number of HSDPA users within the cell if the study is calculated for several users.
These parameters can be either simulation outputs, or user-defined cell inputs. In the last case, when no value is defined
in the Cells table for the total transmitted power and the number of HSDPA users, Atoll uses the following default values:
Total transmitted power = 50% of the maximum power (i.e, 40 dBm if the maximum power is set to 43 dBm)
Number of HSDPA users = 1
On the other hand, no default value is used for the available HSDPA power; this parameter must be defined by the user.
6.5.2.5.2 Study Display Options
When considering all the HSDPA radio bearers, several display options are available in the study properties dialogue.
They can be regrouped in four categories according to the objective of the study:
To analyse the uplink and downlink A-DPCH qualities on the map,
To analyse the HS-SCCH quality/power,
To model fast link adaptation for a single HSDPA bearer user,
To model fast link adaptation for a defined number of HSDPA bearer users.
When studying a certain HSDPA radio bearer, only one display option is available. It allows you to display where a certain
RLC peak rate is available with different cell edge coverage probabilities.
Analysis of UL And DL A-DPCH Qualities
Colour per Max A-DPCH Eb/Nt DL
averageNR
DL
i c
i c ( ) Threshol d >
N
tot
DL
i c ( ) Threshol d >
NR
DL
i c ( ) Threshol d >
Forsk 2010 AT283_TRG_E2 279
Chapter 6: UMTS HSPA Networks
Atoll displays the A-DPCH quality at the receiver ( ) for the best server on the carrier ic ( or ). No
power control is performed as in simulations. Here, Atoll determines downlink traffic channel quality at the receiver for a
maximum traffic channel power allowed for the best server.
For further details of calculation formulas and methods, please refer to Prediction studies: Point analysis AS analysis tab
Downlink sub-menu part.
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
Colour per Max A-DPCH Eb/Nt UL
Atoll displays the A-DPCH quality at the best server ( ) on the carrier ic ( or ). No power control is
performed as in simulations. Here, Atoll determines uplink traffic channel quality at the receiver for a maximum terminal
power allowed.
For further details of calculations formulas and methods, please refer to Point analysis AS analysis tab Uplink sub-
menu part.
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
Analysis of The HS-SCCH Quality/Power
Colour per HS-SCCH Power
This display option is relevant in case of dynamic HS-SCCH power allocation only. In this case, Atoll displays on each
pixel the HS-SCCH power per HS-SCCH channel. Coverage consists of several layers with a layer per threshold. For each
layer, area is covered if . Each layer is assigned a colour and displayed with intersections
between layers.
Colour per HS-SCCH Ec/Nt
This display option is relevant in case of static HS-SCCH power allocation only. In this case, Atoll displays on each pixel
the HS-SCCH quality per HS-SCCH channel. Coverage consists of several layers with a layer per threshold. For each
layer, area is covered if . Each layer is assigned a colour and displayed with intersections
between layers.
Fast Link Adaptation Modelling For A Single User
When you calculate the study with the following display options, Atoll considers one user on each pixel and determines
the best HSDPA bearer that the user can obtain. For dual-cell HSDPA users, Atoll determines the best HSDPA bearers
that the user can obtain in the two cells. On each pixel, the user is processed as if he is the only user in the cell i.e. he
uses the entire HSDPA power available in the cell.
For further information on the fast link adaptation modelling, see "Fast Link Adaptation Modelling" on page 221.
Colour per HS-PDSCH Ec/Nt
Atoll displays on each pixel the HS-PDSCH quality. For a dual-cell HSDPA user, it corresponds to the HS-PDSCH Ec/Nt
of the best serving cell. Coverage consists of several layers with a layer per threshold. For each layer, area is covered if
. Each layer is assigned a colour and displayed with intersections between layers.
Colour per CQI
Atoll displays either the CPICH CQI (see the calculation detail in "CPICH CQI Determination" on page 223) when the
selected option in Global parameters (HSDPA part) is CQI based on CPICH quality, or the HS-PDSCH CQI (see the
calculation detail in the section 10.7.1.2.2) when considering the CQI based on HS-PDSCH quality option.
For a dual-cell HSDPA user, it corresponds to the CQI of the best serving cell.
Coverage consists of several layers with a layer per CQI threshold ( ). For each layer, area is covered if
. Each layer is assigned a colour and displayed with intersections between layers.
Colour per MAC Rate
Atoll displays the MAC rate ( ) provided on each pixel. The MAC rate is calculated as follows:
Where,
Q
MAX
DL
i c ( ) i c
BS
i c
gi ven
Q
MAX
DL
i c ( ) Threshol d >
Q
MAX
UL
i c ( ) i c
BS
i c
gi ven
Q
MAX
UL
i c ( ) Threshol d >
P
HS SCCH
i c ( ) Threshol d >
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Threshol d >
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
Threshol d >
CQI ( )
threshol d
CQI CQI ( )
threshol d
>
R
MAC
DL
R
MAC
DL
S
bl ock
c ( )
T
TTI
------------------------
c Serving cells e

=
280 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the transport block size (in kbits) of the HSDPA bearer selected in the cell, c, for the user; it is defined for
each HSDPA bearer in the HSDPA Radio Bearers table.
is the TTI duration, i.e. (2000 TTI in one second). This value is specified by the 3GPP.
Coverage consists of several layers with a layer per possible MAC rate ( ). For each layer, area is covered if the
MAC rate exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between
layers.
Colour per MAC Throughput
Atoll displays the MAC throughput ( ) provided on each pixel. The MAC throughput is calculated as follows:
Where,
is the transport block size (in kbits) of the selected HSDPA bearer in the cell, c; it is defined for each HSDPA
bearer in the HSDPA Radio Bearers table.
is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user
equipment category properties.
is the TTI duration, i.e. (2000 TTI in one second). This value is specified by the 3GPP.
Coverage consists of several layers with a layer per possible MAC throughput ( ). For each layer, area is covered if
the MAC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections
between layers.
Colour per RLC Peak Rate
After selecting the bearer (two bearers can be selected in case of dual-cell HSDPA), Atoll reads the corresponding RLC
peak rate ( ). This is the highest rate that the bearer can provide on each pixel. Then, it
determines the RLC peak rate provided by the serving cell, c, in the downlink, .
For a single-carrier HSDPA user,we have:
For dual-cell HSDPA users, the RLC peak rate provided to the user is calculated as follows:
Coverage consists of several layers with a layer per possible RLC peak rate ( ). For each layer, area is covered
if the RLC peak rate can be provided. Each layer is assigned a colour and displayed with intersections between layers.
Colour per RLC Peak Throughput
Atoll displays the RLC peak throughput ( ) provided on each pixel. The RLC peak throughput is calculated as
follows:
Where is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the
terminal user equipment category properties.
Coverage consists of several layers with a layer per possible RLC peak throughput ( ). For each layer, area is
covered if the RLC peak throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed
with intersections between layers.
Colour per Average RLC Throughput
Atoll displays the average RLC throughput ( ) provided on each pixel.
For a single-carrier HSDPA user, we have:
For a dual-cell HSDPA user, we have:
S
bl ock
c ( )
T
TTI
2
3
10 s
R
MAC
DL
T
MAC
DL
T
MAC
DL
S
bl ock
c ( )
T
TTI
A TTI
-------------------------------
c Serving cells e

=
S
bl ock
c ( )
ATTI
T
TTI
2
3
10 s
T
MAC
DL
R
RLC peak
DL
I
HSDPABearer
( )
R
RLC p eak
DL
c ( )
R
RLC p eak
DL
R
RLC p eak
DL
c ( ) =
R
RLC peak
DL
R
RLC peak
DL
c ( )
c Serving cell e

=
R
RLC p eak
DL
T
RLC p eak
DL
T
RLC p eak
DL
R
RLC p eak
DL
ATTI
--------------------------- =
ATTI
T
RLC p eak
DL
T
RLC Av
DL
T
RLC Av
DL
R
RLC peak
DL
c ( ) 1 BLER
HSDPA
( )
ATTI
-------------------------------------------------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 281
Chapter 6: UMTS HSPA Networks
Where,
is read in the quality graph defined for the triplet reception equipment-selected bearer-mobility (HSDPA
Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of
the measured quality (HS-PDSCH Ec/Nt). Knowing the HS-PDSCH Ec/Nt, Atoll finds the corresponding BLER.
is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user
equipment category properties.
Coverage consists of several layers with a layer per possible average RLC throughput ( ). For each layer, area
is covered if the average RLC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and
displayed with intersections between layers.
Colour per Application Throughput
Atoll displays the application throughput ( ) provided on each pixel. The application throughput represents the
net throughput after deduction of coding (redundancy, overhead, addressing, etc.).
It is calculated as follows:
Where:
is the average RLC throughput.
is read in the quality graph defined for the triplet reception equipment-selected bearer-mobility (HSDPA
Quality Graphs tab in the Reception equipment properties). This graph describes the variation of BLER as a function of
the measured quality (HS-PDSCH Ec/Nt). Knowing the HS-PDSCH Ec/Nt, Atoll finds the corresponding BLER.
and respectively represent the scaling factor between the application throughput and the RLC (Radio Link
Control) throughput and the throughput offset. These two parameters model the header information and other
supplementary data that does not appear at the application level. They are defined in the service properties.
is the minimum number of TTI (Transmission Time Interval) between two TTI used; it is defined in the terminal user
equipment category properties.
Coverage consists of several layers with a layer per possible application throughput ( ). For each layer, area is
covered if the application throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed
with intersections between layers.
Fast Link Adaptation Modelling For Several Users
When you calculate the study with the following display options, Atoll considers several users per pixel and determines
the best HSDPA bearer that each user can obtain. In this case, the cell available HSDPA power is shared between HSDPA
bearer users. When the coverage prediction is not based on a simulation, the number of HSDPA bearer users is taken
from the cell properties. The displayed results of the coverage prediction will be an average result for one user.
For further information on the HSDPA bearer allocation process when there are several users, see "HSDPA Bearer
Allocation Process" on page 219 For further information on the fast link adaptation modelling, see "Fast Link Adaptation
Modelling" on page 221.
Colour per MAC Throughput Per Mobile
Atoll displays the average MAC throughput per mobile ( ) provided on each pixel. The average MAC
throughput per mobile is calculated as follows:
Where,
represents the set of serving cells for a user x. For a dual-cell HSDPA user, there are two serving cells.
is the number of HSDPA users within the cell, c.
is the MAC throughput of each HSDPA bearer user. For further information on the calculation of the MAC
throughput, see "Colour per MAC Throughput" on page 280.
T
RLC Av
DL
R
RLC peak
DL
c ( ) 1 BLER
HSDPA
( ) ( )
c Serving cells e

ATTI
----------------------------------------------------------------------------------------------------------------------------------- =
BLER
HSDPA
ATTI
T
RLC Av
DL
T
appl i cati on
DL
T
appl i cati on
DL
T
RLC Av
DL
SF
Rate
AR =
T
RLC Av
DL
BLER
HSDPA
SF
Rate
AR
ATTI
T
appl i cati on
DL
T
MAC
DL
( )
average
T
MAC
DL
( )
average
T
MAC
DL
x ( )
x 1 =
n
HSDPA

Max n
HSDPA
c ( ) ( )
c Serving cells x ( ) e
---------------------------------------------------- =
Serving cells x ( )
n
HSDPA
c ( )
T
MAC
DL
x ( )
282 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Coverage consists of several layers with a layer per possible average MAC throughput per mobile ( ). For
each layer, area is covered if the average MAC throughput per mobile exceeds the user-defined thresholds. Each layer is
assigned a colour and displayed with intersections between layers.
Colour per RLC Throughput Per Mobile
Atoll displays the average RLC throughput per mobile ( ) provided on each pixel. The average RLC
throughput per mobile is calculated as follows:
Where,
is the number of HSDPA users within the cell.
is the RLC peak throughput of each HSDPA bearer user. For further information on the calculation of the
RLC peak throughput, see "Colour per RLC Peak Throughput" on page 280.
Coverage consists of several layers with a layer per possible average RLC throughput per mobile ( ). For
each layer, area is covered if the average RLC throughput per mobile exceeds the user-defined thresholds. Each layer is
assigned a colour and displayed with intersections between layers.
Colour per ApplicationThroughput Per Mobile
Atoll displays the average application throughput per mobile ( ) provided on each pixel. The average
application throughput per mobile is calculated as follows:
Where,
is the number of HSDPA users within the cell.
is the application throughput of each HSDPA bearer user. For further information on the calculation of the
application throughput, see "Colour per Application Throughput" on page 281.
Coverage consists of several layers with a layer per possible average application throughput per mobile
( ). For each layer, area is covered if the average application throughput per mobile exceeds the user-
defined thresholds. Each layer is assigned a colour and displayed with intersections between layers.
Probability of Having a Certain RLC Peak Rate
This result can be obtained only if you have selected an HSDPA radio bearer in the Condition tab.
Colour per Cell Edge Coverage Probability
Atoll shows areas where the selected HSDPA radio bearer is available with different cell edge coverage probabilities.
Coverage consists of several layers with a layer per cell edge coverage probability defined in the Display tab. For each
layer, area is covered if the selected HSDPA radio bearer is available. Each layer is assigned a colour and displayed with
intersections between layers.
6.5.2.6 HSUPA Prediction Study
A dedicated HSUPA study is available with different calculation and display options. Atoll determines on each pixel the
best HSUPA bearer that can be obtained; it can consider either a single HSUPA bearer user or several ones on each pixel.
For further information on the HSUPA bearer selection, see "HSUPA Bearer Allocation Process" on page 239. By
caclulating this study with suitable display options, it is possible:
To analyse the power required by the selected terminal,
To analyse the required E-DPDCH quality,
To analyse rates and throughputs.
Let us assume each pixel on the map corresponds to one or several users with HSUPA capable terminal, mobility and
HSUPA service. Each user may be using a specific carrier or all of them. Moreover, he does not create any interference.
Note that the HSUPA service area is limited by the pilot quality and the A-DPCH-EDPCCH quality.
6.5.2.6.1 Prediction Study Inputs
Parameters used as input for the HSUPA prediction study are:
T
MAC
DL
( )
average
T
RLC
DL
( )
average
T
RLC
DL
( )
average
T
RLC p eak
DL
x ( )
x 1 =
n
HSDPA

n
HSDPA
---------------------------------------------------- =
n
HSDPA
T
RLC p eak
DL
x ( )
T
RLC
DL
( )
average
T
appl i cati on
DL
( )
average
T
appl i cati on
DL
( )
average
T
appl i cati on
DL
x ( )
x 1 =
n
HSDPA

n
HSDPA
------------------------------------------------------ =
n
HSDPA
T
appl i cati on
DL
x ( )
T
appl i cati on
DL
( )
average
Forsk 2010 AT283_TRG_E2 283
Chapter 6: UMTS HSPA Networks
The cell UL load factor,
The cell UL reuse factor,
The cell UL load factor due to HSUPA,
The maximum cell UL load factor,
The number of HSUPA users within the cell if the study is calculated for several users.
These parameters can be either simulation outputs, or user-defined cell inputs. In the last case, When no value is defined
in the Cells table, Atoll uses the following default values:
Uplink load factor = 50%
Uplink reuse factor = 1
Uplink load factor due to HSUPA = 0%
Maximum uplink load factor = 75%
Number of HSUPA users = 1
6.5.2.6.2 Calculation Options
Atoll can calculate the HSUPA coverage prediction in one of two ways:
HSUPA resources can be dedictated to a single user: On each pixel, the user is processed as if he is the only
user in the cell i.e he will use the entire remaining load after allocating capacity to all R99 users.
HSUPA resources can be shared by HSUPA users defined or calculated per cell: Atoll considers several
HSUPA bearer users per pixel. After allocating capacity to all R99 users, the remaining load of the cell will be
shared equally between all the HSUPA bearer users. When the coverage prediction is not based on a simulation,
the number of HSUPA users is taken from the cell properties. The displayed results of the coverage prediction will
be an average result for one user.
6.5.2.6.3 Display Options
The following display options are available in the prediction property dialogue.
Colour per Required E-DPDCH Ec/Nt
Atoll displays on each pixel the E-DPDCH Ec/Nt required to obtain the selected HSUPA bearer. Coverage consists of
several layers with a layer per threshold. For each layer, area is covered if . Each layer is
assigned a colour and displayed with intersections between layers.
Colour per Required Terminal Power
Atoll displays on each pixel the terminal power required to obtain the selected HSUPA bearer. The required terminal
power is calculated from the required E-DPDCH Ec/Nt. Coverage consists of several layers with a layer per threshold. For
each layer, area is covered if . Each layer is assigned a colour and displayed with intersections
between layers.
Colour per MAC Rate
Atoll displays the MAC rate ( ) provided on each pixel. The MAC rate is calculated as follows:
Where,
is the transport block size (in kbits) for the selected HSUPA bearer; it is defined for each HSUPA bearer in the
HSUPA Radio Bearers table.
is the duration of one TTI for the selected HSUPA bearer; it is defined for each HSUPA bearer in the HSUPA Radio
Bearers table.
Coverage consists of several layers with a layer per possible MAC rate ( ). For each layer, area is covered if the
MAC rate exceeds the user-defined thresholds. Each layer is assigned a colour and displayed with intersections between
layers.
Colour per RLC Peak Rate
After selecting the HSUPA bearer, Atoll reads the corresponding RLC peak rate. This is the highest rate that the selected
HSUPA bearer can provide on each pixel.
Coverage consists of several layers with a layer per possible RLC peak rate ( ). For each layer, area is covered
if the RLC peak rate can be provided. Each layer is assigned a colour and displayed with intersections between layers.
Ec
Nt
-------
\ .
| |
E DPDCH
req
Threshol d >
P
term
req
Threshol d >
R
MAC
UL
R
MAC
UL
S
bl ock
UL
T
TTI
---------------- =
S
bl ock
UL
T
TTI
R
MAC
UL
R
RLC p eak
UL
284 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Colour per Minimum RLC Throughput
Atoll displays the minimum RLC throughput ( ) provided on each pixel. The minimum RLC throughput
corresponds to the RLC throughput obtained for a given BLER and the maximum number of retransmissions. It is
calculated as follows:
Where,
is the residual BLER for the selected uplink transmission format (HSUPA bearer with
retransmissions). It is read in the quality graph defined for the quartet reception equipment-selected bearer-number of
retransmissions-mobility (HSUPA Quality Graphs tab in the Reception equipment properties). This graph describes the
variation of BLER as a function of the measured quality (E-DPDCH Ec/Nt). Knowing the E-DPDCH Ec/Nt, Atoll finds the
corresponding BLER.
is the maximum number of retransmissions for the selected HSUPA bearer. This figure is read in the HSUPA Bearer
Selection table.
Coverage consists of several layers with a layer per possible minimum RLC throughput ( ). For each layer, area
is covered if the minimum RLC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and
displayed with intersections between layers.
Colour per Average RLC Throughput
When HARQ (Hybrid Automatic Repeat Request) is used, the required average number of retransmissions is smaller and
the RLC throughput is an average RLC throughput ( ). This is the RLC throughput obtained for a given BLER and
the average number of retransmissions. It is calculated as follows:
is the residual BLER for the selected uplink transmission format (HSUPA bearer with
retransmissions). It is read in the quality graph defined for the quartet reception equipment-selected bearer-number of
retransmissions-mobility (HSUPA Quality Graphs tab in the Reception equipment properties). This graph describes the
variation of BLER as a function of the measured quality (E-DPDCH Ec/Nt). Knowing the E-DPDCH Ec/Nt, Atoll finds the
corresponding BLER.
The average number of retransmissions ( ) is determined from early termination probabilities defined for the
selected HSUPA bearer (in the HSUPA Bearer Selection table). The Early Termination Probability graph shows the
probability of early termination ( ) as a function of the number of retransmissions ( ). Atoll calculates the average
number of retransmissions ( ) as follows:
Coverage consists of several layers with a layer per possible average RLC throughput ( ). For each layer, area
is covered if the minimum RLC throughput exceeds the user-defined thresholds. Each layer is assigned a colour and
displayed with intersections between layers.
Colour per Application Throughput
Atoll displays the application throughput ( ) provided on each pixel. The application throughput represents the
net throughput after deduction of coding (redundancy, overhead, addressing, etc.). This one is calculated as follows:
Where:
and respectively represent the scaling factor between the application throughput and the minimum RLC
(Radio Link Control) throughput and the throughput offset. These two parameters model the header information and other
supplementary data that does not appear at the application level. They are defined in the service properties.
Coverage consists of several layers with a layer per possible application throughput ( ). For each layer, area is
covered if the application throughput exceeds the user-defined thresholds. Each layer is assigned a colour and displayed
with intersections between layers.
T
RLC Mi n
UL
T
RLC Mi n
UL
R
RLC p eak
UL
1 BLER
HSUPA
( )
N
Rtx
---------------------------------------------------------------------------------- =
BLER
HSUPA
N
Rtx
N
Rtx
T
RLC Mi n
DL
T
RLC Av
UL
T
RLC Av
UL
R
RLC p eak
UL
1 BLER
HSUPA
( )
N
Rtx
( )
av
---------------------------------------------------------------------------------- =
BLER
HSUPA
N
Rtx
N
Rtx
( )
av
p N
Rtx
N
Rtx
( )
av
N
Rtx
( )
av
p N
Rtx
( ) p N
Rtx
1 ( ) ( ) N
Rtx

N
Rt x
1 =
N
Rtx
( )
max

p N
Rtx
( )
max
( )
----------------------------------------------------------------------------------------------------- =
T
RLC Av
DL
T
appl i cati on
UL
T
appl i cati on
UL
M
b
( ) T
RLC Mi n
UL
SF
Rate
AR =
SF
Rate
AR
T
appl i cati on
UL
Forsk 2010 AT283_TRG_E2 285
Chapter 6: UMTS HSPA Networks
Colour per Average Application Throughput
Atoll displays the average application throughput ( ) provided on each pixel. It is calculated as follows:
Where:
and respectively represent the scaling factor between the average application throughput and the average
RLC (Radio Link Control) throughput and the throughput offset. These two parameters model the header information and
other supplementary data that does not appear at the application level. They are defined in the service properties.
Coverage consists of several layers with a layer per possible average application throughput ( ). For each
layer, area is covered if the average application throughput exceeds the user-defined thresholds. Each layer is assigned
a colour and displayed with intersections between layers.
6.6 Automatic Neighbour Allocation
Atoll permits the automatic allocation of intra-technology neighbours in the current network. Two allocation algorithms are
available, one dedicated to intra-carrier neighbours and the other for inter-carrier neighbours.
The intra-technology neighbour allocation algorithms take into account all the cells of TBC transmitters. It means that all
the cells of TBC transmitters of your .atl document are potential neighbours.
The cells to be allocated will be called TBA cells. They must fulfil following conditions:
They are active,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone,
They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder
or a group of transmitters or a single transmitter.
Only TBA cells may be assigned neighbours.
In this section, the following are explained:
"Neighbour Allocation for All Transmitters" on page 285.
"Neighbour Allocation for a Group of Transmitters or One Transmitter" on page 289.
"Importance Calculation" on page 289.
6.6.1 Neighbour Allocation for All Transmitters
We assume that we have a reference, cell A, and a candidate neighbour, cell B. When the automatic neighbour allocation
starts, Atoll checks the following conditions:
23. The distance between both cells must be less than the user-definable maximum inter-site distance. If the distance
between the reference cell and the candidate neighbour is greater than this value, then the candidate neighbour
is discarded.
24. The calculation options,
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or
more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: This option enables you to force cells located on the reference cell site in the candidate
neighbour list. This constraint can be weighted among the others and ranks the neighbours through the importance field
(see after).
Force adjacent cells as neighbours (only for intra-carrier neighbours): This option enables you to force cells geographically
adjacent to the reference cell in the candidate neighbour list.This constraint can be weighted among the others and ranks
the neighbours through the importance field (see after).
T
appl i cati on Av
UL
T
appl i cati on Av
UL
M
b
( ) T
RLC Av
UL
SF
Rate
AR =
SF
Rate
AR
T
appl i cati on Av
UL
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Notes:
Adjacence criterion: Let CellA be a candidate neighbour cell of CellB. CellA is considered
adjacent to CellB if there exists at least one pixel in the CellB Best Server coverage area
where CellA is Best Server (if several cells have the same best server value) or CellA is the
second best server that enters the Active Set (respecting the HO margin of the allocation).
286 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Force neighbour symmetry: This option enables user to force the reciprocity of a neighbourhood link. Therefore, if the
reference cell is a candidate neighbour of another cell, this one will be considered as candidate neighbour of the reference
cell.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may
force/forbid a cell to be candidate neighbour of the reference cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours
and carries out a new neighbour allocation. If not selected, the existing neighbours are kept.
25. There must be an overlapping zone ( ) with a given cell edge coverage probability:
Intra-carrier neighbours: intra-carrier handover is a soft handover.
The reference cell A and the candidate cell B are located inside a continuous layer of cells with carrier c1 (c1 is the selected
carrier on which you run the allocation).
S
A
is the area where the cell A is the best serving cell. It means that the cell A is the first one in the active set.
- The pilot signal received from the cell A is greater than the minimum pilot signal level.
- The pilot quality from A exceeds a user-definable minimum value (minimum Ec/I
0
).
- The pilot quality from A is the best.
S
B
is the area where the cell B can enter the active set.
- The pilot signal received from the cell B is greater than the minimum pilot signal level.
- The pilot quality from B is greater than the pilot quality from A minus the Ec/I
0
margin. The Ec/I
0
margin has
the same meaning as the AS-threshold defined in the Cell properties. So, it should logically have the same
value.
When this option is checked, adjacent cells are sorted and listed from the most adjacent to
the least, depending on the above criterion. Adjacence is relative to the number of pixels
satisfying the criterion.
Figure 6.14Overlapping Zone for Intra-carrier Neighbours
S
A
S
B

Forsk 2010 AT283_TRG_E2 287


Chapter 6: UMTS HSPA Networks
Inter-carrier neighbours: inter-frequency handover is a hard handover. It is needed in a multi-carrier W-CDMA
network:
- To balance loading between carriers and layers (1
st
case),
- To make a coverage reason handover from micro cell frequency to macro cells (2
nd
case).
1
st
case: the reference cell A is located inside a continuous layer of cells with carrier c1 (c1 is the selected carrier on which
you run the allocation) and the candidate cell B belongs to a layer of cells with carrier c2.
S
A
is the area where the cell A is not the best serving cell of its layer but can enter the active set.
- The pilot signal received from the cell A is greater than the minimum pilot signal level.
- The pilot quality from A exceeds a user-definable minimum value (minimum Ec/I
0
).
- The pilot quality from A is not the highest one. It is strictly lower than the best pilot quality received and greater
than the best pilot quality minus the Ec/I
0
margin.
S
B
is the area where the cell B is the best serving cell of its layer.
- The pilot signal received from the cell B is greater than the minimum pilot signal level.
- The pilot quality from B exceeds a user-definable minimum value (minimum Ec/I
0
).
- The pilot quality from B is the highest one.
2
nd
case: the reference cell A is located on the border of a layer with carrier c1 (c1 is the selected carrier on which you run
the allocation) and the candidate cell B belongs to a layer of cells with carrier c2.
S
A
is the area where the pilot quality from the cell A starts significantly decreasing but the cell A is still the best serving cell
of its layer (since it is on the border).
- The pilot signal received from the cell A is greater than the minimum pilot signal level.
- The pilot quality from A is the highest one
- The pilot quality from A is lower than a user-definable minimum value (minimum Ec/I
0
) plus the Ec/I
0
margin.
S
B
is the area where the cell B is the best serving cell of its layer.
- The pilot signal received from the cell B is greater than the minimum pilot signal level.
- The pilot quality from B exceeds a user-definable minimum value (minimum Ec/I
0
).
- The pilot quality from B is the highest one.
Figure 6.15Overlapping Zone for Inter-carrier Neighbours - 1
st
Case
Note:
Two ways enable you to determine the I
0
value:
1 - Global Value: A percentage of the cell maximum power is considered. If the % of
maximum power is too low, i.e. if , Atoll takes into account the pilot
power of the cell. Then, I
0
represents the sum of values calculated for each cell.
2 - Defined per Cell: Atoll takes into account the total downlink power defined per cell. I
0
represents the sum of total transmitted powers.
% P
max
P
pi l ot
<
288 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Atoll calculates the percentage of covered area ( ) and compares this value to the % minimum covered
area. If this percentage is not exceeded, the candidate neighbour B is discarded.
26. The importance of neighbours.
For information on the importance calculation, see "Importance Calculation" on page 289.
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll
lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the
maximum number of neighbours to be allocated to each transmitter is exceeded. If we consider the case for which there
are 15 candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among
these 15 candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note
that specific maximum numbers of neighbours (maximum number of intra-carrier neighbours, maximum number of inter-
carrier neighbours) can be defined at the cell level (property dialogue or cell table). If defined there, this value is taken into
account instead of the default one available in the Neighbour Allocation dialogue.
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site, adjacent, coverage or symmetric. For
neighbours accepted for co-site, adjacency and coverage reasons, Atoll displays the percentage of area meeting the
coverage conditions and the corresponding surface area (km
2
), the percentage of area meeting the adjacency conditions
and the corresponding surface area (km
2
). Finally, if cells have previous allocations in the list, neighbours are marked as
existing.
Figure 6.16Overlapping Zone for Inter-carrier Neighbours - 2
nd
Case
Notes:
No simulation or prediction study is needed to perform an automatic neighbour allocation.
When starting an automatic neighbour allocation, Atoll automatically calculates the path
loss matrices if not found.
Even if no specific terminal, mobility or service is selected in the automatic allocation, it is
interesting to know that the algorithm works such as finding the maximum number of
neighbours by selection the multi-service traffic data as follows:
Service: selection of the one with the lowest body loss.
Mobility: no impact on the allocation, no specific selection.
Terminal: selection of the one with the greatest (Gain - Loss) value, and, if equal, the one
with the lowest noise figure.
The neighbour lists may be optionally used in the power control simulations to determine
the mobile's active set.
A forbidden neighbour must not be listed as neighbour except if the neighbourhood
relationship already exists and the Delete existing neighbours option is unchecked when
you start the new allocation. In this case, Atoll displays a warning in the Event viewer
indicating that the constraint on the forbidden neighbour will be ignored by algorithm
because the neighbour already exists.
The force neighbour symmetry option enables the users to consider the reciprocity of a
neighbourhood link. This reciprocity is allowed only if the neighbour list is not already full.
Thus, if the cell B is a neighbour of the cell A while the cell A is not a neighbour of the cell
B, two cases are possible:
1
st
case: There is space in the cell B neighbour list: the cell A will be added to the list. It will
be the last one.
S
A
S
B

S
A
---------------------- 100
Forsk 2010 AT283_TRG_E2 289
Chapter 6: UMTS HSPA Networks
6.6.2 Neighbour Allocation for a Group of Transmitters or One
Transmitter
Atoll allocates neighbours to:
TBA cells,
Neighbours of TBA cells marked as exceptional pair, adjacent and symmetric,
Neighbours of TBA cells that satisfy coverage conditions.
Automatic neighbour allocation parameters are described in "Neighbour Allocation for All Transmitters" on page 285.
6.6.3 Importance Calculation
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason, and to
quantify the neighbour importance.
6.6.3.1 Importance of Intra-carrier Neighbours
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between
0 and 100%.
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined
using the Importance Function (IF). The IF considers three factors for calculating the importance:
The co-site factor (C) which is a Boolean
The adjacency factor (A) which deals with the percentage of adjacency
The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
The IF evaluates importance as follows:
2
nd
case: The cell B neighbour list is full: Atoll will not include cell A in the list and will
cancel the link by deleting cell B from the cell A neighbour list.
When the options Force exceptional pairs and Force symmetry are selected, Atoll
considers the constraints between exceptional pairs in both directions so as to respect
symmetry condition. On the other hand, if neighbourhood relationship is forced in one
direction and forbidden in the other one, symmetry cannot be respected. In this case, Atoll
displays a warning in the Event viewer.
In the Results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a
TBA cell has already reached its maximum number of neighbours before starting the new
allocation, it will not appear in the Results table.
Neighbourhood cause When
Importance
value
Existing neighbour
Only if the Delete existing neighbours option is not selected
and in case of a new allocation
Existing
importance
Exceptional pair Only if the Force exceptional pairs option is selected 100 %
Co-site transmitter Only if the Force co-site cells as neighbours option is selected IF
Adjacent transmitter
Only if the Force adjacent cells as neighbours option is
selected
IF
Neighbourhood relationship that fulfils
coverage conditions
Only if the % minimum covered area is exceeded IF
Symmetric neighbourhood
relationship
Only if the Force neighbour symmetry option is selected IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 30%
Adjacency factor (A) 30% 60%
Co-site factor (C) 60% 100%
Neighbourhood
cause
IF
Resulting IF using the
default values from the
table above
Co-site Adjacent
No No
No Yes
Mi n O ( ) Max O ( )
Mi n A ( ) Max A ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 29% O ( ) +
Mi n A ( ) A A ( ) Max O ( ) O ( ) 100% Max O ( ) ( ) A ( ) + { } + 30% 30% 30% O ( ) 70% A ( ) + { } +
290 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where
6.6.3.2 Importance of Inter-carrier Neighbours
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between
0 to 100%.
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined
using the Importance Function (IF). The IF considers two factors for calculating the importance:
The co-site factor (C) which is a Boolean
The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
The IF evaluates importance as follows:
Where
Yes Yes
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Adjacent neighbours
iii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
The ranking between neighbours from the same category depends on the factors (A) and
(O).
The default value of Min(O) = 1% ensures that neighbours selected for symmetry will have
an importance greater than 0%. With a value of Min(O) = 0%, neighbours selected for
symmetry will have an importance field greater than 0% only if there is some coverage
overlapping.
Mi n C ( ) A C ( ) Max O ( ) O ( ) 100% Max O ( ) ( ) A ( ) + { } + 60% 40% 30% O ( ) 70% A ( ) + { } +
A X ( ) Max X ( ) Mi n X ( ) =
Neighbourhood cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected IF
Neighbourhood relationship that fulfils
coverage conditions
If the % minimum covered area is exceeded IF
Symmetric neighbourhood
relationship
If the Force neighbour symmetry option is selected IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 60%
Co-site factor (C) 60% 100%
Co-site Neighbourhood cause IF
Resulting IF using the default
values from the table above
No
Yes
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
Mi n O ( ) Max O ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 59% O ( ) +
Mi n C ( ) A C ( ) O ( ) + 60% 40% O ( ) +
A X ( ) Max X ( ) Mi n X ( ) =
Forsk 2010 AT283_TRG_E2 291
Chapter 6: UMTS HSPA Networks
6.7 Primary Scrambling Code Allocation
Downlink primary scrambling codes enable you to distinguish cells from one another (cell identification).
By default, there are 512 primary scrambling codes numbered (0...511).
The cells to which Atoll allocates scrambling codes are referred to as the TBA cells (cells to be allocated). TBA cells fulfil
following conditions:
- They are active,
- They satisfy the filter criteria applied to the Transmitters folder,
- They are located inside the focus zone,
- They belong to the folder on which allocation has been executed. This folder can be either the Transmitters
folder or a group of transmitters or a single transmitter.
6.7.1 Automatic Allocation Description
6.7.1.1 Options and Constraints
The scrambling code allocation algorithm can take into account following constraints and options:
27. Neighbourhood between cells,
You may consider:
First order neighbours: The neighbours of TBA cells listed in the Intra-technology neighbours table,
Second order neighbours: The neighbours of neighbours,
Third order neighbours: The neighbours neighbours neighbours.
28. Cells fulfilling a criterion on Ec/I0 (option Additional Overlapping Conditions),
For a reference cell A, Atoll considers all the cells B that can enter the active set on the area where the reference cell
is the best server (area where (Ec/I0)
A
exceeds the minimum Ec/I0 and is the highest one and (Ec/I0)
B
is within a Ec/I0
margin of (Ec/I0)
A
).
29. Reuse distance,
The ranking between neighbours from the same category depends on the factor (O).
The default value of Min(O) = 1% ensures that neighbours selected for symmetry will have
an importance greater than 0%. With a value of Min(O) = 0%, neighbours selected for
symmetry will have an importance field greater than 0% only if there is some coverage
overlapping.
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Notes:
In the context of the primary scrambling code allocation, the term "neighbours" refers to
intra-carrier neighbours.
Atoll can take into account inter-technology neighbour relations as constraints to allocate
different scrambling codes to the UMTS neighbours of a GSM transmitter. In order to
consider inter-technology neighbour relations in the scrambling code allocation, you must
make the Transmitters folder of the GSM .atl document accessible in the UMTS .atl
document. For information on making links between GSM and UMTS .atl documents, see
the User Manual.
Atoll considers symmetry relationship between a cell, its first order neighbours, its second
order neighbours and its third order neighbours.
Note:
Atoll considers either a percentage of the cell maximum powers or the total downlink
power used by the cells in order to evaluate I0. In this case, I0 equals the sum of total
transmitted powers. When this parameter is not specified in the cell properties, Atoll uses
50% of the maximum power.
Notes:
Reuse distance is a constraint on the allocation of scrambling codes. A code cannot be
reused at a cell that is not at least as far away as the reuse distance from the cell allocated
with the particular code.
292 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
30. Exceptional pairs,
31. Domains of scrambling codes,
32. The number of primary scrambling codes per cluster. In Atoll, we call "cluster", a group of scrambling codes as
defined in 3GPP specifications. 3GPP specifications define 64 clusters consisting of 8 scrambling codes (in this
case, clusters are numbererd from 0 to 63). However, you can define another value (e.g. if you set the number of
codes per cluster to 4, scrambling codes will be distributed in 128 clusters).
When the allocation is based on a Distributed strategy (Distributed per Cell or Distributed per Site), this parameter
can also be used to define the interval between the primary scrambling codes assigned to cells on a same site.
The defined interval is applied by adding the following lines in the Atoll.ini file:
For more information about setting options in the atoll.ini file, see the Administrator Manual.
33. The carrier on which the allocation is run: It can be a given carrier or all of them. In this case, either Atoll
independently plans scrambling codes for the different carriers, or it allocates the same primary scrambling code
to each carrier of a transmitter if the option "Allocate carriers identically" is selected.
34. The possibility to use a maximum of codes from the defined domains (option "Use a Maximum of Codes"): Atoll
will try to spread the scrambling code spectrum the most.
35. The "Delete All Codes" option: When selecting this option, Atoll deletes all the current scrambling codes and
carries out a new scrambling code allocation. If not selected, the existing scrambling codes are kept.
In addition, it depends on the selected allocation strategy. Allocation strategies can be:
Clustered allocation: The purpose of this strategy is to choose for a group of mutually constrained cells, scrambling
codes among a minimum number of clusters. In this case, Atoll will preferentially allocate all the codes within the
same cluster.
Distributed per cell allocation: This strategy consists in using as many clusters as possible. Atoll will preferentially
allocate codes from different clusters.
One cluster per site allocation: This strategy allocates one cluster to each site, then, one code from the cluster to
each cell of each site. When all the clusters have been allocated and there are still sites remaining to be allocated,
Atoll reuses the clusters as far as possible at another site.
Distributed per site allocation: This strategy allocates a group of adjacent clusters to each site, then, one cluster
to each transmitter on the site according to its azimuth and finally, one code from the cluster to each cell of each
transmitter. The number of adjacent clusters per group depends on the number of transmitters per site you have
in your network; this information is required to start allocation based on this strategy. When all the groups of
adjacent clusters have been allocated and there are still sites remaining to be allocated, Atoll reuses the groups
of adjacent clusters as far as possible at another site.
In the Results table, Atoll only displays scrambling codes allocated to TBA cells.
6.7.1.2 Allocation Process
For each TBA cell, Atoll lists all cells which have constraints with the cell. They are referred to as near cells. The near cells
of a TBA cell may be:
Its neighbour cells: the neighbours listed in the Intra-technology neighbours table (options Existing neighbours
and "First Order"),
The neighbours of its neighbours (options Existing neighbours and Second Order),
The third order neighbours (options Existing neighbours and Third Order),
The cells that fulfil Ec/I0 condition (option Additional Overlapping Conditions),
The cells with distance from the TBA cell less than the reuse distance,
The cells that make exceptional pairs with the TBA cell.
Additional constraints are considered when:
The cell and its near cells are neighbours of a same GSM transmitter (only if the Transmitters folder of the GSM
.atl document is accessible in the UMTS .atl document),
The neighbour cells cannot share the same cluster (for the "Distributed per site" allocation strategy only).
These constraints have a certain weight taken into account to determine the TBA cell priority during the allocation process
and the cost of the scrambling code plan. During the allocation, Atoll tries to assign different scrambling codes to the TBA
cell and its near cells. If it respects all the constraints, the cost of the scrambling code plan is 0. When a cell has too many
constraints and there are not anymore scrambling codes available, Atoll breaks the constraint with the lowest cost so as
to generate the scrambling code plan with the lowest cost. For information on the cost generated by each constraint, see
"Cell Priority" on page 294.
Scrambling code reuse distance can be defined at cell level. If this value is not defined,
then Atoll will use the default reuse distance defined in the Scrambling Code Automatic
Allocation dialogue.
Note:
When no domain is assigned to cells, Atoll considers the 512 primary scrambling codes
available.
[PSC]
ConstantStep = 1
Forsk 2010 AT283_TRG_E2 293
Chapter 6: UMTS HSPA Networks
6.7.1.2.1 Single Carrier Network
The allocation process depends on the selected strategy. Algorithm works as follows:
Strategies: Clustered and Distributed per Cell
Atoll processes TBA cells according to their priority. It allocates scrambling codes starting with the highest priority cell and
its near cells, and continuing with the lowest priority cells not allocated yet and their near cells. For information on
calculating cell priority, see "Cell Priority" on page 294.
Strategy: One Cluster per Site
All sites which have constraints with the studied site are referred to as near sites.
Atoll assigns a cluster to each site, starting with the highest priority site and its near sites, and continuing with the lowest
priority sites not allocated yet and their near sites. When all the clusters have been allocated and there are still sites
remaining to be allocated, Atoll reuses the clusters at another site. When the Reuse Distance option is selected, the
algorithm reuses the clusters as soon as the reuse distance is exceeded. Otherwise, when the option is not selected, the
algorithm tries to assign reused clusters as spaced out as possible.
Then, Atoll allocates a primary scrambling code from the cluster to each cell located on the sites (codes belong to the
assigned clusters). It starts with the highest priority cell and its near cells and goes on with the lowest priority cells not
allocated yet and their near cells.
For information on calculating site priority, see "Site Priority" on page 296. For information on calculating cell priority, see
"Cell Priority" on page 294.
Strategy: Distributed per Site
All sites which have constraints with the studied site are referred to as near sites.
Atoll assigns a group of adjacent clusters to each site, starting with the highest priority site and its near sites, and
continuing with the lowest priority sites not allocated yet and their near sites. When all the groups of adjacent clusters have
been allocated and there are still sites remaining to be allocated, Atoll reuses the groups of adjacent clusters at another
site. When the Reuse Distance option is selected, the algorithm reuses the groups of adjacent clusters as soon as the
reuse distance is exceeded. Otherwise, when the option is not selected, the algorithm tries to assign reused groups of
adjacent clusters as spaced out as possible. Then, Atoll assigns each cluster of the group to each transmitter of the site
according to the transmitter azimuth and selected neighbourhood constraints (options "Neighbours in Other Clusters" and
"Secondary Neighbours in Other Clusters"). Then, Atoll allocates a primary scrambling code to each cell located on the
transmitters (codes belong to the assigned clusters). It starts with the highest priority cell and its near cells and goes on
with the lowest priority cells not allocated yet and their near cells.
For information on calculating site priority, see "Site Priority" on page 296. For information on calculating cell priority, see
"Cell Priority" on page 294.
Determination of Groups of Adjacent Clusters
In order to determine the groups of adjacent clusters to be used, Atoll proceeds as follows: It defines theoretical groups
of adjacent clusters, independently of the defined domain, considering the 512 primary scrambling codes available and
the specified number of codes per cluster (if this one is set to 8, 64 clusters are supposed to be available). It starts the
division in group from the cluster 0 (hard coded) and takes into account the maximum number of transmitters per site user-
specified in order to determine the number of clusters in each group and then, the number of possible groups.
Let us assume that the number of codes per cluster is set to 8 and the maximum number of transmitters per site in the
network is 3. In this case, we have the following theoretical groups:
If no domain is assigned to cells, Atoll can use all these groups for the allocation. On the other hand, if a domain is used,
the tool compares adjacent clusters really available in the assigned domain to the theoretical groups and only keeps
adjacent clusters mapping the theoretical groups.
Let us assume that we have a domain consisted of 12 clusters: clusters 1 to 8 and clusters 12 to 15.
Therefore, Atoll will be able to use the following groups of adjacent clusters:
Group 2 with cluster 3, 4 and 5,
Group 3 with cluster 6, 7 and 8,
Group 6 with cluster 12, 13 and 14.
The clusters 1, 2 and 15 will not be used.
If a domain does not contain any adjacent clusters, the user is warned through the 'Event Viewer'.
6.7.1.2.2 Multi-Carrier Network
In case you have a multi-carrier network and you run the scrambling code allocation on all the carriers, the allocation
process depends on the allocation strategy as detailed above and in addition, wether the option "Allocate Carriers
Identically" is selected or not.
Group 1 Group 2 Group 3 Group 4 ... Group 21
Cluster 0
Cluster 1
Cluster 2
Cluster 3
Cluster 4
Cluster 5
Cluster 6
Cluster 7
Cluster 8
Cluster 9
Cluster 10
Cluster 11
...
Cluster 61
Cluster 62
Cluster 63
294 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
When the option is not selected, algorithm works for each strategy, as explained above. On the other hand, when the
option is selected, allocation order changes. It is no longer based on the cell priority but depends on the transmitter priority.
All transmitters which have constraints with the studied transmitter will be referred to as near transmitters.
In case of a "Per cell" strategy (Clustered and Distributed per cell), Atoll starts scrambling code allocation with the highest
priority transmitter and its near transmitters and continues with the lowest priority transmitters not allocated yet and their
near transmitters. The same scrambling code is assigned to each cell of the transmitter.
In case of the "One cluster per site" strategy, Atoll assigns a cluster to each site and then, allocates a scrambling code to
each transmitter. It starts with the highest priority transmitter and its near transmitters and continues with the lowest priority
transmitters not allocated yet and their near transmitters. The same scrambling code is assigned to each cell of the
transmitter.
In case of the "Distributed per site" strategy, Atoll assigns a group of adjacent clusters to each site, then a cluster to each
transmitter and finally, allocates a scrambling code to each transmitter. It starts with the highest priority transmitter and its
near transmitters and continues with the lowest priority transmitters not allocated yet and their near transmitters. The same
scrambling code is assigned to each cell of the transmitter.
For information on calculating transmitter priority, see "Transmitter Priority" on page 296.
6.7.1.3 Priority Determination
6.7.1.3.1 Cell Priority
Scrambling code allocation algorithm in Atoll allots priorities to cells before performing the actual allocation. Priorities
assigned to cells depend upon how much constrained each cell is and the cost defined for each constraint. A cell without
any constraint has a default cost, , equal to 0. The higher the cost on a cell, the higher the priority it has for the scrambling
code allocation process.
There are six criteria employed to determine the cell priority:
Scrambling Code Domain Criterion
The cost due to the domain constraint, , depends on the number of scrambling codes available for the allocation.
The domain constraint is mandatory and cannot be broken.
When no domain is assigned to cells, 512 scrambling codes are available and we have:
When domains of scrambling codes are assigned to cells, each unavailable scrambling code generates a cost. The higher
the number of codes available in the domain, the less will be the cost due to this criterion. The cost is given as:
Distance Criterion
The constraint level of any cell i depends on the number of cells (j) present within a radius of "reuse distance" from its
centre. The total cost due to the distance constraint is given as:
Each cell j within the reuse distance generates a cost given as:
Where
is a weight depending on the distance between i and j. This weight is inversely proportional to the inter-cell distance.
For a reuse distance of 2000m, the weight for an inter-cell distance of 1500m is 0.25, the weight for co-site cells is 1 and
the weight for two cells spaced out 2100m apart is 0.
is the cost of the distance constraint. This value can be defined in the Constraint Cost dialogue.
Exceptional Pair Criterion
The constraint level of any cell i depends on the number of exceptional pairs (j) for that cell. The total cost due to
exceptional pair constraint is given as:
Where
is the cost of the exceptional pair constraint. This value can be defined in the Constraint Cost dialogue.
Neighbourhood Criterion
Note:
When cells, transmitters or sites have the same priority, processing is based on an
alphanumeric order.
C
C
i
Dom ( )
C
i
Dom ( ) 0 =
C
i
Dom ( ) 512 Number of scrambling codes in the domain =
C
i
Di st ( ) C
j
Di st i ( ) ( )
j

=
C
j
Di st i ( ) ( ) w d
i j
( ) c
di s ce tan
=
w d
i j
( )
c
di s ce tan
C
i
EP ( ) c
EP
i j ( )
j

=
c
EP
Forsk 2010 AT283_TRG_E2 295
Chapter 6: UMTS HSPA Networks
The constraint level of any cell i depends on the number of its neighbour cells j, the number of second order neighbours k
and the number of third order neighbours l.
Lets consider the following neighbour schema:
The total cost due to the neighbour constraint is given as:
Each first order neighbour cell j generates a cost given as:
Where
is the importance of the neighbour cell j.
is the cost of the first order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two first order neighbours must not have the same scrambling code, Atoll considers the cost created by two first
order neighbours to be each other.
Each second order neighbour cell k generates a cost given as:
Where
is the cost of the second order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two second order neighbours must not have the same scrambling code, Atoll considers the cost created by two
second order neighbours to be each other.
Each third order neighbour cell l generates a cost given as:
Where
is the cost of the third order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two third order neighbours must not have the same scrambling code, Atoll considers the cost created by two
third order neighbours to be each other.
Figure 6.17Neighbourhood Constraints
Note:
Atoll considers the highest cost of both links when a neighbour relation is symmetric and the
importance value is different.
In this case, we have:
And
C
i
N ( ) C
j
N1 i ( ) ( ) C
j j '
N1 i ( ) ( )
j '

+
j

\ .
|
| |
C
k
N2 i ( ) ( ) C
k k'
N2 i ( ) ( )
k'

+
k

\ .
|
| |
C
l
N3 i ( ) ( ) C
l l '
N3 i ( ) ( )
l '

+
l

\ .
|
| |
+ + =
C
j
N1 i ( ) ( ) I
j
c
N1
=
I
j
c
N1
C
j j '
N1 i ( ) ( )
C
j
N1 i ( ) ( ) C
j '
N1 i ( ) ( ) +
2
----------------------------------------------------------- =
C
k
N2 i ( ) ( ) Max C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) ( ) C
j '
N1 i ( ) ( ) C
k
N1 j ' ( ) ( ) ( ) ( , ) c
N2
=
c
N2
C
k k'
N2 i ( ) ( )
C
k
N2 i ( ) ( ) C
k'
N2 i ( ) ( ) +
2
------------------------------------------------------------- =
C
l
N3 i ( ) ( ) Max
C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) C
l
N1 k ( ) ( ) C
j '
N1 i ( ) ( ) C
k
N1 j ' ( ) ( ) C
l
N1 k ( ), ,
C
j
N1 i ( ) ( ) C
k'
N1 j ( ) ( ) ( ) C
l
N1 k' ( ) C
j '
N1 i ( ) ( ) C
k'
N1 j ' ( ) ( ) C
l
N1 k' ( ) , \ .
|
| |
c
N3
=
c
N3
C
l l '
N3 i ( ) ( )
C
l
N3 i ( ) ( ) C
l '
N3 i ( ) ( ) +
2
----------------------------------------------------------- =
C
j
N1 i ( ) ( ) Max I
i j
I
j i
, ( ) c
N1
=
C
k
N2 i ( ) ( ) Max C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) C
j
N1 k ( ) ( ) C
i
N1 j ( ) ( ) ( , ) c
N2
=
296 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
GSM Neighbour Criterion
This criterion is considered when the co-planning mode is activated (i.e. the Transmitters folder of the GSM .atl document
is made accessible in the UMTS .atl document) and inter-technology neighbours have been allocated. If the cell i is
neighbour of a GSM transmitter, the cell constraint level depends on how many cells j are neighbours of the same GSM
transmitter. The total cost due to GSM neighbour constraint is given as:
Where
is the cost of the GSM neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Cluster Criterion
When the "Distributed per Site" allocation strategy is used, you can consider additional constraints on allocated clusters
(one cell, its first order neighbours and its second order neighbours must be assigned scrambling codes from different
clusters). In this case, the constraint level of any cell i depends on the number of first and second order neighbours, j and
k. The total cost due to the cluster constraint is given as:
Where
is the cost of the cluster constraint. This value can be defined in the Constraint Cost dialogue.
Therefore, the total cost due to constraints on any cell i is defined as:
With
6.7.1.3.2 Transmitter Priority
In case you have a multi-carrier network and you run scrambling code allocation on "all" the carriers with the option
"allocate carriers identically", algorithm in Atoll allots priorities to transmitters. Priorities assigned to transmitters depend
on how much constrained each transmitter is and the cost defined for each constraint. The higher the cost on a transmitter,
the higher the priority it has for the scrambling code allocation process.
Let us consider a transmitter Tx with two cells using carriers 0 and 1. The cost due to constraints on the transmitter is given
as:
With and
Here, the domain available for the transmitter is the intersection of domains assigned to cells of the transmitter. The
domain constraint is mandatory and cannot be broken.
6.7.1.3.3 Site Priority
In case of "Per Site" allocation strategies (One cluster per site and Distributed per site), algorithm in Atoll allots priorities
to sites. Priorities assigned to sites depend on how much constrained each site is and the cost defined for each constraint.
The higher the cost on a site, the higher the priority it has for the scrambling code allocation process.
Let us consider a site S with three transmitters; each of them has two cells using carriers 0 and 1. The cost due to
constraints on the site is given as:
With and
Here, the domain considered for the site is the intersection of domains available for transmitters of the site. The domain
constraint is mandatory and cannot be broken.
6.7.2 Allocation Examples
6.7.2.1 Allocation Strategies and Use a Maximum of Codes
In order to understand the differences between the different allocation strategies and the behaviour of algorithm when
using a maximum of codes or not, let us consider the following sample scenario:
C
i
N
2G
( ) c
N
2G
j Tx
2G
( )
j

=
c
N
2G
C
i
Cl uster ( ) C
j
N1 i ( ) ( ) c
Cl uster

C
k
N2 i ( ) ( ) c
Cl uster

+ =
c
Cl uster
C
i
C
i
Dom ( ) C
i
U ( ) + =
C
i
U ( ) C
i
Di st ( ) C
i
EP ( ) C
i
N ( ) C
i
N
2G
( ) C
i
Cl uster ( ) + + + + =
C
Tx
C
Tx
Dom ( ) C +
Tx
U ( ) =
C
Tx
U ( )
Max
i Tx e
C
i
U ( ) ( ) = C
Tx
Dom ( ) 512 Number of scrambling codes in the domain =
C
S
C
S
U ( ) C
S
Dom ( ) + =
C
S
U ( )
Max
Tx S e
C
Tx
U ( ) ( ) = C
S
Dom ( ) 512 Number of scrambling codes in the domain =
Forsk 2010 AT283_TRG_E2 297
Chapter 6: UMTS HSPA Networks
Let Site0, Site1, Site2 and Site3 be four sites with 3 cells using carrier 0 whom scrambling codes have to be allocated out
of three clusters consisted of 8 primary scrambling codes. This implies that the domain of scrambling codes for the four
sites is from 0 to 23 (cluster 0 to cluster 2). The reuse distance is supposed to be less than the inter-site distance. Only
co-site neighbours exist.
The following section lists the results of each combination of options with explanation where necessary.
6.7.2.1.1 Strategy: Clustered
Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater
than reuse distances, every cell has the same priority. Then, scrambling code allocation to cells is performed in an
alphanumeric order.
Figure 6.18Primary Scrambling Codes Allocation
Without Use a Maximum of Codes With Use a Maximum of Codes
Atoll starts allocating the codes from the start of cluster 0
at each site.
As it is possible to use a maximum of codes, Atoll starts
allocation at the start of a different cluster at each site.
When a cluster is reused, and there are non allocated
codes left in the cluster, Atoll first allocates those codes
before reusing the already used ones.
298 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
6.7.2.1.2 Strategy: Distributed
Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater
than reuse distances, every cell has the same priority. Then, scrambling code allocation to cells is performed in an
alphanumeric order.
6.7.2.1.3 Strategy: One Cluster per Site
Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater
than reuse distances, every site has the same priority. Then, cluster allocation to sites is performed in an alphanumeric
order.
Without Use a Maximum of Codes With Use a Maximum of Codes
Atoll allocates codes from different clusters to each cell of
the same site. Under given constraints of neighbourhood
and reuse distance, same codes can be allocated to each
sites cells.
Atoll allocates codes from different clusters to each sites
cells. As it is possible to use a maximum of codes, Atoll
allocates the codes so that there is least repetition of codes.
Without Use a Maximum of Codes With Use a Maximum of Codes
In this strategy, a cluster of codes is limited to be used at
just one site at a time unless all codes and clusters have
been allocated and there are still sites remaining to be
allocated. In this case Atoll reuses the clusters as far as
possible at another site.
When it is possible to use a maximum of codes, Atoll can
allocate different codes from a reused cluster at another
site.
Forsk 2010 AT283_TRG_E2 299
Chapter 6: UMTS HSPA Networks
6.7.2.1.4 Strategy: Distributed per Site
Since the restrictions of neighbourhood only apply to co-sites with the same importance and sites distances are greater
than reuse distances, every site has the same priority. Then, the group of adjacent clusters allocation to sites is performed
in an alphanumeric order.
6.7.2.2 Allocate Carriers Identically
In order to understand the behaviour of algorithm when using the option "Allocate Carriers Identically" or not, let us
consider the following sample scenario:
Let Site0, Site1, Site2 and Site3 be four sites with 3 cells using carrier 0 and 3 cells using carrier 1. Scrambling codes have
to be allocated out of 3 clusters consisted of 8 primary scrambling codes. This implies that the domain of scrambling codes
for the five sites is from 0 to 23 (cluster 0 to cluster 2). The reuse distance is supposed to be less than the inter-site
distance. Only co-site neighbours exist. Allocation algorithm will be based on the "One Cluster per Site" strategy and the
option "Use a Maximum of Codes" is selected.
In both cases (with and without Allocate Carriers Identically), every site has the same priority. Then, cluster allocation to
sites is performed in an alphanumeric order.
Without Use a Maximum of Codes With Use a Maximum of Codes
In this strategy, a group of adjacent clusters is limited to be
used at just one site at a time unless all codes and groups
of adjacent clusters have been allocated and there are still
sites remaining to be allocated. In this case (here only one
group of adjacent clusters (clusters 0, 1 and 2) is available),
Atoll reuses the group at another site.
When it is possible to use a maximum of codes, Atoll can
allocate different codes from a reused group of adjacent
cluster at another site.
Without Allocate Carriers Identically With Allocate Carriers Identically
Atoll allocates one cluster at each site as detailed in the
previous section. Then, it allocates a code from the cluster
to each cell of the site so as to use a maximum of codes.
In this case, Atoll allocates one cluster at each site and
then, one code to each transmitter so as to use a maximum
of codes. Then, the same code is given to each cell of the
transmitter.
300 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
6.8 Automatic GSM-UMTS Neighbour Allocation
6.8.1 Overview
You can automatically calculate and allocate neighbours between GSM and UMTS networks. In Atoll, it is called inter-
technology neighbour allocation.
Inter-technology handover is used in two cases:
When the UMTS coverage is not continuous. In this case, the UMTS coverage is extended by UMTS-GSM
handover into the GSM network,
And in order to balance traffic and service distribution between both networks.
Note that the automatic inter-technology neighbour allocation algorithm takes into account both cases.
In order to be able to use the inter-technology neighbour allocation algorithm, you must have:
An .atl document containing the GSM network, GSM.atl, and another one describing the UMTS network,
UMTS.atl,
An existing link on the Transmitters folder of GSM.atl into UMTS.atl.
The external neighbour allocation algorithm takes into account all the GSM TBC transmitters. It means that all the TBC
transmitters of GSM.atl are potential neighbours. The cells to be allocated will be called TBA cells which, being cells of
UMTS.atl, satisfy following conditions:
They are active,
They satisfy the filter criteria applied to Transmitters folder,
They are located inside the focus zone,
They belong to the folder for which allocation has been executed. This folder can be either the Transmitters folder
or a group of transmitters subfolder.
Only UMTS TBA cells may be assigned neighbours.
6.8.2 Automatic Allocation Description
The allocation algorithm takes into account criteria listed below:
The inter-transmitter distance,
The maximum number of neighbours fixed,
Allocation options,
The selected allocation strategy,
Two allocation strategies are available: the first one is based on distance and the second one on coverage overlapping.
We assume we have a UMTS reference cell, A, and a GSM candidate neighbour, transmitter B.
6.8.2.1 Algorithm Based on Distance
When automatic allocation starts, Atoll checks following conditions:
36. The distance between the UMTS reference cell and the GSM neighbour must be less than the user-definable
maximum inter-site distance. If the distance between the UMTS reference cell and the GSM neighbour is greater
than this value, then the candidate neighbour is discarded.
Candidate neighbours are sorted in descending order with respect to distance.
37. The calculation options,
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or
more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same site as
the reference UMTS cell in the candidate neighbour list. This option is automatically selected.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may
force/forbid a GSM transmitter to be candidate neighbour of the reference UMTS cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours
and carries out a new neighbour allocation. If not selected, existing neighbours are kept.
38. The importance of neighbours.
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll
lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the
maximum number of neighbours to be allocated to each cell is exceeded. If we consider the case for which there are 15
candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among these 15
candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note that the
Note:
Transmitter azimuths are taken into account to evaluate the inter-transmitter distance (for
further information on inter-transmitter distance calculation, please refer to "Calculation of
Inter-Transmitter Distance" on page 303)
Forsk 2010 AT283_TRG_E2 301
Chapter 6: UMTS HSPA Networks
maximum number of inter-technology neighbours can be defined at the cell level (property dialogue or cell table). If defined
there, this value is taken into account instead of the default one available in the Neighbour Allocation dialogue.
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between
0 to 100%.
Where is the distance between the UMTS reference cell and the GSM neighbour and is the maximum inter-site
distance.
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site, or distance. For neighbours accepted for
distance reasons, Atoll displays the distance from the reference cell (m). Finally, if cells have previous allocations in the
list, neighbours are marked as existing.
6.8.2.2 Algorithm Based on Coverage Overlapping
When automatic allocation starts, Atoll checks following conditions:
39. The distance between the UMTS reference cell and the GSM neighbour must be less than the user-definable
maximum inter-site distance. If the distance between the UMTS reference cell and the GSM neighbour is greater
than this value, then the candidate neighbour is discarded.
40. The calculation options,
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or
more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same site as
the reference UMTS cell in the candidate neighbour list. This option is automatically selected.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may
force/forbid a GSM transmitter to be candidate neighbour of the reference UMTS cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours
and carries out a new neighbour allocation. If not selected, existing neighbours are kept.
41. There must be an overlapping zone ( ) with a given cell edge coverage probability.
Four different cases may be considered for S
A
:
- 1
st
case: S
A
is the area where the cell A is the best serving cell of the UMTS network.
- The pilot signal received from A is greater than the minimum pilot signal level,
- The pilot quality from A exceeds a user-definable minimum value (minimum Ec/I
0
) and is the highest one.
In this case, the Ec/I
0
margin must be equal to 0dB and the max Ec/I0 option disabled.
- 2
nd
case: S
A
represents the area where the pilot quality from the cell A strats decreasing but the cell A is still
the best serving cell of the UMTS network.
The Ec/I
0
margin must be equal to 0dB, the max Ec/I0 option selected and a maximum Ec/I0 user-defined.
- The pilot signal received from A is greater than the minimum pilot signal level,
- The pilot quality from A exceeds the minimum Ec/I
0
but is lower than the maximum Ec/I0.
- The pilot quality from A is the highest one.
- 3
rd
case: S
A
represents the area where the cell A is not the best serving cell but can enter the active set.
Here, the Ec/I
0
margin has to be different from 0dB and the max Ec/I0 option disabled.
- The pilot signal received from A is greater than the minimum pilot signal level,
- The pilot quality from A is within a margin from the best Ec/I0, where the best Ec/I0 exceeds the minimum
Ec/I0.
- 4
th
case: S
A
represents the area where:
- The pilot signal received from A is greater than the minimum pilot signal level,
Neighbourhood cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected 100 %
Neighbourhood relationship that fulfils
distance conditions
If the maximum distance is not exceeded
1
d
d
max
------------
d d
max
Note:
Here, real inter-transmitter distance is considered.
S
A
S
B

302 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
- The pilot quality from A is within a margin from the best Ec/I0 (where the best Ec/I0 exceeds the minimum
Ec/I0) and lower than the maximum Ec/I0.
In this case, the margin must be different from 0dB, the max Ec/I0 option selected and a maximum Ec/I0 user-
defined.
Two different cases may be considered for S
B
:
- 1
st
case: S
B
is the area where the cell B is the best serving cell of the GSM network.
In this case, the margin must be set to 0dB.
- The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and
is the highest one.
- 2
nd
case: The margin is different from 0dB and S
B
is the area where:
- The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and
is within a margin from the best BCCH signal level.
Atoll calculates the percentage of covered area ( ) and compares this value to the % minimum covered
area. If this percentage is not exceeded, the candidate neighbour B is discarded.
Candidate neighbours fulfilling coverage conditions are sorted in descending order with respect to % of covered area.
42. The importance of neighbours.
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll
lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the
maximum number of neighbours to be allocated to each cell is exceeded. If we consider the case for which there are 15
candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among these 15
candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note that the
maximum number of inter-technology neighbours can be defined at the cell level (property dialogue or cell table). If defined
there, this value is taken into account instead of the default one available in the Neighbour Allocation dialogue.
As indicated in the table below, the neighbour importance depends on the cause; this value varies between 0 to 100%.
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined
using the Importance Function (IF). The IF considers two factors for calculating the importance:
The co-site factor (C) which is a Boolean
The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
The IF evaluates importance as follows:
Where
Guidelines for the automatic allocation
When the automatic allocation is based on coverage overlapping, we recommend you to perform two successive auto-
matic allocations:
- A first allocation in order to find handovers due to non-continuous UMTS coverage. In this case, you have to select the
max Ec/I
0
option and define a high enough value.
- A second allocation in order to complete the previous list with handovers motivated for reasons of traffic and service
distribution. Here, the max Ec/I
0
option must be disabled.
Neighbourhood reason When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected IF
Neighbourhood relationship that fulfils
coverage conditions
If the % minimum covered area is exceeded IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 60%
Co-site factor (C) 60% 100%
Co-site neighbourhood reason IF
Resulting IF using the default
values from the table above
No
Yes
S
A
S
B

S
A
---------------------- 100
Mi n O ( ) Max O ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 59% O ( ) +
Mi n C ( ) A C ( ) O ( ) + 60% 40% O ( ) +
A X ( ) Max X ( ) Mi n X ( ) =
Forsk 2010 AT283_TRG_E2 303
Chapter 6: UMTS HSPA Networks
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site or coverage. For neighbours accepted for co-
site and coverage reasons, Atoll displays the percentage of area meeting the coverage conditions and the corresponding
surface area (km
2
). Finally, if cells have previous allocations in the list, neighbours are marked as existing.
6.8.2.3 Appendices
6.8.2.3.1 Delete Existing Neighbours Option
As explained above, Atoll keeps the existing inter-technology neighbours when the Delete existing neighbours option is
not checked. We assume that we have an existing allocation of inter-technology neighbours.
A new TBA cell i is created in UMTS.atl. Therefore, if you start a new allocation without selecting the Delete existing
neighbours option, Atoll determines the neighbour list of the cell i.
If you change some allocation criteria (e.g. increase the maximum number of neighbours or create a new GSM TBC
transmitter) and start a new allocation without selecting the Delete existing neighbours option, it examines the neighbour
list of TBA cells and checks allocation criteria if there is space in their neighbour lists. A new GSM TBC transmitter can
enter the TBA cell neighbour list if allocation criteria are satisfied. It will be the first one in the neighbour list.
6.8.2.3.2 Calculation of Inter-Transmitter Distance
When allocation algorithm is based on distance, Atoll takes into account the real distance ( in m) and azimuths of
antennas in order to calculate the effective inter-transmitter distance ( in m).
where x = 0.5% so that the maximum D variation does not exceed 1%.
The formula above implies that two cells facing each other will have a smaller effective distance than the real physical
distance. It is this effective distance that will be taken into account rather than the real distance.
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
The ranking between neighbours from the same category depends on the factor (O).
Notes:
No prediction study is needed to perform an automatic neighbour allocation. When starting
an automatic neighbour allocation, Atoll automatically calculates the path loss matrices if
not found.
A forbidden neighbour must not be listed as neighbour except if the neighbourhood
relationship already exists and the Delete existing neighbours option is unchecked when
you start the new allocation. In this case, Atoll displays a warning in the Event viewer
indicating that the constraint on the forbidden neighbour will be ignored by algorithm
because the neighbour already exists.
In the Results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a
TBA cell has already reached its maximum number of neighbours before starting the new
allocation, it will not appear in the Results table.
Figure 6.19Inter-Transmitter Distance Computation
Note:
This formula is not used when allocation algorithm is based on coverage overlapping. In
this case, real inter-transmitter distance is considered.
D
d
d D 1 x | cos x o cos + ( ) =
304 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Chapter 7
CDMA2000 Networks
Forsk 2010 AT283_TRG_E2 307
Chapter 7: CDMA2000 Networks
7 CDMA2000 Networks
7.1 General Prediction Studies
7.1.1 Calculation Criteria
Three criteria can be studied in point analysis (Profile tab) and in common coverage studies. Study criteria are detailed in
the table below:
where,
EIRP is the effective isotropic radiated power of the transmitter,
ic is a carrier number,
is the loss on the transmitter-receiver path (path loss) calculated by the propagation model,
is the transmitter antenna attenuation (from antenna patterns),
is the shadowing margin. This parameter is taken into account when the option Shadowing taken into
account is selected,
are the indoor losses, taken into account when the option Indoor coverage is selected,
are the receiver losses,
is the receiver antenna gain,
is the transmitter antenna gain,
is the transmitter loss ( ). For information on calculating transmitter loss, "UMTS, CDMA2000, TD-
SCDMA, WiMAX, and LTE Documents" on page 128.
7.1.2 Point Analysis
7.1.2.1 Profile Tab
Atoll displays either the signal level received from the selected transmitter on a carrier ( ), or the highest signal
level received from the selected transmitter on all the carriers.
Study criteria Formulas
Signal level ( ) in dBm
Signal level received from a transmitter on a carrier (cell)
Path loss ( ) in dBm
Total losses ( ) in dBm
Notes:
For CDMA2000 1xRTT systems, (where, is
the cell pilot power).
For CDMA2000 1xEV-DO systems, (where
is the maximum cell power).
It is also possible to analyse all the carriers at once. In this case, Atoll displays the best
signal level received from a transmitter. Therefore, if the network consists of 1xRTT and
1xEV-DO carriers, Atoll takes the highest power of both cells for each transmitter (i.e. the
highest value between the pilot power of the 1xRTT cell and the maximum power of the
1xEV-DO cell) to calculate the received signal level.
Atoll considers that and equal zero.
P
rec
P
rec
i c ( ) EIRP i c ( ) L
path
M
Shadowi ng model
L
Indoor
G
term
L
term
+ =
L
path
L
path
L
model
L
ant
Tx
+ =
L
total
L
total
L
path
L
Tx
L
term
L
i ndoor
M
Shadowi ng model
+ + + + ( ) G
Tx
G
term
+ ( ) =
L
model
L
ant
Tx
M
Shadowi ng model
L
Indoor
L
term
G
term
G
Tx
L
Tx
L
Tx
L
total DL
=
EIRP i c ( ) P
pi l ot
i c ( ) G
Tx
L
Tx
+ = P
pi l ot
i c ( )
EIRP i c ( ) P
max
i c ( ) G
Tx
L
Tx
+ = P
max
i c ( )
G
term
L
term
Note:
For a selected transmitter, it is also possible to study the path loss, , or the total
losses, . Path loss and total losses are the same on any carrier.
P
rec
i c ( )
L
path
L
total
308 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.1.2.2 Reception Tab
Analysis provided in the Reception tab is based on path loss matrices. So, you can study reception from TBC transmitters
for which path loss matrices have been computed on their calculation areas.
For each transmitter, Atoll displays either the signal level received on a carrier, ( ), or the highest signal level
received on all the carriers.
Reception bars are displayed in a decreasing signal level order. The maximum number of reception bars depends on the
signal level received from the best server. Only reception bars of transmitters whose signal level is within a 30 dB margin
from the best server can be displayed.
7.1.3 Coverage Studies
For each TBC transmitter, Txi, Atoll determines the selected criterion on each bin inside the Txi calculation area. In fact,
each bin within the Txi calculation area is considered as a potential (fixed or mobile) receiver.
Coverage study parameters to be set are:
The study conditions in order to determine the service area of each TBC transmitter,
The display settings to select how to colour service areas.
7.1.3.1 Service Area Determination
Atoll uses parameters entered in the Condition tab of the coverage study property dialogue to predetermine areas where
it will display coverage.
We can distinguish three cases:
7.1.3.1.1 All Servers
The service area of Txi corresponds to the bins where:
7.1.3.1.2 Best Signal Level and a Margin
The service area of Txi corresponds to the bins where:
And
M is the specified margin (dB).
Best function: considers the highest value.
7.1.3.1.3 Second Best Signal Level and a Margin
The service area of Txi corresponds to the bins where:
And
Note:
For a selected transmitter, it is also possible to study the path loss, , or the total
losses, . Path loss and total losses are the same on any carrier.
You can use a value other than 30 dB for the margin from the best server signal level, for
example a smaller value for improving the calculation speed. For more information on
defining a different value for this margin, see the Administrator Manual.
P
rec
i c ( )
L
path
L
total
Minimum threshold P
rec
Txi
i c ( ) or L
total
Txi
or L
path
Txi
( ) Maximum threshold < s
Notes:
If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi
is the highest.
If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi
is either the highest or 2dB lower than the highest.
If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi
is 2dB higher than the signal levels from transmitters, which are 2
nd
best servers.
Minimum threshold P
rec
Txi
i c ( ) or L
total
Txi
or L
path
Txi
( ) Maximum threshold < s
P
rec
Txi
i c ( ) Best
j i =
P
rec
Txj
i c ( ) ( ) M >
Minimum threshold P
rec
Txi
i c ( ) or L
total
Txi
or L
path
Txi
( ) Maximum threshold < s
P
rec
Txi
i c ( ) 2
nd
Best
j i =
P
rec
Txj
i c ( ) ( ) M >
Forsk 2010 AT283_TRG_E2 309
Chapter 7: CDMA2000 Networks
M is the specified margin (dB).
2
nd
Best function: considers the second highest value.
7.1.3.2 Coverage Display
7.1.3.2.1 Plot Resolution
Prediction plot resolution is independent of the matrix resolutions and can be defined on a per study basis. Prediction plots
are generated from multi-resolution path loss matrices using bilinear interpolation method (similar to the one used to
evaluate site altitude).
7.1.3.2.2 Display Types
It is possible to display the transmitter service area with colours depending on any transmitter attribute or other criteria
such as:
Signal Level (in dBm, dBV, dBV/m)
Atoll calculates signal level received from the transmitter on each bin of each transmitter service area. A bin of a service
area is coloured if the signal level exceeds ( ) the defined minimum thresholds (bin colour depends on signal level).
Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as transmitter service areas. Each layer shows the different signal levels available in the transmitter service area.
Best Signal Level (in dBm, dBV, dBV/m)
Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. Where other service
areas overlap the studied one, Atoll chooses the highest value. A bin of a service area is coloured if the signal level
exceeds ( ) the defined thresholds (the bin colour depends on the signal level). Coverage consists of several independent
layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the signal level from the best server exceeds a defined minimum threshold.
Path Loss (dB)
Atoll calculates path loss from the transmitter on each bin of each transmitter service area. A bin of a service area is
coloured if path loss exceeds ( ) the defined minimum thresholds (bin colour depends on path loss). Coverage consists
of several independent layers whose visibility in the workspace can be managed. There are as many layers as service
areas. Each layer shows the different path loss levels in the transmitter service area.
Total Losses (dB)
Atoll calculates total losses from the transmitter on each bin of each transmitter service area. A bin of a service area is
coloured if total losses exceed ( ) the defined minimum thresholds (bin colour depends on total losses). Coverage
consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as
service areas. Each layer shows the different total losses levels in the transmitter service area.
Best Server Path Loss (dB)
Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. Where other service
areas overlap the studied one, Atoll determines the best transmitter and evaluates path loss from the best transmitter. A
bin of a service area is coloured if the path loss exceeds ( ) the defined thresholds (bin colour depends on path loss).
Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as defined thresholds. Each layer corresponds to an area where the path loss from the best server exceeds a
defined minimum threshold.
Best Server Total Losses (dB)
Atoll calculates signal levels received from transmitters on each bin of each transmitter service area. Where service areas
overlap the studied one, Atoll determines the best transmitter and evaluates total losses from the best transmitter. A bin
of a service area is coloured if the total losses exceed ( ) the defined thresholds (bin colour depends on total losses).
Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as defined thresholds. Each layer corresponds to an area where the total losses from the best server exceed a
defined minimum threshold.
Notes:
If the margin equals 0 dB, Atoll will consider bins where the signal level received from Txi
is the second highest.
If the margin is set to 2 dB, Atoll will consider bins where the signal level received from Txi
is either the second highest or 2dB lower than the second highest.
If the margin is set to -2 dB, Atoll will consider bins where the signal level received from Txi
is 2dB higher than the signal levels from transmitters, which are 3
rd
best servers.
>
>
>
>
>
>
310 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Number of Servers
Atoll evaluates how many service areas cover a bin in order to determine the number of servers. The bin colour depends
on the number of servers. Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the number of
servers exceeds ( ) a defined minimum threshold.
Cell Edge Coverage Probability (%)
On each bin of each transmitter service area, the coverage corresponds to the pixels where the signal level from this
transmitter fulfils signal conditions defined in Conditions tab with different Cell edge coverage probabilities. There is one
coverage area per transmitter in the explorer.
Best Cell Edge Coverage Probability (%)
On each bin of each transmitter service area, the coverage corresponds to the pixels where the best signal level received
fulfils signal conditions defined in Conditions tab. There is one coverage area per cell edge coverage probability in the
explorer.
7.2 Definitions and Formulas
7.2.1 Parameters Used for CDMA2000 1xRTT Modelling
7.2.1.1 Inputs
This table lists simulation and prediction inputs (calculation options, quality targets, active set management conditions,
etc.)
>
Name Value Unit Description
Clutter parameter None Orthogonality factor
Site equipment parameter None MUD factor
Frequency band parameter None Carrier number
None
Active set upper threshold
(used to determine the best server in
the active set)
None
Active set lower threshold
(used to determine other members of
the active set)
Min. Ec/I0 - Cell parameter None
Minimum Ec/I0 required from the cell
to be the best server in the active set
T_Drop - Cell parameter None
Minimum Ec/I0 required from the cell
not to be rejected from the active set
Delta Min. Ec/I0 - Mobility parameter None
Variation of the minimum Ec/I0
required from the cell to be the best
server in the active set
Delta T_Drop - Mobility parameter None
Variation of the minimum Ec/I0
required from the cell not to be
rejected from the active set
(Service, Terminal, Mobility) parameter None
Eb/Nt target for FCH channel on
downlink
(Service, Terminal, Mobility, SCH rate multiple) parameter
None
Eb/Nt target for SCH channel on
downlink
(Service, Terminal, Mobility) parameter None
Eb/Nt target for FCH channel on
uplink
(Service, Terminal, Mobility, SCH rate multiple) parameter
None
Eb/Nt target for SCH channel on
uplink
Site parameter None
Number of channel elements available
for a site on uplink
F
ortho
F
MUD
Tx
i c
Q
pi l ot
req
Q
pi l ot
req
txi i c , ( ) AQ
pi l ot
req
+
Q
pi l ot
mi n
Q
pi l ot
mi n
txi i c , ( ) AQ
pi l ot
mi n
+
Q
pi l ot
req
txi i c , ( )
Q
pi l ot
mi n
txi i c , ( )
AQ
pi l ot
req
AQ
pi l ot
mi n
Q
req
DL
( )
FCH
E
b
N
t
------
\ .
| |
req
FCH DL
Q
req
DL
( )
SCH
E
b
N
t
------
\ .
| |
req
SCH DL
Q
req
UL
( )
FCH
E
b
N
t
------
\ .
| |
req
FCH UL
Q
req
UL
( )
SCH
E
b
N
t
------
\ .
| |
req
SCH UL
N
max
CE U L
N
I
( )
Forsk 2010 AT283_TRG_E2 311
Chapter 7: CDMA2000 Networks
Site parameter None
Number of channel elements available
for a site on downlink
Simulation result None
Number of channel elements of a site
consumed by users on uplink
Simulation result None
Number of channel elements of a site
consumed by users on downlink
Site equipment parameter None
Number of channel elements used by
the cell for common channels on
uplink
Site equipment parameter None
Number of channel elements used by
the cell for common channels on
downlink
(Terminal, site equipment) parameter None
Number of channel elements used for
FCH on uplink
(Terminal, site equipment) parameter None
Number of channel elements used for
FCH on downlink
Simulation constraint None
Maximum number of Walsh codes
available per cell (128)
Simulation result None
Number of Walsh codes used by the
cell
Terminal parameter None Terminal Noise Figure
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
None Transmitter Noise Figure
1.38 10
-23
J/K Boltzman constant
293 K Ambient temperature
1.23 MHz Hz Spreading Bandwidth
Cell parameter None Inter-technology downlink noise rise
Cell parameter None Inter-technology uplink noise rise
Network parameter
If not defined, it is assumed that there is no inter-carrier interference
None
Interference reduction factor between
two adjacent carriers and
Network parameter
If not defined, it is assumed that there is no inter-technology downlink
interferences due to external transmitters
None
Inter-technology Channel Protection
between the signal transmitted by Tx
and received by m assuming the
frequency gap between (external
network) and
Simulation constraint (global parameter or cell parameter) % Maximum uplink load factor
Simulation constraint (global parameter or cell parameter) % Maximum percentage of used power
W Thermal noise at transmitter
W Thermal noise at terminal
W bps Chip rate
Equipment parameter None Uplink rake receiver efficiency factor
Terminal parameter None
Downlink rake receiver efficiency
factor
Simulation result None
SCH rate factor (drawn following the
SCH probabilities of the service)
Terminal parameter bps Downlink FCH nominal rate
bps Downlink SCH bit rate
Simulation result None
SCH rate factor (drawn following the
SCH probabilities of the service)
Terminal parameter bps Uplink FCH nominal rate
N
max
CE D L
N
I
( )
N
CE U L
N
I
( )
N
CE D L
N
I
( )
N
Overhead C E UL
N
Overhead C E DL
N
FCH C E UL
N
FCH C E DL
N
max
Codes
txi i c , ( )
N
Codes
txi i c , ( )
NF
term
NF
Tx
K
T
W
NR
i nter techno y log
Tx DL ,
NR
i nter techno y log
Tx UL ,
RF i c i c
adj
, ( )
i c i c
adj
ICP
i c
i
i c ,
Tx m ,
i c
i
i c
X
max
UL
%Power
max
DL
N
0
Tx
NF
Tx
K T W NR
i nter techno y log
Tx UL ,

N
0
Term
NF
Term
K T W NR
i nter techno y log
Tx DL ,

R
c
f
rake efficiency
UL
f
rake efficiency
DL
Frate
SCH
DL
R
FCH
DL
R
SCH
DL
R
FCH
DL
Frate
SCH
DL

Frate
SCH
UL
R
FCH
UL
312 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
bps Uplink SCH bit rate
None
Downlink service processing gain on
FCH
None
Downlink service processing gain on
SCH
None
Uplink service processing gain on
FCH
None
Uplink service processing gain on
SCH
Service parameter None Downlink activity factor on FCH
Service parameter None Uplink activity factor on FCH
Cell parameter W Cell synchronisation channel power
Cell parameter W
Cell other common channels (except
CPICH and SCH) power
Cell parameter W Cell pilot power
Cell parameter W Maximum cell power
Cell parameter dB
Maximum amount of power reserved
for pooling
Service parameter W Minimum power allowed for FCH
Service parameter W Maximum power allowed for FCH
Service parameter W Minimum power allowed for SCH
Service parameter W Maximum power allowed for SCH
Simulation result including the term W
Cell FCH power for a traffic channel
on carrier ic
W Total FCH power on carrier ic
Simulation result W
Transmitter SCH power for a traffic
channel on carrier ic
W Total SCH power on carrier ic
W
Transmitter total transmitted power on
carrier ic
Terminal parameter W Minimum terminal power allowed
Terminal parameter W Maximum terminal power allowed
Simulation result including the term W
Terminal FCH power transmitted in
carrier ic
Simulation result W
Terminal SCH power transmitted on
carrier ic
BTS parameter %
Percentage of BTS signal correctly
transmitted
Terminal parameter %
Percentage of terminal signal correctly
transmitted
Clutter parameter %
Percentage of pilot finger - percentage
of signal received by the terminal pilot
finger
Antenna parameter None Transmitter antenna gain
Terminal parameter None Terminal gain
R
SCH
UL
R
FCH
UL
Frate
SCH
UL

G
p
FCH DL
W
R
FCH
DL
--------------
G
p
SCH DL
W
R
SCH
DL
--------------
G
p
FCH UL
W
R
FCH
UL
--------------
G
p
SCH UL
W
R
SCH
UL
--------------
AF
FCH
DL
AF
FCH
UL
P
Sync
txi i c , ( )
P
pagi ng
txi i c , ( )
P
pi l ot
txi i c , ( )
P
max
txi i c , ( )
M
pool i ng
txi i c , ( )
P
FCH
mi n
P
FCH
max
P
SCH
mi n
P
SCH
max
P
FCH
txi i c tch , , ( )
AF
FCH
DL
Serv ( )
P
FCH
txi i c , ( )
P
FCH
txi i c tch , , ( )
tch FCH i c ( ) ( )

P
SCH
txi i c tch , , ( )
P
SCH
txi i c , ( )
P
SCH
i c tch , ( )
tch SCH i c ( ) ( )

P
tx
txi i c , ( )
P
pi l ot
txi i c , ( ) P
Sync
txi i c , ( ) P
pagi ng
txi i c , ( ) P
SCH
txi i c , ( ) + + +
P
FCH
txi i c , ( ) +
P
term
mi n
P
term
max
P
term
FCH
i c ( ) AF
FCH
UL
Serv ( )
P
term
SCH
i c ( )

BTS

term
o
G
Tx
G
Term
Forsk 2010 AT283_TRG_E2 313
Chapter 7: CDMA2000 Networks
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
None
Transmitter loss
a
Service parameter None Body loss
Terminal parameter None Terminal loss
Clutter (and, optionally, frequency band) parameter Indoor loss
Propagation model result None Path loss
Terminal parameter None Number of fingers
Terminal parameter % Pilot power percentage
Result calculated from cell edge coverage probability and model
standard deviation
None
Model Shadowing margin
Only used in prediction studies
Result calculated from cell edge coverage probability and Ec/I0
standard deviation
None
Ec/I0 Shadowing margin
Only used in prediction studies
n=2 or 3
None
DL gain due to availability of several
pilot signals at the mobile
b
.
Result calculated from cell edge coverage probability and DL Eb/Nt
standard deviation
None
DL Eb/Nt Shadowing margin
Only used in prediction studies
Result calculated from cell edge coverage probability and UL Eb/Nt
standard deviation
None
UL Eb/Nt Shadowing margin
Only used in prediction studies
n=2 or 3
Global parameter (default value)
None
UL quality gain due to signal diversity
in soft handoff
c
.
Simulation result None
Random shadowing error drawn
during Monte-Carlo simulation
Only used in simulations
In prediction studies
d
For Ec/I0 calculation

For DL Eb/Nt calculation
For UL Eb/Nt calculation
In simulations
None Transmitter-terminal total loss
W Chip power received at terminal
W
Bit received power at terminal for FCH
on carrier ic
W
Bit received power at terminal for SCH
on carrier ic
W
Bit received power at terminal for
FCH+SCH on carrier ic
W
Total received power at terminal from
a transmitter on carrier ic
W
Total power received at terminal from
traffic channels of a transmitter on
carrier ic
W
Bit received power at transmitter for
FCH on carrier ic
L
Tx
L
body
L
Term
L
i ndoor
L
path
f
p
M
Shadowi ng model
M
Shadowi ng Ec Io
G
macro di versi ty
DL G
macro di versi ty
DL
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Ec Io
=
M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Eb Nt ( )
UL

G
macro di versi ty
UL
G
macro di versi ty
UL
M
Shadowi ng Eb Nt ( )
UL

npaths
M
Shadowi ng Eb Nt ( )
UL

=
E
Shadowi ng
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

---------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
DL


G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------
P
c
txi i c , ( )
P
pi l ot
txi i c , ( )
L
T
---------------------------------
P
b
FCH DL
txi i c tch , , ( )
P
FCH
txi i c tch , , ( )
L
T
----------------------------------------------
P
b
SCH DL
txi i c tch , , ( )
P
SCH
txi i c tch , , ( )
L
T
----------------------------------------------
P
b
DL
txi i c tch , , ( ) P
b
FCH DL
txi i c tch , , ( ) P
b
SCH DL
txi i c tch , , ( ) +
P
tot
DL
txi i c , ( )
P
tx
txi i c , ( )
L
T
----------------------------
P
traf
DL
txi i c , ( )
P
FCH
txi i c , ( ) P
SCH
txi i c , ( ) +
L
T
---------------------------------------------------------------------------
tch i c ( )

P
b
FCH UL
i c ( )
P
term
FCH
L
T
--------------
314 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.2.1.2 Ec/I0 Calculation
This table details the pilot quality ( or ) calculations.
7.2.1.3 DL Eb/Nt Calculation
This table details calculations of downlink traffic channel quality ( (tch could be FCH or SCH) or ).
W
Bit received power at transmitter for
SCH on carrier ic
W
Bit received power at transmitter for
SCH+FCH on carrier ic
W
Total power transmitted by the
terminal on carrier ic
W Chip received power at transmitter
a. on uplink and on downlink. For information on calculating transmitter
losses on uplink and downlink, see "UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE Documents" on page 128.
b. corresponds to the shadowing margin evaluated from the shadowing error probability
density function (n paths) in case of downlink Ec/I0 modelling.
c. corresponds to the shadowing margin evaluated from the shadowing error probability
density function (n paths) in case of uplink soft handoff modelling.
d. In uplink prediction studies, only carrier power level is downgraded by the shadowing margin
( ). In downlink prediction studies, carrier power level and intra-cell interference are downgraded by
the shadowing model ( or ) while extra-cell interference level is not. Therefore,
or is set to 1 in downlink extra-cell interference calculation.
P
b
SCH UL
i c ( )
P
term
SCH
L
T
--------------
P
b
UL
i c ( ) P
b
FCH UL
i c ( ) P
b
SCH UL
i c ( ) +
P
tot
UL
i c ( ) P
b
UL
i c ( ) P
c
UL
i c ( ) +
P
b
UL
i c ( )
1 p ( )
-------------------- =
P
c
UL
i c ( ) p P
tot
UL
i c ( )
L
Tx
L
total UL
= L
Tx
L
total DL
=
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Eb Nt ( )
UL

npaths
M
Shadowi ng Eb Nt ( )
UL

M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Ec Io
M
Shadowi ng Eb Nt ( )
DL

M
Shadowi ng Ec Io
Q
pi l ot
Ec Io
Name Value Unit Description
W
Downlink intra-cell interference at
terminal on carrier ic
W
Downlink extra-cell interference at
terminal on carrier ic
W
Downlink inter-carrier interference at
terminal on carrier
W
Downlink inter-technology interference
at terminal on carrier ic
a
W
Total received noise at terminal on
carrier ic
b
None
Quality level at terminal on pilot for
carrier ic
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
b. In an active set, is calculated for all its members with Inter-technology downlink noise rise of the best server.
I
i ntra
DL
txi i c , ( )
P
tot
DL
txi i c , ( )
I
extra
DL
i c ( )
P
tot
DL
txj i c , ( )
txj j i = ,

I
i nter carri er
DL
i c ( )
P
tot
DL
txj i c
adj
, ( )
txj j ,

RF i c i c
adj
, ( )
-------------------------------------------------
i c
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

I
0
DL
i c ( ) I
i ntra
DL
txi i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
Term
+ +
Q
pi l ot
txi i c , ( )
E
c
I
0
------
\ .
| |


BTS
o P
c
txi i c , ( )
I
0
DL
i c ( )
-------------------------------------------------------
N
0
Term
Q
tch
DL Eb
Nt
-------
\ .
| |
DL
Name Value Unit Description
W
Downlink intra-cell interference at
terminal on carrier ic
W
Downlink extra-cell interference at
terminal on carrier ic
I
i ntra
DL
txi i c , ( ) 1
BTS
F
ortho
( )
P
tot
DL
txi i c , ( )

I
extra
DL
i c ( )
P
tot
DL
txj i c , ( )
txj j i = ,

Forsk 2010 AT283_TRG_E2 315


Chapter 7: CDMA2000 Networks
7.2.1.4 UL Eb/Nt Calculation
This table details calculations of uplink traffic channel quality ( (tch could be FCH or SCH) or ).
W
Downlink inter-carrier interference at
terminal on carrier
W
Downlink inter-technology interference
at terminal on carrier ic
a
W
Total received noise at terminal on
carrier ic
Without useful signal:
Total noise:
None
Quality level at terminal on a traffic
channel from one transmitter for a
FCH channel on carrier ic
b
None
Quality level at terminal for FCH using
carrier ic due to combination of all
transmitters of the active set (Macro-
diversity conditions).
Without useful signal:
Total noise:
None
Quality level at terminal on a traffic
channel from one transmitter for a
SCH channel on carrier ic
c
None
Quality level at terminal for SCH using
carrier ic due to combination of all
transmitters of the active set (Macro-
diversity conditions).
None
Downlink soft handover gain for FCH
channel on carrier ic
None
Downlink soft handover gain for SCH
channel on carrier ic
W
Required transmitter FCH traffic
channel power to achieve Eb/Nt target
at terminal on carrier ic
W
Required transmitter SCH traffic
channel power to achieve Eb/Nt target
at terminal on carrier ic
W
Required transmitter traffic channel
power on carrier ic
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
b. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in
simulations. In point analysis and coverage studies, Atoll uses the option Total noise to evaluate DL and UL Eb/Nt.
c. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in
simulations. In point analysis and coverage studies, Atoll uses the option Total noise to evaluate DL and UL Eb/Nt.
I
i nter carri er
DL
i c ( )
P
tot
DL
txj i c
adj
, ( )
txj j ,

RF i c i c
adj
, ( )
-------------------------------------------------
i c
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

N
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
Term
+ +
Q
FCH
DL
txi i c , ( )
E
b
N
t
------
\ .
| |
FCH
DL

BTS
P
b
FCH DL
txi i c tch , , ( )
N
tot
DL
i c ( ) 1 F
ortho
( )
BTS
P
b
DL
txi i c , ( )
---------------------------------------------------------------------------------------------------------------- G
p
FCH DL

BTS
P
b
FCH DL
txi i c tch , , ( )
N
tot
DL
i c ( )
---------------------------------------------------------------------------- G
p
FCH DL

Q
FCH
DL
i c ( )
f
rake efficiency
DL
Q
FCH
DL
tx
k
i c , ( )
tx
k
Acti veSet FCH ( ) e

Q
SCH
DL
txi i c , ( )
E
b
N
t
------
\ .
| |
SCH
DL

BTS
P
b
SCH DL
txi i c tch , , ( )
N
tot
DL
i c ( ) 1 F
ortho
( )
BTS
P
b
DL
txi i c , ( )
---------------------------------------------------------------------------------------------------------------- G
p
SCH DL

BTS
P
b
SCH DL
txi i c tch , , ( )
N
tot
DL
i c ( )
---------------------------------------------------------------------------- G
p
SCH DL

Q
SCH
DL
i c ( )
f
rake efficiency
DL
Q
SCH
DL
tx
k
i c , ( )
tx
k
Acti veSet SCH ( ) e

G
SHO
DL
( )
FCH
Q
FCH
DL
i c ( )
Q
FCH
DL
BestServer i c , ( )
-------------------------------------------------------------
G
SHO
DL
( )
SCH
Q
SCH
DL
i c ( )
Q
SCH
DL
BestServer i c , ( )
--------------------------------------------------------------
P
FCH
req
txi i c , ( )
Q
req
DL
( )
FCH
Q
FCH
DL
i c ( )
--------------------------- P
FCH
txi i c , ( )
P
SCH
req
txi i c , ( )
Q
req
DL
( )
SCH
Q
SCH
DL
i c ( )
--------------------------- P
SCH
txi i c , ( )
P
tch
req
txi i c , ( ) P
FCH
req
txi i c , ( ) P
SCH
req
txi i c , ( ) +
Q
tch
UL Eb
Nt
-------
\ .
| |
UL
Name Value Unit Description
W
Total power received at transmitter
from intra-cell terminals using carrier
ic
I
tot
UL
i ntra
txi i c , ( )
P
b
UL
i c ( ) P
c
UL
i c ( ) + ( )
term
txi

316 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
W
Total power received at transmitter
from extra-cell terminals using carrier
ic
W
Uplink inter-carrier interference at
terminal on carrier
W
Total received interference at
transmitter on carrier ic
W
Total noise at transmitter on carrier ic

(Uplink interference)
a
Without useful signal:
Total noise:
None
Quality level at transmitter on a traffic
channel for the FCH channel on
carrier ic
b
Without useful signal:
Total noise:
None
Quality level at transmitter on a traffic
channel for the SCH channel on
carrier ic
c
No HO:
Softer HO:
Soft, Softer/Soft HO (No MRC):
Softer/Soft HO (MRC):
None
Quality level at site using carrier ic due
to combination of all transmitters of
the active set located at the same site
and taking into account increase of the
quality due to macro-diversity (macro-
diversity gain).
tch could be FCH or SCH
In simulations, .
None
Uplink soft handover gain for FCH
channel on carrier ic
None
Uplink soft handover gain for SCH
channel on carrier ic
W
Required terminal power to achieve
Eb/Nt target at transmitter for FCH on
carrier ic
W
Required terminal power to achieve
Eb/Nt target at transmitter for SCH on
carrier ic
W Required terminal power on carrier ic
a. In an active set, is calculated for all its members with Inter-technology uplink noise rise of the best server.
b. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in
simulations. In point analysis and coverage studies, Atoll uses the option Total noise to evaluate DL and UL Eb/Nt.
I
tot
UL
ext ra
txi i c , ( )
P
b
UL
i c ( ) P
c
UL
i c ( ) + ( )
term
txj j i = ,

I
i nter carri er
UL
txi i c , ( )
P
b
UL
i c
adj
( ) P
c
UL
i c
adj
( ) + ( )
term
txj j ,

RF i c i c
adj
, ( )
------------------------------------------------------------------------------
i c
I
tot
UL
txi i c , ( )
I
tot
UL
extra
txi i c , ( ) 1 F
MUD
Tx

term
( ) + I
tot
UL
i ntra
txi i c , ( ) I
i nter carri er
UL
txi i c , ( ) +
N
tot
UL
txi i c , ( ) I
tot
UL
txi i c , ( ) N
0
tx
+
Q
FCH
UL
txi i c , ( )
E
b
N
t
------
\ .
| |
UL

term
P
b
FCH UL
i c ( )
N
tot
UL
txi i c , ( ) 1 F
MUD
Tx
( )
term
P
b
UL
i c ( )
---------------------------------------------------------------------------------------------------------------- G
p
FCH UL

term
P
b
FCH UL
i c ( )
N
tot
UL
txi i c , ( )
------------------------------------------------------ G
p
FCH UL

Q
SCH
UL
txi i c , ( )
E
b
N
t
------
\ .
| |
UL

term
P
b
SCH UL
i c ( )
N
tot
UL
txi i c , ( ) 1 F
MUD
Tx
( )
term
P
b
UL
i c ( )
---------------------------------------------------------------------------------------------------------------- G
p
SCH UL

term
P
b
SCH UL
i c ( )
N
tot
UL
txi i c , ( )
------------------------------------------------------- G
p
SCH UL

Q
tch
UL
i c ( )
Q
tch
UL
txi i c , ( )
f
rake efficiency
UL
Q
tch
UL
tx
k
i c , ( )
tx
k
Acti veSet e
samesi te ( )

Max
tx
k
Act i veSet e
Q
tch
UL
tx
k
i c , ( ) ( ) G
macro di versi ty
UL

Max
tx
k
tx
l
, Act i veSet e
t x
k
samesi te e
tx
l
othersi te e
f
rake efficiency
UL
Q
tch
UL
tx
k
i c , ( )
tx
k

Q
tch
UL
tx
l
i c , ( ) ,
\ .
|
|
|
| |
G
macro di versi ty
UL

G
macro di versi ty
UL
1 =
G
SHO
UL
( )
FCH
Q
FCH
UL
i c ( )
Q
FCH
UL
BestServer i c , ( )
-------------------------------------------------------------
G
SHO
UL
( )
SCH
Q
SCH
UL
i c ( )
Q
SCH
UL
BestServer i c , ( )
--------------------------------------------------------------
P
term
FCH req
i c ( )
Q
req
UL
( )
FCH
Q
FCH
UL
i c ( )
--------------------------- P
term
FCH
i c ( )
P
term
SCH req
i c ( )
Q
req
UL
( )
SCH
Q
SCH
UL
i c ( )
--------------------------- P
term
SCH
i c ( )
P
term
req
i c ( ) P
term
FCH req
i c ( ) P
term
SCH req
i c ( ) +
N
0
tx
Forsk 2010 AT283_TRG_E2 317
Chapter 7: CDMA2000 Networks
7.2.1.5 Simulation Results
This table contains some simulation results provided in the Cells and Mobiles tabs of the simulation property dialogue.
c. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account only in
simulations. In point analysis and coverage studies, Atoll uses the option Total noise to evaluate DL and UL Eb/Nt.
Name Value Unit Description
None
Downlink intra-cell interference at
terminal on carrier ic
W
Downlink extra-cell interference at
terminal on carrier ic
W
Downlink inter-carrier interference at
terminal on carrier
W
Downlink inter-technology interference
at terminal on carrier ic
a
W
Total effective interference at terminal
on carrier ic (after unscrambling)
W
Total received noise at terminal on
carrier ic
W
Total power received at transmitter
from intra-cell terminals using carrier
ic
W
Total power received at transmitter
from extra-cell terminals using carrier
ic
W
Uplink inter-carrier interference at
terminal on carrier
W
Total received interference at
transmitter on carrier ic
W
Total noise at transmitter on carrier ic
(Uplink interference)
None Cell uplink load factor on carrier ic
None Cell uplink reuse factor on carrier ic
None
Cell uplink reuse efficiency factor on
carrier ic
None
Percentage of max transmitter power
used.
I
i ntra
DL
txi i c , ( )
P
tot
DL
txi i c , ( )
F
ortho

BTS

P
tot
DL
txi i c , ( )

1 F
ortho

BTS
( ) P
b
DL
txi i c , ( )
I
extra
DL
i c ( )
P
tot
DL
txj i c , ( )
txj j i = ,

I
i nter carri er
DL
i c ( )
P
tot
DL
txj i c
adj
, ( )
txj j ,

RF i c i c
adj
, ( )
-------------------------------------------------
i c
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

I
tot
DL
i c ( ) I
i ntra
DL
i c ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) + + +
N
tot
DL
i c ( ) I
tot
DL
i c ( ) N
0
Term
+
I
tot
UL
i ntra
txi i c , ( )
P
b
UL
i c ( ) P
c
UL
i c ( ) + ( )
term
txi

I
tot
UL
ext ra
txi i c , ( )
P
b
UL
i c ( ) P
c
UL
i c ( ) + ( )
term
txj j i = ,

I
i nter carri er
UL
txi i c , ( )
P
b
UL
i c
adj
( ) P
c
UL
i c
adj
( ) + ( )
term
txj j ,

RF i c i c
adj
, ( )
------------------------------------------------------------------------------
i c
I
tot
UL
txi i c , ( )
I
tot
UL
extra
txi i c , ( ) 1 F
MUD
Tx

term
( ) + I
tot
UL
i ntra
txi i c , ( ) I
i nter carri er
UL
txi i c , ( ) +
N
tot
UL
txi i c , ( ) I
tot
UL
txi i c , ( ) N
0
tx
+
X
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
N
tot
UL
txi i c , ( )
------------------------------
F
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
I
tot
UL
i ntra
txi i c , ( ) 1 F
MUD
Tx

term
( )
-------------------------------------------------------------------------------------------
E
UL
txi i c , ( )
1
F
UL
txi i c , ( )
------------------------------
%Power
DL
txi i c , ( )
P
tx
txi i c , ( )
P
max
txi i c , ( )
---------------------------------
\ .
| |
100
318 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.2.2 Parameters Used for CDMA2000 1xEV-DO Modelling
7.2.2.1 Inputs
This table lists simulation and prediction inputs (calculation options, quality targets, active set management conditions,
etc.)
Simulation result available per cell
with
Simulation result available per mobile:
None Downlink load factor on carrier ic
None Downlink reuse factor on a carrier ic
dB Noise rise on downlink
dB Noise rise on uplink
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
X
DL
txi i c , ( )
I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) + ( ) L
T

P
tx
txi i c , ( )
---------------------------------------------------------------------------------------- 1 F
ortho

BTS
+
1
CI
req
DL
------------- 1 F
ortho

BTS
( ) +
-------------------------------------------------------------------------------------------------------------------------------------------
tch

CI
req
DL
Q
req
SCH DL
G
p
SCH DL
-------------------------
Q
req
FCH DL
G
p
FCH DL
------------------------- + =
I
tot
DL
i c ( )
N
tot
DL
i c ( )
--------------------
F
DL
txi i c , ( )
I
tot
DL
i c ( )
I
i ntra
DL
txi i c , ( )
--------------------------------
NR
DL
txi i c , ( ) 10 1 X
DL
txi i c , ( ) ( ) log
NR
UL
txi i c , ( ) 10 1 X
UL
txi i c , ( ) ( ) log
Name Value Unit Description
Clutter parameter None Orthogonality factor
Site equipment parameter None MUD factor
Frequency band parameter None Carrier number
None
Active set upper threshold
(used to determine the best server in
the active set)
None
Active set lower threshold
(used to determine other members of
the active set)
Min. Ec/I0 - Cell parameter None
Minimum Ec/I0 required from the cell
to be the best server in the active set
T_Drop - Cell parameter None
Minimum Ec/I0 required from the cell
not to be rejected from the active set
Delta Min. Ec/I0 - Mobility parameter None
Variation of the minimum Ec/I0
required from the cell to be the best
server in the active set
Delta T_Drop - Mobility parameter None
Variation of the minimum Ec/I0
required from the cell not to be
rejected from the active set
Mobility parameter for 1xEV-DO Rev. 0 users
Parameter read in the 1xEV-DO Rev. A Radio Bearer Selection
(Uplink) table for 1xEV-DO Rev. A users
None Minimum pilot quality level on uplink
1xEV-DO Rev. A Radio Bearer Selection (Uplink) table None
Number of subframes associated to
uplink 1xEV-DO Rev. A bearer
Uplink 1xEV-DO Rev. A Radio Bearer table None
Uplink RLC peak rate provided by the
1xEV-DO Rev. A bearer
Mobility parameter for 1xEV-DO Rev. 0 users
Parameter read in the 1xEV-DO Rev. A Radio Bearer Selection
(Downlink) table for 1xEV-DO Rev. A users
None
Minimum pilot quality level required to
obtain a data rate on downlink
1xEV-DO Rev. A Radio Bearer Selection (Downlink) table None
Number of timeslots associated to
downlink 1xEV-DO Rev. A bearer
F
ortho
F
MUD
Tx
i c
Q
pi l ot
req
Q
pi l ot
req
txi i c , ( ) AQ
pi l ot
req
+
Q
pi l ot
mi n
Q
pi l ot
mi n
txi i c , ( ) AQ
pi l ot
mi n
+
Q
pi l ot
req
txi i c , ( )
Q
pi l ot
mi n
txi i c , ( )
AQ
pi l ot
req
AQ
pi l ot
mi n
E
c
N
t
------
\ .
| |
mi n
UL
n
SF
R
RLC peak
UL
E
c
N
t
------
\ .
| |
mi n
DL
n
TS
Forsk 2010 AT283_TRG_E2 319
Chapter 7: CDMA2000 Networks
Downlink 1xEV-DO Rev. A Radio Bearer Table None
Downlink RLC peak rate provided by
the 1xEV-DO Rev. A bearer
Site parameter None
Number of EVDO channel elements
available for a site on uplink and
downlink
Simulation result None
Total number of EVDO channel
elements of a site consumed by users
on uplink and downlink
(Terminal, site equipment) parameter None
Number of channel elements used for
TCH on uplink
Simulation constraint None
Maximum number of MAC indexes
available per cell (59)
Simulation result None
Number of MAC indexes used by the
cell
Simulation constraint (cell parameter) None
Maximum number of EVDO users that
can be connected to the cell
Simulation result None
Number of EVDO users connected to
the cell
Terminal parameter None Terminal Noise Figure
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
None Transmitter Noise Figure
1.38 10
-23
J/K Boltzman constant
293 K Ambient temperature
1.23 MHz Hz Spreading Bandwidth
Cell parameter None Inter-technology downlink noise rise
Cell parameter None Inter-technology uplink noise rise
Network parameter
If not defined, it is assumed that there is no inter-carrier interference
None
Interference reduction factor between
two adjacent carriers and
Network parameter
If not defined, it is assumed that there is no inter-technology downlink
interferences due to external transmitters
None
Inter-technology Channel Protection
between the signal transmitted by Tx
and received by m assuming the
frequency gap between (external
network) and ic
Simulation constraint (global parameter or cell parameter) % Maximum uplink load factor
W Thermal noise at transmitter
W Thermal noise at terminal
W bps Chip rate
Equipment parameter None Uplink rake receiver efficiency factor
Simulation result bps Uplink data rate
Simulation result bps
Uplink data rate due to TCP
aknowledgements
Cell parameter bps
Downlink data rate for Broadcast/
Multicast services
Simulation result bps
Downlink maximum data rate supplied
to the terminal
Simulation result bps Downlink average cell data rate
bps Downlink user application throughput
Service parameter % Scaling factor
R
RLC peak
DL
N
max
EVDO CE
N
I
( )
N
EVDO CE
N
I
( )
N
TCH C E UL
N
max
MacIndexes
txi i c , ( )
N
MacIndexes
txi i c , ( )
n
max
EVDO
txi i c , ( )
n
EVDO
txi i c , ( )
NF
term
NF
Tx
K
T
W
NR
i nter techno y log
Tx DL ,
NR
i nter techno y log
Tx UL ,
RF i c i c
adj
, ( )
i c i c
adj
ICP
i c
i
i c ,
Tx m ,
i c
i
X
max
UL
N
0
Tx
NF
Tx
K T W NR
i nter techno y log
Tx UL ,

N
0
Term
NF
Term
K T W NR
i nter techno y log
Tx DL ,

R
c
f
rake efficiency
UL
R
UL
R
TCP ACK
UL
R
BCMCS
R
max
DL
R
avg
DL
R
appl i cati on
DL
SF
rate
R
max
DL
AR
SF
Rate
320 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Service parameter kbps Offset
None
Uplink service processing gain on
FCH
Cell parameter None Idle power gain
Cell parameter None Multi user gain
Cell parameter W Max cell power
W
Pilot burst transmitted by the
transmitter on carrier ic.
if users to support
if no user to support
W
Traffic burst transmitted by the
transmitter on carrier ic.
Cell parameter % Error rate on the DRC channel
Cell parameter %
Pourcentage of EVDO timeslots
dedicated to Broadcast/Multicast
services
Cell parameter %
Pourcentage of EVDO timeslots
dedicated to control channels
Simulation result W
Terminal power transmitted on carrier
ic
Terminal parameter W Minimum terminal power allowed
Terminal parameter W Maximum terminal power allowed
BTS parameter %
Percentage of BTS signal correctly
transmitted
Terminal parameter %
Percentage of terminal signal correctly
transmitted
Clutter parameter %
Percentage of pilot finger - percentage
of signal received by the terminal pilot
finger
Antenna parameter None Transmitter antenna gain
Terminal parameter None Terminal gain
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
None
Transmitter loss
a
Service parameter None Body loss
Terminal parameter None Terminal loss
Clutter (and, optionally, frequency band) parameter Indoor loss
Propagation model result None Path loss
Terminal parameter None Acknowledgement Channel gain
Terminal parameter (for 1xEV-DO Rev A terminals only) None Reverse Rate Indicator Channel gain
Terminal parameter None Data Rate Control Channel gain
Terminal parameter (for 1xEV-DO Rev A terminals only) None Auxiliary Pilot Channel gain
Terminal parameter None Traffic data Channel gain
Result calculated from cell edge coverage probability and model
standard deviation
None
Model Shadowing margin
Only used in prediction studies
Result calculated from cell edge coverage probability and Ec/I0
standard deviation
None
Ec/I0 Shadowing margin
Only used in prediction studies
n=2 or 3
None
DL gain due to availability of several
pilot signals at the mobile
b
.
AR
G
p
UL
W
R
UL
----------
G
i dl e power
G
MU
P
max
txi i c , ( )
P
tx
txi i c b
pi l ot
, , ( ) P
max
txi i c , ( )
P
tx
txi i c b
traffi c
, , ( )
P
max
txi i c , ( )
P
max
txi i c , ( ) G
i dl e power

ER
DRC
TS
BCMCS
TS
EVDO CCH
P
term
i c ( )
P
term
mi n
P
term
max

BTS

term
o
G
Tx
G
Term
L
Tx
L
body
L
Term
L
i ndoor
L
path
G
ACK
G
RRI
G
DRC
G
Auxi l i ary pi l ot
G
TCH
M
Shadowi ng model
M
Shadowi ng Ec Io
G
macro di versi ty
DL G
macro di versi ty
DL
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Ec Io
=
Forsk 2010 AT283_TRG_E2 321
Chapter 7: CDMA2000 Networks
7.2.2.2 Ec/I0 and Ec/Nt Calculations
This table details , and calculations.
Result calculated from cell edge coverage probability and UL Eb/Nt
standard deviation
None
UL Eb/Nt Shadowing margin
Only used in prediction studies
n=2 or 3
Global parameter (default value)
None
UL quality gain due to signal diversity
in soft handoff
c
.
Simulation result None
Random shadowing error drawn
during Monte-Carlo simulation
Only used in simulations
In prediction studies
d
For Ec/I0 and Ec/Nt calculations

For UL Eb/Nt calculation
In simulations
None Transmitter-terminal total loss
W
Pilot burst received at terminal from a
transmitter on carrier ic
W
Traffic burst received at terminal from
a transmitter on carrier ic
W
Bit received power at transmitter on
carrier ic
Cell parameter dB Cell uplink noise rise threshold
Cell parameter dB
Cell uplink noise rise upgrading/
downgrading delta
a. on uplink and on downlink.
b. corresponds to the shadowing margin evaluated from the shadowing error probability
density function (n paths) in case of downlink Ec/I0 modelling.
c. corresponds to the shadowing margin evaluated from the shadowing error probability
density function (n paths) in case of uplink soft handoff modelling.
d. In uplink prediction studies, only carrier power level is downgraded by the shadowing margin
( ). In downlink prediction studies, carrier power level and intra-cell interference are downgraded by
the shadowing model ( ) while extra-cell interference level is not. Therefore, is set to
1 in downlink extra-cell interference calculation.
M
Shadowi ng Eb Nt ( )
UL

G
macro di versi ty
UL
G
macro di versi ty
UL
M
Shadowi ng Eb Nt ( )
UL

npaths
M
Shadowi ng Eb Nt ( )
UL

=
E
Shadowi ng
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

---------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

-------------------------------------------------------------------------------------------------------------------------------------------------------------
L
path
L
Tx
L
term
L
body
L
i ndoor
E
Shadowi ng

G
Tx
G
term

--------------------------------------------------------------------------------------------------------------------------------
P
tot
DL
txi i c b
pi l ot
, , ( )
P
tx
txi i c b
pi l ot
, , ( )
L
T
--------------------------------------------
P
tot
DL
txi i c b
traffi c
, , ( )
P
tx
txi i c b
traffi c
, , ( )
L
T
-----------------------------------------------
P
b
UL
i c ( )
P
term
L
T
--------------
NR
threshol d
UL
txi i c , ( )
ANR
threshol d
UL
txi i c , ( )
L
Tx
L
total UL
= L
Tx
L
total DL
=
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Eb Nt ( )
UL

npaths
M
Shadowi ng Eb Nt ( )
UL

M
Shadowi ng Ec Io
M
Shadowi ng Ec Io
E
c
I
0
------ txi i c b
pi l ot
, , ( )
E
c
N
t
------ txi i c b
pi l ot
, , ( )
E
c
N
t
------ txi i c b
traffi c
, , ( )
Name Value Unit Description
W
Downlink intra-cell interference at
terminal on carrier ic (only one mobile
is served at a time)
W
Downlink extra-cell interference based
on pilot at terminal on carrier ic
W
Downlink extra-cell interference based
on traffic at terminal on carrier ic
W
Downlink inter-carrier interference
based on pilot at terminal on carrier
I
i ntra
DL txi i c ,
b
pi l ot
or b
traffi c
\ .
|
| |
0
I
extra
DL
i c b
pi l ot
, ( )
P
tot
DL
txj i c b
pi l ot
, , ( )
txj j i = ,

I
extra
DL
i c b
traffi c
, ( )
P
tot
DL
txj i c b
traffi c
, , ( )
txj j i = ,

I
i nter carri er
DL
i c b
pi l ot
, ( )
P
tot
DL
txj i c
adj
b
pi l ot
, , ( )
txj j ,

RF i c i c
adj
, ( )
-----------------------------------------------------------------
i c
322 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.2.2.3 UL Eb/Nt Calculation
This table details calculations of uplink quality ( or ).
W
Downlink inter-carrier interference
based on traffic at terminal on carrier
W
Downlink inter-technology interference
at terminal on carrier ic
a
W
Total noise based on pilot received at
terminal on carrier ic
W
Total noise based on traffic received
at terminal on carrier ic
W
Total noise based on pilot received at
terminal on carrier ic
W
Total noise based on traffic received
at terminal on carrier ic
None
Pilot quality level at terminal on carrier
ic
None
Pilot quality level at terminal on carrier
ic
None
Traffic quality level at terminal on
carrier ic
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
I
i nter carri er
DL
i c b
traffi c
, ( )
P
tot
DL
txj i c
adj
b
traffi c
, , ( )
txj j ,

RF i c i c
adj
, ( )
---------------------------------------------------------------------
i c
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

I
0
DL
i c b
pi l ot
, ( )
P
tot
DL
txi i c b
pi l ot
, , ( ) I
extra
DL
i c b
pi l ot
, ( ) I
i nter carri er
DL
i c b
pi l ot
, ( ) + +
I
i nter techno y log
DL
i c ( ) N
0
term
+ +
I
0
DL
i c b
traffi c
, ( )
P
tot
DL
txi i c b
traffi c
, , ( ) I
extra
DL
i c b
traffi c
, ( ) I
i nter carri er
DL
i c b
traffi c
, ( ) + +
I
i nter techno y log
DL
i c ( ) N
0
term
+ +
N
tot
DL
i c b
pi l ot
, ( ) I
extra
DL
i c b
pi l ot
, ( ) N
0
term
+
N
tot
DL
i c b
traffi c
, ( ) I
extra
DL
i c b
traffi c
, ( ) N
0
term
+
Q
pi l ot
txi i c , ( )
E
c
I
0
------ txi i c b
pi l ot
, , ( )

BTS
o P
tot
DL
txi i c b
pi l ot
, , ( )
I
0
DL
i c b
pi l ot
, ( )
---------------------------------------------------------------------------
E
c
N
t
------ txi i c b
pi l ot
, , ( )

BTS
o P
tot
DL
txi i c b
pi l ot
, , ( )
N
tot
DL
i c b
pi l ot
, ( ) 1
BTS
( ) P
tot
DL
txi i c b
pi l ot
, , ( ) +
-------------------------------------------------------------------------------------------------------------------------
E
c
N
t
------ txi i c b
traffi c
, , ( )

BTS
o P
tot
DL
txi i c b
traffi c
, , ( )
N
tot
DL
i c b
traffi c
, ( ) 1
BTS
( ) P
tot
DL
txi i c b
traffi c
, , ( ) +
--------------------------------------------------------------------------------------------------------------------------------
Q
UL Eb
Nt
-------
\ .
| |
UL
Name Value Unit Description
W
Total power received at transmitter
from intra-cell terminals using carrier
ic
W
Total power received at transmitter
from extra-cell terminals using carrier
ic
W
Uplink inter-carrier interference at
terminal on carrier
W
Total received interference at
transmitter on carrier ic
W
Total noise at transmitter on carrier ic
(Uplink interference)
I
tot
UL
i ntra
txi i c , ( )
P
b
UL
i c ( )
term
txi

I
tot
UL
ext ra
txi i c , ( )
P
b
UL
i c ( )
term
txj j i = ,

I
i nter carri er
UL
txi i c , ( )
P
b
UL
i c
adj
( )
term
txj j ,

RF i c i c
adj
, ( )
---------------------------------------
i c
I
tot
UL
txi i c , ( )
I
tot
UL
extra
txi i c , ( ) 1 F
MUD
Tx

term
( ) + I
tot
UL
i ntra
txi i c , ( ) I
i nter carri er
UL
txi i c , ( ) +
N
tot
UL
txi i c , ( ) I
tot
UL
i c ( ) N
0
tx
+
Forsk 2010 AT283_TRG_E2 323
Chapter 7: CDMA2000 Networks
7.2.2.4 Simulation Results
This table contains some simulation results provided in the Cells and Mobiles tabs of the simulation property dialogue.
Without useful signal:
Total noise:
None
Quality level at transmitter on carrier
ic
a
No HO:
Softer HO:
Soft, Softer/Soft HO (No MRC):
Softer/Soft HO (MRC):
None
Quality level at site using carrier ic due
to combination of all transmitters of
the active set located at the same site
and taking into account increase of the
quality due to macro-diversity (macro-
diversity gain).
In simulations, .
None Uplink soft handover gain on carrier ic
For 1xEV-DO Rev 0 terminal
For 1xEV-DO Rev A terminal
b
When the acknoledgement signal is considered

When the acknoledgement signal is not considered
None Eb/Nt target on uplink
W
Required terminal power to achieve
Eb/Nt target at transmitter on carrier ic
a. Calculation option may be selected in the Global parameters tab. The chosen option will be taken into account
only in simulations. In point analysis and coverage studies, Atoll uses the option Total noise to evaluate DL and UL Eb/
Nt.
b. In simulations, the uplink Eb/Nt target is calculated whithout considering the aknoledgement signal.
Q
UL
txi i c , ( )
E
b
N
t
------
\ .
| |
UL

term
P
b
UL
i c ( )
N
tot
UL
txi i c , ( ) 1 F
MUD
Tx
( )
term
P
b
UL
i c ( )
---------------------------------------------------------------------------------------------------------------- G
p
UL

term
P
b
UL
i c ( )
N
tot
UL
txi i c , ( )
---------------------------------------- G
p
UL

Q
total
UL
i c ( )
Q
UL
txi i c , ( )
f
rake efficiency
UL
Q
tch
UL
tx
k
i c , ( )
tx
k
Acti veSet e
samesi te ( )

Max
tx
k
Act i veSet e
Q
tch
UL
tx
k
i c , ( ) ( ) G
macro di versi ty
UL

Max
tx
k
tx
l
, Act i veSet e
t x
k
samesi te e
tx
l
othersi te e
f
rake efficiency
UL
Q
tch
UL
tx
k
i c , ( )
tx
k

Q
tch
UL
tx
l
i c , ( ) ,
\ .
|
|
|
| |
G
macro di versi ty
UL

G
macro di versi ty
UL
1 =
G
SHO
UL
Q
total
UL
i c ( )
Q
UL
BestServer i c , ( )
---------------------------------------------------------
Q
req
UL
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
ACK
G
DRC
G
TCH
+ + + ( )
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
ACK
G
RRI
G +
DRC
G
TCH
G
Auxi l i ary Pi l ot
+ + + + ( )
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
RRI
G +
DRC
G
TCH
G
Auxi l i ary Pi l ot
+ + + ( )
P
term
req
i c ( )
Q
req
UL
Q
total
UL
i c ( )
------------------------ P
term

Name Value Unit Description


W
Downlink intra-cell interference at
terminal on carrier ic (only one mobile
is served at a time)
W
Downlink extra-cell interference based
on traffic at terminal on carrier ic
W
Downlink inter-carrier interference
based on traffic at terminal on carrier
I
i ntra
DL
txi i c b
traffi c
, , ( ) 1 F
ortho

BTS
( ) P
tot
DL
txi i c b
traffi c
, , ( ) 0 =
I
extra
DL
i c b
traffi c
, ( )
P
tot
DL
txj i c b
traffi c
, , ( )
txj j i = ,

I
i nter carri er
DL
i c b
traffi c
, ( )
P
tot
DL
txj i c
adj
b
traffi c
, , ( )
txj j ,

RF i c i c
adj
, ( )
---------------------------------------------------------------------
i c
324 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.3 Active Set Management
The mobile active set is the list of the transmitters to which the mobile is connected. The active set may consist of one or
more transmitters; depending on whether the service supports soft handoff and on the terminal active set size. The
terminal frequency bands are taken into account and transmitters in the mobile active set must use a frequency band with
which the terminal is compatible.
It is, however, the quality of the pilot (EcI0) that finally determines whether or not a transmitter can belong to the active set.
Cells entering the mobiles active set must fulfill the following conditions:
43. The best server (first cell entering active set)
In order for a given transmitter to enter the mobile active set as best server, the quality of this transmitters pilot
must be the highest one and it must exceed an upper threshold equal to the sum of the minimum Ec/I0 defined in
the properties of the best serving cell and the Delta minimum Ec/I0 defined in the properties of the mobility type.
The upper threshold is set for the carrier as defined in the cell properties and can also take into account the user
mobility type if the Delta minimum Ec/I0 defined in the mobility type is different from 0.
44. In order for a transmitter to enter the active set (other cells of active set):
- They must use the same carrier as the best server cell,
W
Downlink inter-technology interference
at terminal on carrier ic
a
W
Total effective interference based on
traffic at terminal on carrier ic (after
unscrambling)
W
Total noise based on traffic received
at terminal on carrier ic
W
Total power received at transmitter
from intra-cell terminals using carrier
ic
W
Total power received at transmitter
from extra-cell terminals using carrier
ic
W
Uplink inter-carrier interference at
terminal on carrier
W
Total received interference at
transmitter on carrier ic
W
Total noise at transmitter on carrier ic
(Uplink interference)
Simulation result None
Number of mobiles connected to
transmitter txi on carrier ic
None Cell downlink load factor on carrier ic
None Cell uplink load factor on carrier ic
None Cell uplink reuse factor on carrier ic
None
Cell uplink reuse efficiency factor on
carrier ic
dB Noise rise on downlink
dB Noise rise on uplink
a. In the case of an interfering GSM external network in frequency hopping, the ICP value is weighted according to the
fractional load.
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
n
i
i c ,
Tx m ,

------------------------------------------
n
i

I
tot
DL
i c b
traffi c
, ( )
I
i ntra
DL
i c b
traffi c
, ( ) I
extra
DL
i c b
traffi c
, ( ) I
i nter carri er
DL
i c b
traffi c
, ( ) + +
I
i nter techno y log
DL
i c ( ) +
N
tot
DL
i c b
traffi c
, ( ) I
tot
DL
i c b
traffi c
, ( ) N
0
term
+
I
tot
UL
i ntra
txi i c , ( )
P
b
UL
i c ( )
term
txi

I
tot
UL
ext ra
txi i c , ( )
P
b
UL
i c ( )
term
txj j i = ,

I
i nter carri er
UL
txi i c , ( )
P
b
UL
i c
adj
( )
term
txj j ,

RF i c i c
adj
, ( )
---------------------------------------
i c
I
tot
UL
txi i c , ( )
I
tot
UL
extra
txi i c , ( ) 1 F
MUD
Tx

term
( ) + I
tot
UL
i ntra
txi i c , ( ) I
i nter carri er
UL
txi i c , ( ) +
N
tot
UL
txi i c , ( ) I
tot
UL
txi i c , ( ) N
0
tx
+
N
mobi l es
txi i c , ( )
X
DL
txi i c , ( )
I
tot
DL
i c b
traffi c
, ( )
N
tot
DL
i c b
traffi c
, ( )
----------------------------------------
X
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
N
tot
UL
txi i c , ( )
------------------------------
F
UL
txi i c , ( )
I
tot
UL
txi i c , ( )
I
tot
UL
i ntra
txi i c , ( ) 1 F
MUD
Tx

term
( )
-------------------------------------------------------------------------------------------
E
UL
txi i c , ( )
1
F
UL
txi i c , ( )
------------------------------
NR
DL
txi i c , ( ) 10 1 X
DL
txi i c , ( ) ( ) log
NR
UL
txi i c , ( ) 10 1 X
UL
txi i c , ( ) ( ) log
Forsk 2010 AT283_TRG_E2 325
Chapter 7: CDMA2000 Networks
- The pilot quality from other candidate cells must exceed a lower threshold. The lower threshold depends both
on the type of carrier and the mobility type. It is equal to the sum of T_Drop defined in the properties of the
best server and the Delta T_Drop defined in the properties of the mobility type.
- If you have selected to restrict the active set to neighbours, the cell must be a neighbour of the best server
(the restricted to neighbours option is selected in the equipment properties).
7.4 Simulations
The simulation process is divided into two steps:
1. Obtaining a realistic user distribution
Atoll generates a user distribution using a Monte-Carlo algorithm, which requires traffic maps and data as input.
The resulting user distribution complies with the traffic database and maps provided to the algorithm.
Each user is assigned a service, a mobility type, and an activity status by random trial, according to a probability
law that uses the traffic database.
The user activity status is an important output of the random trial and has direct consequences on the next step
of the simulation and on the network interferences. A user may be either active or inactive. Both active and inactive
users consume radio resources and create interference.
Additionally, each 1xEV-DO Rev. 0 user is assigned a transition flag ("True" or "False") for each possible data rate
transition (from 9.6 to 19.2 kbps, 19.2 to 38.4 kbps, 38.4 to 76.8 kbps, and 76.8 to 153.6 kbps for data rate
upgrading and from 153.6 to 76.8 kbps, 76.8 to 38.4 kbps, 38.4 to 19.2 kbps, and 19.2 to 9.6 kbps for data rate
downgrading). These transition flags are based on the data rate downgrading and upgrading probabilities. If a
transition flag is "True," the user data rate can be downgraded or upgraded if necessary.
Then, Atoll randomly assigns a shadowing error to each user using the probability distribution that describes the
shadowing effect.
Finally, another random trial determines user positions in their respective traffic zone and whether they are indoors
or outdoors (according to the clutter weighting and the indoor ratio per clutter class defined for the traffic maps).
2. Modelling the network regulation mechanism
This algorithm depends on the network. Atoll uses a power control algorithm in case of CDMA2000 1xRTT
networks and a different algorithm, which mixes data rate control on downlink and power control on uplink, for
CDMA2000 1xEV-DO networks.
7.4.1 Generating a Realistic User Distribution
7.4.1.1 Number of Users, User Activity Status and User Data Rate
During the simulation, a first random trial is performed to determine the number of users and their activity status. The
determination of the number of users and the activity status allocation depend on the type of traffic cartography used.
7.4.1.1.1 Simulations Based on User Profile Traffic Maps
User profile environment based traffic maps: Each pixel of the map is assigned an environment class which contains a list
of user profiles with an associated mobility type and a given density (number of subscribers with the same profile per km).
User profile traffic maps: Each polygon and line of the map is assigned a density of subscribers with given user profile and
mobility type. If the map is composed of points, each point is assigned a number of subscribers with given user profile and
mobility type.
The user profile models the behaviour of the different subscriber categories. Each user profile contains a list of services
and their associated parameters describing how these services are accessed by the subscriber.
From environment (or polygon) surface (S) and user profile density (D), a number of subscribers (X) per user profile is
inferred.
Note:
Atoll follows a Poisson distribution to determine the number of total connected users
before each simulation. In order to make Atoll use a constant number of total connected
users, the following lines must be added to the Atoll.ini file:
[CDMA]
RandomTotalUsers=0
Notes:
X S D =
326 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For each behaviour described in a user profile, according to the service, frequency use and exchange volume, Atoll
calculates the probability for the user being connected in uplink and in downlink at an instant t.
45. Calculation of the service usage duration per hour ( : probability of a connection):
where is the number of calls per hour and is the average call duration (in second).
Then, Atoll calculates the total number of users trying to access a certain service.
46. Calculation of the number of users trying to access the service j ( ):
The next step determines the activity status of each user.
47. Calculation of number of users per activity status:
This steps depends on the type of service (Voice, 1xRTT data, 1xEV-DO data).
CDMA2000 1xRTT Services
Activity status of voice and data service users is determined as follows.
Users are always active on FCH in both directions, uplink and downlink. Therefore, we have:
Probability of being active on UL:
Probability of being active on DL:
Probability of being active both on UL and DL:
Probability of being inactive:
Thus, for voice and data services, we have:
Number of inactive users:
Number of users active on UL:
Number of users active on DL:
Number of users active on UL and DL both:
- Voice Users
Voice users are active on uplink and downlink. However, the FCH can have inactivity periods on both links. This is
modelled by the FCH activity factor, and . Therefore, all voice service users try to access the service with
the following FCH rates, on uplink and on downlink.
and are respectively the uplink and downlink FCH nominal rates.
- Data Users
Data service users are active on uplink and downlink. FCH is always allocated but can have inactivity periods on both links;
this is modelled by the FCH activity factor, and . SCH may be allocated with four possible rates (2x, 4x,
8x and 16xFCH nominal rate).
Therefore, data service users can access the service with different rates. Possible rates are detailed in the table below:
In case of user profile traffic maps composed of lines, the number of subscribers (X) per
user profile is calculated from the line length (L) and the user profile density (D) (nb of
subscribers per km) as follows:
The number of subscribers (X) is an input when a user profile traffic map is composed of
points.
SCH rate factor
Allocated rates
On UL On DL
Only FCH is used -
X L D =
p
0
p
0
N
cal l
d
3600
---------------------- =
N
cal l
d
n
j
n
j
X p
0
=
p
UL
0 =
p
DL
0 =
p
UL DL +
1 =
p
i nacti ve
0 =
n
j
i nacti ve ( ) n
j
p
i nacti ve
0 = =
n
j
UL ( ) n
j
p
UL
0 = =
n
j
DL ( ) n
j
p
DL
0 = =
n
j
UL DL + ( ) n
j
p
UL DL +
n
j
= =
n
j
n
j
UL ( ) n
j
DL ( ) n
j
UL DL + ( ) n
j
i nacti ve ( ) + + + n
j
UL DL + ( ) = =
AF
FCH
UL
AF
FCH
DL
R
FCH
UL
AF
FCH
UL
R
FCH
DL
AF
FCH
DL

R
FCH
UL
R
FCH
DL
AF
FCH
UL
AF
FCH
DL
r
k
R
FCH
UL
AF
FCH
UL
R
FCH
DL
AF
FCH
DL

Forsk 2010 AT283_TRG_E2 327


Chapter 7: CDMA2000 Networks
and are respectively the uplink and downlink FCH nominal rates.
Then, Atoll determines the distribution of users between the different possible rates.
In case of a data service, j, several data rate probabilities, and , can be assigned to different rate factors, , for
SCH channel.
For data service users, a random trial compliant with data rate probabilities is performed for each link in order to determine
the rate for each user.
On uplink, we have:
For each SCH rate factor, , the number of users with the data rate is calculated as follows,
Therefore, the number of users with the data rate, , is:
On downlink, we have:
For each SCH rate factor, , the number of users, with the data rate, , is calculated as follows,
Therefore, the number of users with the data rate, , is:
CDMA2000 1xEV-DO Services
As power control is performed on uplink only, 1xEV-DO data service users will be considered either active on uplink or
inactive. 1xEV-DO data Rev. 0 service users can access the service with uplink rates of 9.6, 19.2, 38.4, 76.8 and 153.6
kbps. 1xEV-DO data Rev. A service users can access the service with uplink rates of 4.8, 9.6, 19.2, 38.4, 76.8, 115.2,
153.6, 230.4, 307.2, 460.8, 614.4, 921.6, 1,228.8 and 1,848.2 kbps.
For each service, j, several data rate probabilities, , can be assigned to different rates . The number of users
active on uplink ( ) and the number of inactive users ( ) are calculated as follows:
Probability of being active on UL:
Probability of being inactive:
Probability of being active on DL:
Probability of being active on UL and DL both:
Therefore, we have:
Number of users active on UL:
Number of inactive users:
Number of users active on DL:
Both FCH and SCH are used
2x
4x
8x
16x
Note:
For non-data services, these probabilities are 0.
R
FCH
UL
AF
FCH
UL
2 + ( ) R
FCH
DL
AF
FCH
DL
2 + ( )
R
FCH
UL
AF
FCH
UL
4 + ( ) R
FCH
DL
AF
FCH
DL
4 + ( )
R
FCH
UL
AF
FCH
UL
8 + ( ) R
FCH
DL
AF
FCH
DL
8 + ( )
R
FCH
UL
AF
FCH
UL
16 + ( ) R
FCH
DL
AF
FCH
DL
16 + ( )
R
FCH
UL
R
FCH
DL
P
k
UL
P
k
DL
r
k
r
k
n
j
r
k
R
FCH
UL
AF
FCH
UL
r
k
+ ( )
n
j
r
k
P
r
k
UL
n
j
=
n
j
FCH
R
FCH
UL
AF
FCH
UL

n
j
FCH
n
j
n
j
r
k
r
k

=
r
k
n
j
r
k
R
FCH
DL
AF
FCH
DL
r
k
+ ( )
n
j
r
k
P
r
k
DL
n
j
=
n
j
FCH
R
FCH
DL
AF
FCH
DL

n
j
FCH
n
j
n
j
r
k
r
k

=
P
k
UL
R
k
UL
n
j
UL ( ) n
j
i nacti ve ( )
p
UL
P
k
UL
R
k
UL
( )
R
k
UL

=
p
i nacti ve
1 P
k
UL
R
k
UL
( )
R
k
UL

=
p
DL
0 =
p
UL DL +
0 =
n
j
UL ( ) n
j
p
UL
=
n
j
i nacti ve ( ) n
j
p
i nacti ve
=
n
j
DL ( ) n
j
p
DL
0 = =
328 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Number of users active on UL and DL both:
Then, Atoll determines the distribution of users between the different possible rates, . The number of users with the
data rate , , is calculated as follows:
Inactive users have a requested data rate equal to 0.
7.4.1.1.2 Simulations Based on Sector Traffic Maps
Sector traffic maps can be based on live traffic data from OMC (Operation and Maintenance Centre). Traffic is spread over
the best server coverage area of each transmitter and each coverage area is assigned either the throughputs in the uplink
and in the downlink, or the number of users per activity status or the total number of users (including all activity statuses).
CDMA2000 1xRTT Services
Voice Service (j)
For each transmitter, Tx
i
, Atoll proceeds as follows:
- When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in UL ( )
and DL ( ) for each sector.
Atoll calculates the number of users active in UL and DL using the voice service in the Txi cell as follows:
and
Where,
is the number of kbits per second transmitted in UL in the Txi cell to provide the service j to the users
(user-defined value in the traffic map properties)
is the number of kbits per second transmitted in DL in the Txi cell to provide the service j to the users
(user-defined value in the traffic map properties).
and correspond to the UL and DL rates of a user. FCH is always allocated to active users but can
have inactivity periods on both links. Therefore, we have (where is the service
FCH nominal rate on UL and corresponds to the FCH activity factor on UL) and
(where is the service FCH nominal rate on DL and corresponds to the
FCH activity factor on DL).
Users are always active on FCH for both links. Therefore, we have following activity probabilities.
Probability of being active in UL:
Probability of being active in DL:
Probability of being active in UL and DL both:
Notes:
The user distribution per service is an average distribution and the service of each user is
randomly drawn in each simulation. Therefore, if you compute several simulations at once,
the average number of users per service will correspond to the calculated distribution. But if
you check each simulation, the user distribution between services is different in each of
them.
It is the same for the SCH rate distribution between 1xRTT data service users and the
traffic data rate distribution between 1xEV-DO data service users.
In calculations detailed above, we assume that the sum of data rate probabilities is less
than or equal to 1. If the sum of data rate probabilities exceeds 1, Atoll considers
normalised data rate probabilities values, , instead of specified data rate
probabilities .
n
j
UL DL + ( ) n
j
p
UL DL +
0 = =
n
j
n
j
UL ( ) n
j
DL ( ) n
j
UL DL + ( ) n
j
i nacti ve ( ) + + + n
j
UL ( ) n
j
i nacti ve ( ) + = =
R
k
UL
R
k
UL
n
j
R
k
UL
( )
n
j
R
k
UL
( ) P
k
UL
n
j
=
P
r
k
P
r
k
r
k

\ .
|
| |

P
r
k
R
t
UL
R
t
DL
N
UL
R
t
UL
R
j
UL
---------- = N
DL
R
t
DL
R
j
DL
---------- =
R
t
UL
R
t
DL
R
j
UL
R
j
DL
R
j
UL
R
FCH
UL
AF
FCH
UL
= R
FCH
UL
AF
FCH
UL
R
j
DL
R
FCH
DL
AF
FCH
DL
= R
FCH
DL
AF
FCH
DL
p
UL
0 =
p
DL
0 =
p
UL DL +
1 =
Forsk 2010 AT283_TRG_E2 329
Chapter 7: CDMA2000 Networks
Probability of being inactive:
Then, Atoll calculates the number of users per activity status:
Number of users active in UL and DL both:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of inactive users in UL and DL:
Therefore, all connected voice users ( ) are active in both links.
- When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users
for each sector ( ).
Users are always active on FCH for both links. Therefore, we have following activity probabilities.
Probability of being active in UL:
Probability of being active in DL:
Probability of being active in UL and DL both:
Probability of being inactive:
Then, Atoll calculates the number of users per activity status:
Number of inactive users in UL and DL:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of users active in UL and DL both:
Therefore, all connected users ( ) are active in both links.
- When selecting Number of Users per Activity Status, you can directly input the number of users active in
the uplink and downlink ( ), for each sector.
Voice service users try to access the service with the FCH rates, on uplink and on
downlink.
All user characteristics determined, a second random trial is performed to obtain their geographical positions.
Data Service Users (j)
FCH is always allocated to active users but can have inactivity periods on both links. This is modelled by the FCH activity
factors, and . SCH may be allocated with four possible rates (2x, 4x, 8x, 16xFCH nominal rate). Several
data rate probabilities, and , can be assigned to different rates factor, , for SCH channel.
For each transmitter, Tx
i
, Atoll proceeds as follows:
- When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in UL ( )
and DL ( ) for each sector.
Atoll calculates the number of users active in UL and DL using the service in the Txi cell as follows:
and
Where,
is the number of kbits per second transmitted in UL in the Txi cell to provide the service j to the users
(user-defined value in the traffic map properties)
Note:
For non-data services, these probabilities are 0.
p
i nacti ve
0 =
n
j
UL DL + ( ) max N
UL
N
DL
( , ) =
n
j
UL ( ) 0 =
n
j
DL ( ) 0 =
n
j
i nacti ve
0 =
n
j
n
j
p
UL
0 =
p
DL
0 =
p
UL DL +
1 =
p
i nacti ve
0 =
n
j
i nacti ve
n
j
p
i nacti ve
0 = =
n
j
UL ( ) n
j
p
UL
0 = =
n
j
DL ( ) n
j
p
DL
0 = =
n
j
UL DL + ( ) n
j
p
UL DL +
n
j
= =
n
j
n
j
UL DL + ( )
R
FCH
UL
AF
FCH
UL
R
FCH
DL
AF
FCH
DL

AF
FCH
UL
AF
FCH
DL
P
k
UL
P
k
DL
r
k
R
t
UL
R
t
DL
N
UL
R
t
UL
R
j
UL
---------- = N
DL
R
t
DL
R
j
DL
---------- =
R
t
UL
330 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the number of kbits per second transmitted in DL in the Txi cell to provide the service j to the users
(user-defined value in the traffic map properties).
and correspond to uplink and downlink rates of a user.
and are the uplink and downlink FCH nominal rates respectively.
Users are always active on FCH for both links. Therefore, we have following activity probabilities.
Probability of being active in UL:
Probability of being active in DL:
Probability of being active in UL and DL both:
Probability of being inactive:
Then, Atoll calculates the number of users per activity status and the total number of users:
Number of users active in UL and DL both:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of inactive users in UL and DL:
Therefore, all connected users ( ) are active in both links.
- When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users
for each sector ( ).
Users are always active on FCH for both links. Therefore, we have following activity probabilities.
Probability of being active in UL:
Probability of being active in DL:
Probability of being active in UL and DL both:
Probability of being inactive:
Then, Atoll calculates the number of users per activity status:
Number of inactive users in UL and DL:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of users active in UL and DL both:
Therefore, all connected users ( ) are active in both links.
Note:
In calculations detailed above, we assume that the sum of data rate probabilities is less
than or equal to 1. If the sum of data rate probabilities exceeds 1, Atoll considers
normalised data rate probabilities values, , instead of specified data rate
probabilities .
R
t
DL
R
j
UL
R
j
DL
R
j
UL
r
k
AF
FCH
UL
+ ( )
r
k

R
FCH
UL
P
r
k
UL
1 P
r
k
UL
r
k

\ .
|
| |
R
FCH
UL
AF
FCH
UL
+ =
R
j
DL
r
k
AF
FCH
DL
+ ( )
r
k

R
FCH
DL
P
r
k
DL
1 P
r
k
DL
r
k

\ .
|
| |
R
FCH
DL
AF
FCH
DL
+ =
R
FCH
UL
R
FCH
DL
P
r
k
P
r
k
r
k

\ .
|
| |

P
r
k
p
UL
0 =
p
DL
0 =
p
UL DL +
1 =
p
i nacti ve
0 =
n
j
UL DL + ( ) max N
UL
N
DL
( , ) =
n
j
UL ( ) 0 =
n
j
DL ( ) 0 =
n
j
i nacti ve
0 =
n
j
n
j
p
UL
0 =
p
DL
0 =
p
UL DL +
1 =
p
i nacti ve
0 =
n
j
i nacti ve
n
j
p
i nacti ve
0 = =
n
j
UL ( ) n
j
p
UL
0 = =
n
j
DL ( ) n
j
p
DL
0 = =
n
j
UL DL + ( ) n
j
p
UL DL +
n
j
= =
n
j
Forsk 2010 AT283_TRG_E2 331
Chapter 7: CDMA2000 Networks
- When selecting Number of Users per Activity Status, you can directly input the number of users active in
the uplink and downlink ( ), for each sector.
As explained above, data service users can access the service with different rates. Possible rates are detailed in the table
below:
Atoll determines the distribution of users with the different possible rates. A random trial compliant with data rate
probabilities is performed for each link in order to determine the data rate of each user.
On uplink, we have,
For each SCH rate factor, , the number of users with the data rate is calculated as follows,
Therefore, the number of users with the data rate, , is,
On downlink, we have,
For each SCH rate factor, , the number of users, with the data rate, , is calculated as follows,
Therefore, the number of users with the data rate, , is,
CDMA2000 1xEV-DO Services
As power control is performed on uplink only, 1xEV-DO data service users will be considered either active on uplink or
inactive. 1xEV-DO data Rev. 0 service users can access the service with uplink rates of 9.6, 19.2, 38.4, 76.8 and 153.6
kbps. 1xEV-DO data Rev. A service users can access the service with uplink rates of 4.8, 9.6, 19.2, 38.4, 76.8, 115.2,
153.6, 230.4, 307.2, 460.8, 614.4, 921.6, 1,228.8 and 1,848.2 kbps.
For each service, j, several data rate probabilities, , can be assigned to different uplink rates . The number of
users active in uplink ( ) and the number of inactive users ( ) are calculated into several steps. First of
all, Atoll determines the number of users active in UL using the service j in the Txi cell.
For each transmitter, Tx
i
, and each service j:
- When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in UL ( )
for each sector.
Atoll calculates the number of users active in UL using the service j in the Txi cell as follows:
Where is the number of kbits per second transmitted on UL in the Txi cell to provide the service j (user-
defined value in the traffic map properties).
corresponds to the uplink data rate for a user.
SCH rate factor
Allocated rates
On UL On DL
Only FCH is used -
Both FCH and SCH are used
2x
4x
8x
16x
n
i
UL DL + ( )
r
k
R
FCH
UL
AF
FCH
UL
R
FCH
DL
AF
FCH
DL

R
FCH
UL
AF
FCH
UL
2 + ( ) R
FCH
DL
AF
FCH
DL
2 + ( )
R
FCH
UL
AF
FCH
UL
4 + ( ) R
FCH
DL
AF
FCH
DL
4 + ( )
R
FCH
UL
AF
FCH
UL
8 + ( ) R
FCH
DL
AF
FCH
DL
8 + ( )
R
FCH
UL
AF
FCH
UL
16 + ( ) R
FCH
DL
AF
FCH
DL
16 + ( )
r
k
n
j
r
k
R
FCH
UL
AF
FCH
UL
r
k
+ ( )
n
j
r
k
P
r
k
UL
n
j
=
n
j
FCH
R
FCH
UL
AF
FCH
UL

n
j
FCH
n
j
n
j
r
k
r
k

=
r
k
n
j
r
k
R
FCH
DL
AF
FCH
DL
r
k
+ ( )
n
j
k
P
k
DL
n
j
=
n
j
FCH
R
FCH
DL
AF
FCH
DL

n
j
FCH
n
j
n
j
r
k
r
k

=
P
k
UL
R
k
UL
n
j
UL ( ) n
j
i nacti ve ( )
R
t
UL
N
UL
R
t
UL
R
j
UL
---------- =
R
t
UL
R
j
UL
332 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
We have the following activity probabilities:
Probability of being active in UL:
Probability of being inactive:
Probability of being active in DL:
Probability of being active in UL and DL both:
Therefore, we have:
Number of users active in UL:
Number of inactive users:
Number of users active in DL:
Number of users active in UL and DL both:
Total number of connected users:
- When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users
for each sector ( ).
We have the following activity probabilities:
Probability of being active in UL:
Probability of being inactive:
Probability of being active in DL:
Probability of being active in UL and DL both:
Therefore, we have:
Number of users active in UL:
Number of inactive users:
Number of users active in DL:
Number of users active in UL and DL both:
- When selecting Number of Users per Activity Status, you can directly input the number of inactive users
( ) and the number of users active in the uplink ( ), for each sector.
The total number of connected users ( ) is calculated as follows
Then, Atoll determines the distribution of users with the different possible rates. The number of users with the data rate
, , is calculated as follows:
Note:
In the above calculations, we assume that the sum of data rate probabilities is less than or
equal to 1. If the sum of data rate probabilities exceeds 1, Atoll considers normalised data
rate probabilities values, , instead of specified data rate probabilities .
R
j
UL
P
k
UL
k

R
k
UL
=
P
r
k
P
r
k
r
k

\ .
|
| |
P
r
k
p
UL
P
k
UL
R
k
UL
( )
R
k
UL

=
p
i nacti ve
1 P
k
UL
R
k
UL
( )
R
k
UL

=
p
DL
0 =
p
UL DL +
0 =
n
j
UL ( ) N
UL
p
UL
=
n
j
i nacti ve ( ) N
UL
p
i nacti ve
=
n
j
DL ( ) 0 =
n
j
UL DL + ( ) 0 =
n
j
n
j
UL ( ) n
j
i nacti ve ( ) + =
n
j
p
UL
P
k
UL
R
k
UL
( )
R
k
UL

=
p
i nacti ve
1 P
k
UL
R
k
UL
( )
R
k
UL

=
p
DL
0 =
p
UL DL +
0 =
n
j
UL ( ) n
j
p
UL
=
n
j
i nacti ve ( ) n
j
p
i nacti ve
=
n
j
DL ( ) 0 =
n
j
UL DL + ( ) 0 =
n
j
i nacti ve ( ) n
j
UL ( )
n
j
n
j
n
j
UL ( ) n
j
i nacti ve ( ) + =
R
k
UL
n
j
R
k
UL
( )
n
j
R
k
UL
( ) P
k
UL
n
j
=
Forsk 2010 AT283_TRG_E2 333
Chapter 7: CDMA2000 Networks
Inactive users have a requested data rate equal to 0.
7.4.1.2 Transition Flags for 1xEV-DO Rev.0 User Data Rates
For 1xEV-DO Rev. 0 services supporting data rate downgrading, you can define the probability of the service being
upgraded ( ) or downgraded ( ) on the uplink (reverse link) for each data rate ( ). The
probabilities are taken into account in order to determine if a user with a certain data rate can be upgraded or downgraded.
User data rate downgrading and upgrading occur during congestion control when the cell is over- or underloaded.
The following table shows the data rate changes that are possible when a data rate is upgraded or downgraded. The
probabilities are defined with a number from 1 to 255 for each data rate.
During the generation of the user distribution, each 1xEV-DO Rev. 0 user is assigned a random number between 1 and
255 for each possible data rate transition. When this number is lower or equal to the value of the probability, the transition
flag for this data rate transition is set to "True" meaning that this data rate transition can be performed if necessary.
The number of 1xEV-DO Rev. 0 users with a certain data rate that can be downgraded ( ) and upgraded
( ) are calculated as follows:
And
7.4.1.3 User Geographical Position
Once all the user characteristics determined, another random trial is performed to obtain their geographical positions and
whether they are indoors or outdoors according to the percentage of indoor users per clutter class defined for the traffic
maps.
7.4.2 Network Regulation Mechanism
7.4.2.1 CDMA2000 1xRTT Power Control Simulation Algorithm
CDMA2000 1xRTT network automatically regulates itself using traffic driven uplink and downlink power control on the
fundamental and supplemental channels (FCH and SCH respectively) in order to minimize interference and maximize
capacity. Atoll simulates this network regulation mechanism with an iterative algorithm and calculates, for each user
distribution, network parameters such as base station power, mobile terminal power, active set and handoff status for each
terminal.
The power control simulation is based on an iterative algorithm, where in each iteration, all the mobiles selected during
the user distribution generation (1
st
step) try to connect to network active transmitters with a calculation area. The process
is repeated from iteration to iteration until convergence is achieved. The algorithm steps are detailed below.
Note:
The user distribution per service is an average distribution and the service of each user is
randomly drawn In each simulation. Therefore, if you compute several simulations at once,
the average number of users per service will correspond to the calculated distribution. But if
you check each simulation, the user distribution between services is different in each of
them.
It is the same for the SCH rate distribution between 1xRTT data service users and the
traffic data rate distribution between 1xEV-DO data service users.
Possible Data Rate Changes
During Upgrading
Possible Data Rate Changes
During Downgrading
From To From To
9.6 kbps 19.2 kbps 153.6 kbps 76.8 kbps
19.2 kbps 38.4 kbps 76.8 kbps 38.4 kbps
38.4 kbps 76.8 kbps 38.4 kbps 19.2 kbps
76.8 kbps 153.6 kbps 19.2 kbps 9.6 kbps
Note:
The number of users with a certain data rate that can be downgraded or upgraded is an
average. Therefore, if you compute several simulations at once, the average number of
users with a certain data rate that can be downgraded or upgraded will correspond to the
calculated value. But if you check each simulation, this number is different in each of them.
P
Upg k
UL
R
k
UL
( ) P
Downg k
UL
R
k
UL
( ) R
k
UL
n
j
R
k
UL
( )
Downg
n
j
R
k
UL
( )
Upg
n
j
R
k
UL
( )
Upg
P
Upg k
UL
R
k
UL
( ) n
j
R
k
UL
( )
255
-------------------------------------------------------------- =
n
j
R
k
UL
( )
Downg
P
Downg k
UL
R
k
UL
( ) n
j
R
k
UL
( )
255
--------------------------------------------------------------------- =
334 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.4.2.1.1 Algorithm Initialization
Total power on carrier ic, , of base station S
j
is initialised to .
Uplink received powers on carrier ic, , and , at base station S
j
are initialised to 0 W
(no connected mobile).
7.4.2.1.2 Presentation of the Algorithm
The algorithm is detailed for any iteration k. X
k
is the value of the variable X at the iteration k. In the algorithm, all
and thresholds depend on user mobility type and are defined in Service and Mobility parameters tables. All variables
are described in Definitions and formulas part.
The algorithm applies to single frequency band networks and to dual-band networks. Dual-band terminals can have the
following configurations:
- Configuration 1: The terminal can work on f1 and f2 without any priority (select "All" as main frequency band
in the terminal property dialogue).
- Configuration 2: The terminal can work on f1 and f2 but f1 has a higher priority (select "f1" as main frequency
band and "f2" as secondary frequency band in the terminal property dialogue).
For each mobile M
i
Determination of M
i
s Best Server (S
BS
(M
i
))
For each transmitter Sj containing M
i
in its calculation area and working on the main frequency band supported by the M
i
s
terminal (i.e. either f1 for a single frequency band network, or f1 or f2 for a dual-band terminal with the configuration 1, or
f1 for a dual-band terminal with the configuration 2).
Calculation of
Determination of the best transmitter, S
BS
, for each carrier ic.
For each carrier ic, selection of the transmitter with the highest , .
Analysis of candidate cells, (S
BS
,ic).
For each pair (S
BS
,ic), calculation of the uplink load factor:
Figure 7.1CDMA2000 1xRTT Power Control Algorithm
P
Tx
i c ( ) P
pi l ot
i c ( ) P
sync
i c ( ) P
pagi ng
i c ( ) + +
I
tot
UL
i ntra
i c ( ) I
tot
UL
ext ra
i c ( ) I
i nter carri er
UL
i c ( )
X
k
UL
S
j
i c , ( )
I
tot
UL
S
j
i c , ( )
N
tot
UL
S
j
i c , ( )
----------------------------- 0 = =
Q
req
UL
Q
req
DL
Q
pi l ot
k
Sj i c M
i
, , ( )
o
BTS
P
c
Sj M
i
i c , , ( )
P
tot
DL
Sj i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
Term
+ +
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ =
Q
pi l ot
k
Sj M
i
i c , , ( ) S
BS
M
i
( )
Forsk 2010 AT283_TRG_E2 335
Chapter 7: CDMA2000 Networks
Rejection of bad candidate cells if the pilot is not received or if the uplink load factor is exceeded during the admission load
control (if simulation respects a loading factor constraint and M
b
was not connected in previous iteration)
If then (S
BS
,ic) is rejected by M
i
If , then (S
BS
,ic) is rejected by M
i
Else
Keep (S
BS
,ic) as good candidate cell
For dual band terminals with the configuration 1 or terminals working on one frequency band only, if no good candidate
cell has been selected, M
i
has failed to be connected to the network and is rejected.
For dual band terminals with the configuration 2, if no good candidate cell has been selected, try to connect M
i
to
transmitters txi containing M
i
in their calculation area and working on the secondary frequency band supported by the M
i
s
terminal (i.e. f2). If no good candidate cell has been selected, M
i
has failed to be connected to the network and is rejected.
Determination of the best carrier, ic
BS
.
If a given carrier is specified for the service requested by M
i
is the carrier specified for the service
Else the carrier selection mode defined for the site equipment is considered.
If carrier selection mode is Min. UL Load Factor
is the cell with the lowest
Else if carrier selection mode is Min. DL Total Power
is the cell with the lowest
Else if carrier selection mode is Random
is randomly selected
Else if carrier selection mode is "Sequential"
is the first carrier where
Endif
is the best serving cell ( ) and its pilot quality is
In the following lines, we will consider as the carrier used by the best serving cell.
Determination of the Active Set
For each station S
j
containing M
i
in its calculation area, using ic, and if neighbours are used, neighbour of
Calculation of
Rejection of station S
j
if the pilot is not received
If then S
j
is rejected by M
i
Else S
j
is included in the M
i
active set
Rejection of S
j
if the M
i
active set is full
Station with the lowest in the active set is rejected
EndFor
Uplink Power Control
Calculation of the required power for M
i
,
For each cell (S
j,
ic) present in the M
i
active set
Calculation of quality level on M
i
traffic channel at (S
j
,ic), with the minimum power allowed on traffic channel for the M
i
service
X
k
UL
S
BS
i c , ( )
I
tot
UL
S
BS
i c , ( )
N
tot
UL
S
BS
i c , ( )
---------------------------------- AX
UL
+ =
Q
pi l ot
k
S
BS
M
i
i c , , ( ) Q
req
pi l ot
<
X
k
UL
S
BS
i c , ( ) X
max
UL
>
i c
BS
M
i
( )
i c
BS
M
i
( ) X
k
UL
S
BS
i c , ( )
i c
BS
M
i
( ) P
tx
S
BS
i c , ( )
k
i c
BS
M
i
( )
i c
BS
M
i
( ) X
k
UL
S
BS
i c , ( )X
max
UL
S
BS
i c
BS
( , )
k
M
i
( ) BestCel l
k
M
i
( ) Q
pi l ot
k
max
M
i
( )
i c
BestCel l
k
M
i
( )
Q
pi l ot
k
M
i
S
j
i c , , ( )
o
BTS
P
c
M
i
S
j
, ( )
I
0
DL
i c ( )
------------------------------------------------------- =
Q
pi l ot
k
M
i
S
j
i c , , ( ) Q
mi n
pi l ot
<
Q
pi l ot
k
P
term
req
M
i
i c , ( )
k
336 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
and
If the user selects the option Total noise
End For
If (M
i
is not in handoff)
and
Else if (M
i
is in softer handoff)
Else if (M
i
is in soft or softer/soft without MRC)
Else if (M
i
is in soft/soft)
Else if (M
i
is in softer/soft with MRC)
EndIf
If then
P
b
FCH U L
M
i
S
j
i c , , ( )
P
term
FCH r eq
M
i
i c , ( )
k 1
L
T
M
i
S
j
, ( )
---------------------------------------------------- = P
b
SCH U L
M
i
S
j
i c , , ( )
P
term
SCH r eq
M
i
i c , ( )
k 1
L
T
M
i
S
j
, ( )
----------------------------------------------------- =
Q
FCH
UL
M
i
S
j
i c , , ( )
k

term
P
b
FCH U L
M
i
S
j
i c , , ( )
N
tot
UL
i c ( ) 1 F
MUD
( )
term
P
b
FCH U L
M
i
S
j
i c , , ( ) P
b
SCH U L
M
i
S
j
i c , , ( ) + ( )
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- G
p
FCH UL
Servi ce ( ) =
Q
SCH
UL
M
i
S
j
i c , , ( )
k

term
P
b
SCH U L
M
i
S
j
i c , , ( )
N
tot
UL
i c ( ) 1 F
MUD
( )
term
P
b
FCH U L
M
i
S
j
i c , , ( ) P
b
SCH U L
M
i
S
j
i c , , ( ) + ( )
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- G
p
SCH UL
Servi ce ( ) =
Q
FCH
UL
M
i
S
j
i c , , ( )
k

term
P
b
FCH U L
M
i
S
j
i c , , ( )
N
tot
UL
i c ( )
---------------------------------------------------------------------- G
p
FCH UL
Servi ce ( ) =
Q
SCH
UL
M
i
S
j
i c , , ( )
k

term
P
b
SCH U L
M
i
S
j
i c , , ( )
N
tot
UL
i c ( )
---------------------------------------------------------------------- G
p
SCH UL
Servi ce ( ) =
Q
FCH
k
UL
M
i
( ) Q
FCH
UL
M
i
S
j
i c , , ( )
k
= Q
SCH
k
UL
M
i
( ) Q
SCH
UL
M
i
S
j
i c , , ( )
k
=
Q
FCH
k
UL
M
i
( ) f
rake efficiency
UL
Q
FCH
UL
M
i
S
j
i c , , ( )
k
S
j
Acti veSet e

=
Q
SCH
k
UL
M
i
( ) f
rake efficiency
UL
Q
SCH
UL
M
i
S
j
i c , , ( )
k
S
j
Acti veSet e

=
Q
FCH
k
UL
M
i
( ) G
macro di versi ty
UL
( )
2 links
Max Q
FCH
UL
M
i
S
j
i c , , ( )
k
( )
S
j
Acti veSet e
=
Q
SCH
k
UL
M
i
( ) G
macro di versi ty
UL
( )
2 links
Max Q
SCH
UL
M
i
S
j
i c , , ( )
k
( )
S
j
Acti veSet e
=
Q
FCH
k
UL
M
i
( ) G
macro di versi ty
UL
( )
3 links
Max Q
FCH
UL
M
i
S
j
i c , , ( )
k
( )
S
j
Acti veSet e
=
Q
SCH
k
UL
M
i
( ) G
macro di versi ty
UL
( )
3 links
Max Q
SCH
UL
M
i
S
j
i c , , ( )
k
( )
S
j
Acti veSet e
=
Q
FCH
k
UL
M
i
( ) Max f
rake efficiency
UL
Q
FCH
UL
i c ( )
i
AS
Acti veSet e
(same site)

Q
FCH
other site
UL
i c ( ) ,
\ .
|
|
|
|
| |
G
macro di versi ty
UL
( )
2 links
=
Q
SCH
k
UL
M
i
( ) Max f
rake efficiency
UL
Q
SCH
UL
i c ( )
i
AS
Acti veSet e
(same site)

Q
SCH
other site
UL
i c ( ) ,
\ .
|
|
|
|
| |
G
macro di versi ty
UL
( )
2 links
=
P
term
FCH r eq
M
i
i c , ( )
k
Q
req
UL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) , , ( ) ( )
FCH
Q
FCH
k
UL
M
i
( )
-------------------------------------------------------------------------------------------------------------------------------------- P
term
FCH r eq
M
i
i c , ( )
k 1
=
P
term
SCH r eq
M
i
i c , ( )
k
Q
req
UL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) SCH_rate_multiple , , , ( ) ( )
SCH
Q
SCH
k
UL
M
i
( )
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- P
term
SCH r eq
M
i
i c , ( )
k 1
=
P
term
req
M
i
i c , ( )
k
P
term
FCH r eq
M
i
i c , ( )
k
P
term
SCH r eq
M
i
i c , ( )
k
+ =
P
term
req
M
i
i c , ( )
k
P
term
mi n
M
i
( ) <
Forsk 2010 AT283_TRG_E2 337
Chapter 7: CDMA2000 Networks
EndIf
If then M
i
cannot select any station and its active set is cleared
If and M
i
uses SCH then:
Downgrading the service SCH rate:
While and
EndWhile
If then M
i
will not use SCH
Endif
Endif
If the required number of channel elements exceeds the available quantity in the site of S
j
(Best server of M
i
) and M
i
uses
SCH then:
Downgrading the service SCH rate:
While and
EndWhile
Endif
Downlink Power Control
If M
i
uses an SCH on the downlink
For each cell (S
j,
ic) in M
i
FCH active set
Calculation of quality level on (S
j
,ic) FCH at M
i
, with the minimum power allowed on FCH for the M
i
service
If the user selects the option Total noise
P
term
FCH r eq
M
i
i c , ( )
k
P
term
mi n
M
i
S
j
, ( )
P
term
req
M
i
( )
k
---------------------------------- P
term
FCH r eq
M
i
i c , ( )
k
=
P
term
SCH r eq
M
i
i c , ( )
k
P
term
mi n
M
i
S
j
, ( )
P
term
req
M
i
( )
k
---------------------------------- P
term
SCH r eq
M
i
i c , ( )
k
=
P
term
FCH r eq
M
i
i c , ( )
k
P
term
max
M
i
( ) >
P
term
req
M
i
i c , ( )
k
P
term
max
M
i
( ) >
P
term
req
M
i
i c , ( )
k
P
term
max
M
i
( ) > R
SCH
UL
Servi ce M
i
( ) ( ) R
FCH
UL
Servi ce M
i
( ) ( ) 2 >
R
SCH
UL
Servi ce M
i
( ) ( )
R
SCH
UL
Servi ce M
i
( ) ( )
2
------------------------------------------------------ >
P
term
SCH r eq
M
i
i c , ( )
k
P
term
SCH r eq
M
i
i c , ( )
k
2
----------------------------------------------
Q
req
UL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
UL
Servi ce M
i
( ) ( ) , , , ( ) ( )
SCH
Q
req
UL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
UL
Servi ce M
i
( ) 2 ( ) , , , ( ) ( )
SCH
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
P
term
req
M
i
i c , ( )
k
P
term
FCH r eq
M
i
i c , ( )
k
P
term
SCH r eq
M
i
i c , ( )
k
+ =
P
term
req
M
i
i c , ( )
k
P
term
max
M
i
( ) >
N
CE U L
M
i
( ) N
max
CE U L
S
j
( ) > R
SCH
UL
Servi ce M
i
( ) ( ) R
FCH
UL
Servi ce M
i
( ) ( ) 2 >
R
SCH
UL
Servi ce M
i
( ) ( )
R
SCH
UL
Servi ce M
i
( ) ( )
2
------------------------------------------------------ >
N
SCH
CE U L
M
i
( )
k
N
SCH
CE U L
M
i
( )
k
2
---------------------------------- =
P
term
SCH r eq
M
i
i c , ( )
k
P
term
SCH r eq
M
i
i c , ( )
k
2
----------------------------------------------
Q
req
SCH UL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
UL
Servi ce M
i
( ) ( ) , , , ( )
Q
req
SCH UL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
UL
Servi ce M
i
( ) 2 ( ) , , , ( )
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
P
term
req
M
i
i c , ( )
k
P
term
FCH r eq
M
i
i c , ( )
k
P
term
SCH r eq
M
i
i c , ( )
k
+ =
N
CE U L
M
i
( )
k
N
SCH
CE U L
M
i
( )
k
N
FCH
CE U L
M
i
( )
k
+ =
P
b
FCH D L
M
i
S
j
i c , , ( )
P
FCH
mi n
Servi ce M
i
( ) ( )
L
T
M
i
S
j
, ( )
----------------------------------------------------- =
Q
FCH
DL
M
i
S
j
i c , , ( )
k

BTS
P
b
FCH D L
M
i
S
j
, ( )
N
tot
DL
i c ( ) 1 F
ortho
( )
BTS
P
b
DL
M
i
S
j
i c , , ( )
------------------------------------------------------------------------------------------------------------------------ G
p
FCH DL
Servi ce M
i
( ) ( ) =
338 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
If cell (S
j,
ic) in M
i
SCH active set
Calculation of quality level on (S
j
,ic) SCH at M
i
, with the minimum power allowed on SCH for the M
i
service
If the user selects the option Total noise
EndIf
End For
Recombination of the first f active set links (f is the number of fingers of the M
i
terminal): only quality levels from the
first f cells (S
f
,ic) of active set are recombined.
Do
For each cell (S
j
,ic) in M
i
FCH active set
Calculation of the required power for DL traffic channel between (S
j
,ic) and M
i
:
If then is excluded from M
i
active set
Recalculation of a decreased
If cell (S
j
,ic) in M
i
SCH active set
Calculation of the required power for DL traffic channel between (S
j
,ic) and M
i
:
Downgrading the service SCH rate (only for (S
j
,ic) best server cell of M
i
):
While
Or and
EndWhile
If or then M
i
will not use SCH
Endif
While and
Q
FCH
DL
M
i
S
j
i c , , ( )
k

BTS
P
b
FCH D L
M
i
S
j
, ( )
N
tot
DL
i c ( )
-------------------------------------------------------------- =
P
b
SCH D L
M
i
S
j
i c , , ( )
P
SCH
mi n
Servi ce M
i
( ) ( )
L
T
M
i
S
j
, ( )
------------------------------------------------------ =
Q
SCH
DL
M
i
S
j
i c , , ( )
k

BTS
P
b
SCH D L
M
i
S
j
, ( )
N
tot
DL
i c ( ) 1 F
ortho
( )
BTS
P
b
DL
M
i
S
j
i c , , ( )
------------------------------------------------------------------------------------------------------------------------ G
p
SCH DL
Servi ce M
i
( ) ( ) =
Q
SCH
DL
M
i
S
j
i c , , ( )
k

BTS
P
b
SCH D L
M
i
S
j
, ( )
N
tot
DL
i c ( )
-------------------------------------------------------------- =
Q
FCH
k
DL
M
i
( ) f
rake efficiency
DL
Q
FCH
DL
M
i
S
j
i c , , ( )
k
S
f
Acti veSet FCH ( ) e

=
Q
SCH
k
DL
M
i
( ) f
rake efficiency
DL
Q
SCH
DL
M
i
S
j
i c , , ( )
k
S
f
Acti veSet SCH ( ) e

=
P
FCH
req
M
i
S
j
i c , , ( )
k
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
FCH
DL
Servi ce M
i
( ) ( ) , , , ( ) ( )
FCH
Q
FCH
k
DL
M
i
( )
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ P
FCH
mi n
Servi ce M
i
( ) ( ) =
P
FCH
req
M
i
S
j
i c , , ( )
k
P
FCH
max
Servi ce M
i
( ) ( ) > S
j
i c , ( )
Q
req
DL
P
SCH
req
M
i
S
j
i c , , ( )
k
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
DL
Servi ce M
i
( ) ( ) , , , ( ) ( )
SCH
Q
SCH
k
DL
M
i
( )
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ P
SCH
mi n
Servi ce M
i
( ) ( ) =
P
SCH
req
M
i
S
j
i c , , ( )
k
P
SCH
max
Servi ce M
i
( ) R
SCH
DL
Servi ce M
i
( ) ( ) , ( ) >
P
tx
S
j
i c , ( )
k
P
tch
req
M
i
S
j
i c , , ( )
k
+ P
max
S
j
i c , ( ) > R
SCH
DL
Servi ce M
i
( ) ( ) R
FCH
DL
Servi ce M
i
( ) ( ) 2 >
R
SCH
DL
Servi ce M
i
( ) ( )
R
SCH
DL
Servi ce M
i
( ) ( )
2
------------------------------------------------------ =
P
SCH
req
M
i
S
j
i c , , ( )
k
P
SCH
req
M
i
S
j
i c , , ( )
k
2
--------------------------------------------
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
DL
Servi ce M
i
( ) ( ) , , , ( ) ( )
SCH
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
DL
Servi ce M
i
( ) 2 ( ) , , , ( ) ( )
SCH
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
P
tch
req
M
i
S
j
i c , , ( )
k
P
SCH
req
M
i
S
j
i c , , ( )
k
P
FCH
req
M
i
S
j
i c , , ( )
k
+ =
P
SCH
req
M
i
S
j
i c , , ( )
k
P
SCH
max
Servi ce M
i
( ) ( ) > P
tx
S
j
i c , ( )
k
P
tch
req
M
i
S
j
i c , , ( )
k
+ P
max
S
j
i c , ( ) >
N
CE D L
M
i
( ) N
max
CE D L
S
j
( ) > R
SCH
DL
Servi ce M
i
( ) ( ) R
FCH
DL
Servi ce M
i
( ) ( ) 2 >
Forsk 2010 AT283_TRG_E2 339
Chapter 7: CDMA2000 Networks
EndWhile
If then M
i
will not use SCH
Endif
While and
EndWhile
If then M
i
will not use SCH
Endif
Endif
EndFor
Recombination of the first f active set links (f is the number of fingers of the M
i
terminal): only quality levels from the
first f cells (S
f
,ic) of active set are recombined.
While and M
i
FCH active set is not empty
And (if SCH active set is not empty)
Endif
Uplink and Downlink Interference Updates
Update of interference on active mobiles only (old contributions of mobiles and stations are replaced by the new ones)
For each cell (S
j
,ic)
Update of
EndFor
For each mobile M
i
Update of
EndFor
R
SCH
DL
Servi ce M
i
( ) ( )
R
SCH
DL
Servi ce M
i
( ) ( )
2
------------------------------------------------------ =
N
SCH
CE D L
M
i
( )
k
N
SCH
CE D L
M
i
( )
k
2
---------------------------------- =
P
SCH
req
M
i
S
j
i c , , ( )
k
P
SCH
req
M
i
S
j
i c , , ( )
k
2
--------------------------------------------
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
DL
Servi ce M
i
( ) ( ) , , , ( ) ( )
SCH
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
DL
Servi ce M
i
( ) 2 ( ) , , , ( ) ( )
SCH
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
P
tch
req
M
i
S
j
i c , , ( )
k
P
SCH
req
M
i
S
j
i c , , ( )
k
P
FCH
req
M
i
S
j
i c , , ( )
k
+ =
N
CE D L
M
i
( )
k
N
SCH
CE D L
M
i
( )
k
N
FCH
CE D L
M
i
( )
k
+ =
N
CE D L
M
i
( ) N
max
CE D L
S
j
( ) >
N
Codes
M
i
( ) N
max
Codes
S
j
i c , ( ) > R
SCH
DL
Servi ce M
i
( ) ( ) R
FCH
DL
Servi ce M
i
( ) ( ) 2 >
R
SCH
DL
Servi ce M
i
( ) ( )
R
SCH
DL
Servi ce M
i
( ) ( )
2
------------------------------------------------------ =
N
SCH
Codes
M
i
( )
k
N
SCH
Codes
M
i
( )
k
2
-------------------------------- =
P
SCH
req
M
i
S
j
i c , , ( )
k
P
SCH
req
M
i
S
j
i c , , ( )
k
2
--------------------------------------------
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
DL
Servi ce M
i
( ) ( ) , , , ( ) ( )
SCH
Q
req
DL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) R
SCH
DL
Servi ce M
i
( ) 2 ( ) , , , ( ) ( )
SCH
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
P
tch
req
M
i
S
j
i c , , ( )
k
P
SCH
req
M
i
S
j
i c , , ( )
k
P
FCH
req
M
i
S
j
i c , , ( )
k
+ =
N
Codes
M
i
( )
k
N
FCH
Codes
M
i
( )
k
N
SCH
Codes
M
i
( )
k
+ =
N
Codes
M
i
( ) N
max
Codes
S
j
( ) >
Q
FCH
k
DL
M
i
( ) f
rake efficiency
DL
Q
FCH
DL
M
i
S
f
i c , , ( )
k
S
f
Acti veSet FCH ( ) e

=
Q
SCH
k
DL
M
i
( ) f
rake efficiency
DL
Q
SCH
DL
M
i
S
f
i c , , ( )
k
S
f
Acti veSet SCH ( ) e

=
Q
k
DL
M
i
( ) Q
req
DL
Servi ce M
i
( ) Mobi l i ty M
i
( ) , ( ) <
Q
k
DL
M
i
( ) Q
req
DL
Servi ce M
i
( ) Mobi l i ty M
i
( ) , ( ) <
N
tot
UL
S
j
i c , ( )
N
tot
DL
i c ( )
340 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Control of Radio Resource Limits (Walsh Codes, Cell Power and Site Channel Elements)
For each cell (S
j
,ic) on a site N
l
While
Rejection of mobile with highest for the lowest service priority
EndWhile
EndFor
For each site N
l
The list of rejected mobiles for the site N
l
is
If the equipment installed on N
l
supports power pooling between transmitters
Activation of power pooling between transmitters for each cell (S
j
,ic) containing rejected users
Control of the available power for the other cells (S
i
,ic) of the site where power pooling between transmitters is not
activated
If
Then, the power unused by the cells (S
i
,ic) of the site can be allocated to cells (S
j
,ic)
Sort of all the rejected mobiles by priority in a descending order and by simulation rank in a descending order
For the first mobile M
b
of the list ( )
If
M
b
is reconnected
EndIf
EndFor
EndIf
EndFor
For each cell (S
j
,ic)
While
Rejection of last admitted mobile
EndFor
For each site (Node B) Nl
While
Rejection of mobile with highest for the lowest service priority
While
Rejection of mobile with highest for the lowest service priority
EndFor
Uplink Load Factor Control
For each cell (S
j
,ic) with
Rejection of a mobile with the lowest service priority
EndFor
While at least one cell with exists
7.4.2.1.3 Convergence Criterion
The convergence criteria are evaluated at each iteration, and can be written as follow:
P
tx
S
j
i c , ( )
k
P
max
---------------------------- %Power
max
DL
>
P
tch
req
S
j
M
b
i c , , ( )
k
L
rej ected
N
l
( )
%Power
max
DL
P
max
P
tx
S
i
i c , ( )
k
( ) 0 >
S
i
i c , ( )
S
i
N
l
e

M
b
L e
rej ected
N
l
( )
P
tx
S
j
i c , ( )
k
P
tch
req
S
j
M
b
i c , , ( )
k
+ %Power
max
DL
P
max
M
Pool i ng
S
j
i c , ( ) + <
N
Codes
S
j
i c , ( )
k
N
max
Codes
S
j
i c , ( ) >
N
CE DL
N
I
( )
k
N
max
CE DL
N
I
( ) >
P
tch
req
M
i
S
j
, ( )
k
N
CE UL
N
I
( )
k
N
max
CE UL
N
I
( ) >
P
term
req
M
i
i c , ( )
k
X
UL
S
j
i c , ( ) X
max
UL
>
X
UL
S
j
i c , ( ) X
max
UL
>
Forsk 2010 AT283_TRG_E2 341
Chapter 7: CDMA2000 Networks
Atoll stops the algorithm if:
1
st
case: Between two successive iterations, and are lower ( ) than their respective thresholds (defined
when creating a simulation).
The simulation has reached convergence.
Example: Let us assume that the maximum number of iterations is 100, UL and DL convergence thresholds are set to 5.
If and between the 4
th
and the 5
th
iteration, Atoll stops the algorithm after the 5
th
iteration. Convergence
has been achieved.
2
nd
case: After 30 iterations, or/and are still higher than their respective thresholds and from the 30
th
iteration,
or/and do not decrease during the next 15 successive iterations.
The simulation has not reached convergence (specific divergence symbol).
Examples: Let us assume that the maximum number of iterations is 100, UL and DL convergence thresholds are set to 5.
1. After the 30
th
iteration, and/or equal 100 and do not decrease during the next 15 successive iterations: Atoll
stops the algorithm at the 46
th
iteration. Convergence has not been achieved.
2. After the 30
th
iteration, and/or equal 80, they start decreasing slowly until the 40
th
iteration (without going
under the thresholds) and then do not change during the next 15 successive iterations: Atoll stops the algorithm at the
56
th
iteration without achieving convergence.
3
rd
case: After the last iteration.
If and/or are still strictly higher than their respective thresholds, the simulation has not converged (specific
divergence symbol).
If and are lower than their respective thresholds, the simulation has converged.
7.4.2.2 CDMA2000 1xEV-DO Power/Data Rate Control Simulation Algorithm
In a CDMA2000 1xEV-DO system, the UL supports power control but the DL does not. When a DL connection is
established, the transmitter transmits at full power (P
max
). Instead of power control, there is a data rate control based on
the C/I ratio computed at the mobile. For each distribution of users, Atoll simulates the power control mechanism for the
UL and the data rate control for the DL.
A
DL
max i nt max
Stati ons
P
tx
i c ( )
k
P
tx
i c ( )
k 1

P
tx
i c ( )
k
------------------------------------------------------
100
\ .
|
| |
i nt max
Stati ons
N
user
DL
i c ( )
k
N
user
DL
i c ( )
k 1

N
user
DL
i c ( )
k
------------------------------------------------------------------
100
\ .
|
| |
,
\ .
|
| |
=
A
UL
max i nt max
Stati ons
I
tot
UL
i c ( )
k
I
tot
UL
i c ( )
k 1

I
tot
UL
i c ( )
k
------------------------------------------------------
100
\ .
|
| |
i nt max
Stati ons
N
user
UL
i c ( )
k
N
user
UL
i c ( )
k 1

N
user
UL
i c ( )
k
------------------------------------------------------------------
100
\ .
|
| |
,
\ .
|
| |
=
A
UL
A
DL
s
A
UL
5 s A
DL
5 s
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
A
UL
A
DL
Figure 7.2CDMA2000 1xEVDO Power Control Algorithm
342 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The simulation uses an iterative algorithm, where in each iteration, all the 1xEV-DO data service users selected during the
user distribution generation (1
st
step) try to connect to network active transmitters with a calculation area. The process is
repeated from iteration to iteration until convergence is achieved. The algorithm steps are detailed below.
7.4.2.2.1 Algorithm Initialization
Uplink received powers on carrier ic, , and , at base station S
j
are initialised to 0 W
(no connected mobile).
7.4.2.2.2 Presentation of the Algorithm
The algorithm is detailed for any iteration k. X
k
is the value of the variable X at the iteration k. In the algorithm, is
the minimum pilot quality level on uplink.
In case of 1xEV-DO Rev. 0 users, this threshold depends on the user mobility type and is defined in the Mobility
parameters table.
For 1xEV-DO Rev. A users, the value of depends on the user requested data rate. This data rate can be obtained
by using a certain uplink 1xEV-DO Rev. A radio bearer ( ) in a certain number of subframes ( ).
is the value defined in the 1xEV-DO Rev. A Radio Bearer Selection (Uplink) table for the combination (radio
bearer Index, mobility and number of subframe) providing the user requested data rate. Two values are available for this
parameter, one when the service uplink mode is "Low Latency" and another one for high capacity services.
All variables are described in Definitions and formulas part (see "Definitions and Formulas" on page 310).
The algorithm applies to single frequency band networks and to dual-band networks. Dual-band terminals can have the
following configurations:
- Configuration 1: The terminal can work on f1 and f2 without any priority (select "All" as main frequency band
in the terminal property dialogue).
- Configuration 2: The terminal can work on f1 and f2 but f1 has a higher priority (select "f1" as main frequency
band and "f2" as secondary frequency band in the terminal property dialogue).
For each mobile M
i
Determination of M
i
s Best Server (S
BS
(M
i
))
For each transmitter Sj containing M
i
in its calculation area and working on the main frequency band supported by the M
i
s
terminal (i.e. either f1 for a single frequency band network, or f1 or f2 for a dual-band terminal with the configuration 1, or
f1 for a dual-band terminal with the configuration 2).
Calculation of
Determination of the best transmitter, S
BS
, for each carrier ic.
For each carrier ic, selection of the transmitter with the highest , .
Analysis of candidate cells, (S
BS
,ic).
For each pair (S
BS
,ic), calculation of the uplink load factor:
Rejection of bad candidate cells if the pilot is not received or if the uplink load factor is exceeded during the admission load
control (if simulation respects a loading factor constraint and M
b
was not connected in previous iteration)
If then (S
BS
,ic) is rejected by M
i
If , then (S
BS
,ic) is rejected by M
i
Else
Keep (S
BS
,ic) as good candidate cell
For dual band terminals with the configuration 1 or terminals working on one frequency band only, if no good candidate
cell has been selected, M
i
has failed to be connected to the network and is rejected.
I
tot
UL
i ntra
i c ( ) I
tot
UL
ext ra
i c ( ) I
i nter carri er
UL
i c ( )
X
k
UL
S
j
i c , ( )
I
tot
UL
S
j
i c , ( )
N
tot
UL
S
j
i c , ( )
----------------------------- 0 = =
E
c
N
t
------
\ .
| |
mi n
UL
E
c
N
t
------
\ .
| |
mi n
UL
Index
UL RevA Bearer
n
SF
E
c
N
t
------
\ .
| |
mi n
UL
Q
pi l ot
k
Sj i c M
i
, , ( )
o
BTS
P
c
Sj M
i
i c b
pi l ot
, , , ( )
P
tot
DL
Sj i c b
pi l ot
, , ( ) I
extra
DL
i c b
pi l ot
, ( ) I
i nter carri er
DL
i c b
pi l ot
, ( ) N +
0
Term
+ +
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
Q
pi l ot
k
Sj M
i
i c , , ( ) S
BS
M
i
( )
X
k
UL
S
BS
i c , ( )
I
tot
UL
S
BS
i c , ( )
N
tot
UL
S
BS
i c , ( )
---------------------------------- AX
UL
+ =
Q
pi l ot
k
S
BS
M
i
i c , , ( ) Q
req
pi l ot
<
X
k
UL
S
BS
i c , ( ) X
max
UL
>
Forsk 2010 AT283_TRG_E2 343
Chapter 7: CDMA2000 Networks
For dual band terminals with the configuration 2, if no good candidate cell has been selected, try to connect M
i
to
transmitters txi containing M
i
in their calculation area and working on the secondary frequency band supported by the M
i
s
terminal (i.e. f2). If no good candidate cell has been selected, M
i
has failed to be connected to the network and is rejected.
Determination of the best carrier, ic
BS
.
If a given carrier is specified for the service requested by M
i
is the carrier specified for the service
Else the carrier selection mode defined for the site equipment is considered.
If carrier selection mode is Min. UL Load Factor
is the cell with the lowest
Else if carrier selection mode is Min. DL Total Power
is the cell with the lowest
Else if carrier selection mode is Random
is randomly selected
Else if carrier selection mode is "Sequential"
is the first carrier where
Endif
is the best serving cell ( ) and its pilot quality is
In the following lines, we will consider as the carrier used by the best serving cell.
Determination of the Active Set
For each station S
j
containing M
i
in its calculation area, using ic, and if neighbours are used, neighbour of S
BS
(M
i
)
Calculation of
Rejection of station S
j
if the pilot is not received
If then S
j
is rejected by M
i
Else S
j
is included in the M
i
active set
Rejection of S
j
if the M
i
active set is full
Station with the lowest in the active set is rejected
EndFor
Uplink Power Control
Calculation of the required power for M
i
,
For each cell (S
j,
ic) present in the M
i
active set
Calculation of quality level on M
i
traffic channel at (S
j
,ic), with the minimum power allowed on traffic channel for the M
i
service
If the user selects the option Total noise
End For
If (M
i
is not in handoff)
i c
BS
M
i
( )
i c
BS
M
i
( ) X
k
UL
S
BS
i c , ( )
i c
BS
M
i
( ) P
tx
S
BS
i c , ( )
k
i c
BS
M
i
( )
i c
BS
M
i
( ) X
k
UL
S
BS
i c , ( )X
max
UL
S
BS
i c
BS
( , )
k
M
i
( ) BestCel l
k
M
i
( ) Q
pi l ot
k
max
M
i
( )
i c
Q
pi l ot
k
M
i
S
j
i c , , ( )

BTS
o P
tot
DL
M
i
S
j
i c b
pi l ot
, , , ( )
I
0
DL
i c b
pi l ot
, ( )
----------------------------------------------------------------------------------- =
Q
pi l ot
k
M
i
S
j
i c , , ( ) Q
pi l ot
mi n
<
Q
pi l ot
k
P
term
req
M
i
i c , ( )
k
P
b
UL
M
i
S
j
i c , , ( )
P
term
req
M
i
i c , ( )
k 1
L
T
M
i
S
j
, ( )
------------------------------------------- =
Q
UL
M
i
S
j
i c , , ( )
k

term
P
b
UL
M
i
S
j
i c , , ( )
N
tot
UL
i c ( ) 1 F
MUD
Tx
( )
term
P
b
UL
M
i
S
j
i c , , ( )
----------------------------------------------------------------------------------------------------------------------- G
p
UL
Servi ce ( ) =
Q
UL
M
i
S
j
i c , , ( )
k

term
P
b
UL
M
i
S
j
i c , , ( )
N
tot
UL
i c ( )
--------------------------------------------------------- G
p
UL
Servi ce ( ) =
344 AT283_TRG_E2 Forsk 2010
Technical Reference Guide

Else if (M
i
is in softer handoff)
Else if (M
i
is in soft or softer/soft without MRC)
Else if (M
i
is in soft/soft)
Else if (M
i
is in softer/soft with MRC)
EndIf
If the service of M
i
uses Transmission Control Protocol (TCP)
For the best server cell (S
k
,ic) of M
i
Calculation of the M
i
downlink application throughput
Calculation of
Calculation of the maximum data rate supplied to M
i
,
Calculation of pilot quality level at M
i
If M
i
is an 1xEV-DO Rev. 0 service user, determination of the maximum data rate from the graph (Max rate=f(C/I)) specified
for the mobility type of M
i
If M
i
is an 1xEV-DO Rev. A service user, selection of the downlink 1xEV-DO Rev. A radio bearer ( ):
where
Determination of the maximum data rate:
Determination of the uplink data rate due to TCP acknowledgements, from the graph (UL Thr due to
TCP=f(DL Thr) specified for the service of M
i
Determination of the nearest lower and higher supported rates ( and ) for
For and , calculation of and
Q
total
k
UL
M
i
( ) Q
UL
M
i
S
j
i c , , ( ) =
Q
total
k
UL
M
i
( ) f
rake efficiency
UL
Q
UL
M
i
S
j
i c , , ( )
k
S
j
Acti veSet e

=
Q
total
k
UL
M
i
( ) Max
I
AS
Acti veSet e
Q
UL
M
i
S
j
i c , , ( )
k
( ) G
macro di versi ty
UL
( )
2 links
=
Q
total
k
UL
M
i
( ) Max
I
AS
Acti veSet e
Q
UL
M
i
S
j
i c , , ( )
k
( ) G
macro di versi ty
UL
( )
3 links
=
Q
total
k
UL
M
i
( ) Max f
rake efficiency
UL
Q
UL
M
i
S
j
i c , , ( )
k
i
AS
Acti veSet e
(same site)

Q
UL
M
i
S
j
i c , , ( )
k
othersi te
,
\ .
|
|
|
|
| |
G
macro di versi ty
UL
( )
2 links
=
P
term
req
M
i
i c , ( )
k
Q
req
UL
Servi ce M
i
( ) Term M
i
( ) Mobi l i ty M
i
( ) , , ( )
Q
total
k
UL
M
i
( )
----------------------------------------------------------------------------------------------------------------------- P
term
req
M
i
i c , ( )
k 1
=
N
tot
DL
i c b
traffi c
, ( )
N
tot
DL
i c b
traffi c
, ( ) P
tot
DL
S
j
i , c b
traffi c
, ( )
j j k = ,

P
tot
DL
txj i c
adj
b
traffi c
, , ( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------------------------------------- N
0
term
+ + =
R
max
DL
M
i
S
k
, ( )
E
c
N
t
------ M
i
S
k
i c b
pi l ot
, , , ( )
P
tot
DL
M
i
S
k
i c b
pi l ot
, , , ( )
N
tot
DL
i c b
pi l ot
, ( )
------------------------------------------------------- =
R
max
DL
M
i
S
k
, ( ) f
E
c
N
t
------ M
i
S
k
i c b
pi l ot
, , , ( )
\ .
| |
=
Index
DL R evA Bearer
Index
DL R evA Bearer
E
c
N
t
------ M
i
S
k
i c b
pi l ot
, , , ( )
E
c
N
t
------ Index
DL R evA Bearer
( )
\ .
| |
mi n
DL
>
R
max
DL
M
i
S
k
, ( )
R
RLC Peak
DL
Index
DL R evA Bearer
( )
n
TS
Index
DL R evA Bearer
( )
-------------------------------------------------------------------------------------------- =
R
appl i cati on
DL
M
i
S
k
, ( ) R =
max
DL
M
i
S
k
, ( ) SF
rate
Servi ce Mi ( ) ( ) AR Servi ce Mi ( ) ( )
R
TCP ACK
UL
M
i
S
k
, ( )
R
TCP ACK
UL
M
i
S
k
, ( ) f R
appl i cati on
DL
M
i
S
k
, ( ) ( ) =
R
l ow
UL
R
hi gh
UL
R
TCP ACK
UL
M
i
S
k
, ( )
R
l ow
UL
R
hi gh
UL
CI
req
UL
R
l ow
UL
( ) CI
req
UL
R
hi gh
UL
( )
Forsk 2010 AT283_TRG_E2 345
Chapter 7: CDMA2000 Networks
for DO Rev.0 terminals
And
for DO Rev.A terminals
EndFor
Linear interpolation of between and
EndIf
If then:
Downgrading the traffic data channel data rate:
While
And for DO-Rev.0 users or for DO-Rev.A users
( is the nearest lower supported data
rate)
EndWhile
If then M
i
is rejected
Endif
Endif
Uplink Interference Updates
Update of interference on active mobiles only (old contributions of mobiles and stations are replaced by the new ones)
For each cell (S
j
,ic)
Update of
EndFor
Control of Radio Resource Limits (Number of EVDO users, MAC Indices and Site Channel Elements)
For each cell (S
j
,ic)
While
Rejection of the last admitted mobile
EndFor
For each cell (S
j
,ic)
While
Rejection of the last admitted mobile
EndFor
For each site (Node B) Nl
While
Rejection of the last admitted mobile
EndFor
CI
req
UL
E
c
N
t
------
\ .
| |
mi n
UL
1 G
DRC
G
TCH
+ + ( ) =
CI
req
UL
E
c
N
t
------
\ .
| |
mi n
UL
1 G
DRC
G
TCH
G
RRI
G
Auxi l i ary pi l ot
+ + + + ( ) =
CI
req
UL
R
TCP ACK
UL
( ) CI
req
UL
R
l ow
UL
( ) CI
req
UL
R
hi gh
UL
( )
CI
req
UL
CI
req
UL
R
UL
( ) CI
req
UL
R
TCP ACK
UL
( ) + =
Q
req
UL
CI
req
UL W
R
UL
R
TCP ACK
UL
+ ( )
-------------------------------------------------- =
P
term
req
M
i
i c , ( )
k
Max P
term
req
M
i
i c , ( )
k
P
term
mi n
M
i
S
j
, ( ) , ( ) =
P
term
req
M
i
i c , ( )
k
P
term
max
M
i
( ) >
P
term
req
M
i
i c , ( )
k
P
term
max
M
i
( ) >
R
UL
Servi ce M
i
( ) ( ) 9.6kbps > R
UL
Servi ce M
i
( ) ( ) 4.8kbps >
P
term
req
M
i
i c , ( )
k
P
term
req
M
i
i c , ( )
k
R
l ow
UL
Servi ce M
i
( ) ( )
--------------------------------------------------- R
UL
Servi ce M
i
( ) ( ) =
R
l ow
UL
Servi ce M
i
( ) ( )
R
UL
Servi ce M
i
( ) ( ) R
l ow
UL
Servi ce M
i
( ) ( ) =
P
term
req
M
i
i c , ( )
k
P
term
max
M
i
( ) >
N
tot
UL
S
j
i c , ( )
n
EVDO
S
j
i c , ( ) n
max
EVDO
S
j
i c , ( ) >
N
MacIndexes
S
j
i c , ( ) N
max
MacIndexes
S
j
i c , ( ) >
N
EVDO CE
N
I
( )
k
N
max
EVDO CE
N
I
( ) >
346 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Uplink Load Factor Control
For each cell (S
j
,ic) with
While and there is at least one mobile that can be downgraded
Downgrading the traffic data channel rate for all 1xEV-DO Rev. 0 mobiles for which the data rate transition flag is set to
"True".
Update of
Endwhile
For each cell (S
j
,ic) with
While and there is at least one mobile that can be upgraded
Upgrading the traffic data channel rate for all 1xEV-DO Rev. 0 mobiles for which the data rate transition flag is set to "True".
Update of
Endwhile
For each cell (S
j
,ic) with
While and there is at least one mobile to be downgraded
Downgrading the traffic data channel rate for the 1xEV-DO Rev. A mobile with the highest data rate
Update of
Endwhile
For each cell (S
j
,ic) with
While and there is at least one mobile to be upgraded
Upgrading the traffic data channel rate for the 1xEV-DO Rev. A mobile with the lowest data rate (only 1xEV-DO Rev. A
mobiles which have not been downgraded can be upgraded. In addition, the upgraded data rate cannot exceed the initial
user data rate drawn by the Monte-Carlo algorithm. This means that only mobiles downgraded during the uplink power
control step can be upgraded)
Update of
Endwhile
For each cell (S
j
,ic) with
Rejection of a mobile with the lowest service priority
EndFor
While at least one cell with exists
Downlink Data Rate Control
For each mobile M
i
connected to a cell (S
k
,ic)
Calculation of
For each cell (S
j
,ic) ( )
Determination of the number of mobiles connected to the cell (S
j
,ic),
If then,
Else
EndFor
EndFor
Calculation of the maximum data rate supplied to M
i
,
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) + >
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) + >
N
tot
UL
S
j
i c , ( )
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) <
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) <
N
tot
UL
S
j
i c , ( )
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) + >
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) + >
N
tot
UL
S
j
i c , ( )
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) <
NR
UL
S
j
i c , ( ) NR
threshol d
UL
S
j
i c , ( ) ANR
threshol d
UL
S
j
i c , ( ) <
N
tot
UL
S
j
i c , ( )
X
UL
S
j
i c , ( ) X
max
UL
>
X
UL
S
j
i c , ( ) X
max
UL
>
N
tot
DL
i c b
traffi c
, ( )
k j =
N
mobi l es
S
j
i c , ( )
N
mobi l es
S
j
i c , ( ) 0 = P
tx
S
j
i c b
traffi c
, , ( ) G
i dl e power
P
max
S
j
i c , ( ) =
P
tx
S
j
i c b
traffi c
, , ( ) P
max
S
j
i c , ( ) =
N
tot
DL
i c b
traffi c
, ( ) P
tot
DL
S
j
i c b
traffi c
, , ( )
j j k = ,

N
0
term
+ =
R
max
DL
Forsk 2010 AT283_TRG_E2 347
Chapter 7: CDMA2000 Networks
For the best server cell (S
k
,ic) of M
i
Calculation of pilot quality level at M
i
If M
i
is an 1xEV-DO Rev. 0 service user, determination of the maximum data rate from the graph (Max rate=f(C/I)) specified
for the mobility type of M
i
If M
i
is an 1xEV-DO Rev. A service user, selection of the downlink 1xEV-DO Rev. A radio bearer ( ):
for which
Determination of the maximum data rate:
EndFor
Calculation of the average cell data rate,
For each cell (S
j
,ic)
If , then
Else if , determination of the multi-user gain from the graph (MUG table=f(nb users)) specified
for (S
j
,ic)
EndIf
EndFor
7.4.2.2.3 Convergence Criterion
The algorithm convergence is studied on uplink only. The uplink convergence criterion is evaluated at each iteration, and
can be written as follow:
Atoll stops the algorithm if:
1
st
case: Between two successive iterations, is lower ( ) than the threshold (defined when creating a simulation).
The simulation has reached convergence.
Example: Let us assume that the maximum number of iterations is 100, UL convergence threshold is set to 5. If
between the 4
th
and the 5
th
iteration, Atoll stops the algorithm after the 5
th
iteration. Convergence has been achieved.
2
nd
case: After 30 iterations, is still higher than the threshold and from the 30
th
iteration, does not decrease
during the next 15 successive iterations.
The simulation has not reached convergence (specific divergence symbol).
Examples: Let us assume that the maximum number of iterations is 100, UL convergence threshold is set to 5.
1. After the 30
th
iteration, equals 100 and do not decrease during the next 15 successive iterations: Atoll stops the
algorithm at the 46
th
iteration. Convergence has not been achieved.
2. After the 30
th
iteration, equals 80, it starts decreasing slowly until the 40
th
iteration (without going under the
threshold) and then does not change during the next 15 successive iterations: Atoll stops the algorithm at the 56
th
iteration
without achieving convergence.
3
rd
case: After the last iteration.
If is still strictly higher than the threshold, the simulation has not converged (specific divergence symbol).
E
c
N
t
------ M
i
S
k
i c b
pi l ot
, , , ( )
P
tot
DL
M
i
S
k
i c b
pi l ot
, , , ( )
N
tot
DL
i c b
pi l ot
, ( )
------------------------------------------------------- =
R
max
DL
M
i
S
k
, ( ) f
E
c
N
t
------ M
i
S
k
i c b
pi l ot
, , , ( )
\ .
| |
=
Index
DL R evA Bearer
Index
DL R evA Bearer
E
c
N
t
------ M
i
S
k
i c b
pi l ot
, , , ( )
E
c
N
t
------ Index
DL R evA Bearer
( )
\ .
| |
mi n
DL
>
R
max
DL
M
i
S
k
, ( )
R
RLC Peak
DL
Index
DL R evA Bearer
( )
n
TS
-------------------------------------------------------------------------------------------- =
R
av
DL
N
mobi l es
S
j
i c , ( ) 1 = R
av
DL
S
j
i c , ( ) R
max
DL
M
i
S
j
i c , , ( ) =
N
mobi l es
S
j
i c , ( ) 1 > G
MU
R
av
DL
S
j
i c , ( )
G
MU
N
mobi l es
S
j
i c , ( ) ( )
R
max
DL
M
i
S
j
i c , , ( )
M
i
N
mobi l es
S
j
i c , ( ) e

N
mobi l es
S
j
i c , ( )
---------------------------------------------------------------------- 1 ER
DRC
S
j
i c , ( ) ( )
N
mobi l es
( )
1 TS
BCMCS
S
j
i c , ( ) TS
EVDO CCH
S
j
i c , ( ) ( ) R
BCMCS
S
j
i c , ( ) TS
BCMCS
S
j
i c , ( ) +
=
A
UL
max i nt max
Stati ons
I
tot
UL
i c ( )
k
I
tot
UL
i c ( )
k 1

I
tot
UL
i c ( )
k
------------------------------------------------------
100
\ .
|
| |
i nt max
Stati ons
N
user
UL
i c ( )
k
N
user
UL
i c ( )
k 1

N
user
UL
i c ( )
k
------------------------------------------------------------------
100
\ .
|
| |
,
\ .
|
| |
=
A
UL
s
A
UL
5 s
A
UL
A
UL
A
UL
A
UL
A
UL
348 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
If is lower than the threshold, the simulation has converged.
7.4.3 Appendices
7.4.3.1 Admission Control
During admission control, Atoll calculates the uplink load factor of a considered cell assuming the mobile concerned is
connected with it. Here, activity status assigned to users is not taken into account. So even if the mobile is not active on
UL, it can be rejected due to cell load saturation. To calculate the cell UL load factor, either Atoll takes into account the
mobile power determined during power control if mobile was connected in previous iteration, or it estimates a load rise due
to the mobile and adds it to the current load. The load rise ( ) is calculated as follows:
In case of CDMA2000 1xRTT networks, we have:
and
7.4.3.2 Resources Management
7.4.3.2.1 Walsh Code Management
Walsh codes are managed on the downlink during a simulation in case of CDMA2000 1xRTT networks. Atoll performs
Walsh code allocation during the radio resource control step.
Walsh codes form a binary tree with codes of a longer length generated from codes of a shorter length. Length-k Walsh
codes are generated from length-k/2 Walsh codes. Therefore, if a channel needs 1 length-k/2 Walsh code, it is equivalent
to using 2 length-k Walsh codes, or 4 length-2k Walsh codes and so on.
128 128-bit-length Walsh codes per cell are available in CDMA2000 documents.
During the resource control, Atoll determines the number of 128-bit-length Walsh codes that will be consumed by each
cell. Therefore, it allocates :
A code with the longest length (i.e. a 128 bit-length code) per common channel for each cell. The number of
common channels per cell corresponds to the value defined for the DL overhead resources for common channels
per cell parameter available in the site equipment properties.
Two 128 bit-length codes per cell-receiver link for FCH in RC1, RC2, RC3 or RC5 and only one for FCH in RC4.
The number of 128 bit-length codes to be allocated per cell-receiver link for SCH (in case SCH is supported by the
user radio configuration), , is determined as follows:
for RC1, RC2, RC3 and RC5,
And
for RC4.
Where
is the SCH rate factor.
The Walsh code allocation follows the Buddy algorithm, which guarantees that:
If a k-length Walsh code is used, all of its children with lengths 2k, 4k, , cannot be used as they are not
orthogonal.
A
UL
AX
UL
AX
UL 1
1
W
Q
req
UL
R
UL

----------------------------- +
--------------------------------------- =
Q
req
UL
Q
req
UL
( )
FCH
Q
req
UL
( )
SCH
+ = R
UL
R
FCH
UL
R
SCH
UL
+ =
Figure 7.3Walsh Code Tree Indices (Not Walsh Code Numbers)
N
128 bits
Walsh codes
N
128 bits
Walsh codes
Frate
SCH
DL
2 =
N
128 bits
Walsh codes
Frate
SCH
DL
=
Frate
SCH
DL
Forsk 2010 AT283_TRG_E2 349
Chapter 7: CDMA2000 Networks
If a k-length Walsh code is used, all of its ancestors with lengths k/2, k/4, , cannot be used as they are not
orthogonal.
7.4.3.2.2 Channel Element Management
Channel elements are controlled in the simulation.
CDMA2000 1xRTT networks
Atoll checks the availability of this resource on uplink and downlink.
On uplink, Atoll consumes channel elements for each cell j on a site N
I
. This figure includes:
channel elements for control channels (Pilot channel),
per cell-receiver link, for TCH (TCH correspond to Traffic channels i.e. FCH and
SCH).
Therefore, the number of channel elements required on uplink at the site level, , is:
On downlink, Atoll consumes channel elements for each cell j on a site N
I
. This figure includes:
channel elements for control channels (Pilot channel, Synchronisation channel, Paging
channel),
per cell-receiver link, for TCH (TCH correspond to Traffic channels i.e. FCH and
SCH).
Therefore, the number of channel elements required on downlink at the site level, , is:
CDMA2000 1xEV-DO networks
On uplink, Atoll consumes channel elements for each cell j on a site N
I
. This figure includes:
2 channel elements for control channels (Pilot channel, Data Rate Control channel, etc ). This value is fixed and
hard-coded.
per cell-receiver link, for TCH (Traffic channels).
Therefore, the number of channel elements required on uplink at the site level, , is:
On downlink, only one user can be served by a cell at a time, so this resource is not limited.
7.4.3.3 Downlink Load Factor Calculation
Atoll calculates the downlink load factor for each cell (available in the Cells tab of any given simulation results) and each
connected mobile (available in the Mobiles tab of any given simulation results).
7.4.3.3.1 Downlink Load Factor per Cell
The downlink load factor is calculated for each CDMA2000 1xRTT cell.
Notes:
The Walsh code allocation follows the mobile connection order (mobile order in the Mobiles
tab).
The Walsh code and channel element management is dealt with differently in case of
softer handoff. Atoll allocates Walsh codes for each transmitter-receiver link while it
assigns channel elements globally to a site.
Note:
In case of softer handover (the mobile has several links with co-site cells), Atoll allocates
channel elements for the best serving cell-mobile link only.
N
CE UL
j ( )
N
Overhead CE UL
N
FCH CE UL
1 Frate +
SCH
UL
( )
N
CE UL
N
I
( )
N
CE UL
N
I
( ) N
CE UL
j ( )
j N
I
e

=
N
CE DL
j ( )
N
Overhead CE DL
N
FCH CE DL
1 Frate
SCH
DL
+ ( )
N
CE DL
N
I
( )
N
CE DL
N
I
( ) N
CE DL
j ( )
j N
I
e

=
N
CE UL
j ( )
N
TCH CE UL
N
CE UL
N
I
( )
N
CE UL
N
I
( ) N
CE UL
j ( )
j N
I
e

=
350 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Approach for downlink load factor evaluation is highly inspired by the downlink load factor defined in the book WCDMA
for UMTS by Harry Holma and Antti Toskala.
Let be the required quality.
So, we have
In case of soft handoff, required quality is limited to the effective contribution of the transmitter.
where
At mobile level, we have a required power, P
tch
:
where
is the total power received at receiver from the cell to which it is connected.
is the total power received at receiver from other cells.
is the inter-carrier interference received at receiver.
is the inter-technology interference received at receiver.
We have:
CI
req
Q
req
DL FCH
G
p
DL FCH
-------------------------
Q
req
DL SCH
G
p
DL SCH
------------------------- + =
CI
req
CI
req
FCH
CI
req
SCH
+ =
P
tx
DL
i c ( ) P
pi l ot
i c ( ) P
sync
i c ( ) P
pagi ng
i c ( ) P
SCH
i c ( ) P
FCH
i c ( ) + + + + P
CCH
ortho
i c ( ) P
tch
i c ( )
tch

+ = =
P
CCH
ortho
i c ( ) P
pi l ot
i c ( ) P
sync
i c ( ) P
pagi ng
i c ( ) + + =
P
tch
i c ( )
tch

P
SCH
i c ( ) P
FCH
i c ( ) + =
P
tch
i c ( ) CI
req
I
extra
i c ( ) I
i ntra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) N + +
0
term
+ + ( ) L
T
=
P
tch
i c ( ) CI
req
I
extra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) + +
1 F
ortho

BTS
( )
P
tx
DL
i c ( ) P
tch
i c ( )
L
T
-----------------------------------------------
\ .
|
| |
N
0
term
+ +
\ .
|
|
|
|
| |
L
T
=
P
tch
i c ( )
I
extra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) + + ( ) L
T
1 F
ortho

BTS
( ) P
tx
DL
i c ( ) N
0
term
L
T
+ +
1
CI
req
------------- 1 F
ortho

BTS
( ) +
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
I
i ntra
DL
i c ( )
I
extra
DL
i c ( )
I
i nter carri er
i c ( )
I
i nter techno y log
i c ( )
P
tx
DL
i c ( ) P
CCH
ortho
i c ( )
I
extra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) + + ( ) L
T

1 F
ortho

BTS
( ) P
tx
DL
i c ( ) N
0
term
L
T
+ +
\ .
|
|
| |
1
CI
req
------------- 1 F
ortho

BTS
( ) +
------------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
|
|
|
|
| |
tch

+ =
P
tx
DL
i c ( ) P
CCH
ortho
i c ( )
I
extra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) + + ( ) L
T

P
tx
DL
i c ( )
--------------------------------------------------------------------------------------------------------------------------------------------------
1 F
ortho

BTS
( ) P
tx
DL
i c ( ) N
0
term
L
T
+ +
\ .
|
|
|
|
| |
1
CI
req
------------- 1 F
ortho

BTS
( ) +
------------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
|
|
|
|
|
|
|
|
| |
tch

+ =
P
tx
DL
i c ( )
I
extra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) + + ( ) L
T

P
tx
DL
i c ( )
-------------------------------------------------------------------------------------------------------------------------------------------------- 1 F
ortho

BTS
+
\ .
|
| |
tch

1
CI
req
------------- 1 F
ortho

BTS
( ) +
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
|
|
| |
P
tx
DL
i c ( )
P
CCH
ortho
i c ( )
N
0
term
L
T

1
CI
req
------------- 1 F
ortho

BTS
( ) +
---------------------------------------------------------------------
tch

+
\ .
|
|
|
| |
=
Forsk 2010 AT283_TRG_E2 351
Chapter 7: CDMA2000 Networks
Therefore, the downlink load factor can be expressed as:
The downlink load factor represents the signal degradation in relative to the reference interference (thermal noise).
7.4.3.3.2 Downlink Load Factor per Mobile
Atoll evaluates the downlink load factor for any connected mobile (CDMA2000 1xRTT 1xEV-DO user) as follows,
7.4.3.4 Best Server Determination in Monte Carlo Simulations - Old Method
Before Atoll 2.8.0, best server determination used to be performed by selecting the best carrier within transmitters
according to the selected method (site equipment) and then the best transmitter using the best carrier. To switch back to
this method, add the following lines in the Atoll.ini file:
The method is described below:
For each station Sj containing M
i
in its calculation area and using the main frequency band supported by the M
i
s terminal
(i.e. either f1 for a single frequency band network, or f1 or f2 for a dual-band terminal without any priority on frequency
bands, or f1 for a dual-band terminal with f1 as main frequency band).
Determination of .
If a given carrier is specified for the service requested by Mi and if it is used by S
j
is the carrier specified for the service.
Else the carrier selection mode defined for S
j
is considered.
If carrier selection mode is Min. UL Load Factor
For each carrier ic used by S
j
, we calculate current loading factor:
EndFor
is the carrier with the lowest
Else if carrier selection mode is Min. DL Total Power
is the carrier with the lowest
Else if carrier selection mode is Random
is randomly selected
Else if carrier selection mode is "Sequential"
is the first carrier so that
Calculation of
Rejection of station S
j
if the pilot is not received
P
tx
DL
i c ( )
P
CCH
ortho
i c ( )
N
0
term
L
T

1
CI
req
------------- 1 F
ortho

BTS
( ) +
---------------------------------------------------------------------
tch

+
\ .
|
|
|
| |
1
I
extra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) + + ( ) L
T

P
tx
DL
i c ( )
-------------------------------------------------------------------------------------------------------------------------------------------------- 1 F
ortho

BTS
+
1
CI
req
------------- 1 F
ortho

BTS
( ) +
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
tch

\ .
|
|
|
|
| |
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
X
DL
I
extra
i c ( ) I
i nter carri er
i c ( ) I
i nter techno y log
i c ( ) + + ( ) L
T

P
tx
DL
i c ( )
-------------------------------------------------------------------------------------------------------------------------------------------------- 1 F
ortho

BTS
+
1
CI
req
------------- 1 F
ortho

BTS
( ) +
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
|
| |
tch

=
X
DL
I
tot
DL
i c ( )
N
tot
DL
i c ( )
-------------------- =
[CDMA]
MultiBandSimu = 0
BestCarri er
k
S
j
M
i
, ( )
BestCarri er
k
S
j
M
i
, ( )
X
k
UL
S
j
i c , ( )
I
tot
UL
S
j
i c , ( )
N
tot
UL
S
j
i c , ( )
----------------------------- AX
UL
+ =
BestCarri er
k
S
j
M
i
, ( ) X
k
UL
S
j
i c , ( )
BestCarri er
k
S
j
M
i
, ( ) P
tx
S
j
i c , ( )
k
BestCarri er
k
S
j
M
i
, ( )
BestCarri er
k
S
j
M
i
, ( ) X
k
UL
S
j
i c , ( ) X
max
UL
s
Q
pi l ot
k
M
i
S
j
BestCarri er , , ( )
o
BTS
P
c
M
i
S
j
BestCarri er , , ( )
I
0
DL
BestCarri er
k
S
j
M
i
, ( ) ( )
--------------------------------------------------------------------------------------------- =
352 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
If then S
j
is rejected by M
i
If
Admission control (If simulation respects a load factor constraint and M
i
was not connected in previous iteration).
If , then S
j
is rejected by M
i
Else
Endif
EndFor
If no S
BS
has been selected and M
i
s terminal can work on one frequency band only, M
i
has failed to be connected to the
network and is rejected.
If no S
BS
has been selected and M
i
s terminal can work on another frequency band.
Determination of for each station txj containing M
i
in its calculation area and using another
frequency band supported by the M
i
s terminal (i.e. f1 or f2 for a dual-band terminal without any priority on frequency
bands, or f2 for a dual-band terminal with f2 as secondary frequency band)
If a given carrier is specified for the service requested by Mi and if it is used by S
j
is the carrier specified for the service.
Else the carrier selection mode defined for S
j
is considered.
If carrier selection mode is Min. UL Load Factor
For each carrier ic used by S
j
, we calculate current loading factor:
EndFor
is the carrier with the lowest
Else if carrier selection mode is Min. DL Total Power
is the carrier with the lowest
Else if carrier selection mode is Random
is randomly selected
Else if carrier selection mode is "Sequential"
is the first carrier so that
Calculation of
Rejection of station S
j
if the pilot is not received
If then S
j
is rejected by M
i
If
Admission control (If simulation respects a load factor constraint and M
i
was not connected in previous iteration).
If , then S
j
is rejected by M
i
Else
Endif
EndFor
Q
pi l ot
k
M
i
S
j
BestCarri er , , ( ) Q
req
pi l ot
<
Q
pi l ot
k
M
i
S
j
BestCarri er , , ( ) Q
pi l ot
k
max
M
i
( ) >
X
k
UL
S
j
BestCarri er
k
S
j
M
i
, ( ) , ( ) X
max
UL
>
Q
pi l ot
k
max
M
i
( ) Q
pi l ot
k
M
i
S
j
BestCarri er , , ( ) =
S
BS
M
i
( ) S
j
=
BestCarri er
k
Sj M
i
, ( )
BestCarri er
k
S
j
M
i
, ( )
X
k
UL
S
j
i c , ( )
I
tot
UL
S
j
i c , ( )
N
tot
UL
S
j
i c , ( )
----------------------------- AX
UL
+ =
BestCarri er
k
S
j
M
i
, ( ) X
k
UL
S
j
i c , ( )
BestCarri er
k
S
j
M
i
, ( ) P
tx
S
j
i c , ( )
k
BestCarri er
k
S
j
M
i
, ( )
BestCarri er
k
S
j
M
i
, ( ) X
k
UL
S
j
i c , ( ) X
max
UL
s
Q
pi l ot
k
M
i
S
j
BestCarri er , , ( )
o
BTS
P
c
M
i
S
j
BestCarri er , , ( )
I
0
DL
BestCarri er
k
S
j
M
i
, ( ) ( )
--------------------------------------------------------------------------------------------- =
Q
pi l ot
k
M
i
S
j
BestCarri er , , ( ) Q
req
pi l ot
<
Q
pi l ot
k
M
i
S
j
BestCarri er , , ( ) Q
pi l ot
k
max
M
i
( ) >
X
k
UL
S
j
BestCarri er
k
S
j
M
i
, ( ) , ( ) X
max
UL
>
Q
pi l ot
k
max
M
i
( ) Q
pi l ot
k
M
i
S
j
BestCarri er , , ( ) =
S
BS
M
i
( ) S
j
=
Forsk 2010 AT283_TRG_E2 353
Chapter 7: CDMA2000 Networks
If no S
BS
has been selected, M
i
has failed to be connected to the network and is rejected.
7.5 CDMA2000 Prediction Studies
7.5.1 Point Analysis: The AS Analysis Tab
Let us assume a receiver with a terminal, a mobility type and a service with certain UL and DL rates. This receiver does
not create any interference. You can make the prediction for a specific carrier or for all carriers of a same type. The type
of carrier and the carriers you can select depend on the service and on the frequency band(s) supported by the terminal.
The analysis is based on the uplink load percentage and the downlink total power of cells. These parameters can be either
outputs of a given simulation, average values calculated from a group of simulations, or user-defined cell inputs.
7.5.1.1 Bar Graph and Pilot Sub-Menu
We can consider the following cases:
1
st
case: Analysis based on a specific carrier
The carrier that can be used by transmitters is fixed. In this case, for each transmitter i containing the receiver in its
calculation area and using the selected carrier, Atoll calculates the pilot quality at the receiver on this carrier. Then, it
determines the best serving transmitter using the selected carrier ic.
2
nd
case: Analysis based on all carriers
Atoll determines the best carrier for each transmitter i which contains the receiver in its calculation area and uses a
frequency band supported by the receivers terminal. The best carrier selection depends on the option selected for the site
equipment (UL minimum noise, DL minimum power, random, sequential). Then, Atoll calculates the pilot quality at the
receiver from these transmitters on their best carriers (ic) and defines the best server (on its best carrier).
Atoll provides the same outputs in the bar graph and pilot sub-menu whichever the studied network, CDMA2000 1xRTT
or 1xEV-DO.
48. Ec/I0 (or ) evaluation
We assume that ic is the best carrier of a transmitter i containing the receiver in its calculation radius.
For CDMA2000 1xRTT users we have,

with
For CDMA2000 1xEV-DO users, we have,
With
The calculation of can be divided into 6 steps explained in the table below.
Q
pi l ot
i c ( )
Q
pi l ot
i i c , ( )

BTS
o P
c
i i c , ( )
I
0
DL
i c ( )
-------------------------------------------------- =
I
0
DL
i c ( ) P
tot
DL
i i c , ( ) I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( ) N + +
0
term
+ + =
Q
pi l ot
i i c , ( )

BTS
o P
tot
DL
i i c b
pi l ot
, , ( )
I
0
DL
i c b
pi l ot
, ( )
---------------------------------------------------------------------- =
I
0
DL
i c b
pi l ot
, ( ) P
tot
DL
i i c b
pi l ot
, , ( ) I
extra
DL
i c b
pi l ot
, ( ) I
i nter carri er
DL
i c b
pi l ot
, ( ) I
i nter techno y log
DL
i c ( ) N
0
term
+ + + + =
Q
pi l ot
i i c , ( )
CDMA2000 1xRTT users CDMA2000 1xEV-DO users
1
s
t

s
t
e
p
calculation for each cell (i,ic)
is the pilot power from a transmitter i on the carrier ic at the
receiver.
calculation for each cell (i,ic)
is the pilot burst from the transmitter i on the carrier
ic at the receiver.
and
is the total loss between the transmitter i and the receiver:
P
c
i i c , ( )
P
c
i i c , ( )
P
c
i i c , ( )
P
pi l ot
i i c , ( )
L
T
I
---------------------------- =
P
tot
DL
i i c b
pi l ot
, , ( )
P
tot
DL
i i c b
pi l ot
, , ( )
P
tot
DL
i i c b
pi l ot
, , ( )
P
tx
i i c b
pi l ot
, , ( )
L
T
I
-------------------------------------- =
P
tx
i i c b
pi l ot
, , ( ) P
max
i i c , ( ) =
L
T
I
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Ec Io

G
Tx
G
term

---------------------------------------------------------------------------------------------------------------------------------------------------
354 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
49. Number of cells in active set
This is a user-defined input in the terminal properties. It corresponds to the active set size.
50. Number of fingers
2
n
d

s
t
e
p
, and calculation
We have,
For each transmitter of the network, is the total power
received at the receiver from the transmitter j on the best carrier ic of
the transmitter i.
is the total power transmitted by the transmitter j on the best
carrier of the transmitter i.
Finally, we have,

and
and calculation
We have,
and
3
r
d

s
t
e
p
calculation
4
t
h

s
t
e
p
and evaluation based on formulas defined above
5
t
h

s
t
e
p
calculation
The macro-diversity gain, , models the decrease in shadowing margin due to the fact there are several pilot signals at the
mobile.
is the shadowing margin for the mobile receiving n pilot signals (not necessarily from transmitters belonging to the mobile
active set).
Note: This parameter is determined from the fixed cell edge coverage probability and the model standard deviation. When the model standard
deviation is set to 0, the macro-diversity gain equals 0.
6
t
h

s
t
e
p
Determination of active set
Atoll takes the transmitter i with the highest and calculates the best pilot quality received with a fixed cell edge coverage
probability .
means that the pilot quality at the receiver exceeds x% of times (x is the fixed cell edge coverage
probability). The cell with the highest enters the active set as best server ( ) and the best carrier (ic
BS
) of the best
server
BS will be the one used by other transmitters of active set (when active set size is greater than 1). Pilot is available.
If , no cell (i,ic) can enter the active set. Pilot is unavailable.
Then, pilot qualities at the receiver from transmitters i (other than the best server) on the best carrier of the best server, ic
BS
, are recalculated
to determine the entire receiver active set (when active set is greater than 1). Same formulas and calculation method are used to update
and determine .
Other cells (i,ic
BS
) in active set must fulfill the following criteria:
(optional)
I
extra
DL
i c ( ) I
i nter carri er
DL
i c ( ) I
i nter techno y log
DL
i c ( )
I
extra
DL
i c ( ) P
tot
DL
j i c , ( )
j j i = ,

=
P
tot
DL
j i c , ( )
P
tot
DL
j i c , ( )
P
tx
j i c , ( )
L
T
---------------------- =
P
tx
j i c , ( )
I
i nter carri er
DL
i c ( )
P
tot
DL
j i c
adj
, ( )
j j ,

RF i c i c
adj
, ( )
--------------------------------------- =
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
I
extra
DL
i c b
pi l ot
, ( ) I
i nter carri er
DL
i c b
pi l ot
, ( )
I
extra
DL
i c b
pi l ot
, ( ) P
tot
DL
j i c b
pi l ot
, , ( )
j j i = ,

=
I
i nter carri er
DL
i c b
pi l ot
, ( )
P
tot
DL
j i c
adj
b
pi l ot
, , ( )
j j ,

RF i c i c
adj
, ( )
-------------------------------------------------------- =
I
i nter techno y log
DL
i c ( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c ,
Tx m ,

------------------------------------------
n
i

=
N
0
term
NF
Term
K T W NR
i nter techno y log
Tx DL ,

I
0
DL
i c ( ) Q
pi l ot
i i c , ( )
G
macro di versi ty
DL
G
macro di versi ty
DL
G
macro di versi ty
DL
M
Shadowi ng Ec Io
npaths
M
Shadowi ng Ec Io
=
M
Shadowi ng Ec Io
npaths
Q
pi l ot
i i c , ( )
Q
pi l ot
Resul ti ng
i c ( )
Q
pi l ot
Resul ti ng
i c ( ) G
macro di versi ty
DL
max Q
pi l ot
i i c , ( ) ( ) =
Q
pi l ot
Resul ti ng
Q
pi l ot
req
> Q
pi l ot
Resul ti ng
i c ( )
Q
pi l ot
i i c , ( ) Q
pi l ot
BS i c , ( )
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
<
I
0
DL
i c
BS
( ) Q
pi l ot
i i c
BS
, ( )
Q
pi l ot
i i c
BS
, ( ) Q
mi n
pi l ot
>
i i c
BS
, ( ) neighbour list BS i c
BS
, ( ) e
Forsk 2010 AT283_TRG_E2 355
Chapter 7: CDMA2000 Networks
The number of fingers, f, of the rake receiver. This parameter is defined in the terminal properties. It is relevant in
CDMA2000 1xRTT only
11
. This is the maximum number of active set links that the terminal (rake) can combine.
51. Thermal noise
This parameter is calculated as described above (3
rd
step).
52. I0 (Best server)
I0 (Best server) is the total noise received at the receiver on ic
BS
.
53. Downlink macro-diversity gain
This parameter is calculated as described above (5
th
step).
7.5.1.2 Downlink Sub-Menu
Outputs calculated by Atoll depend on the studied network (CDMA2000 1xRTT or CDMA2000 1xEV-DO).
7.5.1.2.1 CDMA2000 1xRTT
Let m
FCH
and m
SCH
respectively denote the number of cells in the receiver active set for the fundamental channel (FCH)
and the supplemental channel (SCH) and f be the number of rake fingers defined for the terminal. We assume that f is less
than or equal to m
FCH
and m
SCH
.
Among the m
FCH
cells of the receiver active set, only the first f cells will be considered in order to determine the FCH
availability on downlink. In the same way, only the first f cells among the m
SCH
cells of the receiver active set will be
considered in order to determine the SCH availability on downlink. Each of these cells is noted (k,ic
BS
).
Atoll calculates the traffic channel quality on FCH from each cell (k,ic
BS
). No power control is performed as in simulations.
Here, Atoll determines the downlink traffic channel quality on FCH at the receiver for the maximum traffic channel power
per transmitter allowed on FCH. Then, after combination, the total downlink traffic channel quality on FCH is evaluated and
compared with the specified target quality.
Atoll calculates the traffic channel quality on SCH from each cell (k,ic
BS
). No power control is performed as in simulations.
Here, Atoll determines the downlink traffic channel quality on SCH at the receiver for the maximum traffic channel power
per transmitter allowed on SCH. This value depends on the downlink data rate specified in the analysis. Then, after
combination, the total downlink traffic channel quality on SCH is evaluated and compared with the specified target quality.
1. Eb/Nt target on FCH and Eb/Nt target on SCH
Eb/Nt target on FCH ( ) is the downlink traffic data quality target on the fundamental channel (FCH). This value
is user-defined for a given service and terminal.
Eb/Nt target on SCH ( ) is the downlink traffic data quality target on the supplemental channel (SCH). This value
is specified for a given service, terminal and SCH rate.
2. Required transmitter powers on FCH and SCH
The calculation of the required transmitter powers on FCH and SCH ( and ) may be divided into three steps.
1
st
step: Eb/Nt max for the first f (number of fingers) cells of active set
Let us assume the following notations: Eb/Nt max on FCH and SCH respectively correspond to and
.
Therefore, for each cell (k,ic
BS
), we have:
And
With ,
And
Where
is the maximum power allowed on FCH. This parameter is user-defined in the Services table for a certain terminal.
11. CDMA2000 1xEV-DO systems do not support soft handover on downlink.
Q
req
DL
( )
FCH
Q
req
DL
( )
SCH
P
FCH
req
P
SCH
req
Q
max
DL
( )
FCH
Q
max
DL
( )
SCH
Q
max
DL
k i c
BS
, ( ) ( )
FCH

BTS
P
b max
DL FCH
k i c
BS
, ( )
N
tot
DL
i c
BS
( )
------------------------------------------------------------------ G
p
DL FCH
=
Q
max
DL
k i c
BS
, ( ) ( )
SCH

BTS
P
b max
DL SCH
k i c
BS
, ( )
N
tot
DL
i c
BS
( )
------------------------------------------------------------------- G
p
DL SCH
=
P
b
DL FCH
k i c
BS
, ( )
P
FCH
max
L
T
k
-------------- = P
b max
DL SCH
k i c
BS
, ( )
P
SCH
max
L
T
k
-------------- =
N
tot
DL
i c
BS
( ) I
i ntra
DL
i c
BS
( ) I
extra
DL
i c
BS
( ) I
i nter carri er
DL
i c
BS
( ) I
i nter techno y log
DL
i c
BS
( ) N
0
term
+ + + + =
P
FCH
max
356 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the maximum power allowed on SCH for the specified downlink data rate. This parameter is user-defined in the
Services table for a certain terminal and SCH rate.
is the total loss between the transmitter i and the receiver.
is the total noise at the receiver on the best carrier of the best server.
With
And
For each transmitter in the network, is the total power received at the receiver from this transmitter on ic
BS
.
is the inter-carrier interference at the receiver on the best carrier of the best server.
ic
adj
is a carrier adjacent to ic
BS
.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on the best carrier of the best server.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
2
nd
step: Calculation of the total traffic channel quality on FCH and SCH
is the traffic channel quality on FCH at the receiver on ic
BS
after combining the signal from each cell (k,ic
BS
).
On downlink, if there is no handoff, we have:
For any other handoff status, we have:
Where
is the downlink rake efficiency factor defined in Terminal properties.
is the traffic channel quality on SCH at the receiver on ic
BS
after combining the signal from each cell (k,ic
BS
).
On downlink, if there is no handoff, we have:
For any other handoff status, we have:
3
rd
step: and calculation
P
SCH
max
L
T
k
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
DL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c
BS
( )
I
i ntra
DL
i c
BS
( ) 1
BTS
F
ortho
( )
P
tot
DL
k i c
BS
, ( )
=
I
extra
DL
i c
BS
( ) P
tot
DL
j i c
BS
, ( )
j j k = ,

=
P
tot
DL
i c
BS
( )
I
i nter carri er
DL
i c
BS
( )
I
i nter carri er
DL
i c
BS
( )
P
tot
DL
j i c
adj
, ( )
txj j ,

RF i c
BS
i c
adj
, ( )
------------------------------------------- =
RF i c
BS
i c
adj
, ( )
I
i nter techno y log
DL
i c
BS
( )
I
i nter techno y log
DL
i c
BS
( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c
BS
,
Tx m ,

----------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c
BS
,
Tx m ,
i c
i
i c
BS
Q
MAX
DL
( )
FCH
Q
MAX
DL
i c
BS
( ) ( )
FCH
Q
max
DL
k i c
BS
, ( ) ( )
FCH
=
Q
MAX
DL
i c
BS
( ) ( )
FCH
f
rake efficiency
DL
Q
max
DL
k i c
BS
, ( ) ( )
FCH
k

=
f
rake efficiency
DL
Q
MAX
DL
( )
SCH
Q
MAX
DL
i c
BS
( ) ( )
SCH
Q
max
DL
k i c
BS
, ( ) ( )
SCH
=
Q
MAX
DL
i c
BS
( ) ( )
SCH
f
rake efficiency
DL
Q
max
DL
k i c
BS
, ( ) ( )
SCH
k

=
P
FCH
req
P
SCH
req
Forsk 2010 AT283_TRG_E2 357
Chapter 7: CDMA2000 Networks
3. Eb/Nt max on FCH for the first f (number of fingers) cells of active set
Let us assume the following notation: Eb/Nt max on FCH corresponds to .
Therefore, for each cell (k,ic
BS
), we have:
With and
Where
is the maximum power allowed on FCH. This parameter is user-defined in the Services table for a certain terminal.
is the total loss between the transmitter i and the receiver.
is the total noise at the receiver on the best carrier of the best server.
With
And
For each transmitter in the network, is the total power received at the receiver from the transmitter on ic
BS
.
is the inter-carrier interference at the receiver on the best carrier of the best server.
ic
adj
is a carrier adjacent to ic
BS
.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on the best carrier of the best server.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
4. Eb/Nt max on SCH for the first f (number of fingers) cells of active set
Let us assume the following notation: Eb/Nt max on SCH corresponds to .
Therefore, for each cell (k,ic
BS
), we have:
P
FCH
req
Q
req
DL
( )
FCH
Q
MAX
DL
i c
BS
( ) ( )
FCH
----------------------------------------------- P
FCH
max
=
P
SCH
req
Q
req
DL
( )
SCH
Q
MAX
DL
i c
BS
( ) ( )
SCH
----------------------------------------------- P
SCH
max
=
Q
max
DL
( )
FCH
Q
max
DL
k i c
BS
, ( ) ( )
FCH

BTS
P
b max
DL FCH
k i c
BS
, ( )
N
tot
DL
i c
BS
( )
------------------------------------------------------------------ G
p
DL FCH
=
P
b max
DL FCH
k i c
BS
, ( )
P
FCH
max
L
T
k
-------------- = N
tot
DL
i c
BS
( ) I
i ntra
DL
i c
BS
( ) I
extra
DL
i c
BS
( ) I
i nter carri er
DL
i c
BS
( ) N
0
term
+ + + =
P
FCH
max
L
T
k
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
DL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c
BS
( )
I
i ntra
DL
i c
BS
( ) 1
BTS
F
ortho
( )
P
tot
DL
k i c
BS
, ( ) 1
BTS
( )
max
P
FCH
max
P
FCH
req

L
T
k
---------------------------------- 0 ( , )

=
I
extra
DL
i c
BS
( ) P
tot
DL
j i c
BS
, ( )
j j k = ,

=
P
tot
DL
i c
BS
( )
I
i nter carri er
DL
i c
BS
( )
I
i nter carri er
DL
i c
BS
( )
P
tot
DL
j i c
adj
, ( )
txj j ,

RF i c
BS
i c
adj
, ( )
------------------------------------------- =
RF i c
BS
i c
adj
, ( )
I
i nter techno y log
DL
i c
BS
( )
I
i nter techno y log
DL
i c
BS
( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c
BS
,
Tx m ,

----------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c
BS
,
Tx m ,
i c
i
i c
BS
Q
max
DL
( )
SCH
358 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
With
and
Where
is the maximum power allowed on SCH for the specified downlink data rate. This parameter is user-defined in the
Services table for a certain terminal and SCH rate.
is the total loss between the transmitter i and the receiver.
is the total noise at the receiver on the best carrier of the best server.
With
And
For each transmitter in the network, is the total power received at the receiver from the transmitter on ic
BS
.
is the inter-carrier interference at the receiver on the best carrier of the best server.
ic
adj
is a carrier adjacent to ic
BS
.
is the interference reduction factor, defined between ic and ic
adj
and set to a value different from 0.
is the inter-technology interference at the receiver on the best carrier of the best server.
is the interfering carrier of an external transmitter
is the inter-technology Channel Protection between the signal transmitted by Tx and received by m assuming
the frequency gap between (external network) and .
5. Eb/Nt max on FCH and Eb/Nt max on SCH
is the traffic channel quality on FCH at the receiver on ic
BS
after combining the signal from each cell (k,ic
BS
).
On downlink, if there is no handoff, we have:
For any other handoff status, we have:
Where
is the downlink rake efficiency factor defined in Terminal properties.
Q
max
DL
k i c
BS
, ( ) ( )
SCH

BTS
P
b max
DL SCH
k i c
BS
, ( )
N
tot
DL
i c
BS
( )
------------------------------------------------------------------- G
p
DL SCH
=
P
b max
DL SCH
k i c
BS
, ( )
P
SCH
max
L
T
k
-------------- =
N
tot
DL
i c
BS
( ) I
i ntra
DL
i c
BS
( ) I
extra
DL
i c
BS
( ) I
i nter carri er
DL
i c
BS
( ) I
i nter techno y log
DL
i c
BS
( ) N
0
term
+ + + + =
P
SCH
max
L
T
k
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
DL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
DL
i c
BS
( )
I
i ntra
DL
i c
BS
( ) 1
BTS
F
ortho
( )
P
tot
DL
k i c
BS
, ( ) 1
BTS
( )
max
P
SCH
max
P
SCH
req

L
T
k
---------------------------------- 0 ( , )

=
I
extra
DL
i c
BS
( ) P
tot
DL
j i c
BS
, ( )
j j k = ,

=
P
tot
DL
i c
BS
( )
I
i nter carri er
DL
i c
BS
( )
I
i nter carri er
DL
i c
BS
( )
P
tot
DL
j i c
adj
, ( )
txj j ,

RF i c
BS
i c
adj
, ( )
------------------------------------------- =
RF i c
BS
i c
adj
, ( )
I
i nter techno y log
DL
i c
BS
( )
I
i nter techno y log
DL
i c
BS
( )
P
Transmi tted
Tx
i c
i
( )
L
total
Tx
ICP
i c
i
i c
BS
,
Tx m ,

----------------------------------------------
n
i

=
i c
i
i
th
ICP
i c
i
i c
BS
,
Tx m ,
i c
i
i c
BS
Q
MAX
DL
( )
FCH
Q
MAX
DL
i c
BS
( ) ( )
FCH
Q
max
DL
k i c
BS
, ( ) ( )
FCH
=
Q
MAX
DL
i c
BS
( ) ( )
FCH
f
rake efficiency
DL
Q
max
DL
k i c
BS
, ( ) ( )
FCH
k

=
f
rake efficiency
DL
Forsk 2010 AT283_TRG_E2 359
Chapter 7: CDMA2000 Networks
is the traffic channel quality on SCH at the receiver on ic
BS
after combining the signal from each cell (k,ic
BS
).
On downlink, if there is no handoff, we have:
For any other handoff status, we have:
Therefore, the service on the downlink traffic channel is available if and
.
6. Effective Eb/Nt on FCH and Eb/Nt on SCH
and are respectively effective traffic channel qualities at the receiver on ic
BS
supplied on FCH and
SCH.
And
7. Downlink soft handover gain on FCH and downlink soft handover gain on SCH
and respectively correspond to DL soft handover gains on FCH and SCH.
And
corresponds to the highest value.
7.5.1.2.2 CDMA2000 1xEV-DO
Atoll calculates the effective pilot quality level at the receiver and compares this value with the required quality level.
1. Required rate
The required rate, , is the downlink data rate selected for the analysis.
2. Required C/I
For 1xEV-DO Rev. 0 users, the required C/I ( ) is determined from the graph Max Rate=f(C/I) defined for the
mobility type selected in the analysis. It corresponds to the value read in the graph Max Rate=f(C/I) (Rev0) for the
specified required rate, .
For 1xEV-DO Rev. A users, the required data rate ( ) is obtained by using a certain downlink transmission format (i.e.
a 1xEV-DO Rev. A radio bearer ( ) with a certain number of timeslots ( )). It is calculated as
follows:
is the value defined in the 1xEV-DO Rev. A Radio Bearer Selection (Downlink) table for this downlink transmission
format (radio bearer Index, mobility and number of timeslots). It corresponds to the C/I required to obtain the defined
required rate, .
3. Effective C/I
Let be the effective C/I at the receiver on ic
BS
.
For the best cell (BS,ic
BS
) of the receiver active set, we have:
Q
MAX
DL
( )
SCH
Q
MAX
DL
i c
BS
( ) ( )
SCH
Q
max
DL
k i c
BS
, ( ) ( )
SCH
=
Q
MAX
DL
i c
BS
( ) ( )
SCH
f
rake efficiency
DL
Q
max
DL
k i c
BS
, ( ) ( )
SCH
k

=
Q
MAX
DL
i c
BS
( ) ( )
FCH
Q
req
DL
( )
FCH
>
Q
MAX
DL
i c
BS
( ) ( )
SCH
Q
req
DL
( )
SCH
>
Q
eff
DL
( )
FCH
Q
eff
DL
( )
SCH
Q
eff
DL
( )
FCH
mi n Q
MAX
DL
( )
FCH
Q
req
DL
( )
FCH
, ( ) =
Q
eff
DL
( )
SCH
mi n Q
MAX
DL
( )
SCH
Q
req
DL
( )
SCH
, ( ) =
G
SHO
DL
( )
FCH
G
SHO
DL
( )
SCH
G
SHO
DL
( )
FCH
Q
MAX
DL
i c
BS
( ) ( )
FCH
max
k
Q
max
DL
k i c
BS
, ( ) ( )
FCH
( )
----------------------------------------------------------------------- =
G
SHO
DL
( )
SCH
Q
MAX
DL
i c
BS
( ) ( )
SCH
max
k
Q
max
DL
k i c
BS
, ( ) ( )
SCH
( )
------------------------------------------------------------------------ =
max
k
Q
max
DL
k i c
BS
, ( ) ( ) Q
max
DL
k i c
BS
, ( )
R
req
DL
C
I
----
\ .
| |
req
R
req
DL
R
req
DL
Index
DL R evA Bearer
n
TS
R
req
DL
R
RLC peak
DL
Index
DL RevA Bearer
( )
n
TS
---------------------------------------------------------------------------------------------- =
C
I
----
\ .
| |
req
R
req
DL
E
c
N
t
------ i c
BS
b
pi l ot
, ( )
360 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where
4. Effective data rate
For 1xEV-DO Rev. 0 users, the effective data rate, , is determined from the graph Max Rate=f(C/I) (Rev0) defined
for the mobility type selected in the analysis. is the value read in the graph Max Rate=f(C/I) (Rev0) for the calculated
effective C/I, .
For 1xEV-DO Rev. A users, the effective data rate ( ) provided on downlink depends on the downlink transmission
format, i.e the radio bearer index ( ) with the number of timeslots ( ). For the defined mobility
type, Atoll selects the downlink transmission format where . Then, it determines the downlink
effective data rate as follows:
.
The traffic data channel on downlink is available if .
7.5.1.3 Uplink Sub-Menu
Outputs calculated by Atoll depend on the studied network (CDMA2000 1xRTT or CDMA2000 1xEV-DO).
7.5.1.3.1 CDMA2000 1xRTT
For each cell (i,ic
BS
) in the receiver active set, Atoll calculates the uplink traffic channel quality on FCH and SCH from the
receiver. No power control is performed as in simulations. Here, Atoll determines the uplink traffic channel quality on FCH
at the cell for the maximum terminal power allowed on FCH. In the same way, it evaluates the uplink traffic channel quality
on SCH at the cell for the maximum terminal power allowed on SCH. Then, total uplink traffic channel qualities on FCH
and SCH are evaluated with respect to the receiver handover status. From these values, Atoll deduces required terminal
powers on FCH and SCH, calculates the total terminal power required and compares this value with the maximum terminal
power allowed.
1. Max terminal power on FCH and SCH
The Max terminal power parameter ( ) is user-defined for each terminal. It corresponds to the maximum terminal
power allowed. On uplink, the terminal power is shared between pilot, FCH and SCH channels. So, we may write:
We have:
Where p is the percentage of the terminal power dedicated to pilot. This parameter is user-defined in the terminal
properties.
And
Therefore,
And
2. Required terminal power on FCH and SCH
E
c
N
t
------ i c
BS
b
pi l ot
, ( )
o Q
resul ti ng
pi l ot
i c
BS
( )
o Q
resul ti ng
pi l ot
i c
BS
( )
--------------------------------------------------- =
Q
resul ti ng
pi l ot
i c
BS
( ) G
macro di versi ty
DL
Q
pi l ot
BS
i c
BS
( ) =
R
DL
R
DL
E
c
N
t
------ i c
BS
b
pi l ot
, ( )
R
DL
Index
DL R evA Bearer
n
TS
E
c
N
t
------ i c
BS
b
pi l ot
, ( )
C
I
----
\ .
| |
req
>
R
DL
R
RLC peak
DL
Index
DL R evA Bearer
( )
n
TS
-------------------------------------------------------------------------------------------- =
R
DL
R
req
DL
>
P
term
max
P
term
max
P
term
max
( )
pi l ot
P
term
max
( )
FCH
P
term
max
( )
SCH
+ + =
P
term
max
( )
pi l ot
p P
term
max
=
P
term
max
( )
FCH
P
term
max
( )
SCH
-----------------------------
Q
req
UL
( )
FCH
Q
req
UL
( )
SCH
---------------------------
R
FCH
UL
AF
FCH
UL

R
SCH
UL
--------------------------------------- =
P
term
max
( )
FCH
1 p ( ) P
term
max

1
Q
req
UL
( )
SCH
R
SCH
UL

Q
req
UL
( )
FCH
R
FCH
UL
AF
FCH
UL

------------------------------------------------------------------------ +
---------------------------------------------------------------------------------- =
P
term
max
( )
SCH
1 p ( ) P
term
max

1
Q
req
UL
( )
FCH
R
FCH
UL
AF
FCH
UL

Q
req
UL
( )
SCH
R
SCH
UL

------------------------------------------------------------------------ +
---------------------------------------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 361
Chapter 7: CDMA2000 Networks
The required terminal powers on FCH and SCH, respectively and , are calculated as follows:
1
st
step: Evaluation of uplink traffic channel qualities on FCH and SCH, and , for
each cell of active set.
For each cell (i,ic
BS
), we have:
And
With and
is the total loss between the transmitter i and the receiver.
is the total noise at the transmitter on the best carrier of the best server. This value is deduced from the cell
uplink load factor .
is the transmitter thermal noise.
2
nd
step: Calculation of FCH and SCH total traffic channel qualities at the transmitter on ic
BS
, and
, based on the receiver handover status.
If there is no handoff, we have:
and
For soft handover, we have:
And
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
corresponds to the highest value.
For soft-soft handover, we have:
And
is the uplink macro-diversity gain.This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
For softer and softer-softer handovers, we have:
P
term
req
( )
FCH
P
term
req
( )
SCH
Q
max
i
UL
i c
BS
( ) ( )
FCH
Q
max
i
UL
i c
BS
( ) ( )
SCH
Q
max
UL
i i c
BS
, ( ) ( )
FCH

term
P
b max
UL FCH
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
----------------------------------------------------------------- G
p
UL FCH
=
Q
max
UL
i i c
BS
, ( ) ( )
SCH

term
P
b max
UL SCH
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
----------------------------------------------------------------- G
p
UL SCH
=
P
b max
UL FCH
i i c
BS
, ( )
P
term
max
( )
FCH
L
T
i
----------------------------- = P
b max
UL SCH
i i c
BS
, ( )
P
term
max
( )
SCH
L
T
i
----------------------------- =
L
T
i
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
UL
i i c
BS
, ( )
X
UL
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
N
0
tx
1 X
UL
i i c
BS
, ( )
---------------------------------------- =
N
0
tx
Q
MAX
UL
( )
FCH
Q
max
UL
( )
SCH
Q
MAX
UL
i c
BS
( ) ( )
FCH
Q
max
UL
i i c
BS
, ( ) ( )
FCH
= Q
MAX
UL
i c
BS
( ) ( )
SCH
Q
max
UL
i i c
BS
, ( ) ( )
SCH
=
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
FCH
( ) =
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
SCH
( ) =
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) Q
max
UL
i i c
BS
, ( )
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
3 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
FCH
( ) =
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
3 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
SCH
( ) =
G
macro di versi ty
UL
( )
3 links
Q
MAX
UL
i c
BS
( ) ( )
FCH
f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
FCH
i

=
362 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
And
For softer-soft handover, there are two possibilities. If the MRC option is selected (option available in Global parameters),
we have:
And
otherwise,
And
3
rd
step: Calculation of and
and
Where
is the user-defined uplink data traffic quality target on FCH for a given service and a terminal. This parameter
is available in the Services table.
is the user-defined uplink data traffic quality target on SCH for a given service, terminal and SCH rate. This
parameter is available in the Services table.
Then, from the required terminal power on FCH and SCH, Atoll determines the total terminal power required ( ).
As , we have:
Therefore, the service on the uplink data traffic channel is available if .
3. Eb/Nt max on FCH for each cell in active set
For each cell (i,ic
BS
), we have:
With
is the total loss between the transmitter i and the receiver.
is the total noise at the transmitter on the best carrier of the best server. This value is deduced from the cell
uplink load factor .
is the transmitter thermal noise.
Q
MAX
UL
i c
BS
( ) ( )
SCH
f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
SCH
i

=
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
FCH
i on the same site

Q
max
i on the other site
UL
i i c
BS
, ( ) ( )
FCH
,
\ .
|
| |
=
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
SCH
i on the same site

Q
max
i on the other site
UL
i i c
BS
, ( ) ( )
SCH
,
\ .
|
| |
=
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
FCH
( ) =
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
SCH
( ) =
P
term
req
( )
FCH
P
term
req
( )
SCH
P
term
req
( )
FCH
Q
req
UL
( )
FCH
Q
MAX
UL
i c
BS
( ) ( )
FCH
----------------------------------------------- P
term
max
( )
FCH
= P
term
req
( )
SCH
Q
req
UL
( )
SCH
Q
MAX
UL
i c
BS
( ) ( )
SCH
----------------------------------------------- P
term
max
( )
SCH
=
Q
req
UL
( )
FCH
Q
req
UL
( )
SCH
P
term
req
P
term
req
P
term
req
( )
FCH
P
term
req
( )
SCH
P
term
req
( )
pi l ot
+ + =
P
term
req
( )
pi l ot
p P
term
req
=
P
term
req
P
term
req
( )
FCH
P
term
req
( )
SCH
+
1 p
----------------------------------------------------------------- =
P
term
req
P
term
max
s
Q
max
UL
i i c
BS
, ( ) ( )
FCH

term
P
b max
UL FCH
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
----------------------------------------------------------------- G
p
UL FCH
=
P
b max
UL FCH
i i c
BS
, ( )
P
term
max
( )
FCH
L
T
i
----------------------------- =
L
T
i
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
UL
i i c
BS
, ( )
X
UL
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
N
0
tx
1 X
UL
i i c
BS
, ( )
---------------------------------------- 1
term
( ) max
P
FCH
max
P
FCH
req

L
T
i
---------------------------------- 0 ( , ) + =
N
0
tx
Forsk 2010 AT283_TRG_E2 363
Chapter 7: CDMA2000 Networks
4. Eb/Nt max on SCH for each cell in active set
For each cell (i,ic
BS
), we have:
With
is the total loss between the transmitter i and the receiver.
is the total noise at the transmitter on the best carrier of the best server. This value is deduced from the cell
uplink load factor .
is the transmitter thermal noise.
5. Eb/Nt max on FCH and SCH
and are respectively the traffic channel qualities on FCH and SCH at the transmitter
on ic
BS
after signal combination of all the transmitters of the active set.
If there is no handoff, we have:
and
For soft handover, we have:
And
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
corresponds to the highest value.
For soft-soft handover, we have:
And
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
For softer and softer-softer handovers, we have:
And
For softer-soft handover, there are two possibilities. If the MRC option is selected (option available in Global parameters),
we have:
Q
max
UL
i i c
BS
, ( ) ( )
SCH

term
P
b max
UL SCH
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
----------------------------------------------------------------- G
p
UL SCH
=
P
b max
UL SCH
i i c
BS
, ( )
P
term
max
( )
SCH
L
T
i
----------------------------- =
L
T
i
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
UL
i i c
BS
, ( )
X
UL
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
N
0
tx
1 X
UL
i i c
BS
, ( )
---------------------------------------- 1
term
( ) max
P
SCH
max
P
SCH
req

L
T
i
---------------------------------- 0 ( , ) + =
N
0
tx
Q
MAX
UL
i c
BS
( ) ( )
FCH
Q
MAX
UL
i c
BS
( ) ( )
SCH
Q
MAX
UL
i c
BS
( ) ( )
FCH
Q
max
UL
i i c
BS
, ( ) ( )
FCH
= Q
MAX
UL
i c
BS
( ) ( )
SCH
Q
max
UL
i i c
BS
, ( ) ( )
SCH
=
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
FCH
( ) =
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
SCH
( ) =
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) Q
max
UL
i i c
BS
, ( )
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
3 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
FCH
( ) =
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
3 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
SCH
( ) =
G
macro di versi ty
UL
( )
3 links
Q
MAX
UL
i c
BS
( ) ( )
FCH
f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
FCH
i

=
Q
MAX
UL
i c
BS
( ) ( )
SCH
f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
SCH
i

=
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
FCH
i on the same site

Q
max
i on the other site
UL
i i c
BS
, ( ) ( )
FCH
,
\ .
|
| |
=
364 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
And
otherwise,
And
6. Effective Eb/Nt on FCH and SCH
is the uplink effective traffic channel quality on FCH at the receiver on ic
BS
.
is the uplink effective traffic channel quality on SCH at the receiver on ic
BS
.
and
7. Uplink soft handover gain FCH and SCH
corresponds to the UL soft handover gain on FCH.
corresponds to the UL soft handover gain on SCH.
and
corresponds to the highest value.
7.5.1.3.2 CDMA2000 1xEV-DO
For each cell (l,ic
BS
) in the receiver active set, Atoll calculates the uplink quality level from the receiver. No power control
is performed as in simulations. Here, Atoll determines the uplink quality level at the cell for the maximum terminal power
allowed. Then, the total uplink quality level is evaluated with respect to the receiver handover status. From this value, Atoll
calculates the required terminal power and compares it with the maximum terminal power allowed.
1. Max terminal power
The Max terminal power parameter ( ) is user-defined for each terminal. It corresponds to the maximum terminal
power allowed.
2. Required terminal power with ACK
The required terminal power ( ) calculation may be divided into four steps:
1
st
step: Evaluation of the uplink quality, , for each cell of active set
For each cell (i,ic
BS
), we have:
With
is the total loss between the transmitter i and the receiver.
is the total noise at the transmitter on the best carrier of the best server. This value is deduced from the cell
uplink load factor .
is the transmitter thermal noise.
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( ) ( )
SCH
i on the same site

Q
max
i on the other site
UL
i i c
BS
, ( ) ( )
SCH
,
\ .
|
| |
=
Q
MAX
UL
i c
BS
( ) ( )
FCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
FCH
( ) =
Q
MAX
UL
i c
BS
( ) ( )
SCH
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( )
SCH
( ) =
Q
eff
UL
( )
FCH
Q
eff
UL
( )
SCH
Q
eff
UL
( )
FCH
mi n Q
MAX
UL
( )
FCH
Q
req
UL
( )
FCH
, ( ) = Q
eff
UL
( )
SCH
mi n Q
MAX
UL
( )
SCH
Q
req
UL
( )
SCH
, ( ) =
G
SHO
UL
( )
FCH
G
SHO
UL
( )
SCH
G
SHO
UL
( )
FCH
Q
MAX
UL
i c
BS
( ) ( )
FCH
max
I
Q
max
UL
i i c
BS
, ( ) ( )
FCH
( )
--------------------------------------------------------------------- = G
SHO
UL
( )
SCH
Q
MAX
UL
i c
BS
( ) ( )
SCH
max
I
Q
max
UL
i i c
BS
, ( ) ( )
SCH
( )
--------------------------------------------------------------------- =
max
I
Q
max
UL
i i c
BS
, ( ) ( ) Q
max
UL
i i c
BS
, ( )
P
term
max
P
term
req
Q
max
UL
i i c
BS
, ( )
Q
max
UL
i i c
BS
, ( )

term
P
b max
UL
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
----------------------------------------------------------- G
p
UL
=
P
b max
UL
i i c
BS
, ( )
P
term
max
L
T
i
-------------- =
L
T
i
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
UL
i i c
BS
, ( )
X
UL
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
N
0
tx
1 X
UL
i i c
BS
, ( )
---------------------------------------- =
N
0
tx
Forsk 2010 AT283_TRG_E2 365
Chapter 7: CDMA2000 Networks
2
nd
step: Calculation of the total quality at the transmitter on ic
BS
( ) based on the receiver handover status.
If there is no handoff, we have:
For soft handover, we have:
is the uplink macro-diversity gain.This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
corresponds to the highest value.
For soft-soft handover, we have:
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
For softer and softer-softer handovers, we have:
For softer-soft handover, there are two possibilities. If the MRC option is selected (option available in Global parameters),
we have:
otherwise,
3
rd
step: Evaluation of the required quality level on uplink,
In case of a 1xEV-DO Rev. 0 capable terminal, we have:
Where
is the minimum pilot quality level on uplink. This parameter is available in the Mobility types table.
, and are respectively acknowledgement, data rate control and traffic data gains relative to the pilot.
They are defined in the terminal properties (1xEV-DO Rev. 0 tab).
In case of a 1xEV-DO Rev. A capable terminal, we have:
Where
is the minimum pilot quality level required on uplink to obtain the defined data rate, . The required data rate,
(i.e. the uplink data rate selected for the analysis) is obtained by using a certain uplink transmission format (i.e. 1xEV-
DO Rev. A radio bearer ( ) with a certain number of subframes ( )) and calculated as follows:
is the value defined in the 1xEV-DO Rev. A Radio Bearer Selection (Uplink) table for this uplink transmission
format (radio bearer Index, mobility and number of subframe). Two values are available for this parameter, one when the
service uplink mode is "Low Latency" and another one for high capacity services.
Q
MAX
UL
Q
MAX
UL
i c
BS
( ) Q
max
UL
i i c
BS
, ( ) =
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) =
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) Q
max
UL
i i c
BS
, ( )
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
3 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) =
G
macro di versi ty
UL
( )
3 links
Q
MAX
UL
i c
BS
( ) f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( )
i

=
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( )
i on the same site

Q
max
i on the other site
UL
i i c
BS
, ( ) ,
\ .
|
| |
=
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) =
Q
req
UL
Q
req
UL
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
ACK
G
DRC
G
TCH
+ + + ( ) =
E
c
N
t
------
\ .
| |
mi n
UL
G
ACK
G
DRC
G
TCH
Q
req
UL
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
ACK
G
DRC
G
TCH
G
RRI
G
Auxi l i ary pi l ot
+ + + + + ( ) =
E
c
N
t
------
\ .
| |
mi n
UL
R
req
UL
R
req
UL
Index
UL RevA Bearer
n
SF
R
req
UL
R
RLC peak
UL
Index
UL RevA Bearer
( )
n
SF
---------------------------------------------------------------------------------------------- =
E
c
N
t
------
\ .
| |
mi n
UL
366 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
, , , and are respectively acknowledgement, data rate control, traffic data
channel, reverse rate indicator and auxiliary pilot channel gains relative to the pilot. They are defined in the terminal
properties (1xEV-DO Rev. A tab). Two values of are available, one when the service uplink mode is "Low Latency"
and another one for high capacity services.
4
th
step: Calculation of
Therefore, the service on the uplink traffic data channel is available if .
3. Required terminal power without ACK
Atoll also calculates the required terminal power without taking into account the ACK channel contribution. Calculations
are quite similar to those detailed in the previous paragraph, only the evaluation of the required quality on uplink is different.
In this case, we have:
for 1xEV-DO Rev. 0 capable terminals
And
for 1xEV-DO Rev. A capable terminals
And then,
4. UL SHO gain
1
st
step: Evaluation of the uplink quality, , for each cell of active set.
For each cell (i,ic
BS
), we have:
With
is the total loss between the transmitter i and the receiver.
is the total noise at the transmitter on the best carrier of the best server. This value is deduced from the cell
uplink load factor .
is the transmitter thermal noise.
2
nd
step: Calculation of the total quality at the transmitter on ic
BS
( ) based on the receiver handover status.
is the traffic channel quality at the transmitter on ic
BS
after signal combination of all the transmitters of the
active set.
If there is no handoff, we have:
For soft handover, we have:
G
ACK
G
DRC
G
TCH
G
RRI
G
Auxi l i ary pi l ot
G
TCH
P
term
req
P
term
req
Q
req
UL
Q
MAX
UL
i c
BS
( )
-------------------------------- P
term
max
=
P
term
req
P
term
max
s
Q
req
UL
( )
wi thoutACK
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
DRC
G
TCH
+ + ( ) =
Q
req
UL
( )
wi thoutACK
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
DRC
G
TCH
G
RRI
G
Auxi l i ary pi l ot
+ + + + ( ) =
P
term
req
( )
wi thoutACK
Q
req
UL
( )
wi thoutACK
Q
MAX
UL
i c
BS
( )
------------------------------------------- P
term
max
=
Q
max
UL
i i c
BS
, ( )
Q
max
UL
i i c
BS
, ( )

term
P
b max
UL
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
----------------------------------------------------------- G
p
UL
=
P
b max
UL
i i c
BS
, ( )
P
term
max
L
T
i
-------------- =
L
T
i
L
T
L
path
L
Tx
L
term
L
body
L
i ndoor
M
Shadowi ng Eb Nt ( )
UL


G
Tx
G
term

------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
tot
UL
i i c
BS
, ( )
X
UL
i i c
BS
, ( )
N
tot
UL
i i c
BS
, ( )
N
0
tx
1 X
UL
i i c
BS
, ( )
---------------------------------------- 1
term
( ) max
P
term
max
P
term
req

L
T
i
---------------------------------- 0 ( , ) + =
N
0
tx
Q
MAX
UL
Q
MAX
UL
i c
BS
( )
Q
MAX
UL
i c
BS
( ) Q
max
UL
i i c
BS
, ( ) =
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) =
Forsk 2010 AT283_TRG_E2 367
Chapter 7: CDMA2000 Networks
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
corresponds to the highest value.
For soft-soft handover, we have:
is the uplink macro-diversity gain. This parameter is determined from the fixed cell edge coverage
probability and the uplink Eb/Nt standard deviation. When the option Shadowing taken into account is not selected
(Prediction properties), Atoll considers the uplink macro-diversity gain defined by the user in Global parameters.
For softer and softer-softer handovers, we have:
For softer-soft handover, there are two possibilities. If the MRC option is selected (option available in Global parameters),
we have:
otherwise,
3
rd
step: Calculation of the UL SHO gain
corresponds to the uplink soft handover gain.
7.5.2 Coverage Studies
Let us assume each pixel of the map corresponds to a probe receiver with a terminal, a mobility type and a service. This
receiver does not create any interference. You can make the coverage prediction for a specific carrier or for all carriers of
a same type. The type of carrier and the carriers you can select depend on the service and on the frequency band(s)
supported by the terminal. Coverage studies are based on the uplink load percentage and the downlink total power of cells.
These parameters can either be either simulation results, or average values calculated from a group of simulations, or
user-defined cell inputs.
7.5.2.1 Pilot Reception Analysis
For further details on calculation formulas, see "Definitions and Formulas" on page 310 For further details on calculations,
see "Bar Graph and Pilot Sub-Menu" on page 353
1
st
Case: Analysis Based on all Carriers
Atoll proceeds as in point analysis. It determines the best carrier of each transmitter i containing the receiver in its
calculation area. The best carrier selection depends on the option chosen in Equipment (UL minimum noise, DL minimum
power, random, sequential) and is based on the UL load percentage and the downlink total power of cells (simulation
results or cell properties). Atoll calculates the pilot quality at the receiver from these transmitters on their best carrier and
determines the best serving transmitter BS on its best carrier ic
BS
( ). Then, it deduces the best pilot quality
received with a fixed cell edge coverage probability, .
Atoll displays the best pilot quality received with a fixed cell edge coverage probability.
2
nd
Case: Analysis Based on a Specific Carrier
The carrier that can be used by transmitters is fixed. In this case, for each transmitter i containing the receiver in its
calculation area that may use the specified carrier (carrier specified in Cell Properties), Atoll calculates pilot quality at the
receiver on this carrier ic
given
. Then, it determines the best serving transmitter BS using the carrier ic
given
( ) and deduces the best pilot quality received with a fixed cell edge coverage probability,
.
Atoll displays the best pilot quality received with a fixed cell edge coverage probability.
5. Single colour
G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) Q
max
UL
i i c
BS
, ( )
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
3 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) =
G
macro di versi ty
UL
( )
3 links
Q
MAX
UL
i c
BS
( ) f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( )
i

=
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max f
rake efficiency
UL
Q
max
UL
i i c
BS
, ( )
i on the same site

Q
max
i on the other site
UL
i i c
BS
, ( ) ,
\ .
|
| |
=
Q
MAX
UL
i c
BS
( ) G
macro di versi ty
UL
( )
2 links
max
i
Q
max
UL
i i c
BS
, ( ) ( ) =
G
SHO
UL
G
SHO
UL
Q
MAX
UL
i c
BS
( )
max
i
Q
max
UL
i i c
BS
, ( ) ( )
----------------------------------------------------- =
Q
pi l ot
BS
i c
BS
( )
Q
pi l ot
Resul ti ng
i c
BS
( )
Q
pi l ot
BS
i c
gi ven
( )
Q
pi l ot
Resul ti ng
i c
gi ven
( )
368 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Atoll displays a coverage if . Coverage consists of a single layer with a unique colour.
6. Colour per transmitter
Atoll displays a coverage if ( ). Coverage consists of several layers with
associated colours. There is a layer per transmitter with no intersection between layers. Layer colour is the colour assigned
to the best serving transmitter BS.
7. Colour per mobility
In this case, the receiver is not completely defined and no mobility assigned. Coverage consists of several layers with a
layer per user-defined mobility type defined in the Mobility Types sub-folder. For each layer, area is covered if
( ). Each layer is assigned a colour and displayed with intersections between
layers.
8. Colour per probability
This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations
and the All option in the Condition tab of prediction properties).
Coverage consists of several layers with a layer per user-defined probability level defined in the Display tab (Prediction
properties). For each layer, area is covered if ( ) in the required number of
simulations. Each layer is assigned a colour and displayed with intersections between layers.
9. Colour per cell edge coverage probability
Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display
tab (Prediction properties). For each layer, area is covered if ( ). Each layer
is assigned a colour and displayed with intersections between layers.
10. Colour per quality level (Ec/I0)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if ( ). Each layer is
assigned a colour and displayed with intersections between layers.
11. Colour per quality margin (Ec/I0 margin)
Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction
properties). For each layer, area is covered if ( ). Each layer is
assigned a colour and displayed with intersections between layers.
7.5.2.2 Downlink Service Area Analysis
The downlink service area analysis depends on the studied network (CDMA2000 1xRTT or CDMA2000 1xEV-DO).
Several display options are available when calculating this study, some of which are dedicated to CDMA2000 1xRTT
networks while others are relevant when analysing CDMA2000 1xEV-DO systems only.
7.5.2.2.1 CDMA2000 1xRTT
As in point analysis, Atoll calculates downlink quality on FCH at the receiver for each cell (k,ic) (with ic=ic
BS
or ic
given
)
(these cells are the first f cells in the receivers active set and f is the number of fingers defined for the terminal). No power
control is performed as in simulations. Here, Atoll determines the downlink quality on FCH at the receiver for a maximum
traffic channel power per transmitter allowed on the fundamental channel (FCH). Then, the total downlink quality on FCH
( ) is evaluated after recombination.
Atoll displays total traffic channel quality at the receiver on the carrier ic ( or ).
For further details on formulas, see "Definitions and Formulas" on page 310. For further details on calculation, see
"Downlink Sub-Menu" on page 355.
You may choose following display options:
12. Single colour
Atoll displays a coverage with a unique colour if . is the downlink traffic data
quality target on the fundamental channel (FCH). This parameter is user-defined for a given service and a terminal in the
Services sub-folder.
13. Colour per transmitter
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
>
i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c p , ( ) Q
pi l ot
req
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
( )
threshol d
> i c i c
BS
or i c
gi ven
=
Q
pi l ot
Resul ti ng
i c ( ) Q
pi l ot
req
Q
pi l ot
( )
m i n arg
> i c i c
BS
or i c
gi ven
=
Note:
Best server and active set determination is performed as in point prediction.
Q
MAX
DL
i c ( ) ( )
FCH
i c
BS
i c
gi ven
Q
MAX
DL
i c ( ) ( )
FCH
Q
req
DL
( )
FCH
> Q
req
DL
( )
FCH
Forsk 2010 AT283_TRG_E2 369
Chapter 7: CDMA2000 Networks
Atoll displays a coverage if . Coverage consists of several layers with associated colours.
There is a layer per transmitter with no intersection between layers. Layer colour is the colour assigned to best serving
transmitter.
14. Colour per mobility
In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a
layer per user-defined mobility defined in Mobility sub-folder. For each layer, area is covered if
. Each layer is assigned a colour and displayed with intersections between layers.
15. Colour per service
In this case, receiver is not completely defined and no service is assigned. Coverage consists of several layers with a layer
per user-defined service defined in Services sub-folder. For each layer, area is covered if .
Each layer is assigned a colour and displayed with intersections between layers.
16. Colour per probability
This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations
and the All option in the Condition tab of prediction properties).
Coverage consists of several layers with a layer per user-defined probability level defined in the Display tab (Prediction
properties). For each layer, area is covered if in the required number of simulations. Each
layer is assigned a colour and displayed with intersections between layers.
17. Colour per cell edge coverage probability
Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display
tab (Prediction properties). For each layer, area is covered if . Each layer is assigned a
colour and displayed with intersections between layers.
18. Colour per maximum quality level (max Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
19. Colour per effective quality level (Effective Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
20. Colour per quality margin (Eb/Nt margin)
Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
21. Colour per required power
Atoll calculates the downlink power required on FCH, , as follows:
Where is a user-defined input for a given service and terminal. It corresponds to the maximum traffic data power
allowed on FCH for a transmitter.
Coverage consists of several layers with a layer per user-defined required power threshold defined in the Display tab
(Prediction properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
22. Colour per required power margin
Coverage consists of several layers with a layer per user-defined power margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
23. Colour per data rate
This display option is relevant for CDMA2000 1xRTT data services only. For each possible data rate,
( , , , , ), Atoll
calculates traffic channel quality at the receiver for each cell (k,ic) (with ic=ic
BS
or ic
given
). Downlink traffic channel quality
Q
MAX
DL
i c ( ) ( )
FCH
Q
req
DL
( )
FCH
>
Q
MAX
DL
i c ( ) ( )
FCH
Q
req
DL
( )
FCH
>
Q
MAX
DL
i c ( ) ( )
FCH
Q
req
DL
( )
FCH
>
Q
MAX
DL
i c ( ) ( )
FCH
Q
req
DL
( )
FCH
>
Q
MAX
DL
i c p , ( ) ( )
FCH
Q
req
DL
( )
FCH
>
Q
MAX
DL
i c ( ) ( )
FCH
Threshol d >
Q
eff
DL
i c ( ) ( )
FCH
Threshol d >
Q
MAX
DL
i c ( ) ( )
FCH
Q
req
DL
( )
FCH
M i n arg >
P
FCH
req
i c ( )
P
FCH
req
i c ( )
Q
req
DL
( )
FCH
Q
MAX
DL
i c ( )
--------------------------- P
FCH
max
=
P
FCH
max
P
FCH
req
i c ( ) Threshol d >
P
FCH
max
P
FCH
req
i c ( ) M i n arg >
R
DL
R
FCH
DL
AF
FCH
DL
R
FCH
DL
AF
FCH
DL
2 + ( ) R
FCH
DL
AF
FCH
DL
4 + ( ) R
FCH
DL
AF
FCH
DL
8 + ( ) R
FCH
DL
AF
FCH
DL
16 + ( )
370 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
at the receiver is evaluated from a maximum traffic channel power per transmitter allowed for the corresponding data rate.
Then, the total downlink traffic channel quality ( ) is calculated after recombination.
Coverage consists of several layers with a layer per possible data rate, . For each layer, area is covered if
. Each layer is assigned a colour and displayed with intersections between layers.
is the downlink traffic data quality target for the data rate, . This parameter is user-defined for a given
service, terminal and data rate in the Services sub-folder.
7.5.2.2.2 CDMA2000 1xEV-DO
As in point analysis, Atoll calculates the effective pilot quality level at the receiver from the best server cell, .
Best server and active set determination is performed as in point prediction (AS analysis).Then, from this value, it
determines the effective downlink data rate received, .
For further details on formulas, see "Definitions and Formulas" on page 310. For further details on calculations, see
"Downlink Sub-Menu" on page 355.
1xEV-DO Rev. 0 Users
For 1xEV-DO Rev. 0 users (users with EV-DO Rev. 0-capable terminals and EV-DO Rev. 0 services), the effective data
rate ( ) provided on downlink is determined from the graph Max Rate=f(C/I) (Rev0) defined for the mobility type
selected in the Condition tab (Prediction properties). is the value read in the graph Max Rate=f(C/I) (Rev0) for the
calculated effective pilot quality level, .
1xEV-DO Rev. A Users
For 1xEV-DO Rev. A users (users with EV-DO Rev. A-capable terminals and EV-DO Rev. A services), the effective data
rate ( ) provided on downlink depends on the downlink transmission format, i.e the radio bearer index
( ) with the number of timeslots ( ). Atoll selects the downlink transmission format where
. Then, it determines the downlink effective data rate as follows:
.
The effective data rate corresponds to the guaranted data rate after a certain number of retransmissions (i.e. the number
of timeslots, ).
When HARQ (Hybrid Automatic Repeat Request) is used, the required average number of retransmissions is smaller and
the data rate is an average data rate ( ) calculated as follows:
The average number of retransmissions ( ) is determined from early termination probabilities defined for the
selected downlink transmission format. The Early Termination Probability graph shows the probability of early termination
( ) as a function of the number of retransmissions ( ). Atoll calculates the average number of retransmissions
( ) as follows:
Display Options
You may choose following display options:
Q
MAX
DL
i c R
DL
, ( )
R
DL
Q
MAX
DL
i c R
DL
, ( ) Q
req
DL
R
DL
( ) >
Q
req
DL
R
DL
( ) R
DL
E
c
N
t
------ i c b
pi l ot
, ( )
R
DL
R
DL
R
DL
E
c
N
t
------ i c
BS
b
pi l ot
, ( )
R
DL
Index
DL R evA Bearer
n
TS
E
c
N
t
------ i c
BS
b
pi l ot
, ( )
C
I
----
\ .
| |
req
>
R
DL
R
RLC peak
DL
Index
DL RevA Bearer
( )
n
TS
---------------------------------------------------------------------------------------------- =
n
TS
R
av
DL
R
av
DL
R
RLC peak
DL
Index
DL RevA Bearer
( )
n
Rtx
DL
Index
DL RevA Bearer
n
TS
( , ) ( )
av
------------------------------------------------------------------------------------------------ =
n
Rtx
DL
( )
av
p n
Rtx
DL
n
Rtx
DL
( )
av
n
Rtx
DL
( )
av
p n
Rtx
DL
( ) p n
Rtx
DL
1 ( ) ( ) n
Rtx
DL

n
Rtx
DL
1 =
n
Rt x
( )
max

p n
Rtx
DL
( )
max
( )
------------------------------------------------------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 371
Chapter 7: CDMA2000 Networks
24. Colour per C/I
Coverage consists of several layers with a layer per quality threshold defined in the Display tab (Prediction properties).
For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
25. Colour per rate
Coverage consists of several layers with a layer per possible data rate ( ). For each layer, area is covered if the data
rate, , can be obtained. Each layer is assigned a colour and displayed with intersections between layers.
26. Colour per average rate
This display option is available for 1xEV-DO Rev. A users only. It enables you to view the obtained downlink data rate
when HARQ is used. Coverage consists of several layers with a layer per possible average data rate ( ). For each
layer, area is covered if the average data rate, , can be obtained. Each layer is assigned a colour and displayed with
intersections between layers.
7.5.2.3 Uplink Service Area Analysis
The results displayed when calculating the uplink service area analysis depend on the studied network (CDMA2000
1xRTT or CDMA2000 1xEV-DO).
7.5.2.3.1 CDMA2000 1xRTT
As in point analysis, Atoll calculates uplink quality on FCH from receiver for each cell (l,ic) (with ic=ic
BS
or ic
given
) in
receiver active set. No power control simulation is performed. Atoll determines uplink quality on FCH at the transmitter for
the maximum terminal power. Then, the total uplink traffic channel quality ( ) is evaluated with respect to
the receiver handover status.
Atoll displays uplink quality on FCH at transmitters in active set on the carrier ic ( or ) received from the
receiver.
For further details on formulas, see "Definitions and Formulas" on page 310. For further details on calculations, see "Uplink
Sub-Menu" on page 360.
27. Single colour
Atoll displays a coverage if . Coverage colour is unique. is the uplink data traffic
quality target on the fundamental channel (FCH). This parameter is user-defined for a given service and a terminal in the
Services sub-folder.
28. Colour per transmitter
Atoll displays a coverage if . Coverage consists of several layers with associated colours.
There is a layer per transmitter with no intersection between layers. Layer colour is the colour assigned to best server
transmitter.
29. Colour per mobility
In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a
layer per user-defined mobility defined in Mobility sub-folder. For each layer, area is covered if
. Each layer is assigned a colour and displayed with intersections between layers.
30. Colour per service
In this case, receiver is not completely defined and no service is assigned. Coverage consists of several layers with a layer
per user-defined service defined in Services sub-folder. For each layer, area is covered if .
Each layer is assigned a colour and displayed with intersections between layers.
31. Colour per probability
This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations
and the All option in the Condition tab of prediction properties). Coverage consists of several layers with a layer per user-
defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if
in the required number of simulations. Each layer is assigned a colour and displayed with
intersections between layers.
E
c
N
t
------ i c b
pi l ot
, ( ) Threshol d >
R
DL
R
DL
R
av
DL
R
av
DL
Note:
Best server and active set determination is performed as in point prediction (AS analysis).
Q
MAX
UL
i c ( ) ( )
FCH
i c
BS
i c
gi ven
Q
MAX
UL
i c ( ) ( )
FCH
Q
req
UL
( )
FCH
> Q
req
UL
( )
FCH
Q
MAX
UL
i c ( ) ( )
FCH
Q
req
UL
( )
FCH
>
Q
MAX
UL
i c ( ) ( )
FCH
Q
req
UL
( )
FCH
>
Q
MAX
UL
i c ( ) ( )
FCH
Q
req
UL
( )
FCH
>
Q
MAX
UL
i c ( ) ( )
FCH
Q
req
UL
( )
FCH
>
372 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
32. Colour per cell edge coverage probability
Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display
tab (Prediction properties). For each layer, area is covered if . Each layer is assigned a
colour and displayed with intersections between layers.
33. Colour per maximum quality level (Max Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
34. Colour per effective quality level (Effective Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
35. Colour per quality margin (Eb/Nt margin)
Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
36. Colour per required power
The required terminal power, , is calculated as described in the Point analysis AS analysis tab Uplink sub-
menu part. Coverage consists of several layers with a layer per user-defined power threshold defined in the Display tab
(Prediction properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
37. Colour per required power margin
Coverage consists of several layers with a layer per user-defined power margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
38. Colour per rate
This display option is relevant for CDMA2000 1xRTT data services only. For each possible data rate,
( , , , , ), Atoll
calculates the total uplink traffic channel quality ( ). Coverage consists of several layers with a layer per
possible data rate, . For each layer, area is covered if . Each layer is assigned a colour
and displayed with intersections between layers. is the uplink traffic data quality target for the data rate, .
This parameter is user-defined for the service, a given terminal and data rate in the service properties.
7.5.2.3.2 CDMA2000 1xEV-DO
As in point analysis, Atoll calculates uplink quality from receiver for each cell (l,ic) (with ic=ic
BS
or ic
given
) in receiver active
set. No power control simulation is performed. For 1xEV-DO Rev. 0 users, Atoll determines uplink quality at the transmitter
for the maximum terminal power allowed and an uplink data channel rate of 9.6 kbps. For 1xEV-DO Rev. A users, Atoll
determines uplink quality at the transmitter for the maximum terminal power allowed and an uplink data channel rate of
4.8 kbps. Then, the total uplink quality ( ) is evaluated with respect to the receiver handover status.
Atoll displays uplink quality at transmitters in active set on the carrier ic ( or ) received from the receiver.
For further details on formulas, see "Definitions and Formulas" on page 310. For further details on calculations, see "Uplink
Sub-Menu" on page 360.
39. Single colour
Atoll displays a coverage if . Coverage colour is unique. For 1xEV-DO Rev. 0 users, is the quality
required on uplink for a 9.6 kbps data channel rate. For 1xEV-DO Rev. A users, is the quality required on uplink for
a 4.8 kbps data channel rate. This parameter is calculated from the minimum uplink pilot quality and gains on the different
uplink channels.
We have:
Q
MAX
UL
i c p , ( ) ( )
FCH
Q
req
UL
( )
FCH
>
Q
MAX
UL
i c ( ) ( )
FCH
Threshol d >
Q
effecti ve
UL
i c ( ) ( )
FCH
Threshol d >
Q
MAX
UL
i c ( ) ( )
FCH
Q
req
UL
( )
FCH
M i n arg >
P
term
FCH re q
P
term
FCH re q
i c ( ) Threshol d >
P
term
max
P
term
FCH re q
i c ( ) M i n arg >
R
UL
R
FCH
UL
AF
FCH
UL
R
FCH
UL
AF
FCH
UL
2 + ( ) R
FCH
UL
AF
FCH
UL
4 + ( ) R
FCH
UL
AF
FCH
UL
8 + ( ) R
FCH
UL
AF
FCH
UL
16 + ( )
Q
MAX
UL
i c R
UL
, ( )
R
UL
Q
MAX
UL
i c R
UL
, ( ) Q
req
UL
R
UL
( ) >
Q
req
UL
R
UL
( ) R
UL
Note:
Best server and active set determination is performed as in point prediction (AS analysis).
Q
MAX
UL
i c ( )
i c
BS
i c
gi ven
Q
MAX
UL
i c ( ) Q
req
UL
> Q
req
UL
Q
req
UL
Forsk 2010 AT283_TRG_E2 373
Chapter 7: CDMA2000 Networks
for 1xEV-DO Rev 0 terminals,
And
for 1xEV-DO Rev A terminals.
40. Colour per transmitter
Atoll displays a coverage if . Coverage consists of several layers with associated colours. There is a
layer per transmitter with no intersection between layers. Layer colour is the colour assigned to best server transmitter.
41. Colour per mobility
In this case, receiver is not completely defined and no mobility is assigned. Coverage consists of several layers with a
layer per user-defined mobility defined in Mobility sub-folder. For each layer, area is covered if . Each
layer is assigned a colour and displayed with intersections between layers.
42. Colour per service
In this case, receiver is not completely defined and no service is assigned. Coverage consists of several layers with a layer
per user-defined service defined in Services sub-folder. For each layer, area is covered if . Each layer is
assigned a colour and displayed with intersections between layers.
43. Colour per probability
This display option is available only if analysis is based on all simulations in a group (i.e. if you select a group of simulations
and the All option in the Condition tab of prediction properties). Coverage consists of several layers with a layer per user-
defined probability level defined in the Display tab (Prediction properties). For each layer, area is covered if
in the required number of simulations. Each layer is assigned a colour and displayed with intersections
between layers.
44. Colour per cell edge coverage probability
Coverage consists of several layers with a layer per user-defined cell edge coverage probability, p, defined in the Display
tab (Prediction properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
45. Colour per maximum quality level (Max Eb/Nt)
Here, Atoll calculates the total uplink traffic channel quality ( ).
With
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
46. Colour per effective quality level (Effective Eb/Nt)
Coverage consists of several layers with a layer per user-defined quality threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
47. Colour per quality margin (Eb/Nt margin)
Coverage consists of several layers with a layer per user-defined quality margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
48. Colour per required power
The required terminal power on traffic data channel, , is calculated as described in the Point analysis AS
analysis tab Uplink sub-menu part.
for 1xEV-DO Rev 0 terminals,
Q
req
UL
E
c
N
t
------
\ .
| |
=
mi n
UL
G
p
UL
1 G
ACK
G
DRC
G
TCH
+ + + ( )
Q
req
UL
E
c
N
t
------
\ .
| |
=
mi n
UL
G
p
UL
1 G
ACK
G
RRI
G +
DRC
G
TCH
G
Auxi l i ary Pi l ot
+ + + + ( )
Q
MAX
UL
i c ( ) Q
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
>
Q
MAX
UL
i c ( ) Q
req
UL
>
Q
MAX
UL
i c p , ( ) Q
req
UL
>
Q
MAX
UL
i c ( ) ( )
TCH
Q
MAX
UL
i c ( ) ( )
TCH
Q
req
UL
( )
TCH
P
term
req
--------------------------- P
term
max
=
Q
req
UL
( )
TCH
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
G
TCH
=
Q
MAX
UL
i c ( ) ( )
TCH
Threshol d >
Q
effecti ve
UL
i c ( ) ( )
TCH
Threshol d >
Q
effecti ve
UL
i c ( ) ( )
TCH
mi n Q
MAX
UL
i c ( ) ( )
TCH
Q
req
UL
( ) ,
TCH
( ) =
Q
MAX
UL
i c ( ) Q
req
UL
M i n arg >
P
term
TCH re q
P
term
TCH re q
P
term
req
1 G
ACK
G
DRC
G
TCH
+ + +
------------------------------------------------------------------- G
TCH
=
374 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
And
for 1xEV-DO Rev A terminals.
Coverage consists of several layers with a layer per user-defined power threshold defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
49. Colour per required power margin
Coverage consists of several layers with a layer per user-defined power margin defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
50. Colour per rate
For each possible data rate, , Atoll calculates the total uplink quality ( ). Coverage consists of several
layers with a layer per possible data rate. For each layer, area is covered if . Each layer is
assigned a colour and displayed with intersections between layers.
is the uplink quality required to obtain the data rate, .
1xEV-DO Rev. 0 users
The possible data rates on uplink, , are: 9.6, 19.2, 38.4, 76.8 and 153.6 kbps
Where
is the minimum pilot quality level on uplink. This parameter is available in the Mobility types table.
, and are respectively acknowledgement, data rate control and traffic data gains relative to the pilot.
They are defined in the terminal properties (1xEV-DO Rev. 0 tab).
1xEV-DO Rev. A users
The data rate, is obtained when a certain uplink transmission format (i.e. 1xEV-DO Rev. A radio bearer
( ) with a certain number of subframes ( )) is used. It is calculated as follows:
Where
is the minimum pilot quality level required on uplink to obtain the data rate, . The value is defined in the 1xEV-
DO Rev. A Radio Bearer Selection (Uplink) table for the uplink transmission format (radio bearer Index, mobility and
number of subframe). Two values are available for this parameter, one when the service uplink mode is "Low Latency"
and another one for high capacity services.
, , , and are respectively acknowledgement, data rate control, traffic data
channel, reverse rate indicator and auxiliary pilot channel gains relative to the pilot. They are defined in the terminal
properties (1xEV-DO Rev. A tab). Two values of are available, one when the service uplink mode is "Low Latency"
and another one for high capacity services.
51. Colour per average rate
This display option is available for 1xEV-DO Rev. A users only. When HARQ (Hybrid Automatic Repeat Request) is used,
the required average number of retransmissions is smaller and the data rate is an average data rate ( ) calculated as
follows:
The average number of retransmissions ( ) is determined from early termination probabilities defined for the
selected uplink transmission format (i.e. the radio bearer index ( ) with the number of subframes
P
term
TCH re q
P
term
req
1 G
ACK
G
RRI
G +
DRC
G
TCH
G
Auxi l i ary Pi l ot
+ + + +
------------------------------------------------------------------------------------------------------------------------------------- G
TCH
=
P
term
TCH re q
i c ( ) Threshol d >
P
term
max
P
term
req
i c ( ) M i n arg >
R
UL
Q
MAX
UL
i c R
UL
, ( )
Q
MAX
UL
i c R
UL
, ( ) Q
req
UL
R
UL
( ) >
Q
req
UL
R
UL
( ) R
UL
R
UL
Q
req
UL
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
ACK
G
DRC
G
TCH
+ + + ( ) =
E
c
N
t
------
\ .
| |
mi n
UL
G
ACK
G
DRC
G
TCH
R
UL
Index
UL RevA Bearer
n
SF
R
req
UL
R
RLC peak
UL
Index
UL RevA Bearer
( )
n
SF
---------------------------------------------------------------------------------------------- =
Q
req
UL
E
c
N
t
------
\ .
| |
mi n
UL
G
p
UL
1 G
ACK
G
DRC
G
TCH
G
RRI
G
Auxi l i ary pi l ot
+ + + + + ( ) =
E
c
N
t
------
\ .
| |
mi n
UL
R
UL
G
ACK
G
DRC
G
TCH
G
RRI
G
Auxi l i ary pi l ot
G
TCH
R
av
UL
R
av
UL
R
RLC peak
UL
Index
UL R evA Bearer
( )
n
Rtx
UL
Index
UL R evA Bearer
n
SF
, ( ) ( )
av
------------------------------------------------------------------------------------------------ =
n
Rtx
UL
( )
av
Index
UL R evA Bearer
Forsk 2010 AT283_TRG_E2 375
Chapter 7: CDMA2000 Networks
( )). The Early Termination Probability graph shows the probability of early termination ( ) as a function of the number
of retransmissions ( ). Atoll calculates the average number of retransmissions ( ) as follows:
For each possible average data rate, , Atoll calculates the total uplink quality ( ). Coverage consists
of several layers with a layer per possible average data rate. For each layer, area is covered if
. Each layer is assigned a colour and displayed with intersections between layers.
is the uplink quality required to obtain the average data rate, .
7.5.2.4 Downlink Total Noise Analysis
Atoll determines downlink total noise generated by cells.
For CDMA2000 1xRTT systems, we have:
For CDMA2000 1xEV-DO systems, we have:
Downlink noise rise, , is calculated from the downlink total noise, , as:
7.5.2.4.1 Analysis on all Carriers
If all the carriers are selected, Atoll determines DL total noise for all the carriers. Then, allows the user to choose different
displays.
52. Colour per minimum noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
53. Colour per maximum noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed
with intersections between layers.
54. Colour per average noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and
displayed with intersections between layers.
55. Colour per minimum noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-defined
noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
56. Colour per maximum noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-
defined noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
57. Colour per average noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-
defined noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
n
SF
p
n
Rtx
UL
n
Rtx
UL
( )
av
n
Rtx
UL
( )
av
p n
Rtx
UL
( ) p n
Rtx
UL
1 ( ) ( ) n
Rtx
UL

n
Rtx
UL
1 =
n
Rt x
( )
max

p n
Rtx
UL
( )
max
( )
------------------------------------------------------------------------------------------------- =
R
av
UL
Q
MAX
UL
i c R
av
UL
, ( )
Q
MAX
UL
i c R
av
UL
, ( ) Q
req
UL
R
av
UL
( ) >
Q
req
UL
R
av
UL
( ) R
av
UL
N
tot
DL
i c ( ) P
tot
DL
i c ( )
txj j ,

P
tot
DL
i c
adj
( )
txj j ,

RF i c i c
adj
, ( )
--------------------------------------- N
0
term
+ + =
N
tot
DL
i c ( ) P
tot
DL
i c b
pi l ot
, ( )
txj j ,

P
tot
DL
i c
adj
b
pi l ot
, ( )
txj j ,

RF i c i c
adj
, ( )
------------------------------------------------------- N
0
term
+ + =
NR
DL
i c ( ) N
tot
DL
NR
DL
i c ( ) 10
N
0
term
N
tot
DL
--------------
\ .
|
| |
log =
mi n NR
tot
i c
DL
i c ( ) Threshol d >
max NR
tot
i c
DL
i c ( ) Threshol d >
average NR
tot
i c
DL
i c ( ) Threshol d >
mi n NR
DL
i c
i c ( ) Threshol d >
max NR
DL
i c
i c ( ) Threshol d >
average NR
DL
i c
i c ( ) Threshol d >
376 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.5.2.4.2 Analysis on a Specific Carrier
When only one carrier is analysed, Atoll determines DL total noise or DL noise rise on this carrier. In this case, the
displayed coverage is the same for any selected display per noise level (average, minimum or maximum) or any display
per noise rise (average, minimum or maximum).
58. Colour per noise level
Coverage consists of several layers with a layer per user-defined noise level defined in the Display tab (Prediction
properties). For each layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
59. Colour per noise rise
Atoll displays bins where . Coverage consists of several areas with an area per user-defined
noise rise threshold defined in the Display tab. Each area is assigned a colour with intersections between areas.
7.6 Automatic Neighbour Allocation
Atoll permits the automatic allocation of intra-technology neighbours in the current network. Two allocation algorithms are
available, one dedicated to intra-carrier neighbours and the other for inter-carrier neighbours.
The intra-technology neighbour allocation algorithms take into account all the cells of TBC transmitters. It means that all
the cells of TBC transmitters of your .atl document are potential neighbours.
The cells to be allocated will be called TBA cells. They must fulfill the following conditions:
They are active,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone,
They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder
or a group of transmitters or a single transmitter.
Only TBA cells may be assigned neighbours.
In this section, the following are explained:
"Neighbour Allocation for all Transmitters" on page 376.
"Neighbour Allocation for a Group of Transmitters or One Transmitter" on page 379.
"Importance Calculation" on page 379.
7.6.1 Neighbour Allocation for all Transmitters
We assume that we have a reference cell A and a candidate neighbour, cell B. When automatic allocation starts, Atoll
checks following conditions:
60. The distance between both cells must be less than the user-definable maximum inter-site distance. If the distance
between the reference cell and the candidate neighbour is greater than this value, then the candidate neighbour
is discarded.
61. The calculation options,
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or
more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: This option enables you to force cells located on the reference cell site in the candidate
neighbour list. This constraints can be weighted among the others and ranks the neighbours through the importance field
(see after).
Force adjacent cells as neighbours (only for intra-carrier neighbours): This option enables you to force cells geographically
adjacent to the reference cell in the candidate neighbour list.This constraints can be weighted among the others and ranks
the neighbours through the importance field (see after).
Force neighbour symmetry: This option enables user to force the reciprocity of a neighbourhood link. Therefore, if the
reference cell is a candidate neighbour of another cell, this one will be considered as candidate neighbour of the reference
cell.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may
force/forbid a cell to be candidate neighbour of the reference cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours
and carries out a new neighbour allocation. If not selected, the existing neighbours are kept.
N
tot
DL
i c ( ) Threshol d >
NR
DL
i c ( ) Threshol d >
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Forsk 2010 AT283_TRG_E2 377
Chapter 7: CDMA2000 Networks
62. There must be an overlapping zone ( ) with a given cell edge coverage probability:
Intra-carrier neighbours: intra-carrier handover is a soft handover.
The reference cell A and the candidate cell B are located inside a continuous layer of cells with carrier c1 (c1 is the selected
carrier on which you run the allocation).
S
A
is the area where the cell A is the best serving cell. It means that the cell A is the first one in the active set.
- The pilot signal received from the cell A is greater than the minimum pilot signal level.
- The pilot quality from A exceeds Min. Ec/I0.
- The pilot quality from A is the best.
S
B
is the area where the cell B can enter the active set.
- The pilot signal received from the cell B is greater than the minimum pilot signal level.
- The pilot quality from B is greater than T_Drop.
Inter-carrier neighbours: inter-frequency handover is a hard handover. It is needed in a multi-carrier (1xRTT and
1xEV-DO carriers) CDMA network:
- To balance loading between carriers and layers (1
st
case),
- To make a coverage reason handover from micro cell frequency to macro cells (2
nd
case).
1
st
case: the reference cell A is located inside a continuous layer of cells with carrier c1 (c1 is the selected carrier on which
you run the allocation) and the candidate cell B belongs to a layer of cells with carrier c2.
S
A
is the area where:
- The pilot signal received from the cell A is greater than the minimum pilot signal level.
- The pilot signal from A is not the highest one. It is strictly lower than the best pilot signal received and higher
than the best pilot signal minus the margin.
S
B
is the area where:
- The pilot signal received from the cell B is greater than the minimum pilot signal level.
- The pilot signal from B is the highest one.
2
nd
case: the reference cell A is located on the border of a layer with carrier c1 (c1 is the selected carrier on which you run
the allocation) and the candidate cell B belongs to a layer of cells with carrier c2.
S
A
is the area where:
- The pilot signal received from the cell A is greater than the minimum pilot signal level.
- The pilot signal from A is the highest one
- The pilot signal from A is lower than the minimum pilot signal level plus the margin.
S
B
is the area where:
- The pilot signal received from the cell B is greater than the minimum pilot signal level.
Note:
Adjacence criterion: Let CellB be a candidate neighbour cell of CellA. CellB is considered
adjacent to CellA if there exists at least one pixel in the CellA Best Server coverage area
where CellB is Best Server (if several cells have the same best server value) or CellB is the
second best server that enters the Active Set (respecting the T_Drop of the allocation).
When this option is checked, adjacent cells are sorted and listed from the most adjacent to
the least, depending on the above criterion. Adjacence is relative to the number of pixels
satisfying the criterion.
Figure 7.4Overlapping Zones - 1st Case
S
A
S
B

378 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
- The pilot signal from B is the highest one.
Atoll calculates the percentage of covered area ( ) and compares this value to the % minimum covered
area. If this percentage is not exceeded, the candidate neighbour B is discarded.
The coverage condition can be weighted among the others and ranks the neighbours through the importance field (see
after).
63. The importance of neighbours.
For information on the importance calculation, see "Importance Calculation" on page 379.
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll
lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the
maximum number of neighbours to be allocated to each transmitter is exceeded. If we consider the case for which there
are 15 candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among
these 15 candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note
that specific maximum numbers of neighbours (maximum number of intra-carrier neighbours, maximum number of inter-
carrier neighbours) can be defined at the cell level (property dialogue or cell table). If defined there, this value is taken into
account instead of the default one available in the Neighbour Allocation dialogue.
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site, adjacent, coverage or symmetric. For
neighbours accepted for co-site, adjacency and coverage reasons, Atoll displays the percentage of area meeting the
coverage conditions and the corresponding surface area (km
2
), the percentage of area meeting the adjacency conditions
and the corresponding surface area (km
2
). Finally, if cells have previous allocations in the list, neighbours are marked as
existing.
Figure 7.5Overlapping Zones - 2nd Case
Note:
Two ways enable you to determine the I
0
value:
1 - Global Value: A percentage of the cell maximum power is considered. If the % of
maximum power is too low, i.e. if , Atoll takes into account the pilot
power of the cell. Then, I
0
represents the sum of values calculated for each cell.
2 - Defined per Cell: Atoll takes into account the total downlink power defined per cell. I
0
represents the sum of total transmitted powers.
Notes:
No simulation or prediction study is needed to perform an automatic neighbour allocation.
When starting an automatic neighbour allocation, Atoll automatically calculates the path
loss matrices if not found.
Even if no specific terminal, mobility or service is selected in the automatic allocation, it is
interesting to know that the algorithm works such as finding the maximum number of
neighbours by selection the multi-service traffic data as follows:
Service: selection of the one with the lowest body loss.
Mobility: no impact on the allocation, no specific selection.
Terminal: selection of the one with the greatest (Gain - Loss) value, and, if equal, the one
with the lowest noise figure.
The neighbour lists may be optionally used in the power control simulations to determine
the mobile's active set.
% P
max
P
pi l ot
<
S
A
S
B

S
A
---------------------- 100
Forsk 2010 AT283_TRG_E2 379
Chapter 7: CDMA2000 Networks
7.6.2 Neighbour Allocation for a Group of Transmitters or One
Transmitter
In this case, Atoll allocates neighbours to:
TBA cells,
Neighbours of TBA cells marked as exceptional pair, adjacent and symmetric,
Neighbours of TBA cells that satisfy coverage conditions.
Automatic neighbour allocation parameters are described in "Neighbour Allocation for all Transmitters" on page 376.
7.6.3 Importance Calculation
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason, and to
quantify the neighbour importance.
7.6.3.1 Importance of Intra-carrier Neighbours
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between
0 and 100%.
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined
using the Importance Function (IF). The IF considers three factors for calculating the importance:
The co-site factor (C) which is a Boolean
The adjacency factor (A) which deals with the percentage of adjacency
The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
A forbidden neighbour must not be listed as neighbour except if the neighbourhood
relationship already exists and the Delete existing neighbours option is unchecked when
you start the new allocation. In this case, Atoll displays a warning in the Event viewer
indicating that the constraint on the forbidden neighbour will be ignored by algorithm
because the neighbour already exists.
The force neighbour symmetry option enables the users to consider the reciprocity of a
neighbourhood link. This reciprocity is allowed only if the neighbour list is not already full.
Thus, if the cell B is a neighbour of the cell A while the cell A is not a neighbour of the cell
B, two cases are possible:
1
st
case: There is space in the cell B neighbour list: the cell A will be added to the list. It will
be the last one.
2
nd
case: The cell B neighbour list is full: Atoll will not include cell A in the list and will
cancel the link by deleting cell B from the cell A neighbour list.
When the options Force exceptional pairs and Force symmetry are selected, Atoll
considers the constraints between exceptional pairs in both directions so as to respect
symmetry condition. On the other hand, if neighbourhood relationship is forced in one
direction and forbidden in the other one, symmetry cannot be respected. In this case, Atoll
displays a warning in the Event viewer.
In the Results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a
TBA cell has already reached its maximum number of neighbours before starting the new
allocation, it will not appear in the Results table.
Neighbourhood cause When
Importance
value
Existing neighbour
Only if the Delete existing neighbours option is not selected
and in case of a new allocation
Existing
importance
Exceptional pair Only if the Force exceptional pairs option is selected 100 %
Co-site transmitter Only if the Force co-site cells as neighbours option is selected IF
Adjacent transmitter
Only if the Force adjacent cells as neighbours option is
selected
IF
Neighbourhood relationship that fulfils
coverage conditions
Only if the % minimum covered area is exceeded IF
Symmetric neighbourhood
relationship
Only if the Force neighbour symmetry option is selected IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 30% Mi n O ( ) Max O ( )
380 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The IF evaluates importance as follows:
Where
7.6.3.2 Importance of Inter-carrier Neighbours
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between
0 to 100%.
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined
using the Importance Function (IF). The IF considers two factors for calculating the importance:
The co-site factor (C) which is a Boolean
The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
The IF evaluates importance as follows:
Adjacency factor (A) 30% 60%
Co-site factor (C) 60% 100%
Neighbourhood
cause
IF
Resulting IF using the
default values from the
table above
Co-site Adjacent
No No
No Yes
Yes Yes
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Adjacent neighbours
iii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
The ranking between neighbours from the same category depends on the factors (A) and
(O).
The default value of Min(O) = 1% ensures that neighbours selected for symmetry will have
an importance greater than 0%. With a value of Min(O) = 0%, neighbours selected for
symmetry will have an importance field greater than 0% only if there is some coverage
overlapping.
Mi n A ( ) Max A ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 29% O ( ) +
Mi n A ( ) A A ( ) Max O ( ) O ( ) 100% Max O ( ) ( ) A ( ) + { } + 30% 30% 30% O ( ) 70% A ( ) + { } +
Mi n C ( ) A C ( ) Max O ( ) O ( ) 100% Max O ( ) ( ) A ( ) + { } + 60% 40% 30% O ( ) 70% A ( ) + { } +
A X ( ) Max X ( ) Mi n X ( ) =
Neighbourhood cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected IF
Neighbourhood relationship that fulfils
coverage conditions
If the % minimum covered area is exceeded IF
Symmetric neighbourhood
relationship
If the Force neighbour symmetry option is selected IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 60%
Co-site factor (C) 60% 100%
Co-site Neighbourhood cause IF
Resulting IF using the default
values from the table above
No
Yes
Mi n O ( ) Max O ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 59% O ( ) +
Mi n C ( ) A C ( ) O ( ) + 60% 40% O ( ) +
Forsk 2010 AT283_TRG_E2 381
Chapter 7: CDMA2000 Networks
Where
7.7 PN Offset Allocation
PN offset is used to identify a cell. It is a time offset used by a cell to shift a Pseudo Noise sequence. Mobile processes
the strongest received PN sequence and reads its phase that identifies the cell.
By default, there are 512 PN Offsets. PN Offsets are numbered (0...511).
The cells to which Atoll allocates PN Offsets are referred to as the TBA cells (cells to be allocated). TBA cells fulfil following
conditions:
- They are active,
- They satisfy the filter criteria applied to the Transmitters folder,
- They are located inside the focus zone,
- They belong to the folder on which allocation has been executed. This folder can be either the Transmitters
folder or a group of transmitters or a single transmitter.
7.7.1 Automatic Allocation Description
7.7.1.1 Options and Constraints
The PN Offset allocation algorithm can take into account following constraints and options:
64. PILOT_INC parameter,
Atoll uses this parameter to determine the pool of possible PN offsets (512 divided by PILOT_INC value). The first
PN offset is PILOT_INC and other ones are multiples of this value.
For example: When PILOT_INC is set to 4, the pool of possible PN offsets consists of PN offsets from 4 to 508
with a separation interval of 4 (i.e. [4,8,12,16,...508]).
65. Neighbourhood between cells,
You may consider:
First order neighbours: The neighbours of TBA cells listed in the Intra-technology neighbours table,
Second order neighbours: The neighbours of neighbours,
Third order neighbours: The neighbours neighbours neighbours.
66. Cells fulfilling a criterion on Ec/I0 (option Additional Ec/I0 conditions),
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
The ranking between neighbours from the same category depends on the factor (O).
The default value of Min(O) = 1% ensures that neighbours selected for symmetry will have
an importance greater than 0%. With a value of Min(O) = 0%, neighbours selected for
symmetry will have an importance field greater than 0% only if there is some coverage
overlapping.
A X ( ) Max X ( ) Mi n X ( ) =
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Notes:
In the context of the PN Offset allocation, the term "neighbours" refers to intra-carrier
neighbours.
Atoll can take into account inter-technology neighbour relations as constraints to allocate
different PN Offsets to the CDMA neighbours of a GSM transmitter. In order to consider
inter-technology neighbour relations in the PN Offset allocation, you must make the
Transmitters folder of the GSM .atl document accessible in the CDMA .atl document. For
information on making links between GSM and CDMA .atl documents, see the User
Manual.
Atoll considers symmetry relationship between a cell, its first order neighbours, its second
order neighbours and its third order neighbours.
382 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For a reference cell A, Atoll considers all the cells B that can enter the active set on the area where the reference cell
is the best server (area where (Ec/I0)
A
exceeds Min. Ec/I0 and is the highest one and (Ec/I0)
B
exceeds T_Drop).
67. Co-PN Reuse distance,
Reuse distance is a constraint on the allocation of PN offsets. A PN offset cannot be reused at a site that is not at least as
far away as the reuse distance from the site allocated with the particular PN offset.
68. PN-cluster size. Within the context of PN offset allocation, the term "PN-cluster" refers to a sub-group of PN
offsets.
69. Exceptional pairs,
70. Domains of PN Offsets,
71. The carrier on which the allocation is run: It can be a given carrier or all of them. In this case, either Atoll
independently plans PN Offsets for the different carriers, or it allocates the same PN Offset to each carrier of a
transmitter if the option "Allocate carriers identically" is selected.
72. The possibility to use a maximum of PN offsets (option "Use a Maximum of PN Offsets"): Atoll will try to spread
the PN offset spectrum the most.
73. The "Delete All Codes" option: When selecting this option, Atoll deletes all the current PN Offsets and carries out
a new PN Offset allocation. If not selected, the existing PN Offsets are kept.
In addition, it depends on the selected allocation strategy. Allocation strategies can be:
PN offset per cell: The purpose of this strategy is to reduce the spectrum of allocated PN offsets the maximum
possible. Atoll will allocate the first possible PN offsets in the domain.
Adjacent PN-Clusters per site:This strategy consists of allocating one cluster of adjacent PN offsets to each site,
then, one PN offset of the cluster to each cell of each transmitter according to its azimuth. When all the clusters
have been allocated and there are still sites remaining to be allocated, Atoll reuses the clusters at another site.
Distributed PN-clusters per site: This strategy consists of allocating one cluster of PN offsets to each site in the
network, then, one PN offset of the cluster to each cell of each transmitter according to its azimuth. With this
strategy, the cluster is made of PN offsets separated as much as possible. When all the clusters have been allo-
cated and there are still sites remaining to be allocated, Atoll reuses the clusters at another site.
In the Results table, Atoll only displays PN offsets allocated to TBA cells.
7.7.1.2 Allocation Process
For each TBA cell, Atoll lists all cells which have constraints with the cell. They are referred to as near cells. The near cells
of a TBA cell may be:
Its neighbour cells: the neighbours listed in the Intra-technology neighbours table (options Existing neighbours
and "First Order"),
The neighbours of its neighbours (options Existing neighbours and Second Order),
The third order neighbours (options Existing neighbours and Third Order),
The cells that fulfil Ec/I0 condition (option Additional Ec/I0 conditions),
The cells with distance from the TBA cell less than the reuse distance,
The cells that make exceptional pairs with the TBA cell.
One additional constraint is considered when:
The cell and its near cells are neighbours of a same GSM transmitter (only if the Transmitters folder of the GSM
.atl document is accessible in the UMTS .atl document),
These constraints have a certain weight taken into account to determine the TBA cell priority during the allocation process
and the cost of the PN Offset plan. During the allocation, Atoll tries to assign different PN Offsets to the TBA cell and its
near cells. If it respects all the constraints, the cost of the PN Offset plan is 0. When a cell has too many constraints and
there are not anymore PN Offsets available, Atoll breaks the constraint with the lowest cost so as to generate the PN
Offset plan with the lowest cost. For information on the cost generated by each constraint, see "Cell Priority" on page 384.
7.7.1.2.1 Single Carrier Network
The allocation process depends on the selected strategy. Algorithm works as follows:
Note:
Atoll considers either a percentage of the cell maximum powers or the total downlink
power used by the cells in order to evaluate I0. In this case, I0 equals the sum of total
transmitted powers. When this parameter is not specified in the cell properties, Atoll uses
50% of the maximum power.
Note:
PN offset reuse distance can be defined at cell level. If this value is not defined, then Atoll
will use the default reuse distance defined in the PN offset Automatic Allocation
dialogue.
Note:
When no domain is assigned to cells, Atoll considers the PILOT_INC parameter only to
determine available PN offsets (e.g., If PILOT_INC is set to 4, all PN offsets from 4 to 508
with a separation interval of 4 can be allocated).
Forsk 2010 AT283_TRG_E2 383
Chapter 7: CDMA2000 Networks
Strategy: PN offset per cell
Atoll processes TBA cells according to their priority. It allocates PN Offsets starting with the highest priority cell and its
near cells, and continuing with the lowest priority cells not allocated yet and their near cells. For information on calculating
cell priority, see "Cell Priority" on page 384.
Strategy: Adjacent PN-Clusters per site
All sites which have constraints with the studied site are referred to as near sites.
Atoll assigns a PN-cluster of adjacent PN offsets to each site, starting with the highest priority site and its near sites, and
continuing with the lowest priority sites not allocated yet and their near sites. When all the clusters have been allocated
and there are still sites remaining to be allocated, Atoll reuses the clusters at another site. When the Co-PN Reuse
Distance option is selected, the algorithm reuses the clusters as soon as the Co-PN reuse distance is exceeded.
Otherwise, when the option is not selected, the algorithm tries to assign reused clusters as spaced out as possible.
Then, Atoll allocates a PN offset from the cluster to each cell of each transmitter located on the sites according to the
transmitter azimuth. It starts with the highest priority cell and its near cells and goes on with the lowest priority cells not
allocated yet and their near cells.
For information on calculating site priority, see "Site Priority" on page 386. For information on calculating cell priority, see
"Cell Priority" on page 384.
Strategy: Distributed PN-Clusters per site
All sites which have constraints with the studied site are referred to as near sites.
Atoll assigns one cluster to each site, starting with the highest priority site and its near sites, and continuing with the lowest
priority sites not allocated yet and their near sites. When all the clusters have been allocated and there are still sites
remaining to be allocated, Atoll reuses the clusters at another site. When the Co-PN Reuse Distance option is selected,
the algorithm reuses the clusters as soon as the Co-PN reuse distance is exceeded. Otherwise, when the option is not
selected, the algorithm tries to assign reused clusters as spaced out as possible.
Then, Atoll assigns a PN offset from the cluster to each cell of each transmitter located on the sites according to the
transmitter azimuth. It starts with the highest priority cell and its near cells and goes on with the lowest priority cells not
allocated yet and their near cells.
For information on calculating site priority, see "Site Priority" on page 386. For information on calculating cell priority, see
"Cell Priority" on page 384.
7.7.1.2.2 Multi-Carrier Network
In case you have a multi-carrier network and you run the PN Offset allocation on all the carriers, the allocation process
depends on wether the option "Allocate Carriers Identically" is selected or not.
When the option is not selected, algorithm works for each strategy, as explained above. On the other hand, when the
option is selected, allocation order changes. It is no longer based on the cell priority but depends on the transmitter priority.
All transmitters which have constraints with the studied transmitter will be referred to as near transmitters.
In case of a "Per cell" strategy (PN offset per cell), Atoll starts PN offset allocation with the highest priority transmitter and
its near transmitters and continues with the lowest priority transmitters not allocated yet and their near transmitters. The
same PN offset is assigned to each cell of the transmitter.
In case of a "Per site" strategy (Adjacent and Distributed PN-clusters per site strategies), Atoll assigns a cluster to each
site and then, allocates a PN offset to each transmitter. It starts with the highest priority transmitter and its near transmitters
and continues with the lowest priority transmitters not allocated yet and their near transmitters. The same PN offset is
assigned to each cell of the transmitter.
For information on calculating cell priority, see "Cell Priority" on page 384. For information on calculating transmitter
priority, see "Transmitter Priority" on page 386.
7.7.1.2.3 Difference between Adjacent and Distributed PN-Clusters
The following example explains the difference between "Adjacent PN-clusters" and "Distributed PN-clusters". The
PILOT_INC has been set to 4 and the PN-cluster size to 3. There are:
128 PN offsets that can be allocated: they are all PN offsets from 4 to 508 with a separation interval of 4.
Each PN-cluster consists of three PN offsets. So, there are 42 PN-clusters available.
If you select "Adjacent PN-cluster per site" as allocation strategy, Atoll will consider PN-clusters consisted of adjacent PN
offsets (e.g. {4,8,12}, {16,20,24}, ...,{496,500,504}).
If you select "Distributed PN-cluster per site" as allocation strategy, Atoll will consider PN-clusters consisted of PN offsets
separated as much as possible (e.g. {4,172,340}, {8,176,344}, ...,{168,336,504}).
Note:
When cells, transmitters or sites have the same priority, processing is based on an
alphanumeric order.
384 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.7.1.3 Priority Determination
7.7.1.3.1 Cell Priority
PN Offset allocation algorithm in Atoll allots priorities to cells before performing the actual allocation. Priorities assigned
to cells depend upon how much constrained each cell is and the cost defined for each constraint. A cell without any
constraint has a default cost, , equal to 0. The higher the cost on a cell, the higher the priority it has for the PN Offset
allocation process.
There are five criteria employed to determine the cell priority:
PN Offset Domain Criterion
The cost due to the domain constraint, , depends on the number of PN Offsets available for the allocation. The
domain constraint is mandatory and cannot be broken.
When no domain is assigned to cells, 512 PN Offsets are available and we have:
When domains of PN Offsets are assigned to cells, each unavailable PN Offset generates a cost. The higher the number
of codes available in the domain, the less will be the cost due to this criterion. The cost is given as:
Distance Criterion
The constraint level of any cell i depends on the number of cells (j) present within a radius of "reuse distance" from its
centre. The total cost due to the distance constraint is given as:
Each cell j within the reuse distance generates a cost given as:
Where
is a weight depending on the distance between i and j. This weight is inversely proportional to the inter-cell distance.
For a reuse distance of 2000m, the weight for an inter-cell distance of 1500m is 0.25, the weight for co-site cells is 1 and
the weight for two cells spaced out 2100m apart is 0.
is the cost of the distance constraint. This value can be defined in the Constraint Cost dialogue.
Exceptional Pair Criterion
The constraint level of any cell i depends on the number of exceptional pairs (j) for that cell. The total cost due to
exceptional pair constraint is given as:
Where
is the cost of the exceptional pair constraint. This value can be defined in the Constraint Cost dialogue.
Neighbourhood Criterion
The constraint level of any cell i depends on the number of its neighbour cells j, the number of second order neighbours k
and the number of third order neighbours l.
Lets consider the following neighbour schema:
The total cost due to the neighbour constraint is given as:
Each first order neighbour cell j generates a cost given as:
Figure 7.6Neighbourhood Constraints
C
C
i
Dom ( )
C
i
Dom ( ) 0 =
C
i
Dom ( ) 512 Number of PN Offsets in the domain =
C
i
Di st ( ) C
j
Di st i ( ) ( )
j

=
C
j
Di st i ( ) ( ) w d
i j
( ) c
di s ce tan
=
w d
i j
( )
c
di s ce tan
C
i
EP ( ) c
EP
i j ( )
j

=
c
EP
C
i
N ( ) C
j
N1 i ( ) ( ) C
j j '
N1 i ( ) ( )
j '

+
j

\ .
|
| |
C
k
N2 i ( ) ( ) C
k k'
N2 i ( ) ( )
k'

+
k

\ .
|
| |
C
l
N3 i ( ) ( ) C
l l '
N3 i ( ) ( )
l '

+
l

\ .
|
| |
+ + =
C
j
N1 i ( ) ( ) I
j
c
N1
=
Forsk 2010 AT283_TRG_E2 385
Chapter 7: CDMA2000 Networks
Where
is the importance of the neighbour cell j.
is the cost of the first order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two first order neighbours must not have the same PN Offset, Atoll considers the cost created by two first order
neighbours to be each other.
Each second order neighbour cell k generates a cost given as:
Where
is the cost of the second order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two second order neighbours must not have the same PN Offset, Atoll considers the cost created by two second
order neighbours to be each other.
Each third order neighbour cell l generates a cost given as:
Where
is the cost of the third order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two third order neighbours must not have the same PN Offset, Atoll considers the cost created by two third order
neighbours to be each other.
GSM Neighbour Criterion
This criterion is considered when the co-planning mode is activated (i.e. the Transmitters folder of the GSM .atl document
is made accessible in the UMTS .atl document) and inter-technology neighbours have been allocated. If the cell i is
neighbour of a GSM transmitter, the cell constraint level depends on how many cells j are neighbours of the same GSM
transmitter. The total cost due to GSM neighbour constraint is given as:
Where
is the cost of the GSM neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Therefore, the total cost due to constraints on any cell i is defined as:
With
7.7.1.3.2 Transmitter Priority
In case you have a multi-carrier network and you run PN Offset allocation on "all" the carriers with the option "allocate
carriers identically", algorithm in Atoll allots priorities to transmitters. Priorities assigned to transmitters depend on how
Note:
Atoll considers the highest cost of both links when a neighbour relation is symmetric and the
importance value is different.
.
In this case, we have:
And
I
j
c
N1
C
j j '
N1 i ( ) ( )
C
j
N1 i ( ) ( ) C
j '
N1 i ( ) ( ) +
2
----------------------------------------------------------- =
C
k
N2 i ( ) ( ) Max C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) ( ) C
j '
N1 i ( ) ( ) C
k
N1 j ' ( ) ( ) ( ) ( , ) c
N2
=
c
N2
C
k k'
N2 i ( ) ( )
C
k
N2 i ( ) ( ) C
k'
N2 i ( ) ( ) +
2
------------------------------------------------------------- =
C
l
N3 i ( ) ( ) Max
C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) C
l
N1 k ( ) ( ) C
j '
N1 i ( ) ( ) C
k
N1 j ' ( ) ( ) C
l
N1 k ( ), ,
C
j
N1 i ( ) ( ) C
k'
N1 j ( ) ( ) ( ) C
l
N1 k' ( ) C
j '
N1 i ( ) ( ) C
k'
N1 j ' ( ) ( ) C
l
N1 k' ( ) , \ .
|
| |
c
N3
=
c
N3
C
l l '
N3 i ( ) ( )
C
l
N3 i ( ) ( ) C
l '
N3 i ( ) ( ) +
2
----------------------------------------------------------- =
C
j
N1 i ( ) ( ) Max I
i j
I
j i
, ( ) c
N1
=
C
k
N2 i ( ) ( ) Max C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) C
j
N1 k ( ) ( ) C
i
N1 j ( ) ( ) ( , ) c
N2
=
C
i
N
2G
( ) c
N
2G
j Tx
2G
( )
j

=
c
N
2G
C
i
C
i
Dom ( ) C
i
U ( ) + =
C
i
U ( ) C
i
Di st ( ) C
i
EP ( ) C
i
N ( ) C
i
N
2G
( ) + + + =
386 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
much constrained each transmitter is and the cost defined for each constraint. The higher the cost on a transmitter, the
higher the priority it has for the PN Offset allocation process.
Let us consider a transmitter Tx with two cells using carriers 0 and 1. The cost due to constraints on the transmitter is given
as:
With and
Here, the domain available for the transmitter is the intersection of domains assigned to cells of the transmitter. The
domain constraint is mandatory and cannot be broken.
7.7.1.3.3 Site Priority
In case of "Per Site" allocation strategies (Adjacent PN-clusters per site and Distributed PN-clusters per site), algorithm in
Atoll allots priorities to sites. Priorities assigned to sites depend on how much constrained each site is. The higher the
constraint on a site, the higher the priority it has for the PN Offset allocation process.
Let us consider a site S with three transmitters; each of them has two cells using carriers 0 and 1. The site constraint is
given as:
With, , and
Here, the domain considered for the site is the intersection of domains available for transmitters of the site.
7.7.2 Allocation Examples
In order to understand the differences between the different allocation strategies and the behaviour of the algorithm when
using a maximum of PN offsets or not, let us consider the following sample scenario:
Let Site0, Site1, Site2 and Site3 be four sites with 3 cells using carrier 0 whom PN Offsets have to be allocated. The
PILOT_INC parameter has been set to 4 and the PN Cluster Size is 3. Therefore, all PN offsets from 4 to 508 with a
separation interval of 4 can be allocated. The reuse distance is supposed to be lower than the inter-site distance. Only co-
site neighbours exist and all of them have the same importance.
The following section lists the results of each combination of options with explanation where necessary.
C
Tx
C
Tx
Dom ( ) C +
Tx
U ( ) =
C
Tx
U ( )
Max
i Tx e
C
i
U ( ) ( ) = C
Tx
Dom ( ) 512 Number of PN offsets in the domain =
C
S
C
S
U ( ) C
S
Dom ( ) + =
C
S
U ( ) C
Tx
U ( )
Tx

= C
S
Dom ( ) 512 Number of PN offsets in the domain =
Figure 7.7PN Offset Allocation
Forsk 2010 AT283_TRG_E2 387
Chapter 7: CDMA2000 Networks
7.7.2.1 Strategy: PN Offset per Cell
Since the restrictions of neighbourhood only apply to co-sites with the same importance and inter-site distances are greater
than reuse distances, every cell has the same priority. Then, the PN offset allocation to cells is performed in an
alphanumeric order.
7.7.2.2 Strategy: Adjacent PN-Clusters Per Site
Since the restrictions of neighbourhood only apply to co-sites with the same importance and inter-site distances are greater
than reuse distances, every cell has the same priority. Then, the PN offset allocation to cells is performed in an
alphanumeric order.
Without Use a Maximum of PN Offsets With Use a Maximum of PN Offsets
Atoll allocates the first three PN offsets in the domain (4, 8
and 12) to the Site0s cells. Under given constraints of
neighbourhood and reuse distance, same PN offsets can
be allocated to each sites cells.
Atoll allocates the first three PN offsets in the domain (4, 8
and 12) to the Site0s cells. As it is allowed to use a
maximum of PN offsets, Atoll allocates different PN offsets
to each sites cells so that there is least repetition.
Without Use a Maximum of PN Offsets With Use a Maximum of PN Offsets
Atoll allocates a PN cluster of adjacent PN offsets to Site0
and then, one PN offset of the PN cluster to each cell.
Under given constraints of neighbourhood and reuse
distance, the same PN cluster can be allocated to each site
and same PN offsets to each sites cells.
As it is possible to use a maximum of PN offsets, Atoll
allocates different PN clusters of adjacent PN offsets to
sites so that there is least repetition of PN offsets.
388 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
7.7.2.3 Strategy: Distributed PN-Clusters Per Site
Since the restrictions of neighbourhood only apply to co-sites with the same importance and inter-site distances are greater
than reuse distances, every cell has the same priority. Then, the PN offset allocation to cells is performed in an
alphanumeric order.
7.8 Automatic GSM-CDMA Neighbour Allocation
7.8.1 Overview
You can automatically calculate and allocate neighbours between GSM/TDMA and CDMA2000 networks. In Atoll, it is
called inter-technology neighbour allocation.
Inter-technology handover is used in two cases:
When the CDMA coverage is not continuous. In this case, the CDMA coverage is extended by CDMA-GSM
handover into the GSM network,
And in order to balance traffic and service distribution between both networks.
Note that the automatic inter-technology neighbour allocation algorithm takes into account both cases.
In order to be able to use the inter-technology neighbour allocation algorithm, you must have:
An .atl document containing the GSM/TDMA network, GSM.atl, and another one containing the CDMA2000
network, CDMA.atl,
An existing link on the Transmitters folder of GSM.atl into CDMA.atl.
The external neighbour allocation algorithm takes into account all the GSM TBC transmitters. It means that all the TBC
transmitters of GSM.atl are potential neighbours. The cells to be allocated will be called TBA cells which, being cells of
CDMA.atl, fulfill following conditions:
They are active,
They satisfy the filter criteria applied to Transmitters folder,
They are located inside the focus zone,
They belong to the folder for which allocation has been executed. This folder can be either the Transmitters folder
or a group of transmitters subfolder.
Only CDMA TBA cells may be assigned neighbours.
7.8.2 Automatic Allocation Description
The allocation algorithm takes into account criteria listed below:
The inter-transmitter distance,
The maximum number of neighbours fixed,
Allocation options,
The selected allocation strategy,
Two allocation strategies are available: the first one is based on distance and the second one on coverage overlapping.
We assume we have a CDMA reference cell, A, and a GSM candidate neighbour, transmitter B.
Without Use a Maximum of PN Offsets With Use a Maximum of PN Offsets
Atoll allocates a PN cluster of distributed PN offsets to
Site0 and then, one PN offset of the PN cluster to each cell.
Under given constraints of neighbourhood and reuse
distance, the same PN cluster can be allocated to each site
and same PN offsets to each sites cells.
As it is possible to use a maximum of PN offsets, Atoll
allocates different PN clusters of distributed PN offsets to
sites so that there is least repetition of PN offsets.
Forsk 2010 AT283_TRG_E2 389
Chapter 7: CDMA2000 Networks
7.8.2.1 Algorithm Based on Distance
When automatic allocation starts, Atoll checks following conditions:
74. The distance between the CDMA reference cell and the GSM neighbour must be less than the user-definable
maximum inter-site distance. If the distance between the CDMA reference cell and the GSM neighbour is greater
than this value, then the candidate neighbour is discarded.
Candidate neighbours are sorted in descending order with respect to distance.
75. The calculation options,
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or
more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same site as
the reference CDMA cell in the candidate neighbour list. This option is automatically selected.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may
force/forbid a GSM transmitter to be candidate neighbour of the reference CDMA cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours
and carries out a new neighbour allocation. If not selected, existing neighbours are kept.
76. The importance of neighbours.
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll
lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the
maximum number of neighbours to be allocated to each cell is exceeded. If we consider the case for which there are 15
candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among these 15
candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note that the
maximum number of inter-technology neighbours can be defined at the cell level (property dialogue or cell table). If defined
there, this value is taken into account instead of the default one available in the Neighbour Allocation dialogue.
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between
0 to 100%.
Where is the distance between the UMTS reference cell and the GSM neighbour and is the maximum inter-site
distance.
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site, or distance. For neighbours accepted for
distance reasons, Atoll displays the distance from the reference cell (m). Finally, if cells have previous allocations in the
list, neighbours are marked as existing.
7.8.2.2 Algorithm Based on Coverage Overlapping
When automatic allocation starts, Atoll checks following conditions:
77. The distance between the CDMA reference cell and the GSM neighbour must be less than the user-definable
maximum inter-site distance. If the distance between the CDMA reference cell and the GSM neighbour is greater
than this value, then the candidate neighbour is discarded.
78. The calculation options,
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose one or
more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same site as
the reference CDMA cell in the candidate neighbour list. This option is automatically selected.
Note:
Transmitter azimuths are taken into account to evaluate the inter-transmitter distance. For
further information on inter-transmitter distance calculation, see "Calculation of Inter-
Transmitter Distance" on page 303.
Neighbourhood cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected 100 %
Neighbourhood relationship that fulfils
distance conditions
If the maximum distance is not exceeded
1
d
d
max
------------
d d
max
Note:
Here, real inter-transmitter distance is considered.
390 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you may
force/forbid a GSM transmitter to be candidate neighbour of the reference CDMA cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current neighbours
and carries out a new neighbour allocation. If not selected, existing neighbours are kept.
79. There must be an overlapping zone ( ) with a given cell edge coverage probability where:
Four different cases may be considered for S
A
:
- 1
st
case: S
A
is the area where the cell A is the best serving cell of the CDMA network.
- The pilot signal received from A is greater than the minimum pilot signal level,
- The pilot quality from A exceeds a user-definable minimum value (minimum Ec/I
0
) and is the highest one.
In this case, the Ec/I
0
margin must be equal to 0dB and the max Ec/I0 option disabled.
- 2
nd
case: S
A
represents the area where the pilot quality from the cell A strats decreasing but the cell A is still
the best serving cell of the CDMA network.
The Ec/I
0
margin must be equal to 0dB, the max Ec/I0 option selected and a maximum Ec/I0 user-defined.
- The pilot signal received from A is greater than the minimum pilot signal level,
- The pilot quality from A exceeds the minimum Ec/I
0
but is lower than the maximum Ec/I0.
- The pilot quality from A is the highest one.
- 3
rd
case: S
A
represents the area where the cell A is not the best serving cell but can enter the active set.
Here, the Ec/I
0
margin has to be different from 0dB and the max Ec/I0 option disabled.
- The pilot signal received from A is greater than the minimum pilot signal level,
- The pilot quality from A is within a margin from the best Ec/I0, where the best Ec/I0 exceeds the minimum
Ec/I0.
- 4
th
case: S
A
represents the area where:
- The pilot signal received from A is greater than the minimum pilot signal level,
- The pilot quality from A is within a margin from the best Ec/I0 (where the best Ec/I0 exceeds the minimum
Ec/I0) and lower than the maximum Ec/I0.
In this case, the margin must be different from 0dB, the max Ec/I0 option selected and a maximum Ec/I0
user-defined.
Two different cases may be considered for S
B
:
- 1
st
case: S
B
is the area where the cell B is the best serving cell of the GSM network.
In this case, the margin must be set to 0dB.
- The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and
is the highest one.
- 2
nd
case: The margin is different from 0dB and S
B
is the area where:
- The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and
is within a margin from the best BCCH signal level.
Atoll calculates the percentage of covered area ( ) and compares this value to the % minimum covered
area. If this percentage is not exceeded, the candidate neighbour B is discarded.
Candidate neighbours fulfilling coverage conditions are sorted in descending order with respect to percentage of covered
area.
80. The importance of neighbours.
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason. Atoll
lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour list if the
maximum number of neighbours to be allocated to each cell is exceeded. If we consider the case for which there are 15
candidate neighbours and the maximum number of neighbours to be allocated to the reference cell is 8. Among these 15
candidate neighbours, only 8 (having the highest importance values) will be allocated to the reference cell. Note that the
maximum number of inter-technology neighbours can be defined at the cell level (property dialogue or cell table). If defined
there, this value is taken into account instead of the default one available in the Neighbour Allocation dialogue.
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies between
0 to 100%.
Guidelines for the automatic allocation
When the automatic allocation is based on coverage overlapping, we recommend you to perform two successive auto-
matic allocations:
- A first allocation in order to find handovers due to non-continuous CDMA coverage. In this case, you have to select the
max Ec/I
0
option and define a high enough value.
- A second allocation in order to complete the previous list with handovers motivated for reasons of traffic and service
distribution. Here, the max Ec/I
0
option must be disabled.
S
A
S
B

S
A
S
B

S
A
---------------------- 100
Forsk 2010 AT283_TRG_E2 391
Chapter 7: CDMA2000 Networks
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined
using the Importance Function (IF). The IF considers two factors for calculating the importance:
The co-site factor (C) which is a Boolean
The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
The IF evaluates importance as follows:
Where
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site or coverage. For neighbours accepted for co-
site and coverage reasons, Atoll displays the percentage of area meeting the coverage conditions and the corresponding
surface area (km
2
). Finally, if cells have previous allocations in the list, neighbours are marked as existing.
7.8.2.3 Delete Existing Neighbours Option
As explained above, Atoll keeps the existing inter-technology neighbours when the Delete existing neighbours option is
not checked. We assume that we have an existing allocation of inter-technology neighbours.
A new TBA cell i is created in CDMA.atl. Therefore, if you start a new allocation without selecting the Delete existing
neighbours option, Atoll determines the neighbour list of the cell i,
Neighbourhood reason When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected IF
Neighbourhood relationship that fulfils
coverage conditions
If the % minimum covered area is exceeded IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 60%
Co-site factor (C) 60% 100%
Co-site neighbourhood reason IF
Resulting IF using the default
values from the table above
No
Yes
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
The ranking between neighbours from the same category depends on the factor (O).
Notes:
No prediction study is needed to perform an automatic neighbour allocation. When starting
an automatic neighbour allocation, Atoll automatically calculates the path loss matrices if
not found.
A forbidden neighbour must not be listed as neighbour except if the neighbourhood
relationship already exists and the Delete existing neighbours option is unchecked when
you start the new allocation. In this case, Atoll displays a warning in the Event viewer
indicating that the constraint on the forbidden neighbour will be ignored by algorithm
because the neighbour already exists.
In the Results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a
TBA cell has already reached its maximum number of neighbours before starting the new
allocation, it will not appear in the Results table.
Mi n O ( ) Max O ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 59% O ( ) +
Mi n C ( ) A C ( ) O ( ) + 60% 40% O ( ) +
A X ( ) Max X ( ) Mi n X ( ) =
392 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
If you change some allocation criteria (e.g. increase the maximum number of neighbours or create a new GSM TBC
transmitter) and start a new allocation without selecting the Delete existing neighbours option, it examines the neighbour
list of TBA cells and checks allocation criteria if there is space in their neighbour lists. A new GSM TBC transmitter can
enter the TBA cell neighbour list if allocation criteria are satisfied. It will be the first one in the neighbour list.
Chapter 8
TD-SCDMA Networks
Forsk 2010 AT283_TRG_E2 395
Chapter 8: TD-SCDMA Networks
8 TD-SCDMA Networks
This chapter describes in detail the algorithms, calculation parameters, and processes of the coverage predictions and the
simulations available in TD-SCDMA documents. The first part of this chapter lists all the input and output parameters in
the TD-SCDMA documents, their significance, location in the Atoll GUI, and their usage. Detailed explanation of the basic
coverage predictions, which do not require simulation results, is provided in the second part. The third part describes the
traffic scenario generation and Montel Carlo simulation algorithms including smart antenna modelling and dynamic
channel allocation. The next sections are dedicated to TD-SCDMA coverage predictions which can be based on results
obtained from simulations. The last three sections describe in detail the allocation of frequencies, i.e., master and slave
carriers, the allocation of neigbours, and the allocation of scrambling codes.
8.1 Definitions and Formulas
The tables in the following subsections list the input and output parameters and formulas used in simulations and other
computations.
8.1.1 Inputs
This table lists the inputs to computations, coverage predictions, and simulations.
Name Value Unit Description
Global parameter Mcps Chip rate (or Spreading rate) (1.28)
Global parameter None Minimum spreading factor (1)
Global parameter None Maximum spreading factor (16)
Global parameter None P-CCPCH processing gain (13.8 dB)
Global parameter None Number of timeslots per subframe (7)
Global parameter ms Subframe duration (5)
Global parameter ms Frame duration (10)
Global parameter None
Number of guard period chips per
timeslot (16)
Global parameter None
Number of data chips per timeslot
(704)
Global parameter None
Number of midamble chips per
timeslot (144)
Global parameter None
Number of guard period chips per pilot
timeslot (96)
Global parameter None
Number of guard period chips per
DwPTS timeslot (32)
Global parameter None
Number of SYNC_DL chips per
DwPTS timeslot (64)
Global parameter
None
Total number of chips per DwPTS
timeslot (96)
Global parameter None
Number of guard period chips per
UpPTS timeslot (32)
Global parameter None
Number of SYNC_UL chips per
UpPTS timeslot (128)
Global parameter
None
Total number of chips per UpPTS
timeslot (160)
Calculated global parameter
bps Chip rate (140800 bps)
Frequency band parameter MHz
Average frequency range of the
frequency band (2010)
R
Ch
F
Mi n
Spread
F
Max
Spread
G
P CCPCH
Proc
N
TS
SF
D
SF
D
Frame
N
Ch TS
GP
N
Ch TS
Data
N
Ch TS
Mi dambl e
N
Ch PTS
GP
N
Ch DwPTS
GP
N
Ch DwPTS
SYNC_DL
N
Ch DwPTS
Total
N
Ch DwPTS
Total
N
Ch DwPTS
GP
N
Ch DwPTS
SYNC_DL
+ =
N
Ch UpPTS
GP
N
Ch UpPTS
SYNC_UL
N
Ch UpPTS
Total
N
Ch UpPTS
Total
N
Ch UpPTS
GP
N
Ch UpPTS
SYNC_UL
+ =
W
W
N
Ch TS
Data
D
SF
------------------- =
F
Avg
396 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Frequency band parameter MHz
Channel bandwidth of the carriers of a
frequency band (1.6)
Cell parameter None Interference reduction factor
Site equipment parameter None Joint Detection (JD) factor
Site equipment parameter None Multi-Cell Joint Detection factor
Transmitter parameter
(user-defined or calculated from transmitter equipment characteristics)
None BTS Noise Figure
Transmitter parameter
(user-defined or calculated from transmitter equipment characteristics)
None
Transmitter loss
on uplink
on downlink
BTS parameter None
Percentage of BTS signal correctly
transmitted
Cell parameter W Maximum cell traffic timeslot power
Cell parameter W P-CCPCH power on TS0
Cell parameter W DwPCH power on DwPTS
Cell parameter W Other common channel power on TS0
Cell parameter None
P-CCPCH RSCP comparative
threshold for baton handover
Cell parameter None
Maximum difference between two
transmitted powers
Cell parameter None Required resource units in uplink
Cell parameter None Required resource units in downlink
Cell parameter W
HS-PDSCH power available per
downlink timeslot
Cell parameter None Power headroom
Cell parameter W
HS-SCCH power per downlink
timeslot
Cell parameter None Number of HS-SCCH channels
Cell parameter None Number of HS-SICH channels
Cell parameter None Maximum number of HSDPA users
Cell parameter None
Minimum number of HS-PDSCH
codes
Cell parameter None
Maximum number of HS-PDSCH
codes
Cell parameter None
Maximum number of intra-technology
neighbours
Cell parameter None
Maximum number of inter-technology
neighbours
Timeslot parameter W Other common channel power
Timeslot parameter W Downlink traffic power
Timeslot parameter
(Simulation constraint)
None
Maximum percentage of downlink
used power
Timeslot parameter
(Simulation result)
None Uplink load factor
Timeslot parameter
(Simulation constraint)
None Maximum uplink load factor
Timeslot parameter W HS-PDSCH power available
Timeslot parameter None
Minimum number of HS-PDSCH
codes
BW
F
IRF
F
JD
TX
F
MCJD
TX
NF
TX
L
TX L
Tx
L
Total UL
=
L
Tx
L
Total DL
=

TX
P
TCH
Max
P
P CCPCH
P
DwPCH
P
OCCH TS0
TComp
P CCPCH
AP
Max
RU
UL
Req
RU
DL
Req
P
HS PDSCH
Avai l abl e
P
HR
P
HS SCCH
N
HS SCCH
N
HS SICH
N
HSDPA
Max
N
HS-PDSCH Codes
Mi n
N
HS-PDSCH Codes
Max
N
Intra Nei gh
Max
N
Intra Nei gh
Max
P
OCCH
P
TCH
DL
%P
DL
Max
X
UL
X
UL
Max
P
HS PDSCH
Avai l abl e
N
HS-PDSCH Codes
Mi n
Forsk 2010 AT283_TRG_E2 397
Chapter 8: TD-SCDMA Networks
Timeslot parameter None
Maximum number of HS-PDSCH
codes
Timeslot parameter Overhead resource units
Service parameter None Body loss
Service parameter None
Downlink activity factor for circuit-
switched services and the A-DPCH
activity factor for HSDPA services
Service parameter None
Uplink activity factor for circuit-
switched services and the A-DPCH
activity factor for HSDPA services
Service parameter None
Downlink efficiency factor for circuit-
switched services
Service parameter None
Uplink efficiency factor for circuit-
switched services
Service parameter None Application througput scaling factor
Service parameter kbps Application throughput offset
Service parameter (packet session modelling) None
Average number of packet calls on the
uplink during a session
Service parameter (packet session modelling) None
Average number of packet calls on the
downlink during a session
Service parameter (packet session modelling) ms
Average time between two packet
calls on the uplink
Service parameter (packet session modelling) ms
Average time between two packet
calls on the downlink
Service parameter (packet session modelling) KBytes Minimum packet call size on the uplink
Service parameter (packet session modelling) KBytes
Minimum packet call size on the
downlink
Service parameter (packet session modelling) KBytes
Maximum packet call size on the
uplink
Service parameter (packet session modelling) KBytes
Maximum packet call size on the
downlink
Service parameter (packet session modelling) ms
Average time between two packets on
the uplink
Service parameter (packet session modelling) ms
Average time between two packets on
the downlink
Service parameter (packet session modelling) Bytes Packet size on uplink
Service parameter (packet session modelling) Bytes Packet size on downlink
R99 bearer parameter kbps Downlink nominal bit rate
R99 bearer parameter kbps Uplink nominal bit rate
R99 bearer parameter (Can be calculated as )
None Downlink processing gain
R99 bearer parameter (Can be calculated as )
None Uplink processing gain
R99 bearer parameter W
Allowed minimum downlink traffic
channel power
R99 bearer parameter W
Allowed maximum downlink traffic
channel power
R99 bearer parameter None Number of downlink timelots
R99 bearer parameter None Number of uplink timelots
R99 bearer parameter per mobility ( or ) None Eb/Nt or C/I target on uplink
N
HS-PDSCH Codes
Max
RU
Overhead
L
Body
f
DL
Act
f
UL
Act
f
DL
Eff
f
UL
Eff
F
Scal i ng
O
TP
N
PacketCal l
UL
N
PacketCal l
DL
AT
PacketCal l
UL
AT
PacketCal l
DL
S
Mi n PacketCal l
UL
S
Mi n PacketCal l
DL
S
Max PacketCal l
UL
S
Max PacketCal l
DL
AT
Packet
UL
AT
Packet
DL
S
Packet
UL
S
Packet
DL
R
DL
Nom
R
UL
Nom
G
DL
Proc
W
R
DL
Nom
--------------
G
UL
Proc
W
R
UL
Nom
--------------
P
TCH DL
Mi n
P
TCH DL
Max
N
DL
TS
N
UL
TS
Q
TCH UL
Req
E
b
N
t
------
\ .
| |
TCH UL
Req
C
I
----
\ .
| |
TCH UL
Req
398 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
R99 bearer parameter per mobility ( or ) None Eb/Nt or C/I target on downlink
R99 bearer parameter per mobility W Target RSCP on uplink TCH
R99 bearer parameter per mobility W Target RSCP on downlink TCH
R99 bearer parameter per mobility None Downlink diversity gain
R99 bearer parameter per mobility None Uplink diversity gain
Terminal parameter W Maximum terminal power
Terminal parameter W Minimum terminal power
Terminal parameter W UpPCH power
Terminal parameter None Terminal Noise Figure
Terminal parameter None Joint Detection (JD) factor
Terminal parameter None
Percentage of terminal signal correctly
transmitted
Terminal parameter None Terminal gain
Terminal parameter None Terminal loss
Mobility parameter W Required RSCP T_Add for P-CCPCH
Mobility parameter W Required RSCP T_Drop for P-CCPCH
Mobility parameter W Required RSCP threshold for DwPCH
Mobility parameter W Required RSCP threshold for UpPCH
Mobility parameter ( or ) None
Required quality threshold for P-
CCPCH
Mobility parameter ( ) None
Required quality threshold for HS-
SCCH
Mobility parameter ( ) None
Required quality threshold for P-
CCPCH
Mobility parameter ( ) None Required quality threshold for DwPCH
Clutter class parameter None Model standard deviation
or
Clutter class parameter None
P-CCPCH Eb/Nt or C/I standard
deviation
or Clutter class parameter None
Downlink Eb/Nt or C/I standard
deviation
or Clutter class parameter None Uplink Eb/Nt or C/I standard deviation
Clutter (and, optionally, frequency band) parameter None Indoor loss
Clutter class parameter None Downlink orthogonality factor
Clutter class parameter None Uplink orthogonality factor
Clutter class parameter Spreading angle
K
1.38 x 10
-23
J/K Boltzman constant
T 293 K Ambient temperature
W Thermal noise at transmitter
W Thermal noise at terminal
Q
TCH DL
Req
E
b
N
t
------
\ .
| |
TCH DL
Req
C
I
----
\ .
| |
TCH DL
Req
RSCP
TCH UL
Req
RSCP
TCH DL
Req
G
DL
Di v
G
UL
Di v
P
Max
Term
P
Mi n
Term
P
UpPCH
NF
Term
F
JD
Term

Term
G
Term
L
Term
TAdd
P CCPCH
TDrop
P CCPCH
RSCP
DwPCH
Req
RSCP
UpPCH
Req
Q
P CCPCH
Req
E
b
N
t
------
\ .
| |
P CCPCH
Req
C
I
----
\ .
| |
P CCPCH
Req
Q
HS SCCH
Req
E
c
N
t
------
\ .
| |
HS SCCH
Req
Q
HS SICH
Req
E
c
N
t
------
\ .
| |
HS SICH
P CCPCH
Q
DwPCH
Req C
I
----
\ .
| |
DwPCH
Req
o
Model
o
P CCPCH
Eb/Nt
o
P CCPCH
C I
o
DL
Eb/Nt
o
DL
C I
o
UL
Eb/Nt
o
UL
C I
L
Indoor
F
DL
Ortho
F
UL
Ortho
u
Spread
N
0
TX
NF
TX
K T BW
N
0
Term
NF
Term
K T BW
Forsk 2010 AT283_TRG_E2 399
Chapter 8: TD-SCDMA Networks
8.1.2 P-CCPCH Eb/Nt and C/I Calculation
Antenna parameter None Transmitter antenna gain
Propagation model result None Path loss
Result calculated from cell edge coverage probability and model
standard deviation
None
Model shadowing margin used in
coverage predictions
Result calculated from cell edge coverage probability and P-CCPCH
Eb/Nt standard deviation
None
P-CCPCH Eb/Nt shadowing margin
used in coverage predictions
Result calculated from cell edge coverage probability and DL Eb/Nt
standard deviation
None
DL Eb/Nt shadowing margin used in
coverage predictions
Result calculated from cell edge coverage probability and UL Eb/Nt
standard deviation
None
UL Eb/Nt shadowing margin used in
coverage predictions
For RSCP calculation
None
Transmitter-terminal total loss in
coverage predictions
In UL, only carrier power is attenuated
by .
In DL, carrier power and intra-cell
interference are attenuated by
or while
extra-cell interference is not.
Therefore, or
are set to 1 in DL extra-
cell interference calculation.
For P-CCPCH Eb/Nt calculation
For DL Eb/Nt calculation
For UL Eb/Nt calculation
G
TX
L
Path
M
Shadowi ng
Model
M
Shadowi ng
P CCPCH
M
Shadowi ng
Eb Nt ( )
DL
M
Shadowi ng
Eb Nt ( )
UL
L
T
L
T
Model
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
Model

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =
M
Shadowi ng
Eb Nt ( )
UL
M
Shadowi ng
Eb Nt ( )
DL
M
Shadowi ng
P CCPCH
M
Shadowi ng
Eb Nt ( )
DL
M
Shadowi ng
P CCPCH
L
T
Eb Nt ( )
P
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
P CCPCH

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =
L
T
Eb Nt ( )
DL
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
Eb Nt ( )
DL

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =
L
T
Eb Nt ( )
UL
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
Eb Nt ( )
UL

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =
Name Value Unit Description
None P-CCPCH Eb/Nt for the cell
None P-CCPCH C/I for the cell
W
Downlink total noise for the cell
With and
W
Downlink intra-cell interference for the
cell
W
Downlink extra-cell interference for the
cell
W Inter-carrier interference
E
b
N
t
------
\ .
| |
P CCPCH
TX
i
i c ( )

TX
i
RSCP
P CCPCH
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------------ G
P CCPCH
Proc
TX
i
i c ( )
C
I
----
\ .
| |
P CCPCH
TX
i
i c ( )

TX
i
RSCP
P CCPCH
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------------ TX
i
i c ( )
N
Tot DL
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
I
IC DL
i c j c , ( ) N
0
Term
+ + +
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
|
TX
i
RSCP
OCCH TS0
TX
i
i c ( )

TX
i
+

TX
i

TX
i
1 F
DL
Ortho
( ) 1 F
JD
Term
( ) =
|
0 Without Useful Signal
1 Total Noise

=
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
RSCP
P CCPCH
TX
j
i c ( )
RSCP
OCCH TS0
TX
j
i c ( )
+ ( )
j i =

TX
i
i c ( )
I
IC DL
i c j c , ( )
RSCP
P CCPCH
TX
j
j c ( )
RSCP
OCCH TS0
TX
j
j c ( )
+ ( )
TX
j

F
IRF
i c j c , ( )
------------------------------------------------------------------------------------------------------------
400 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.1.3 DwPCH C/I Calculation
8.1.4 DL TCH Eb/Nt and C/I Calculation
8.1.5 UL TCH Eb/Nt and C/I Calculation
Name Value Unit Description
None DwPCH C/I for the cell
W
Downlink total noise for the cell
With and
W
Intra-cell interference for the cell
W
Extra-cell interference for the cell
W Inter-carrier interference
C
I
----
\ .
| |
DwPCH
TX
i
i c ( )

TX
i
RSCP
DwPCH
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
---------------------------------------------------- TX
i
i c ( )
N
Tot DL
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
I
IC DL
i c j c , ( ) N
0
Term
+ + +
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
RSCP
DwPCH
TX
i
i c ( )
|
TX
i

TX
i

TX
i
1 F
DL
Ortho
( ) 1 F
JD
Term
( ) =
|
0 Without Useful Signal
1 Total Noise

=
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
RSCP
DwPCH
TX
j
i c ( )
( )
j i =

TX
i
i c ( )
I
IC DL
i c j c , ( )
RSCP
DwPCH
TX
j
j c ( )
( )
TX
j

F
IRF
i c j c , ( )
------------------------------------------------
Name Value Unit Description
None
Downlink TCH Eb/Nt for the cell
None Downlink TCH C/I for the cell
W
Downlink total noise for the cell
W
Downlink intra-cell interference for the
cell
W
Downlink extra-cell interference for the
cell
W Inter-carrier interference
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )

TX
i
RSCP
TCH DL
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------- G
DL
Proc
G
DL
Di v

TX
i
i c ( )
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )

TX
i
RSCP
TCH DL
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------- G
DL
Di v
TX
i
i c ( )
N
Tot DL
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
I
IC DL
i c j c , ( ) N
0
Term
+ + +
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )

TX
i
1 F
DL
Ortho
( ) 1 F
JD
Term
( ) 1
TX
i
( ) +
)
`

RSCP
TCH DL
TX
i
i c ( )
RSCP
OCCH
TX
i
i c ( )
+ ( )
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
RSCP
TCH DL
TX
j
i c ( )
RSCP
OCCH
TX
j
i c ( )
+ ( )
j i =

TX
i
i c ( )
I
IC DL
i c j c , ( )
RSCP
TCH DL
TX
j
j c ( )
RSCP
OCCH
TX
j
j c ( )
+ ( )
TX
j

F
IRF
i c j c , ( )
-------------------------------------------------------------------------------------------
Name Value Unit Description
None Uplink TCH Eb/Nt for the cell
None Uplink TCH C/I for the cell
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )

Term
RSCP
TCH UL
TX
i
i c ( )

N
Tot UL
TX
i
i c ( )
------------------------------------------------------------ G
UL
Proc
G
UL
Di v
TX
i
i c ( )
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )

Term
RSCP
TCH UL
TX
i
i c ( )

N
Tot UL
TX
i
i c ( )
------------------------------------------------------------ G
UL
Di v
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 401
Chapter 8: TD-SCDMA Networks
8.1.6 Interference Calculation
8.1.7 HSDPA Dynamic Power Calculations
8.1.8 Smart Antenna Models
8.1.8.1 Downlink Beamforming
or
W Uplink required power for the terminal P
Req
Term
P
Max
Term
Q
TCH UL
Req
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
--------------------------------- P
Max
Term
Q
TCH UL
Req
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
------------------------------
Name Value Unit Description
W Cell to cell interference
W UpPCH interference
I
C2C
TX
i
TX
j
, ( )
RSCP
TCH DL
TX
j
i c ( )
RSCP
OCCH
TX
j
i c ( )
+ ( )
TX
j

RSCP
TCH DL
TX
j
j c ( )
RSCP
OCCH
TX
j
j c ( )
+ ( )
TX
j

F
IRF
i c j c , ( )
------------------------------------------------------------------------------------------- +
I
TS1 UL
TX
i
i c ( )
N
0
TX
i
X
TS1 UL
TX
i
i c ( )
1 X
TS1 UL
TX
i
i c ( )
( )
-------------------------------------
Name Value Unit Description
W HS-SCCH power
W HS-PDSCH power
W HS-SICH power
P
HS SCCH
TX
i
i c ( )
E
c
N
t
------
\ .
| |
HS SCCH
TX
i
i c ( )
N
Tot DL
TX
i
i c ( )
|
TX
i
RSCP
HS SCCH
TX
i
i c ( )
( )

TX
i
------------------------------------------------------------------------------------------------------------------------------------------------- L
T
Model

P
HS PDSCH
TX
i
i c ( )
P
Max DL Eff
TX
i
i c ( )
P
R99 DL
TX
i
i c ( )
P
HR
TX
i
i c ( )
P
HS SCCH
TX
i
i c ( )

P
HS SICH
M
i
E
c
N
t
------
\ .
| |
HS SICH
TX
i
i c ( )
N
Tot UL
TX
i
i c ( )
|
M
i
RSCP
HS SICH
M
i
( )

M
i
------------------------------------------------------------------------------------------------------------------------------------------- L
T
Model

Name Value Unit Description


Smart antenna model parameter None Number of smart antenna elements
Calculation parameter Degrees Angle of arrival for the useful signal
Calculation parameter Degrees
Angle at which the smart antenna
effect is calculated
d , where is the wavelength of the signal m
Distance between two adjacent
antenna elements
E
SA
u

2
---
Name Value Unit Description
Smart antenna model parameter None Gain of a single element
None Steering vector for the direction of
with
None Complex smart antenna weight
None
Array correlation matrix for a given
user direction
None Smart antenna gain in any direction
g
n
( )
S
u 1 e
j
2t

------- d u sin
e
j
2t

------- 2d u sin
... e
j
2t

------- E
SA
1 ( )d u sin
, , , ,
T
u
w
n
e
j
2t

------- nd u sin
e
j t n u sin
d

2
--- =
R
u S
u
S
u
H

u
G
SA
( )
g
n
( ) S

H
R
u
S

g
n
( ) S

H
S
u
S
u
H
S

g
n
u ( ) E
SA
2
= =

402 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.1.8.2 Uplink Beamforming
8.1.8.3 Uplink Beamforming and Interference Cancellation (MMSE)
None Average array correlation matrix R
Avg

j
p
j
R
j

j 1 =
J

Name Value Unit Description


None
Vector of E
SA
complex weights for the
conventional beamformer
= None Total noise correlation matrix
None Thermal noise correlation matrix
None Interference correlation matrix
W Total uplink noise power
W
Total power received from the served
user
None Signal quality in the uplink
None
Uplink smart antenna beamforming
gain in the direction of the served user
W Average noise correlation matrix
w
S
u
E
SA
--------------
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+
R
n o
n
2
I
R
I
p
j
S
j
S
j
H

j 1 =
J

P
N w
H
R
N
w
P
u p
u
w
H
S
u
S
u
H
w p
u
E
SA
=
Q
UL
SA
P
u
P
N
-------
p
u
E
SA

w
H
R
N
w
---------------------------- =
G
SA
E
SA
R
N
Avg
1
K
---- R
N
k
k 1 =
K

Name Value Unit Description


None
Vector of E
SA
complex weights for the
optimum beamformer
None MMSE optimization constant
= None Total noise correlation matrix
None Thermal noise correlation matrix
None Interference correlation matrix
W
Total uplink noise power (optimum
beamformer)
W
Total power received from the served
user (optimum beamformer)
None Signal quality in the uplink
None
Uplink smart antenna beamforming
gain in the direction of the served user
W
Average inverse noise correlation
matrix
w

u
R
N
1
S
u

u
E
SA
S
u
H
R
N
1
S
u

-----------------------------------
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+
R
n o
n
2
I
R
I
p
j
S
j
S
j
H

j 1 =
J

N
u
2
S
u
H
R
N
1
S
u

P

u p
u

u
2
S
u
H
R
N
1
S
u
( )
2

Q
UL
SA
P
u
P
N
-------
P

u
P

N
------- p
u
S
u
H
R
N
1
S
u
= =
G
SA S
u
H
I S
u
E
SA
=
R
N
1
Avg
1
K
---- R
N
1
k
k 1 =
K

Forsk 2010 AT283_TRG_E2 403


Chapter 8: TD-SCDMA Networks
8.2 Signal Level Based Calculations
Two types of signal level based calculations are available in Atoll:
1. Point Analysis: Real-time calculations for profile and reception analysis using the mouse to move a probe mobile
on the map.
2. RSCP Based Coverage Predictions: Calculation of RSCP related parameters on each pixel and colouring
according to the selected display.
8.2.1 Point Analysis
For the selected transmitted TX
i
and carrier (ic), you can study three parameters in point analysis Profile tab:
Where,
is the received signal code power for the P-CCPCH.
EIRP is the effective isotropic radiated power of the transmitter. .
ic is a carrier number
is the loss on the transmitter-receiver path (path loss) calculated by the propagation model
is the transmitter antenna attenuation (from antenna patterns)
is the shadowing margin. This parameter is taken into account when the option Shadowing taken into
account is selected
are the indoor losses, taken into account when the option "Indoor coverage" is selected
is the transmitter antenna gain
is the transmitter loss ( )
8.2.1.1 Profile Tab
Atoll displays either the signal level received from the selected transmitter on a carrier ( ), or the highest
signal level received from the selected transmitter on all the carriers.
8.2.1.2 Reception Tab
Analysis provided in the Reception tab is based on path loss matrices. You can study reception from TBC transmitters for
which path loss matrices have been calculated on their calculation areas.
For each transmitter, Atoll displays either the signal level received on a carrier, ( ), or the highest signal
level received on all the carriers.
Received signal level bar graphs are displayed in a decreasing signal level order. The number of bars in the graph depends
on the signal level received from the best server. Only bars for transmitters whose signal level is within a 30 dB margin
from the best server signal are displayed.
Study criteria Formulas
Signal level ( ) in dBm
Signal level received from a transmitter on a carrier (cell)
Path loss ( ) in dB
Total losses ( ) in dB
Notes:
It is possible to analyse all the carriers. In this case, Atoll takes the highest P-CCPCH
power of cells to calculate the signal level received from a transmitter.
RSCP
RSCP
TX
i
i c ( )
EIRP
TX
i
i c ( )
L
Path
M
Shadowi ng
Model
L
Indoor
=
L
Path L
Path
L
Model
L
Ant
TX
i
+ =
L
T L
T
L
Path
L
TX
i
L
Indoor
M
Shadowi ng
Model
+ + + G
TX
i
=
RSCP
EIRP
TX
i
i c ( )
P
P CCPCH
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
L
Model
L
Ant
TX
i
M
Shadowi ng
Model
L
Indoor
G
TX
i
L
TX
i
L
TX
i
L
Total DL
=
Notes:
For a selected transmitter, it is also possible to study the path loss, , or the total
losses, . Path loss and total losses are the same on any carrier.
RSCP
P CCPCH
TX
i
i c ( )
L
Path
L
T
RSCP
P CCPCH
TX
i
i c ( )
404 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.2.2 RSCP Based Coverage Predictions
For each TBC transmitter, TX
i
, Atoll determines the value of the selected parameter on each studied pixel inside the TX
i
calculation area. Each pixel within the TX
i
calculation area is considered a probe receiver.
Coverage study parameters to be set are:
The study conditions to determine the service area of each TBC transmitter
The display settings to for colouring the covered pixels
Atoll uses the parameters entered in the Condition tab of the coverage study properties dialogue to determine pixels
covered by the each transmitter. Coverage prediction display resolution is independent of the path loss matrix and
geographic data resolutions, and can be different for each coverage prediction. Coverage predictions are calculated using
bilinear interpolation of multi-resolution path loss matrices (similar to the evaluation of site altitudes).
8.2.2.1 Calculation Criteria
The RSCP from a transmitter TX
i
and a selected carrier (ic) is given by:
Where,
is the received signal code power. RSCP can be calculated for P-CCPCH, DwPCH, or the downlink TCH.
EIRP is the effective isotropic radiated power of the transmitter. ,
, or .
ic is a carrier number
is the loss on the transmitter-receiver path (path loss) calculated by the propagation model
is the transmitter antenna attenuation (from antenna patterns)
is the shadowing margin. This parameter is taken into account when the option Shadowing taken into
account is selected
are the indoor losses, taken into account when the option "Indoor coverage" is selected
is the terminal loss
is the body loss defined in the service
is the receiver total gain
is the transmitter antenna gain
is the transmitter loss ( )
8.2.2.2 P-CCPCH RSCP Coverage Prediction
8.2.2.2.1 Coverage Condition
This coverage prediction calculates and displays the Received Signal Code Power (RSCP) for the P-CCPCH. The
coverage prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for TS0. The
best server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the highest
P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
coverage prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will
not be any pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates
the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
You can select the display colours according to the RSCP, or on any best server parameter.
Note:
You can use a value other than 30 dB for the margin from the best server signal level, for
example a smaller value for improving the calculation speed. For more information on
defining a different value for this margin, see the Administrator Manual.
RSCP
TX
i
i c ( )
EIRP
TX
i
i c ( )
L
Path
M
Shadowi ng
Model
L
Body
L
Indoor
G
Term
L
Term
+ =
RSCP
EIRP
P CCPCH
TX
i
i c ( )
P
P CCPCH
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
EIRP
DwPCH
TX
i
i c ( )
P
DwPCH
TX
i
i c ( )
G
TX
i
L
TX
i
+ = EIRP
DL TCH
TX
i
i c ( )
P
DL TCH
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
L
Path
L
Model
L
Ant
TX
i
+ =
L
Model
L
Ant
TX
i
M
Shadowi ng
Model
L
Indoor
L
Term
L
Body
G
Term
G
TX
i
L
TX
i
L
TX
i
L
Total DL
=
Forsk 2010 AT283_TRG_E2 405
Chapter 8: TD-SCDMA Networks
The pixels in the coverage area where are covered and coloured
according to the selected display parameter.
8.2.2.2.2 Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
Best Signal Level (dBm)
Atoll calculates the best received from each transmitter on each pixel. Where other
service areas overlap the studied one, Atoll chooses the highest RSCP. A pixel of a service area is coloured if
. The pixel colour depends on the RSCP level. Coverage consists
of several independent layers whose visibility in the workspace can be managed. There are as many layers as
defined thresholds. Each layer corresponds to an area where the RSCP from the best server exceeds a defined
minimum threshold.
RSCP Margin (dB)
Coverage consists of several layers with a layer per user-defined RSCP margin defined in the Display tab
(Prediction properties). For each layer, area is covered if
. Each layer is assigned a colour and displayed with
intersections between layers.
Cell Edge Coverage Probability (%)
On each pixel of each transmitter service area, the coverage corresponds to the pixels where the
from the transmitter exceeds defined in the mobility selected in the Conditions tab, with different
cell edge coverage probabilities. There is one coverage area per transmitter in the explorer.
8.2.2.3 Best Server P-CCPCH Coverage Prediction
This coverage prediction calculates and displays the best server RSCP for the P-CCPCH. The coverage prediction is
calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for TS0. The best server for the
coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the highest P-CCPCH power,
or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the coverage prediction is
calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will not be any pixels covered
by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area where and where
will be covered and coloured according to the transmitter colour.
8.2.2.4 P-CCPCH Pollution Coverage Prediction
This coverage prediction calculates and displays the number of P-CCPCH polluters. Atoll calculates the Received Signal
Code Power (RSCP) for the P-CCPCH for each pixel in the coverage area where
and determines the polluting transmitters according to:
Where M is the specified pollution margin.
The coverage prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for TS0.
The best server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the
highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
coverage prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will
not be any pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates
the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
Atoll determines the number of transmitters covering each pixel and colours the pixel according to the number of polluting
transmitters. Coverage consists of several independent layers whose visibility in the workspace can be managed. There
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
P CCPCH
TX
i
i c ( )
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) M
P CCPCH
RSCP
>
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
P CCPCH
TX
i
i c ( )
Best
j = All
RSCP
P CCPCH
TX
j
j c ( )
( ) =
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
P CCPCH
TX
i
i c ( )
Best
j i =
RSCP
P CCPCH
TX
j
j c ( )
( ) M >
406 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
are as many layers as defined thresholds. Each layer corresponds to an area where the number of servers exceeds ( )
a defined minimum threshold.
8.2.2.5 DwPCH RSCP Coverage Prediction
8.2.2.5.1 Coverage Condition
This coverage prediction calculates and displays the Received Signal Code Power (RSCP) for the DwPCH. The coverage
prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for DwPTS. The best
server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the highest P-
CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the coverage
prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will not be any
pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates the RSCP
considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area where are covered and coloured
according to the selected display parameter.
8.2.2.5.2 Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
DwPCH RSCP (dBm)
Atoll calculates the best received from each transmitter on each pixel.. Where other
service areas overlap the studied one, Atoll chooses the highest RSCP. A pixel of a service area is coloured if
. The pixel colour depends on the RSCP level. Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as
defined thresholds. Each layer corresponds to an area where the RSCP from the best server exceeds a defined
minimum threshold.
RSCP Margin (dB)
Coverage consists of several layers with a layer per user-defined RSCP margin defined in the Display tab
(Prediction properties). For each layer, area is covered if .
Each layer is assigned a colour and displayed with intersections between layers.
Cell edge coverage probability (%)
On each pixel of each transmitter service area, the coverage corresponds to the pixels where the
from the transmitter exceeds defined in the mobility selected in the Conditions tab, with
different cell edge coverage probabilities. There is one coverage area per transmitter in the explorer.
8.2.2.6 UpPCH RSCP Coverage Prediction
8.2.2.6.1 Coverage Condition
This coverage prediction calculates and displays the Received Signal Code Power (RSCP) for the UpPCH in the uplink.
The coverage prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for UpPTS.
The best server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the
highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
coverage prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will
not be any pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates
the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
Atoll uses the UpPCH power of the selected terminal to calculate the RSCP from each pixel of each transmitters best
server coverage area.
The pixels where are covered and coloured according to the selected display
parameter.
8.2.2.6.2 Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
>
TX
i
i c ( ) RSCP
DwPCH
TX
i
i c ( )
RSCP
DwPCH
Req
Mobi l i ty ( ) >
RSCP
DwPCH
TX
i
i c ( )
TX
i
i c ( )
RSCP
DwPCH
TX
i
i c ( )
RSCP
DwPCH
Req
Mobi l i ty ( ) >
RSCP
DwPCH
TX
i
i c ( )
RSCP
DwPCH
Req
Mobi l i ty ( ) M
DwPCH
RSCP
>
RSCP
DwPCH
TX
i
i c ( )
TX
i
i c ( ) RSCP
DwPCH
TX
i
i c ( )
RSCP
UpPCH
Term
RSCP
UpPCH
Req
Mobi l i ty ( ) >
Forsk 2010 AT283_TRG_E2 407
Chapter 8: TD-SCDMA Networks
UpPCH RSCP (dBm)
Atoll calculates the best received from each pixel of each transmitter service area at the transmitter.
Where other service areas overlap the studied one, Atoll chooses the highest RSCP. A pixel of a service area is
coloured if . The pixel colour depends on the RSCP level. Coverage
consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as defined thresholds. Each layer corresponds to an area where the RSCP at the best server exceeds a
defined minimum threshold.
RSCP Margin (dB)
Coverage consists of several layers with a layer per user-defined RSCP margin defined in the Display tab
(Prediction properties). For each layer, area is covered if .
Each layer is assigned a colour and displayed with intersections between layers.
Cell Edge Coverage Probability (%)
On each pixel of each transmitter service area, the coverage corresponds to the pixels from which the
at the transmitter exceeds defined in the mobility selected in the Conditions tab, with
different cell edge coverage probabilities. There is one coverage area per transmitter in the explorer.
8.2.2.7 Baton Handover Coverage Prediction
8.2.2.7.1 Coverage Condition
This coverage prediction determines the pixels which receive RSCP from cells other than the best server high enough to
perform baton handovers. Received Signal Code Power (RSCP) is calculated for the P-CCPCH. The coverage prediction
is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for TS0. The best server for the
coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the highest P-CCPCH power,
or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the coverage prediction is
calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will not be any pixels covered
by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels are covered and coloured according to the selected display parameters, where
and .
8.2.2.7.2 Coverage Display
It is possible to display the potential handover areas or the number of transmitters covering each pixel.
Handover Areas
Atoll displays the pixels where there are transmitters other than the best server that satisfy the above criteria.
Coverage consists of a single layer with a defined colour whose visibility in the workspace can be managed.
Number of Potential Servers
Atoll determines the number of transmitters covering each pixel and colours the pixel according to the number of
transmitters. Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the number of servers
exceeds ( ) a defined minimum threshold.
8.2.2.8 Scrambling Code Interference Analysis
This coverage prediction calculates and displays the pixels covered by two cells using the same scrambling code. Atoll
calculates the Received Signal Code Power (RSCP) for the P-CCPCH for each pixel in the coverage area where
and determines the interfering transmitters according to:
Where M is the specified pollution margin.
The coverage prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for TS0.
The best server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the
highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
coverage prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will
not be any pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates
the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
RSCP
UpPCH
Term
RSCP
UpPCH
Term
RSCP
UpPCH
Req
Mobi l i ty ( ) >
RSCP
UpPCH
Term
RSCP
UpPCH
Req
Mobi l i ty ( ) M
UpPCH
RSCP
>
RSCP
UpPCH
Term
RSCP
UpPCH
Term
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) > RSCP
P CCPCH
TX
j
j c ( )
TDrop
P CCPCH
Mobi l i ty ( ) TComp
P CCPCH
TX
j
j c ( )
>
>
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
P CCPCH
TX
i
i c ( )
Best
j i =
RSCP
P CCPCH
TX
j
j c ( )
( ) M >
408 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
the master carrier in case of N-frequency mode compatible transmitters.
Atoll determines whether the cells of two transmitters covering a pixel have the same scrambling code. If the pixel is
interfered, Atoll colours it according to the colour assigned to the scrambling code in the display parameters. Coverage
consists of several independent layers whose visibility in the workspace can be managed. There are as many layers as
scrambling codes. Each layer corresponds to the area where the corresponding scrambling code has interference. A layer
corresponding to areas where more than one scrambling code interferes is also available.
8.3 Monte Carlo Simulations
The simulation process is divided into two steps.
Generating a realistic user distribution as explained in "Generating a Realistic User Distribution" on page 408.
Atoll generates user distributions as part of the Monte Carlo algorithm based on traffic data. The resulting user
distribution complies with the traffic database and maps selected when creating simulations.
Dynamic channel allocation and power control as explained under "Power Control Simulation" on page 413.
8.3.1 Generating a Realistic User Distribution
During each simulation, Atoll performs two random trials. The first random trial generates the number of users and their
activity status as explained in the following sections depending on the type of traffic input.
"Simulations Based on User Profile Traffic Maps" on page 408.
"Simulations Based on Sector Traffic Maps" on page 412.
Each user is randomly assigned a service, a terminal, and a mobility type. The activity status is determined based on the
calculations of activity probabilities using the traffic inputs.
The user activity status influences the next step of the simulation, i.e., the interference in the network. Both active and
inactive users use radio resources and generate interference.
Once all the user characteristics have been determined, a second random trial is performed to obtain their geographical
locations weighted according to the clutter classes, and whether they are indoor or outdoor according to the percentage
of indoor users per clutter class defined for the traffic maps.
Atoll also calculates the shadowing margin for each user based on the standard deviations defined for the clutter class of
each user.
In TD-SCDMA networks users accessing packet-switched services can transmit either on uplink or on downlink, but never
on both simultaneously. Users accessing circuit-switched services transmit on both uplink and downlink simultaneously.
Circuit-switched service users, mobiles connected in uplink and downlink both, are modelled in Atoll by two mobiles
generated at the same location with one connected on the uplink and the other on the downlink. If one of these two mobiles
is rejected for some reason, the other is also rejected due to the same reason.
8.3.1.1 Simulations Based on User Profile Traffic Maps
User profile environment based traffic maps: Each pixel of the map is assigned an environment class which contains a list
of user profiles with an associated mobility type and a given density, i.e., number of users of a user profile per km.
User profile traffic maps: Each polygon or line of the map is assigned a density of users with a given user profile and
mobility type. If the map is composed of points, each point is assigned a number of users with given user profile and
mobility type.
The user profile models the behaviour of the different user categories. Each user profile contains a list of services and their
associated parameters describing how these services are accessed by the user.
The number of users of each user profile is calculated from the surface area (S
Env
) of each environment class map (or
each polygon) and the user profile density (D
UP
).
Notes:
Atoll follows a Poisson distribution to determine the total number of users attempting a
connection in each simulation. In order for Atoll to use a constant total number of users
attempting a connection, the following lines must be added to the Atoll.ini file:
[CDMA]
RandomTotalUsers=0
Notes:
In case of user profile traffic maps composed of lines, the number of users per user profile
is calculated from the line length (L) and the user profile density (D
UP
) (users per km):
The number of users is an input when a user profile traffic map is composed of points.
N
Users
S
Env
D
UP
=
N
Users
L D
UP
=
Forsk 2010 AT283_TRG_E2 409
Chapter 8: TD-SCDMA Networks
At any given instant, Atoll calculates the probability for a user being active in the uplink and in the downlink according to
the service usage characteristics described in the user profiles, i.e., the number of voice calls or data sessions, the average
duration of each voice call, or the volumes of the data exchanged in the uplink and the downlink in each data session.
8.3.1.1.1 Circuit Switched Service (i)
User profile parameters for circuit switched services are:
The user terminal equipment used for the service (from the Terminals table),
The average number of calls per hour ,
The average duration of a call (seconds) .
The number of users and their distribution per activity status is determined as follows:
81. Calculation of the service usage duration per hour ( : probability of a connection):
82. Calculation of the number of users trying to access the service i ( ):
The activity status of each user depends on the activity periods during the connection, i.e., the uplink and downlink activity
factors defined for the circuit switched service i, and .
83. Calculation of activity probabilities:
Probability of being inactive:
Probability of being active on UL:
Probability of being active on DL:
Probability of being active both on UL and DL:
84. Calculation of number of users per activity status:
Number of inactive users:
Number of users active in the uplink:
Number of users active in the downlink:
Number of users active in the uplink and downlink both:
Therefore, a connected user can be either active on both links, inactive on both links, active on UL only, or active on DL
only.
8.3.1.1.2 Packet Switched Service (j)
User profile parameters for packet switched services are:
The user terminal equipment used for the service (from the Terminals table),
The average number of packet sessions per hour ,
The volume (in kBytes) which is transferred on the downlink and the uplink during a session.
A packet session consists of several packet calls separated by a reading time. Each packet call is defined by its size and
may be divided in packets of fixed size (1500 Bytes) separated by an inter-packet arrival time.
N
Cal l
D
Cal l
p
0
p
o
N
cal l
d
3600
---------------------- =
n
i
n
i
N
Users
p
0
=
f
Act
UL
f
Act
DL
p
Inacti ve
1 f
Act
UL
( ) 1 f
Act
DL
( ) =
p
Acti ve
UL
f
Act
UL
1 f
Act
DL
( ) =
p
Acti ve
DL
f
Act
DL
1 f
Act
UL
( ) =
p
Acti ve
UL DL +
f
Act
UL
f
Act
DL
=
n
i Inacti ve
n
i
p
Inacti ve
=
n
i Acti ve
UL
n
i
p
Acti ve
UL
=
n
i Acti ve
DL
n
i
p
Acti ve
DL
=
n
i Acti ve
UL DL +
n
i
p
Acti ve
UL DL +
=
N
Sess
V
DL
V
UL
410 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Calculation of the average packet call size (kBytes):
and
In case of HSDPA services, and are the uplink and downlink A-DPCH activity factors, respectively.
Calculation of the average number of packets per packet call:
and
Calculation of the average duration of inactivity within a packet call (c):
and
Calculation of the average duration of inactivity in a session (s):
and
Calculation of the average duration of activity in a session (s):
and
Therefore, the average duration of a connection in the session s is:
and
Calculation of the service usage duration per hour (probability of a connection):
and
Calculation of the probability of being connected:
Therefore, the number of users trying to access the service j is:
Figure 8.1Description of a Packet Session
Note:
1 kBytes = 1024 Bytes.
S
PacketCal l
UL V
UL
N
PacketCal l
UL
f
Eff
UL

------------------------------------------- = S
PacketCal l
DL V
DL
N
PacketCal l
DL
f
Eff
DL

------------------------------------------- =
f
Eff
UL
f
Eff
DL
N
Packet
UL
Int
S
PacketCal l
UL
S
Packet
UL
1024
-------------------------------------
\ .
|
| |
1 + = N
Packet
DL
Int
S
PacketCal l
DL
S
Packet
DL
1024
-------------------------------------
\ .
|
| |
1 + =
D
Inacti vi ty
UL
( )
PacketCal l
N
Packet
UL
1 ( ) AT
Packet
UL

1000
---------------------------------------------------------------- = D
Inacti vi ty
DL
( )
PacketCal l
N
Packet
DL
1 ( ) AT
Packet
DL

1000
---------------------------------------------------------------- =
D
Inacti vi ty
UL
( )
Sessi on
N
PacketCal l
UL
D
Inacti vi ty
UL
( )
PacketCal l
=
D
Inacti vi ty
DL
( )
Sessi on
N
PacketCal l
DL
D
Inacti vi ty
DL
( )
PacketCal l
=
D
Acti vi ty
UL
( )
Sessi on
N
PacketCal l
UL
N
Packet
UL
S
Packet
UL
8
R
Nom
UL
1000
------------------------------------------------------- =
D
Acti vi ty
DL
( )
Sessi on
N
PacketCal l
DL
N
Packet
DL
S
Packet
DL
8
R
Nom
DL
1000
------------------------------------------------------- =
D
Connecti on
UL
D
Acti vi ty
UL
( )
Sessi on
D
Inacti vi ty
UL
( )
Sessi on
+ = D
Connecti on
DL
D
Acti vi ty
DL
( )
Sessi on
D
Inacti vi ty
DL
( )
Sessi on
+ =
p
Connecti on
UL
N
Sess
3600
--------------- D
Connecti on
UL
= p
Connecti on
DL
N
Sess
3600
--------------- D
Connecti on
DL
=
p
Connected
1 1 p
Connecti on
UL
( ) 1 p
Connecti on
DL
( ) =
n
j
N
Users
p
Connected
=
Forsk 2010 AT283_TRG_E2 411
Chapter 8: TD-SCDMA Networks
As Figure 8.1 on page 410 shows, there can be three possible cases when a user is connected:
a. 1
st
case: At a given time, packets are downloaded and uploaded.
The probability of being connected is:
b. 2
nd
case: At a given time, packet are uploaded only.
The probability of being connected is:
c. 3
rd
case: At a given time, packet are downloaded only.
The probability of being connected is:
Calculation of the probability of being active:
To determine the activity status of each user, the activity periods during the connection are taken into account.
and
Therefore, we have:
a. 1
st
case: At a given time, packets are downloaded and uploaded.
The probability of the user being active on UL and inactive on DL:
The probability of the user being active on DL and inactive on UL:
The probability of the user being active on both UL and DL:
The probability of the user being inactive on both UL and DL:
b. 2
nd
case: At a given time, packet are uploaded only.
The probability of the user being active on UL and inactive on DL:
The probability of the user being inactive on both UL and DL:
c. 3
rd
case: At a given time, packet are downloaded only.
The probability of the user being active on DL and inactive on UL:
The probability of the user being inactive on both UL and DL:
Calculation of number of users per activity status:
Number of inactive users on UL and DL:
Number of users active on UL and inactive on DL:
Number of users active on DL and inactive on UL:
Number of users active on UL and DL:
Therefore, a connected user can be active on both links, inactive on both links, active on UL only, or active on DL
only.
Notes:
The user distribution per service, and the activity status distribution between the users are
average distributions. The service and the activity status of each user are random in each
simulation. Therefore, if you compute several simulations at once, the average number of
users per service and average numbers of inactive, active on UL, active on DL, and active
on UL and DL users, will correspond to calculated distributions. But, if you compare each
simulation, you will observe that the user distribution between services as well as the
activity status distribution between users is different in each simulation.
p
Connected
UL DL +
p
Connecti on
UL
p
Connecti on
DL

p
Connected
----------------------------------------------------------------- =
p
Connected
UL
p
Connecti on
UL
1 p
Connecti on
DL
( )
p
Connected
------------------------------------------------------------------------------- =
p
Connected
DL
p
Connecti on
DL
1 p
Connecti on
UL
( )
p
Connected
------------------------------------------------------------------------------- =
f
UL
D
Acti vi ty
UL
( )
Sessi on
D
Inacti vi ty
UL
( )
Sessi on
D
Acti vi ty
UL
( )
Sessi on
+
--------------------------------------------------------------------------------------------------- = f
DL
D
Acti vi ty
DL
( )
Sessi on
D
Inacti vi ty
DL
( )
Sessi on
D
Acti vi ty
DL
( )
Sessi on
+
--------------------------------------------------------------------------------------------------- =
p1
Acti ve
UL
f
UL
1 f
DL
( ) p
Connected
UL DL +
=
p1
Acti ve
DL
f
DL
1 f
UL
( ) p
Connected
UL DL +
=
p1
Acti ve
UL DL +
f
UL
f
DL
p
Connected
UL DL +
=
p1
Inacti ve
1 f
UL
( ) 1 f
DL
( ) p
Connected
UL DL +
=
p2
Acti ve
UL
f
UL
p
Connected
UL
=
p2
Inacti ve
1 f
UL
( ) p
Connected
UL
=
p1
Acti ve
DL
f
DL
p
Connected
DL
=
p3
Inacti ve
1 f
DL
( ) p
Connected
DL
=
n
j Inacti ve
n
j
p1
Inacti ve
p2
Inacti ve
p3
Inacti ve
+ + ( ) =
n
j Acti ve
UL
n
j
p1
Acti ve
UL
p2
Acti ve
UL
+ ( ) =
n
j Acti ve
DL
n
j
p1
Acti ve
DL
p3
Acti ve
DL
+ ( ) =
n
j Acti ve
UL DL +
n
j
p1
Acti ve
UL DL +
( ) =
412 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.3.1.2 Simulations Based on Sector Traffic Maps
Sector traffic maps are also referred to as live traffic maps. Live traffic data from the OMC is spread over the best server
coverage areas of the transmitters included in the traffic map. Throughput demands per service, the numbers of active
users per service, or Erlangs per service are assigned to the coverage areas of each transmitter.
8.3.1.2.1 Throughputs in Uplink and Downlink
When selecting Throughputs in Uplink and Downlink, you can input the throughput demands in the uplink and downlink
for each sector and for each listed service.
Atoll calculates the number of users active in uplink and in downlink in the Txi cell using the service (N
UL
and N
DL
) as
follows:
and for R99 circuit and packet switched services
for HSDPA service
and are the uplink and downlink rates for service S in the TX
i
cell from the traffic map.
N
UL
and N
DL
values include:
Users active in uplink and inactive in downlink ( ),
Users active in downlink and inactive in uplink ( ),
And users active in both links ( ).
Atoll takes into account activity periods during the connection in order to determine the activity status of each user.
Activity probabilities are calculated as follows:
Probability of being inactive in UL and DL:
Probability of being active in UL only:
Probability of being active in DL only:
Probability of being active both in UL and DL:
Where, and are respectively the UL and DL activity factors defined for the service i.
Then, Atoll calculates the number of users per activity status:
We have:
Therefore, we have:
Number of users active in UL and DL both:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of inactive users in UL and DL:
Therefore, a connected user can have four different activity status: either active in both links, or inactive in both links, or
active in UL only, or active in DL only.
8.3.1.2.2 Total Number of Users (All Activity Statuses)
When selecting Total Number of Users (All Activity Statuses), you can input the number of connected users for each
sector and for each listed service ( ).
Atoll takes into account activity periods during the connection in order to determine the activity status of each user.
Activity probabilities are calculated as follows:
N
UL
R
S
UL
R
Nom
UL
-------------- = N
DL
R
S
DL
R
Nom
DL
-------------- =
N
DL
R
S
DL
R
Avg
DL
------------- =
R
S
UL
R
S
DL
n
i Acti ve
UL
n
i Acti ve
DL
n
i Acti ve
UL DL +
p
Inacti ve
1 f
Act
UL
( ) 1 f
Act
DL
( ) =
p
Acti ve
UL
f
Act
UL
1 f
Act
DL
( ) =
p
Acti ve
DL
f
Act
DL
1 f
Act
UL
( ) =
p
Acti ve
UL DL +
f
Act
UL
f
Act
DL
=
f
Act
UL
f
Act
DL
p
Acti ve
UL
p
Acti ve
UL DL +
+ ( ) n
i Acti ve
UL
n
i Acti ve
DL
n
i Acti ve
UL DL +
+ + ( ) N
UL
=
p
Acti ve
DL
p
Acti ve
UL DL +
+ ( ) n
i Acti ve
UL
n
i Acti ve
DL
n
i Acti ve
UL DL +
+ + ( ) N
DL
=
n
i Acti ve
UL DL +
mi n
N
UL
p
Acti ve
UL DL +

p
Acti ve
UL
p
Acti ve
UL DL +
+
--------------------------------------------
N
DL
p
Acti ve
UL DL +

p
Acti ve
DL
p
Acti ve
UL DL +
+
-------------------------------------------- ,
\ .
|
| |
=
n
i Acti ve
UL
N
UL
n
i Acti ve
UL DL +
=
n
i Acti ve
DL
N
DL
n
i Acti ve
UL DL +
=
n
i Inacti ve
n
i Acti ve
UL
n
i Acti ve
DL
n
i Acti ve
UL DL +
+ + ( )
1 p
i nacti ve

-------------------------------------------------------------------------------------- p
i nacti ve
=
n
i
Forsk 2010 AT283_TRG_E2 413
Chapter 8: TD-SCDMA Networks
Probability of being inactive in UL and DL:
Probability of being active in UL only:
Probability of being active in DL only:
Probability of being active both in UL and DL:
Where, and are respectively the UL and DL activity factors defined for the service i.
Then, Atoll calculates the number of users per activity status:
Number of inactive users in UL and DL:
Number of users active in UL and inactive in DL:
Number of users active in DL and inactive in UL:
Number of users active in UL and DL both:
Therefore, a connected user can have four different activity status: either active in both links, or inactive in both links, or
active in UL only, or active in DL only.
8.3.1.2.3 Number of Users per Activity Status
When selecting Number of Users per Activity Status, you can directly input the number of inactive users ( ),
the number of users active in the uplink ( ), in the downlink ( ) and in the uplink and downlink ( ),
for each sector and for each service.
8.3.2 Power Control Simulation
Based on CDMA air interface, a TD-SCDMA network automatically regulates itself by using uplink and downlink power
control in order to minimise interference and maximise capacity. For each user distribution, Atoll simulates these network
regulation mechanisms using an iterative algorithm and calculates network parameters such as traffic power per cell and
per timeslot, mobile terminal power, and handoff status for each terminal.
In each iteration, all the mobiles (R99 and HSDPA service users) selected during generation of the user distribution
attempt to connect to the network one by one. The process is repeated from iteration to iteration and ends when the
network is balanced, i.e., when the convergence criteria on uplink and downlink are satisfied.
The simulation algorithm also models the impact of smart antennas in the power control loop. The influence of smart
antennas is taken into account in signal quality calculations. Smart antennas improve the signal quality of each served
mobile, decrease the required powers and the loads of all the surrounding cells. Interference on the downlink and the
uplink is calculated on a per user. Power control is simulated over a sub-frame, i.e., 7 timeslots.
For HSDPA users, uplink and downlink power control is performed on the associated A-DCH bearer before fast link
adaptation on downlink. The steps of this algorithm are detailed below.
p
Inacti ve
1 f
Act
UL
( ) 1 f
Act
DL
( ) =
p
Acti ve
UL
f
Act
UL
1 f
Act
DL
( ) =
p
Acti ve
DL
f
Act
DL
1 f
Act
UL
( ) =
p
Acti ve
UL DL +
f
Act
UL
f
Act
DL
=
f
Act
UL
f
Act
DL
n
i Inacti ve
n
i
p
Inacti ve
=
n
i Acti ve
UL
n
i
p
Acti ve
UL
=
n
i Acti ve
DL
n
i
p
Acti ve
DL
=
n
i Acti ve
UL DL +
n
i
p
Acti ve
UL DL +
=
Note:
The activity status of users is based on an average distribution. The activity status of each
user is random in each simulation. Therefore, if you compute several simulations at once,
the average numbers of inactive, active on UL, active on DL, and active on UL and DL
users, will correspond to calculated distributions. But, if you compare each simulation, you
will observe that the activity status distribution between users is different in each
simulation.
n
i Inacti ve
n
i Acti ve
UL
n
i Acti ve
DL
n
i Acti ve
UL DL +
414 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.3.2.1 Algorithm Initialisation
At the start of each simulation, the system loads for each carrier and timeslot are reset to initial values:
Downlink traffic powers of cells are initialised to 0 Watts
Uplink interference powers received on all the carriers and timeslots and are initialised to 0
Watts (i.e., no connected mobiles)
Uplink required power for mobiles is set to
8.3.2.2 R99 Part of the Algorithm
The algorithm is described for an iteration k. Here, X
k
is the value of the variable X at the iteration k. In the algorithm, all
and thresholds depend on the user mobility, and are defined in the Service and Mobility parameter tables.
All the variables used in the description below are listed in "Definitions and Formulas" on page 395.
The following calculations are made for all R99 and HSDPA mobiles (M
i
) using R99 bearers.
8.3.2.2.1 Determination of M
i
s Best Server (S
BS
(M
i
))
This step is performed for TS0 for each station TX
i
containing M
i
in its calculation area.
The best server for M
i
is determined according to the P-CCPCH RSCP from the carrier with the highest P-CCPCH power,
or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the P-CCPCH RSCP is
calculated for:
the preferred carrier of the service used by M
i
, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The RSCP from a transmitter TX
i
and a selected carrier ic is given by:
in dBm
Where,
Figure 8.2TD-SCDMA Power Control Algorithm
P
TCH DL
I
Intra UL
I
Extra UL
P
Mi n
Term
Q
UL
Req
Q
DL
Req
RSCP
P CCPCH
TX
i
i c ( )
P
P CCPCH
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng
Model
L
Body
M
i
L
Indoor
G
M
i
L
M
i
+ + =
Forsk 2010 AT283_TRG_E2 415
Chapter 8: TD-SCDMA Networks
is the loss on the transmitter-receiver path (path loss) calculated by the propagation model
is the transmitter antenna attenuation (from antenna patterns)
is the shadowing margin. This parameter is taken into account when the option Shadowing taken into
account is selected
are the indoor losses, taken into account when the option "Indoor coverage" is selected
is the los of the terminal used by M
i
is the body loss defined in the service used by M
i
is the receiver gain of the terminal user by M
i
is the transmitter antenna gain
is the transmitter loss ( )
A cell is considered the best server of a mobile M
i
if it satisfies the following conditions:
and .
The best server is determined once for the whole simulation during the first iteration, i.e., k = 0, because the best server
does not change during the simulation and smart antennas do not influence this step.
M
i
is considered unable to connect to the network if no best server has been selected. In this case, M
i
is rejected for the
reason P-CCPCH RSCP < Min P-CCPCH RSCP. If M
i
has no best server, it is not taken into account in the next steps.
8.3.2.2.2 Dynamic Channel Allocation
The dynamic channel allocation is performed once for the whole simulation during the first iteration, i.e., k = 0. The DCA
controls the mobile admission. Once a mobile has been admitted for a simulation, it remains admitted for the all the
iterations unless there are other reasons to reject it (following steps).
The aim of Dynamic Channel Allocation (DCA) is to reduce interference in order to maximise the usage of the radio
resources. In other words, the DCA tries to find the "best carrier" and the "best timeslots", which when allocated to the
mobiles will optimise the load balance between carriers.
If a preferred carrier is defined for the service requested by M
i
and if it is available at . the
carrier preferred for the service. In the case of N-frequency compatible transmitters, M
i
can be allocated timeslots over
more than one slave carrier.
M
i
is considered unable to connect to the network if no carrier or not enough timeslots have been selected. In this case,
the mobile M
i
will be rejected for the reason "RU Saturation". If the carrier and timeslot(s) selected by the DCA do not
satisfy the control of radio resource limits for DL power or UL load, then the mobile will be rejected for the reason "DL Load
Saturation" or "Admission Rejection" respectively.
There are four strategies for the DCA available in Atoll. These strategies are described below one by one.
1. Load
Carrier Selection by Load: The DCA determines the least loaded carrier with enough timeslots to accomodate
the service being used by each mobile M
i
. The best carrier for a mobile is the one that is least loaded:
Where, if the mobile is connected in the downlink.
And, if the mobile is connected in the uplink.
is the load increment given by:
L
Path
L
Model
L
Ant
TX
i
+ =
L
Model
L
Ant
TX
i
M
Shadowi ng
Model
L
Indoor
L
M
i
L
Body
M
i
G
M
i
G
TX
i
L
TX
i
L
TX
i
L
Total DL
=
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) > RSCP
P CCPCH
TX
i
i c ( )
Best
j = All
RSCP
P CCPCH
TX
j
j c ( )
( ) =
TX
i
BestCarri er TX
i
M
i
, ( ) =
BestCarri er TX
i
M
i
, ( ) Carri er
Mi n X
DCA
( )
=
X
DCA
X
DL
DCA
N
Tot DL
TX
i
i c TS M
i
( ) , ( )
= =
X
DCA
X
UL
DCA
N
Tot UL
TX
i
i c TS M
i
( ) , ( )
N
Tot UL
TX
i
i c TS M
i
( ) , ( )
N
0
TX
i
+
------------------------------------------------------ AX
DCA
= =
AX
DCA
AX
DCA

M
i
1 f
UL
Ortho
( ) 1 f
JD
TX
i
( )
1
1
Q
UL
Req
------------- +
------------------------------------------------------------------------ =
416 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where is the uplink required signal quality. The uplink processing gain
calculated from the service parameters, if no smart antenna is used by the transmitter in the uplink.
If a smart antenna is used by the transmitter in the uplink, the smart antenna gain is taken into account in
calculating .
Timeslot selection by Load: From the selected carrier, Atoll selects the timeslots which are the least loaded and
have enough resource units for the service being accessed by M
i
.
2. Available RUs
Carrier selection by Available RUs: The DCA determines the carrier which has the highest number of available
resource units with enough timeslots to accomodate the service being used by each mobile M
i
. The best carrier
for a mobile is the one that has the highest number of resource units:
Timeslot selection by Available RUs: From the selected carrier, Atoll selects the timeslots which have the
highest numbers of available resource units.
3. Direction of Arrival
Carrier selection by Direction of Arrival: The DCA determines the direction of arrival of the signal from the
served user M
i
and checks whether there is an interfering mobile in the same direction as M
i
. Atoll searches for
interfering mobiles within the angle defined by the Angular Step. For example, if you enter an angular step of 15
degrees, Atoll searches for interfering mobiles within 15 degrees to the right and to the left of the served user, and
allocates a different carrier than the ones used by any interfering mobiles found. The best carrier for a mobile is
the one which is not interfered by another mobile in the direction of the mobile M
i
.
In other words, the direction of arrival for the served user M
i
should not be the direction of arrival of an interfering
mobile.
Timeslot selection by Direction of Arrival: From the selected carrier, Atoll selects the timeslots which are not
being used by any other mobile M
j
located in the same direction as the served user M
i
.
4. Sequential
Sequential carrier selection: The DCA allocates carriers to served users M
i
in a sequential order.
Sequential timeslot selection: From the selected carrier, Atoll allocates timeslots to served users M
i
in a
sequential order.
At the end of the DCA, each admitted mobile has an associated carrier and timeslots. In case of N-frequency mode
compatible transmitters, an admitted mobile can have associated timeslots over more than one slave carrier.
8.3.2.2.3 Uplink Power Control
For each mobile M
i
, the uplink power control step calculates the uplink power required to satisfy the required quality level
on the traffic channel, which is defined for the service being accessed by M
i
.
If the mobile M
i
is connected (active or inactive) in the uplink and has a best server assigned to it, Atoll calculates
the signal quality on the uplink timeslots allocated to M
i
by the DCA:
or
Calculation of Uplink Total Noise ( ):
The uplink total noise is calculated for the uplink connection between each mobile M
i
and its best server .
Notes:
is described in "Uplink Power Control" on page 416.
is described in "Downlink Power Control" on page 418.
The carrier is the same in the uplink and in the downlink for mobiles accessing circuit-
switched services.
Q
UL
Req C
I
----
\ .
| |
UL
Req
E
b
N
t
------
\ .
| |
UL
Req
G
UL
Proc
--------------------- = = G
UL
Proc
Q
UL
Req
N
Tot UL
TX
i
i c TS M
i
( ) , ( )
N
Tot DL
TX
i
i c TS M
i
( ) , ( )
BestCarri er TX
i
M
i
, ( ) Carri er
Max RUs ( )
=
BestCarri er TX
i
M
i
, ( ) Carri er
DoA Mi ( ) DoA Mj ( ) =
=
TX
i
i c ( )
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c TS M
i
( ) , ( )

M
i
RSCP
TCH UL
TX
i
i c TS M
i
( ) , ( )

N
Tot UL
TX
i
i c TS M
i
( ) , ( )
---------------------------------------------------------------- G
UL
Proc
G
UL
Di v
=
C
I
----
\ .
| |
TCH UL
TX
i
i c TS M
i
( ) , ( )

M
i
RSCP
TCH UL
TX
i
i c TS M
i
( ) , ( )

N
Tot UL
TX
i
i c TS M
i
( ) , ( )
---------------------------------------------------------------- G
UL
Di v
=
N
Tot UL
TX
i
i c ( )
N
Tot UL
TX
i
i c TS M
i
( ) , ( )
I
Tot UL
TX
i
i c TS M
i
( ) , ( )
N
0
TX
i
+ =
Forsk 2010 AT283_TRG_E2 417
Chapter 8: TD-SCDMA Networks
Where
and
The above formula gives the value of for the uplink connection between M
i
and , taking into account the
interference received from other mobiles, M
j
, which are located in the M
i
best server coverage area, as well as located in
the coverage areas of other cells. The mobile M
i
is the focus, i.e., the mobile that is listened to by the transmitter .
The four terms comprising are:
The useful signal for which the received mobile is the focus (M
i
).
The intra-cell interference for which the best-server is the same for the received mobile M
j
and the focus M
i
,
.
The intra-cell interference due to distortion in the terminal transmission.
The extra-cell interference for which the best-server for the received mobile M
j
is not .
The uplink received signal code power is:
and is the uplink required mobile
power calculated for the timeslot allocated to M
i
. If M
i
is an HSDPA user,
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the uplink. Otherwise, and are read from the main
antenna model.
Calculation of Uplink Required Power ( ):
Then Atoll determines the required uplink power by:
or
And if then
Notes:
Interference is updated only for active mobiles on the uplink for circuit- and packet-
switched services. However, if these mobiles are rejected, they are considered in the
number of rejected mobiles.
I
Tot UL
TX
i
i c TS M
i
( ) , ( )
RSCP
TCH UL
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) |
M
i
+
RSCP
TCH UL
M
j
TX
i
i c TS M
i
( ) , ( ) ( )
M
j
TX
i
i c TS M
i
( ) , ( ) e
M
j
M
i
=


M
i
+
1
M
j
( ) RSCP
TCH UL
M
j
TX
i
i c TS M
i
( ) , ( ) ( )
M
j
TX
i
i c TS M
i
( ) , ( ) e
M
j
M
i
=

+
RSCP
TCH UL
M
j
TX
i
i c TS M
i
( ) , ( ) ( ) 1 F
MCJD
TX
i
( )
M
j
TX
i
i c TS M
i
( ) , ( ) e

=

M
i

M
i
1 F
UL
Ortho
( ) 1 F
JD
TX
i
( ) = |
0 Without Useful Signal
1 Total Noise

=
I
Tot UL
TX
i
i c ( )
TX
i
i c ( )
I
Tot UL
TX
i
i c ( )
TX
i
i c ( )
RSCP
TCH UL
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
k 1
L
T
Model
------------------------------------------------------------------------ =
L
T
Model
L
Path
L
TX
i
L
M
i
L
Body
M
i
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
M
i

------------------------------------------------------------------------------------------------------------------------------- = P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) 0.1 P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) =
L
T
Model
G
TX
i
G
UL
SA
= L
TX
i
L
UL
SA
=
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) G
TX
i
L
TX
i
P
Req
M
i
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
k
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
k 1
E
b
N
t
------
\ .
| |
TCH UL
Req
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c TS M
i
( ) , ( )
-------------------------------------------- =
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
k
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
k 1
C
I
----
\ .
| |
TCH UL
Req
C
I
----
\ .
| |
TCH UL
TX
i
i c TS M
i
( ) , ( )
------------------------------------------ =
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) P
Mi n
M
i
< P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) P
Mi n
M
i
=
418 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
If then the mobile M
i
is rejected for the reason "Pmob > PmobMax", and
is set to 0.
and are set in the properties of the terminal used by the mobile M
i
.
Where
and is the uplink required mobile
power for iteration k - 1 transmitted on the timeslot allocated to M
i
.
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the uplink. Otherwise, and are read from the main
antenna model.
8.3.2.2.4 Downlink Power Control
For each mobile M
i
, the downlink power control step calculates the downlink power for the best server required
to satisfy the required quality level on the traffic channel, which is defined for the service being accessed by M
i
.
If the mobile M
i
is connected (active or inactive) in the downlink and has a best server assigned to it, Atoll
calculates the signal quality on the uplink timeslots allocated to M
i
by the DCA:
or
Calculation of Downlink Total Noise ( ):
The downlink total noise is calculated for the downlink connection between each mobile M
i
and its best server .
Where
The four terms comprising are:
The useful signal for which the received mobile is the focus (M
i
).
The intra-cell interference for which the best-server is the same for the received mobile M
j
and the focus M
i
,
.
The intra-cell interference due to distortion in the transmitter.
The extra-cell interference for which the best-server for the received mobile M
j
is not .
Note:
The uplink required powers for mobiles inactive in the uplink accessing circuit- or packet-
switched services are calculated for information only. However, if these mobiles are
rejected, they are considered in the number of rejected mobiles.
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) P
Max
M
i
>
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
P
Mi n
M
i
P
Max
M
i
RSCP
TCH UL
TX
i
i c TS M
i
( ) , ( )
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
k 1
L
T
Model
------------------------------------------------------------------------ =
L
T
Model
L
Path
L
TX
i
L
M
i
L
Body
M
i
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
M
i

------------------------------------------------------------------------------------------------------------------------------- = P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( )
k 1
L
T
Model
G
TX
i
G
UL
SA
= L
TX
i
L
UL
SA
=
P
Req
M
i
TX
i
i c TS M
i
( ) , ( ) ( ) G
TX
i
L
TX
i
TX
i
i c ( )
TX
i
i c ( )
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c TS M
i
( ) , ( )

TX
i
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( )

N
Tot DL
TX
i
i c TS M
i
( ) , ( )
------------------------------------------------------------------- G
DL
Proc
G
DL
Di v
=
C
I
----
\ .
| |
TCH DL
TX
i
i c TS M
i
( ) , ( )

TX
i
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( )

N
Tot DL
TX
i
i c TS M
i
( ) , ( )
------------------------------------------------------------------- G
DL
Di v
=
N
Tot DL
TX
i
i c ( )
N
Tot DL
TX
i
i c TS M
i
( ) , ( )
I
Tot DL
TX
i
i c TS M
i
( ) , ( )
I
IC DL
i c j c , ( ) I
MM
M
i
M
j
, ( ) N
0
M
i
+ + + =
I
Tot DL
TX
i
i c TS M
i
( ) , ( )
RSCP
Tot DL
TX
i
i c TS M
i
( ) , ( )
M
i
( ) |
TX
i
+
RSCP
Tot DL
TX
i
i c TS M
i
( ) , ( )
M
j
( )
M
j
TX
i
i c TS M
i
( ) , ( ) e
M
j
M
i
=


TX
i
+
1
TX
i
( ) RSCP
Tot DL
TX
i
i c TS M
i
( ) , ( )
M
j
( )
M
j
TX
i
i c TS M
i
( ) , ( ) e
M
j
M
i
=

+
RSCP
Tot DL
TX
j
i c TS M
i
( ) , ( )
M
j
( )
M
j
TX
i
i c TS M
i
( ) , ( ) e

=
I
Tot DL
TX
i
i c ( )
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 419
Chapter 8: TD-SCDMA Networks
and
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced by
the interference reduction factor defined for the pair (ic, jc).
With and
and is the downlink traffic power
transmitted on the timeslot allocated to M
i
during the iteration k - 1. If M
i
is an HSDPA user,
In , and are calculated according to the smart antenna modelling method used, for
only and not for , if a smart antenna is available in the downlink. Otherwise, and
are read from the main antenna model.
is the interference from each mobile M
j
transmitting in the uplink on the same
timeslots as those on which the mobile M
i
is receiving in the downlink. M
j
can interfere M
i
directly if and only if:
The distance between M
i
and M
j
( ) is less than the Max Distance between interfering mobiles defined by
the user when starting the simulation, and
The downlink timeslot of M
i
(TS
Mi
) is the same as the uplink timeslot of M
j
, (TS
Mj
).
The interference received from the mobile M
j
at the mobile M
i
is calculated using either the free-space propagation model
or the Xia model.
with being the average frequency in MHz of
the frequency band used by the best server of the mobile M
i
, and d is the distance between the mobiles M
i
and M
j
in km.
Calculation of Downlink Required Power ( ):
Then Atoll determines the required downlink power by:
or
And if then
If then the mobile M
i
is rejected for the reason "Ptch > PtchMax", and
is set to 0.
I
IC DL
i c j c , ( )
RSCP
Tot DL
TX
j
j c TS M
i
( ) , ( )
M
i
( )
All TX
j

F
IRF
i c j c , ( )
--------------------------------------------------------------------------- =

TX
i

TX
i
1 F
DL
Ortho
( ) 1 F
JD
M
i
( ) = |
0 Without Useful Signal
1 Total Noise

=
I
IC DL
i c j c , ( )
F
IRF
i c j c , ( )
RSCP
Tot DL
TX
i
i c TS M
i
( ) , ( )
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( )
RSCP
OCCH
TX
i
i c TS M
i
( ) , ( )
+ =
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( )
P
TCH DL
TX
i
i c TS M
i
( ) , ( )
k 1
L
T
Model
----------------------------------------------- = RSCP
OCCH
TX
i
i c TS M
i
( ) , ( ) P
OCCH
TX
i
i c TS M
i
( ) , ( )
L
T
Model
------------------------------------ =
L
T
Model
L
Path
L
TX
i
L
M
i
L
Body
M
i
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
M
i

------------------------------------------------------------------------------------------------------------------------------- = P
TCH DL
TX
i
i c TS M
i
( ) , ( )
k 1
P
TCH DL
TX
i
i c TS M
i
( ) , ( )
0.1 P
TCH DL
TX
i
i c TS M
i
( ) , ( )
=
L
T
Model
G
TX
i
G
DL
SA
= L
TX
i
L
DL
SA
=
P
TCH DL
TX
i
i c TS M
i
( ) , ( )
P
OCCH
TX
i
i c TS M
i
( ) , ( )
G
TX
i
L
TX
i
I
MM
M
i
M
j
, ( )
RSCP
TCH UL
M
j
M
i
( )
M
j

F
IRF
i c j c , ( )
---------------------------------------------------------- =
d
Mi Mj
RSCP
TCH UL
M
j
M
i
( )
P
TCH UL
M
j
L
MM
------------------------ =
L
MM
32.4 20 Log F
Avg
( ) 20 Log d ( ) + + If d
M
i
M
j

3 m s
49 30 Log F
Avg
( ) 40 Log d ( ) + + If d
M
i
M
j

3 m >

= F
Avg
P
Req
TX
i
i c TS M
i
( ) , ( )
P
Req
TX
i
i c TS M
i
( ) , ( )
k
P
Req
TX
i
i c TS M
i
( ) , ( )
k 1
E
b
N
t
------
\ .
| |
TCH DL
Req
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c TS M
i
( ) , ( )
-------------------------------------------- =
P
Req
TX
i
i c TS M
i
( ) , ( )
k
P
Req
TX
i
i c TS M
i
( ) , ( )
k 1
C
I
----
\ .
| |
TCH DL
Req
C
I
----
\ .
| |
TCH DL
TX
i
i c TS M
i
( ) , ( )
------------------------------------------ =
P
Req
TX
i
i c TS M
i
( ) , ( )
P
TCH DL
Mi n
Servi ce ( ) < P
Req
TX
i
i c TS M
i
( ) , ( )
P
TCH DL
Mi n
Servi ce ( ) =
P
Req
TX
i
i c TS M
i
( ) , ( )
P
TCH DL
Max
Servi ce ( ) > P
Req
TX
i
i c TS M
i
( ) , ( )
420 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
and are set in the properties of the R99 bearer associated with the service used
by the mobile M
i
.
Otherwise, the downlink traffic power is incremented
For each mobile, Atoll also calculates the downlink traffic power for the different values of the Angular Step .
Where
and is the downlink traffic power for
iteration k - 1 transmitted on the timeslot allocated to M
i
.
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the downlink. Otherwise, and are read from the main antenna
model.
8.3.2.2.5 Uplink Signals Update
This step uses the uplink terminal powers calculated for each timeslot allocated to the mobiles. The Dynamic Channel
Allocation allocates timeslots and carriers to all the connected and active mobiles. The Dynamic Channel Allocation is
performed once only, during the first iteration, and the timeslot and carrier allocation remains the same for all the following
iterations of a simulation.
This step updates the received signals for all the mobiles M
i
interfered in the uplink by the uplink connection between
interfering mobiles M
j
and their best servers , only if contain M
i
in their coverage areas. is the
interfered receiver and M
i
is the focus, i.e., the mobile that is listened to by the transmitter .
For each mobile M
i
interfered by M
j
in the uplink by the connection between M
j
and , Atoll updates
.
8.3.2.2.6 Downlink Signals Update
For the first iteration, i.e., k = 0, the downlink traffic powers for all the downlink timeslots are set to 0 Watts. Therefore, for
the first iteration, this step is performed for any downlink timeslot for each mobile M
i
that is connected and active.
However, for the following iterations, the downlink signals update step uses the actual downlink traffic powers calculated
for each timeslot and the actual timeslots allocated to the mobiles. The Dynamic Channel Allocation allocates timeslots
and carriers to all the connected and active mobiles. The Dynamic Channel Allocation is performed once only during the
first iteration and the timeslot and carrier allocation remains the same for all the following iterations of a simulation.
Therefore, this step is performed for any downlink timeslot for each mobile M
i
that is connected and active for the first
iteration, and this step is performed for all the downlink timeslots allocated to the mobile M
i
on which it is connected and
active, for the following iterations since the DCA has been performed.
This step updates the received signals for all the mobiles in the coverage area which are interfered in the downlink
by the connection between and M
i
.
For each mobile interfered by M
i
, Atoll updates
Where is the transmitter considered and M
i
is the focus, i.e., the mobile that is the target for .
8.3.2.2.7 Control of Radio Resource Limits (Downlink Traffic Power and Uplink Load)
This step checks whether the downlink traffic powers of the downlink timeslots and the uplink loads of the uplink timeslots
of all the cells satisfy the conditions defined globally or per cell and timeslot.
Note:
The downlink power for mobiles inactive in the downlink accessing circuit- or packet-
switched services are calculated for information only.
P
TCH DL
Mi n
Servi ce ( ) P
TCH DL
Max
Servi ce ( )
P
TCH DL
TX
i
i c TS M
i
( ) , ( )
P
TCH DL
TX
i
i c TS M
i
( ) , ( )
P
Req
TX
i
i c TS M
i
( ) , ( )
+ =
u
Step
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( )
u
Step
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( ) G
DL
SA
L
DL
SA
u
Step
( )
---------------------------- =
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( )
P
Req
TX
i
i c TS M
i
( ) , ( )
k 1
L
T
Model
----------------------------------------------- =
L
T
Model
L
Path
L
TX
i
L
M
i
L
Body
M
i
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
M
i

------------------------------------------------------------------------------------------------------------------------------- = P
Req
TX
i
i c TS M
i
( ) , ( )
k 1
L
T
Model
G
TX
i
G
DL
SA
= L
TX
i
L
DL
SA
=
P
Req
TX
i
i c TS M
i
( ) , ( )
G
TX
i
L
TX
i
TX
j
i c ( ) TX
j
i c ( ) TX
i
i c ( )
TX
i
i c ( )
TX
j
i c ( )
RSCP
TCH UL
TX
i
i c TS M
i
( ) , ( )
TX
i
i c ( )
TX
i
i c ( )
RSCP
TCH DL
TX
i
i c TS M
i
( ) , ( )
TX
i
i c ( ) TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 421
Chapter 8: TD-SCDMA Networks
Downlink Power Control:
Atoll verifies that the total R99 power transmitted by any cell on any timeslot does not exceed the effective maximum cell
power per timeslot. The effective maximum cell traffic power per timeslot is calculated as:
Where is the maximum cell power per timeslot defined per cell, and is the maximum allowed
downlink load either taken from the properties of each cell or from the simulation properties if a global value is defined.
For each transmitter TX
i
, carrier ic, and downlink timeslot ,
If the mobile with the lowest service priority is rejected for the reason "DL Load Saturation".
Uplink Load Control:
Atoll verifies that the uplink load of any cell on any timeslot does not exceed the maximum uplink cell load allowed per
timeslot.
The maximum allowed uplink cell load, , is either taken from the properties of each cell or from the simulation
properties if a global value is defined.
For each transmitter TX
i
, carrier ic, and uplink timeslot ,
If the mobile with the lowest service priority is rejected for the reason "UL Load Saturation".
The uplink load is given by:
if no smart antenna is used by the transmitter in the uplink.
If a smart antenna is used by the transmitter in the uplink, the smart antenna gain is taken into account in the calculation
of uplink load.
8.3.2.3 HSDPA Part of the Algorithm
The following calculations are made for all HSDPA mobiles (M
i
).
8.3.2.3.1 HSDPA Power Allocation
The total transmitted power of the cell ( ) is the sum of the R99 transmitted power and the HSDPA powers.
The HSDPA powers, i.e., the HS-SCCH and HS-PDSCH powers are calculated as follows:
HS-SCCH Power:
HS-SCCH channels are transmitted on DL traffic timeslots. The maximum number of supported HS-SCCH
channels is defined per cell. Power can be allocated to HS-SCCH statically or dynamically:
- Static Allocation
The static HS-SCCH power is defined in the properties of the HSDPA cell.
- Dynamic Allocation
HS-SCCH power is calculated for so that
.
Where is the power available for HS-SCCH in the
cell , and .
The effective maximum cell traffic power per timeslot is calculated as:
. is the maximum power defined per cell, and
is the maximum allowed downlink load either taken from the properties of each cell or from the simulation
properties if a global value is defined.
P
Max DL Eff
TX
i
i c TS M
i
( ) , ( )
P
Max DL
TX
i
i c TS M
i
( ) , ( )
%P
Max DL
=
P
Max DL
TX
i
i c TS M
i
( ) , ( )
%P
Max DL
TS
M
i
P
R99 DL
TX
i
i c TS M
i
( ) , ( )
P
TCH DL
TX
i
i c TS M
i
( ) , ( )
P
OCCH
TX
i
i c TS M
i
( ) , ( )
+ =
P
R99 DL
TX
i
i c TS M
i
( ) , ( )
P
Max DL Eff
TX
i
i c TS M
i
( ) , ( )
>
X
Max UL
TX
i
i c TS M
i
( ) , ( )
TS
M
i
X
UL
TX
i
i c TS M
i
( ) , ( )
X
Max UL
TX
i
i c TS M
i
( ) , ( )
>
X
UL
TX
i
i c TS M
i
( ) , ( ) N
Tot UL
TX
i
i c TS M
i
( ) , ( )
N
Tot UL
TX
i
i c TS M
i
( ) , ( )
N
0
TX
i
+
------------------------------------------------------ =
P
Tot DL
TX
i
i c ( )
P
Tot DL
TX
i
i c ( )
P
R99 DL
TX
i
i c ( )
P
HR
TX
i
i c ( )
P
HS SCCH
TX
i
i c ( )
P
HS PDSCH
TX
i
i c ( )
+ + + =
E
c
N
t
------
\ .
| |
HS SCCH
TX
i
i c ( )
Q
HS SCCH
Req
Mobi l i ty ( ) =
P
HS SCCH
TX
i
i c ( )
P
Avai l abl e HS SCCH
TX
i
i c ( )
<
P
Avai l abl e HS SCCH
TX
i
i c ( )
P
Max DL Eff
TX
i
i c ( )
P
R99 DL
TX
i
i c ( )
P
HR
TX
i
i c ( )
=
TX
i
i c ( ) P
R99 DL
TX
i
i c ( )
P
TCH DL
TX
i
i c ( )
P
OCCH
TX
i
i c ( )
+ =
P
Max DL Eff
TX
i
i c ( )
P
Max DL
TX
i
i c ( )
%P
Max DL
= P
Max DL
TX
i
i c ( )
%P
Max DL
422 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where is the downlink total noise calculated in "Downlink Power Control" on page 418,
and
and is the HS-SCCH power
calculated for the timeslots allocated to M
i
.
In , and are calculated according to the smart antenna modelling method
used, for , if a smart antenna is available in the downlink. Otherwise, and are read from
the main antenna model.
HS-PDSCH Power:
HS-PDSCH channels are transmitted on DL traffic timeslots. Power can be allocated to HS-PDSCH statically or
dynamically:
- Static Allocation
The static HS-PDSCH power is defined in the properties of the HSDPA cell.
- Dynamic Allocation
HS-PDSCH power is calculated as follows:
Where . The effective maximum cell traffic power per timeslot is calculated as:
. is the maximum power defined per cell, and
is the maximum allowed downlink load either taken from the properties of each cell or from the simulation
properties if a global value is defined.
The HS-SICH power is calculated as follows:
HS-SICH Power:
HS-SICH channels can be transmitted on any UL traffic timeslot. The maximum number of supported HS-SICH
channels is defined per cell. Power can be allocated to HS-SICH statically or dynamically:
- Static Allocation
The static HS-SICH power is defined in the properties of the terminal used by the HSDPA mobile M
i
.
- Dynamic Allocation
HS-SICH power is calculated for so that
and .
Where is the uplink total noise calculated in "Uplink Power Control" on page 416,
and
and is the HS-SICH power calculated
for the timeslots allocated to M
i
.
P
HS SCCH
TX
i
i c ( )
E
c
N
t
------
\ .
| |
HS SCCH
TX
i
i c ( )
N
Tot DL
TX
i
i c ( )
|
TX
i
RSCP
HS SCCH
TX
i
i c ( )
( )

TX
i
------------------------------------------------------------------------------------------------------------------------------------------------- L
T
Model
=
N
Tot DL
TX
i
i c ( )

TX
i

TX
i
1 F
DL
Ortho
( ) 1 F
JD
M
i
( ) = |
0 Without Useful Signal
1 Total Noise

=
L
T
Model
L
Path
L
TX
i
L
M
i
L
Body
M
i
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
M
i

------------------------------------------------------------------------------------------------------------------------------- = P
HS SCCH
TX
i
i c ( )
L
T
Model
G
TX
i
G
DL
SA
= L
TX
i
L
DL
SA
=
P
HS SCCH
TX
i
i c ( )
G
TX
i
L
TX
i
P
HS PDSCH
TX
i
i c ( )
P
Max DL Eff
TX
i
i c ( )
P
R99 DL
TX
i
i c ( )
P
HR
TX
i
i c ( )
P
HS SCCH
TX
i
i c ( )
=
P
R99 DL
TX
i
i c ( )
P
TCH DL
TX
i
i c ( )
P
OCCH
TX
i
i c ( )
+ =
P
Max DL Eff
TX
i
i c ( )
P
Max DL
TX
i
i c ( )
%P
Max DL
= P
Max DL
TX
i
i c ( )
%P
Max DL
E
c
N
t
------
\ .
| |
HS SICH
TX
i
i c ( )
Q
HS SICH
Req
Mobi l i ty ( ) = P
HS SICH
M
i
P
Max HS SICH
TX
i
i c ( )
<
P
HS SICH
M
i
P
Max HS SICH
M
i
<
P
HS SICH
M
i
E
c
N
t
------
\ .
| |
HS SICH
TX
i
i c ( )
N
Tot UL
TX
i
i c ( )
|
M
i
RSCP
HS SICH
M
i
( )

M
i
------------------------------------------------------------------------------------------------------------------------------------------- L
T
Model
=
N
Tot UL
TX
i
i c ( )

M
i

M
i
1 F
UL
Ortho
( ) 1 F
JD
TX
i
( ) = |
0 Without Useful Signal
1 Total Noise

=
L
T
Model
L
Path
L
TX
i
L
M
i
L
Body
M
i
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
M
i

------------------------------------------------------------------------------------------------------------------------------- = P
HS SICH
M
i
Forsk 2010 AT283_TRG_E2 423
Chapter 8: TD-SCDMA Networks
In , and are calculated according to the smart antenna modelling method
used, for , if a smart antenna is available in the uplink. Otherwise, and are read from
the main antenna model.
The total transmitted power of the cell ( ) is the sum of the R99 transmitted power and the HSDPA powers.
8.3.2.3.2 Connection Status and Number of HSDPA Users
HSDPA users cannot receive HS-SCCH and HS-PDSCH powers simultaneously. HS-PDSCH arrives 3 timeslots after the
HS-SCCH. HS-SICH is 9 timeslots afte the HS-PDSCH. Atoll assumes that an active HSDPA user has the same
probability of receiving HS-SCCH and HS-PDSCH, and transmitting HS-SICH because their occurence is equally likely.
Therefore, each HSDPA user is assigned a sub-connection status randomly. The sub-connection status can be:
HS-SCCH: HSDPA mobile that is receiving HS-SCCH power
HS-PDSCH: HSDPA mobile that is receiving traffic power
HS-SICH: HSDPA mobile that is transmitting HS-SICH power
The number of active HSDPA users belonging to each sub-connection status is 1/3rd of the total number of active HSDPA
users.
is the maximum number of HS-SCCH channels and is the maximum number of HS-SICH channels
that the cell can manage. Each HSDPA user consumes one HS-SCCH and HS-SICH channels. Therefore, at a given
instance, the number of connected HSDPA users cannot exceed the number of HS-SCCH and HS-SICH channels per
cell. The maximum number of HSDPA users ( ) corresponds to the maximum number of HSDPA users that the cell
can support.
8.3.2.3.3 HSDPA Admission Control
HS-SCCH
HS-SCCH admission control is performed for active HSDPA users connected to A-DCH bearers on the downlink and
having an HS-SCCH sub-connection status. Each cell is able to manage a maximum number of HS-SCCH channels,
. During the R99 part, the DCA provides a DL timeslot with one SF16 resource unit that has the downlink Ec/
Nt higher than the required quality. If no cell with such a resource unit is available, the user is rejected.
HS-SICH
HS-SICH admission control is performed for active HSDPA users connected to A-DCH bearers on the uplink and having
an HS-SICH sub-connection status. Each cell is able to manage a maximum number of HS-SICH channels, .
During the R99 part, the DCA provides an UL timeslot with one SF16 resource unit that has the uplink Ec/Nt higher than
the required quality. If no cell with such a resource unit is available, the user is rejected.
HS-PDSCH
Scheduling is performed for active HSDPA users connected to A-DCH bearers on the downlink and having an HS-PDSCH
sub-connection status. The scheduling is performed as follows:
1. Each HS-PDSCH user is considered as the only served user. The scheduler allocates the best available HSDPA
bearer to each user. The best available HSDPA bearer is selected depending on the users Ec/Nt. If no bearer can
be allocated due to low Ec/Nt, the user is rejected for the reason "HSDPA Scheduler Saturation".
The required HS-PDSCH Ec/Nt value is read from receiver equipment properties. For each bearer, Atoll checks
that the Ec/Nt reaches the quality target. HS-PDSCH Ec/Nt is calculated by taking into account all intra and extra
cells interferences.
2. The scheduler sorts the HS-PDSCH users to whom bearers have been assigned in the order of decreasing RLC
peak rates. If two users have the same bearer, the user with the higher Ec/Nt has the higher rank.
3. The scheduler considers the group of HS-PDSCH users to whom bearers, HS-SCCH, and HS-SICH have been
assigned. The number of HS-PDSCH users cannot exceed the maximum number of HSDPA users ( )
supported by the cell. If there are enough HSDPA power and resource units available in order to obtain a HSDPA
bearer, the users will be connected. Otherwise, they will be delayed and their connection status will be HSDPA
Delayed.
4. Other HS-PDSCH users will be rejected for the reason "HSDPA Scheduler Saturation".
For N-frequency mode compatible transmitters, the resource units available in the master and slave carriers can be
shared, i.e., a mobile can be connected to timeslots belonging more than one carrier.
L
T
Model
G
TX
i
G
UL
SA
= L
TX
i
L
UL
SA
=
P
HS SICH
M
i
G
TX
i
L
TX
i
P
Tot DL
TX
i
i c ( )
P
Tot DL
TX
i
i c ( )
P
R99 DL
TX
i
i c ( )
P
HR
TX
i
i c ( )
P
HS SCCH
TX
i
i c ( )
P
HS PDSCH
TX
i
i c ( )
+ + + =
n
HS SCCH
n
HS SICH
n
Max
n
HS SCCH
n
HS SICH
n
Max
424 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.3.2.3.4 HSDPA Dynamic Channel Allocation
For each mobile connected to the A-DPCH bearer:
1. Atoll selects the HSDPA bearers that match to the mobile terminal and UE category parameters.
2. For each bearer supported by a mobile:
a. The scheduler searches for the best collection of "n" ordered timeslots that can provide enough resource units
to support the service, and whose Ec/Nt is better than the minimum required and enough to reach the bearers
resource unit requirements. The best is determined by applying the R99 Dynamic Channel Allocation
algorithm.
b. The scheduler calculates the HS-PDSCH Ec/Nt for each timeslot of the best collection. The Ec/Nt value
associated with the mobile-bearer pair is the worst one of all selected timeslots.
c. If the scheduler is unable to find a satisfactory timeslot collection, the bearer is removed from the list of
supported bearers.
3. The mobile is connected to the supported bearer having the highest RLC peak rate. If two bearers have the same
RLC peak rate, the best one is the one with the highest Ec/Nt.
8.3.2.3.5 Ressource Unit Saturation
For each time slot, a minimum and maximum number of resource units for HSDPA users are defined in the cell properties.
Atoll dynamically allocates the required number of codes respecting these limitations. The minimum number of HSDPA
codes is excluded from the set of codes available for R99 users. The scheduler checks if enough codes are available for
the selected HSDPA bearer (taking into account the maximum number of HSDPA codes). If not, the scheduler allocates
a lower HSDPA bearer which needs fewer codes. If there are no more resource units available for the lowest HSDPA
bearer, the user will be delayed or rejected.
8.3.2.4 Convergence Criteria
The convergence criteria are evaluated for each iteration and can be written as follows:
Where, is given by:
with smart antennas.
without smart antennas.
Atoll stops the simulations in the following cases:
Convergence: Between two successive iterations, and are less than or equal to their respective
thresholds (defined when creating a simulation).
Example: Let us assume that the maximum number of iterations is 100, and the UL and DL convergence
thresholds are set to 5 %. If and between the 4
th
and the 5
th
iteration, Atoll stops the algorithm
after the 5
th
iteration. The simulation has converged.
Divergence: After 30 iterations, and/or are still higher than their respective thresholds and from the 30
th
iteration, and/or do not decrease during the next 15 successive iterations.
A
DL
Int
Max
All TX
i
P
Err
TX
i
i c TS M
i
( ) , ( )
( ) 100
\ .
| |
=
A
UL
Int
Max
All TX
i
N
Tot UL
TX
i
i c TS M
i
( ) , ( )
k
N
Tot UL
TX
i
i c TS M
i
( ) , ( )
k 1

N
Tot UL
TX
i
i c TS M
i
( ) , ( )
k
----------------------------------------------------------------------------------------------
100
\ .
|
|
|
| |
=
P
Err
TX
i
i c TS M
i
( ) , ( )
P
Err
TX
i
i c TS M
i
( ) , ( ) Max
0 u
Step
360 < s
=
P
Rec
TX
i
i c TS M
i
( ) , ( )
u
Step
k ,
P
Rec
TX
i
i c TS M
i
( ) , ( )
u
Step
k 1 ,

P
Rec
TX
i
i c TS M
i
( ) , ( )
u
Step
k ,
------------------------------------------------------------------------------------------------------------------------
P
Err
TX
i
i c TS M
i
( ) , ( )
P
Rec
TX
i
i c TS M
i
( ) , ( )
k
P
Rec
TX
i
i c TS M
i
( ) , ( )
k 1

P
Rec
TX
i
i c TS M
i
( ) , ( )
k
---------------------------------------------------------------------------------------------
=
A
DL
A
UL
A
DL
5 s A
UL
5 s
A
DL
A
UL
A
DL
A
UL
Forsk 2010 AT283_TRG_E2 425
Chapter 8: TD-SCDMA Networks
Examples: Let us assume that the maximum number of iterations is 100, and the UL and DL convergence
thresholds are set to 5 %.
a. After the 30
th
iteration, and/or equal 100 and do not decrease during the next 15 successive
iterations. Atoll stops the algorithm at the 46
th
iteration. The simulation has not converged.
b. After the 30
th
iteration, and/or equal 80, they start decreasing slowly until the 40
th
iteration (without
going under the thresholds) and then, do not change during 15 successive iterations. Atoll stops the algorithm
at the 56
th
iteration without converging.
Last Iteration: If and/or are still much higher than their respective thresholds after the last iteration, the
simulation has not converged. If and are lower than their respective thresholds, the simulation has
reached convergence.
8.4 TD-SCDMA Prediction Studies
For each TBC transmitter, TX
i
, Atoll determines the value of the selected parameter on each studied pixel inside the TX
i
calculation area. Each pixel within the TX
i
calculation area is considered a probe receiver.
Coverage study parameters to be set are:
The study conditions to determine the service area of each TBC transmitter
The display settings to for colouring the covered pixels
Atoll uses the parameters entered in the Condition tab of the coverage study properties dialogue to determine pixels
covered by the each transmitter. Coverage prediction display resolution is independent of the path loss matrix and
geographic data resolutions, and can be different for each coverage prediction. Coverage predictions are calculated using
bilinear interpolation of multi-resolution path loss matrices (similar to the evaluation of site altitudes).
8.4.1 P-CCPCH Reception Analysis (Eb/Nt) or (C/I)
These coverage predictions calculate and display the Eb/Nt or C/I on the P-CCPCH, or . The
coverage predictions are calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for TS0. The
best servers for the coverage predictions are determined according to the P-CCPCH RSCP from the carrier with the
highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
coverage predictions are calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there
will not be any pixels covered by this transmitter. If you perform these coverage predictions for all the carriers, Atoll
calculates the Eb/Nt or C/I considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area where and
or are covered and coloured according to the selected display
option.
Where and
The downlink total noise is calculated as follows:
Where
With and
A
DL
A
DL
A
DL
A
UL
A
DL
A
UL
A
DL
A
UL
E
b
N
t
------
\ .
| |
P CCPCH
C
I
----
\ .
| |
P CCPCH
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
E
b
N
t
------
\ .
| |
P CCPCH
TX
i
i c ( )
Q
P CCPCH
Req
>
C
I
----
\ .
| |
P CCPCH
TX
i
i c ( )
Q
P CCPCH
Req
>
E
b
N
t
------
\ .
| |
P CCPCH
TX
i
i c ( )

TX
i
RSCP
P CCPCH
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------------ G
P CCPCH
Proc
=
C
I
----
\ .
| |
P CCPCH
TX
i
i c ( )

TX
i
RSCP
P CCPCH
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------------ =
RSCP
P CCPCH
TX
i
i c ( ) P
P CCPCH
TX
i
i c ( )
L
T
----------------------------- =
N
Tot DL
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
I
IC DL
i c j c , ( ) N
0
Term
+ + + =
I
Intra DL
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
|
TX
i
RSCP
OCCH TS0
TX
i
i c ( )

TX
i
+ =

TX
i

TX
i
1 F
DL
Ortho
( ) 1 F
JD
Term
( ) = |
0 Without Useful Signal
1 Total Noise

=
I
Extra DL
TX
i
i c ( )
RSCP
P CCPCH
TX
j
i c ( )
RSCP
OCCH TS0
TX
j
i c ( )
+ ( )
j i =

=
426 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced by
the interference reduction factor defined for the pair (ic, jc).
and are defined in "Definitions and Formulas" on page 395.
Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
Eb/Nt or C/I (dB)
Atoll calculates the Eb/Nt or C/I on each pixel of the best server coverage area. The pixel colour depends
on the Eb/Nt or C/I level. Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as thresholds defined in the Display tab (Prediction properties). For each
layer, a pixel is covered if or . Each layer is assigned a
colour and displayed with intersections between layers.
Eb/Nt Margin or C/I Margin (dB)
Atoll calculates the Eb/Nt or C/I margin on each pixel of the best server coverage area. The pixel colour
depends on the Eb/Nt or C/I margin value. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections
between layers.
Cell Edge Coverage Probability (%)
Atoll calculates the cell edge coverage probability on each pixel of the best server coverage area. The
pixel colour depends on the cell edge coverage probability value. Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display
tab (Prediction properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections between
layers.
8.4.2 DwPCH Reception Analysis (C/I)
This coverage prediction calculates and displays the C/I on the DwPCH, . The coverage prediction is calculated
for a given set of a terminal type, a mobility type, a service, a carrier, and for DwPTS. The best server for the coverage
prediction is determined according to the P-CCPCH RSCP from the carrier with the highest P-CCPCH power, or from the
master carrier in case of N-frequency mode compatible transmitters. Afterwards, the coverage prediction is calculated for
the selected carrier. If the selected carrier does not exist on a transmitter, there will not be any pixels covered by this
transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates the C/I considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
I
IC DL
i c j c , ( )
RSCP
P CCPCH
TX
j
j c ( )
RSCP
OCCH TS0
TX
j
j c ( )
+ ( )
TX
j

F
IRF
i c j c , ( )
------------------------------------------------------------------------------------------------------------ =
I
IC DL
i c j c , ( )
F
IRF
i c j c , ( )
RSCP
OCCH TS0
TX
i
i c ( ) P
OCCH TS0
TX
i
i c ( )
L
T
------------------------------- =
L
T
L
Path
L
TX
i
L
Term
L
Body
L
Indoor
M
Shadowi ng
Eb Nt

G
TX
i
G
Term

-------------------------------------------------------------------------------------------------------------------------------------- =

TX
i
N
0
Term
TX
i
i c ( )
E
b
N
t
------
\ .
| |
P CCPCH
TX
i
i c ( )
Threshol d >
C
I
----
\ .
| |
P CCPCH
TX
i
i c ( )
Threshol d >
TX
i
i c ( )
E
b
N
t
------
\ .
| |
P CCPCH
TX
i
i c ( )
Q
P CCPCH
Req
M
P CCPCH
Eb Nt
>
C
I
----
\ .
| |
P CCPCH
TX
i
i c ( )
Q
P CCPCH
Req
M
P CCPCH
C I
>
TX
i
i c ( )
E
b
N
t
------
\ .
| |
P CCPCH
TX
i
i c ( )
CECP
Q
P CCPCH
Req
>
C
I
----
\ .
| |
P CCPCH
TX
i
i c ( )
CECP
Q
P CCPCH
Req
>
C
I
----
\ .
| |
DwPCH
Forsk 2010 AT283_TRG_E2 427
Chapter 8: TD-SCDMA Networks
The pixels in the coverage area where and
are covered and coloured according to the selected display option.
Where
The downlink total noise is calculated as follows:
Where
With and
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced by
the interference reduction factor defined for the pair (ic, jc).
and are defined in "Definitions and Formulas" on page 395.
Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
C/I (dB)
Atoll calculates the C/I on each pixel of the best server coverage area. The pixel colour depends on the
C/I level. Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as thresholds defined in the Display tab (Prediction properties). For each layer, a pixel
is covered if . Each layer is assigned a colour and displayed with intersections between
layers.
C/I Margin (dB)
Atoll calculates the C/I margin on each pixel of the best server coverage area. The pixel colour depends
on the C/I margin value. Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as thresholds defined in the Display tab (Prediction properties). For each
layer, a pixel is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
Cell Edge Coverage Probability (%)
Atoll calculates the cell edge coverage probability on each pixel of the best server coverage area. The
pixel colour depends on the cell edge coverage probability value. Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display
tab (Prediction properties). For each layer, a pixel is covered if . Each layer is
assigned a colour and displayed with intersections between layers.
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
C
I
----
\ .
| |
DwPCH
TX
i
i c ( )
Q
DwPCH
Req
>
C
I
----
\ .
| |
DwPCH
TX
i
i c ( )

TX
i
RSCP
DwPCH
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
---------------------------------------------------- =
RSCP
DwPCH
TX
i
i c ( ) P
DwPCH
TX
i
i c ( )
L
T
--------------------- =
N
Tot DL
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
I
IC DL
i c j c , ( ) N
0
Term
+ + + =
I
Intra DL
TX
i
i c ( )
RSCP
DwPCH
TX
i
i c ( )
|
TX
i
=

TX
i

TX
i
1 F
DL
Ortho
( ) 1 F
JD
Term
( ) = |
0 Without Useful Signal
1 Total Noise

=
I
Extra DL
TX
i
i c ( )
RSCP
DwPCH
TX
j
i c ( )
( )
j i =

=
I
IC DL
i c j c , ( )
RSCP
DwPCH
TX
j
j c ( )
( )
TX
j

F
IRF
i c j c , ( )
------------------------------------------------ =
I
IC DL
i c j c , ( )
F
IRF
i c j c , ( )
L
T
L
Path
L
TX
i
L
Term
L
Body
L
Indoor
M
Shadowi ng
Eb Nt

G
TX
i
G
Term

-------------------------------------------------------------------------------------------------------------------------------------- =

TX
i
N
0
Term
TX
i
i c ( )
C
I
----
\ .
| |
DwPCH
TX
i
i c ( )
Threshol d >
TX
i
i c ( )
C
I
----
\ .
| |
DwPCH
TX
i
i c ( )
Q
DwPCH
Req
M
DwPCH
C I
>
TX
i
i c ( )
C
I
----
\ .
| |
DwPCH
TX
i
i c ( )
CECP
Q
DwPCH
Req
>
428 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.4.3 Downlink TCH RSCP Coverage
This coverage prediction calculates and displays the RSCP for the downlink traffic channel, . The coverage
prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for a downlink timeslot.
The best server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the
highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
coverage prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will
not be any pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates
the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area where and
are covered and coloured according to the selected display option.
Where is given by:
and is the maximum downlink traffic
power defined for the selected service.
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the downlink. Otherwise, and are read from the main
antenna model.
Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
DL TCH RSCP (dBm)
Atoll calculates the DL TCH RSCP on each pixel of the best server coverage area. The pixel colour
depends on the RSCP level. Coverage consists of several independent layers whose visibility in the workspace
can be managed. There are as many layers as thresholds defined in the Display tab (Prediction properties). For
each layer, a pixel is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
RSCP Margin (dB)
Atoll calculates the RSCP margin on each pixel of the best server coverage area. The pixel colour
depends on the RSCP margin value. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if .
Each layer is assigned a colour and displayed with intersections between layers.
Cell Edge Coverage Probability (%)
Atoll calculates the cell edge coverage probability on each pixel of the best server coverage area. The
pixel colour depends on the cell edge coverage probability value. Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display
tab (Prediction properties). For each layer, a pixel is covered if
. Each layer is assigned a colour and displayed with
intersections between layers.
8.4.4 Uplink TCH RSCP Coverage
This coverage prediction calculates and displays the RSCP for the uplink traffic channel, . The coverage
prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for an uplink timeslot.
The best server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the
highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
RSCP
TCH DL
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
TCH DL
TX
i
i c ( )
RSCP
TCH DL
Req
Servi ce Mobi l i ty , ( ) >
RSCP
TCH DL
TX
i
i c ( )
RSCP
TCH DL
TX
i
i c ( ) P
TCH DL
Max
Servi ce ( )
L
T
Model
---------------------------------------------------- =
L
T
Model
L
Path
L
TX
i
L
Term
L
Body
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
Term

-------------------------------------------------------------------------------------------------------------------------------------- = P
TCH DL
Max
Servi ce ( )
L
T
Model
G
TX
i
G
DL
SA
= L
TX
i
L
DL
SA
=
P
TCH DL
Max
Servi ce ( ) G
TX
i
L
TX
i
TX
i
i c ( )
RSCP
TCH DL
TX
i
i c ( )
Threshol d >
TX
i
i c ( )
RSCP
TCH DL
TX
i
i c ( )
RSCP
TCH DL
Req
Servi ce Mobi l i ty , ( ) M
TCH DL
RSCP
>
TX
i
i c ( )
RSCP
TCH DL
TX
i
i c ( )
CECP
RSCP
TCH DL
Req
Servi ce Mobi l i ty , ( ) >
RSCP
TCH UL
Forsk 2010 AT283_TRG_E2 429
Chapter 8: TD-SCDMA Networks
coverage prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will
not be any pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates
the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area where and
are covered and coloured according to the selected display option.
Where is given by:
and is the maximum uplink traffic power defined for
the selected terminal.
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the uplink. Otherwise, and are read from the main antenna model.
Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
UL TCH RSCP (dBm)
Atoll calculates the UL TCH RSCP on each pixel of the best server coverage area. The pixel colour
depends on the RSCP level. Coverage consists of several independent layers whose visibility in the workspace
can be managed. There are as many layers as thresholds defined in the Display tab (Prediction properties). For
each layer, a pixel is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
RSCP Margin (dB)
Atoll calculates the RSCP margin on each pixel of the best server coverage area. The pixel colour
depends on the RSCP margin value. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if .
Each layer is assigned a colour and displayed with intersections between layers.
Cell Edge Coverage Probability (%)
Atoll calculates the cell edge coverage probability on each pixel of the best server coverage area. The
pixel colour depends on the cell edge coverage probability value. Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display
tab (Prediction properties). For each layer, a pixel is covered if
. Each layer is assigned a colour and displayed with
intersections between layers.
8.4.5 Downlink Total Noise
This coverage prediction calculates and displays the total noise on the downlink, . The coverage prediction is
calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for a downlink timeslot. The best server
for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the highest P-CCPCH
power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the coverage
prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will not be any
pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates the downlink
noise for all the carriers but keeps the worst case value, i.e., the most interfered carrier. You can choose to display the
minimum, the maximum, or the average total noise values from among the values calculated for all the carriers. Pixels are
covered and coloured according to the total downlink noise thresholds defined in the display options.
Total downlink noise is given by:
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
TCH UL
TX
i
i c ( )
RSCP
TCH UL
Req
Servi ce Mobi l i ty , ( ) >
RSCP
TCH UL
TX
i
i c ( )
RSCP
TCH UL
TX
i
i c ( ) P
Max
Term
L
T
Model
----------------- =
L
T
Model
L
Path
L
TX
i
L
Term
L
Body
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
Term

-------------------------------------------------------------------------------------------------------------------------------------- = P
Max
Term
L
T
Model
G
TX
i
G
UL
SA
= L
TX
i
L
UL
SA
=
P
Max
Term
G
TX
i
L
TX
i
TX
i
i c ( )
RSCP
TCH UL
TX
i
i c ( )
Threshol d >
TX
i
i c ( )
RSCP
TCH UL
TX
i
i c ( )
RSCP
TCH UL
Req
Servi ce Mobi l i ty , ( ) M
TCH UL
RSCP
>
TX
i
i c ( )
RSCP
TCH UL
TX
i
i c ( )
CECP
RSCP
TCH UL
Req
Servi ce Mobi l i ty , ( ) >
N
Tot DL
N
Tot DL
RSCP
TCH DL
RSCP
OCCH
+ ( )
All TX, c, and TS

N
0
Term
+ =
430 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
With and
and and are respectively the
downlink traffic power and the other common control channel power for the selected timeslot.
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the downlink. Otherwise, and are read from the main
antenna model.
8.4.6 Downlink Service Area (Eb/Nt) or (C/I)
These coverage predictions calculate and display the Eb/Nt or C/I on the downlink traffic channel, or
. The coverage predictions are calculated for a given set of a terminal type, a mobility type, a service, a carrier,
and for a downlink timeslot. The best servers for the coverage predictions are determined according to the P-CCPCH
RSCP from the carrier with the highest P-CCPCH power, or from the master carrier in case of N-frequency mode
compatible transmitters. Afterwards, the coverage predictions are calculated for the selected carrier. If the selected carrier
does not exist on a transmitter, there will not be any pixels covered by this transmitter. If you perform these coverage
predictions for all the carriers, Atoll calculates the Eb/Nt or C/I considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area where ,
, and or are
covered and coloured according to the selected display option.
Where and
With
and is the maximum downlink
traffic power defined for the selected service.
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the downlink. Otherwise, and are read from the main
antenna model.
Where
With
RSCP
TCH DL
P
TCH DL
L
T
Model
------------------------ = RSCP
OCCH
P
OCCH
L
T
Model
------------------ =
L
T
Model
L
Path
L
TX
i
L
Term
L
Body
L
Indoor
M
Shadowi ng
Model

G
TX
i
G
Term

-------------------------------------------------------------------------------------------------------------------------------------- = P
TCH DL
P
TCH DL
L
T
Model
G
TX
i
G
DL
SA
= L
TX
i
L
DL
SA
=
P
TCH DL
Max
Servi ce ( ) G
TX
i
L
TX
i
E
b
N
t
------
\ .
| |
TCH DL
C
I
----
\ .
| |
TCH DL
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
TCH DL
TX
i
i c ( )
RSCP
TCH DL
Req
Servi ce Mobi l i ty , ( ) >
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
>
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
>
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )

TX
i
RSCP
TCH DL
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------- G
DL
Proc
G
DL
Di v
=
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )

TX
i
RSCP
TCH DL
TX
i
i c ( )

N
Tot DL
TX
i
i c ( )
------------------------------------------------------- G
DL
Di v
=
RSCP
TCH DL
TX
i
i c ( ) P
TCH DL
Max
Servi ce ( )
L
T
Eb Nt ( )
DL
---------------------------------------------------- =
L
T
Eb Nt ( )
DL
L
Path
L
TX
i
L
Term
L
Body
L
Indoor
M
Shadowi ng
Eb Nt ( )
DL

G
TX
i
G
Term

-------------------------------------------------------------------------------------------------------------------------------------- = P
TCH DL
Max
Servi ce ( )
L
T
Eb Nt ( )
DL
G
TX
i
G
DL
SA
= L
TX
i
L
DL
SA
=
P
TCH DL
Max
Servi ce ( ) G
TX
i
L
TX
i
N
Tot DL
TX
i
i c ( )
I
Intra DL
TX
i
i c ( )
I
Extra DL
TX
i
i c ( )
I
IC DL
i c j c , ( ) N
0
Term
+ + + =
I
Intra DL
TX
i
i c ( )

TX
i
1 F
DL
Ortho
( ) 1 F
JD
Term
( ) 1
TX
i
( ) +
)
`

RSCP
TCH DL
TX
i
i c ( )
RSCP
OCCH
TX
i
i c ( )
+ ( ) =
RSCP
OCCH
TX
i
i c ( ) P
OCCH
TX
i
i c ( )
L
T
Eb Nt ( )
DL
-------------------------- =
I
Extra DL
TX
i
i c ( )
RSCP
TCH DL
TX
j
i c ( )
RSCP
OCCH
TX
j
i c ( )
+ ( )
j i =

=
I
IC DL
i c j c , ( )
RSCP
TCH DL
TX
j
j c ( )
RSCP
OCCH
TX
j
j c ( )
+ ( )
TX
j

F
IRF
i c j c , ( )
------------------------------------------------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 431
Chapter 8: TD-SCDMA Networks
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced by
the interference reduction factor defined for the pair (ic, jc).
Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
Max Eb/Nt or Max C/I (dB)
Atoll calculates the Eb/Nt or C/I on each pixel of the best server coverage area. The pixel colour depends
on the Eb/Nt or C/I level. Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as thresholds defined in the Display tab (Prediction properties). For each
layer, a pixel is covered if or . Each layer is assigned a
colour and displayed with intersections between layers.
Effective Eb/Nt or Effective C/I (dB)
Atoll calculates the effective Eb/Nt or C/I on each pixel of the best server coverage area. The pixel colour
depends on the effective Eb/Nt or C/I level. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections
between layers.
Eb/Nt Margin or C/I Margin (dB)
Atoll calculates the Eb/Nt or C/I margin on each pixel of the best server coverage area. The pixel colour
depends on the Eb/Nt or C/I margin value. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections between
layers.
Required Power (dBm)
Atoll calculates the downlink required power on each pixel of the best server coverage area. The pixel
colour depends on the required power level. Coverage consists of several independent layers whose visibility in
the workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if , where
or . Each layer
is assigned a colour and displayed with intersections between layers.
Required Power Margin (dB)
Atoll calculates the downlink required power margin on each pixel of the best server coverage area. The
pixel colour depends on the required power margin value. Coverage consists of several independent layers whose
visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display tab
(Prediction properties). For each layer, a pixel is covered if , where
or . Each layer
is assigned a colour and displayed with intersections between layers.
Cell Edge Coverage Probability (%)
Atoll calculates the cell edge coverage probability on each pixel of the best server coverage area. The
pixel colour depends on the cell edge coverage probability value. Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display
I
IC DL
i c j c , ( )
F
IRF
i c j c , ( )
TX
i
i c ( )
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
Threshol d >
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
Threshol d >
TX
i
i c ( )
Mi n
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
,
\ .
|
| |
Threshol d >
Mi n
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
,
\ .
| |
Threshol d >
TX
i
i c ( )
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
M
TCH DL
Eb Nt
>
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
M
TCH DL
C I
>
TX
i
i c ( )
P
TCH DL
Req
Threshol d >
P
TCH DL
Req
Q
TCH DL
Req
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
--------------------------------- P
TCH DL
Max
Servi ce ( ) = P
TCH DL
Req
Q
TCH DL
Req
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
------------------------------ P
TCH DL
Max
Servi ce ( ) =
TX
i
i c ( )
P
TCH DL
Req
P
TCH DL
Max
Servi ce ( ) M i n arg >
P
TCH DL
Req
Q
TCH DL
Req
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
--------------------------------- P
TCH DL
Max
Servi ce ( ) = P
TCH DL
Req
Q
TCH DL
Req
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
------------------------------ P
TCH DL
Max
Servi ce ( ) =
TX
i
i c ( )
432 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
tab (Prediction properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections between layers.
8.4.7 Uplink Service Area (Eb/Nt) or (C/I)
These coverage predictions calculate and display the Eb/Nt or C/I on the uplink traffic channel, or
. The coverage predictions are calculated for a given set of a terminal type, a mobility type, a service, a carrier,
and for an uplink timeslot. The best servers for the coverage predictions are determined according to the P-CCPCH RSCP
from the carrier with the highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible
transmitters. Afterwards, the coverage predictions are calculated for the selected carrier. If the selected carrier does not
exist on a transmitter, there will not be any pixels covered by this transmitter. If you perform these coverage predictions
for all the carriers, Atoll calculates the Eb/Nt or C/I considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area where ,
, and or are
covered and coloured according to the selected display option.
Where and
With and or
and is the maximum power defined for the
selected terminal.
In , and are calculated according to the smart antenna modelling method used, for
, if a smart antenna is available in the uplink. Otherwise, and are read from the main antenna model.
Coverage Display
It is possible to colour the transmitter service areas using a unique colour per transmitter, or colour the pixels in the
coverage areas by any transmitter attribute or other criteria such as:
Max Eb/Nt or Max C/I (dB)
Atoll calculates the Eb/Nt or C/I on each pixel of the best server coverage area. The pixel colour depends
on the Eb/Nt or C/I level. Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as thresholds defined in the Display tab (Prediction properties). For each
layer, a pixel is covered if or . Each layer is assigned a
colour and displayed with intersections between layers.
Effective Eb/Nt or Effective C/I (dB)
Atoll calculates the effective Eb/Nt or C/I on each pixel of the best server coverage area. The pixel colour
depends on the effective Eb/Nt or C/I level. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections
between layers.
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
CECP
Q
TCH DL
Req
>
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
CECP
Q
TCH DL
Req
>
E
b
N
t
------
\ .
| |
TCH UL
C
I
----
\ .
| |
TCH UL
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
TCH UL
TX
i
i c ( )
RSCP
TCH UL
Req
Servi ce Mobi l i ty , ( ) >
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
>
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
>
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )

Term
RSCP
TCH UL
TX
i
i c ( )

N
Tot UL
TX
i
i c ( )
------------------------------------------------------------ G
UL
Proc
G
UL
Di v
=
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )

Term
RSCP
TCH UL
TX
i
i c ( )

N
Tot UL
TX
i
i c ( )
------------------------------------------------------------ G
UL
Di v
=
RSCP
TCH UL
TX
i
i c ( ) P
Max
Term
L
T
Eb Nt ( )
UL
-------------------------- = P
Req
Term
P
Max
Term
Q
TCH UL
Req
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
--------------------------------- = P
Req
Term
P
Max
Term
Q
TCH UL
Req
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
------------------------------ =
L
T
Eb Nt ( )
UL
L
Path
L
TX
i
L
Term
L
Body
L
Indoor
M
Shadowi ng
Eb Nt ( )
UL

G
TX
i
G
Term

-------------------------------------------------------------------------------------------------------------------------------------- = P
Max
Term
L
T
Eb Nt ( )
UL
G
TX
i
G
UL
SA
= L
TX
i
L
UL
SA
=
P
Max
Term
G
TX
i
L
TX
i
TX
i
i c ( )
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
Threshol d >
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
Threshol d >
TX
i
i c ( )
Mi n
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
,
\ .
|
| |
Threshol d >
Mi n
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
,
\ .
| |
Threshol d >
Forsk 2010 AT283_TRG_E2 433
Chapter 8: TD-SCDMA Networks
Eb/Nt Margin or C/I Margin (dB)
Atoll calculates the Eb/Nt or C/I margin on each pixel of the best server coverage area. The pixel colour
depends on the Eb/Nt or C/I margin value. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections between
layers.
Required Power (dBm)
Atoll calculates the uplink required power on each pixel of the best server coverage area. The pixel colour
depends on the required power level. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). For each layer, a pixel is covered if , where or
. Each layer is assigned a colour and displayed with intersections between layers.
Required Power Margin (dB)
Atoll calculates the uplink required power margin on each pixel of the best server coverage area. The
pixel colour depends on the required power margin value. Coverage consists of several independent layers whose
visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display tab
(Prediction properties). For each layer, a pixel is covered if , where
or . Each layer is assigned a colour and displayed
with intersections between layers.
Cell Edge Coverage Probability (%)
Atoll calculates the cell edge coverage probability on each pixel of the best server coverage area. The
pixel colour depends on the cell edge coverage probability value. Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as thresholds defined in the Display
tab (Prediction properties). For each layer, a pixel is covered if or
. Each layer is assigned a colour and displayed with intersections between layers.
8.4.8 Effective Service Area (Eb/Nt) or (C/I)
These coverage predictions consist of pixels covered by the both the uplink and the downlink service areas. These
coverage predictions calculate the Eb/Nt or C/I on the downlink and uplink traffic channels, or
and or , and display the pixels where both downlink and uplink Eb/Nt or C/I are above the
required quality thresholds.
The coverage predictions are calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for all
the 6 timeslots. The best servers for the coverage predictions are determined according to the P-CCPCH RSCP from the
carrier with the highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters.
Afterwards, the coverage predictions are calculated for the selected carrier. If the selected carrier does not exist on a
transmitter, there will not be any pixels covered by this transmitter. If you perform these coverage predictions for all the
carriers, Atoll calculates the Eb/Nt or C/I considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
TX
i
i c ( )
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
M
TCH UL
Eb Nt
>
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
M
TCH UL
C I
>
TX
i
i c ( )
P
Req
Term
Threshol d > P
Req
Term
Q
TCH UL
Req
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
--------------------------------- P
Max
Term
=
P
Req
Term
Q
TCH UL
Req
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
------------------------------ P
Max
Term
=
TX
i
i c ( )
P
Req
Term
P
Max
Term
M i n arg >
P
Req
Term
Q
TCH UL
Req
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
--------------------------------- P
Max
Term
= P
Req
Term
Q
TCH UL
Req
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
------------------------------ P
Max
Term
=
TX
i
i c ( )
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
CECP
Q
TCH UL
Req
>
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
CECP
Q
TCH UL
Req
>
E
b
N
t
------
\ .
| |
TCH DL
C
I
----
\ .
| |
TCH DL
E
b
N
t
------
\ .
| |
TCH UL
C
I
----
\ .
| |
TCH UL
434 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The pixels in the coverage area are covered and coloured according to the selected display option if all the
following conditions are satisfied:

or for any of the 6 timeslots


or for any of the 6 timeslots
8.4.9 Cell to Cell Interference
This coverage prediction calculates and displays the interference received by cells receiving in uplink from other cells
which are transmitting in downlink. The timeslot configuration of each cell defines the direction of the link at any given
instance. During each subframe, the direction of the link changes twice (downlink to uplink, and then uplink to downlink).
These transitions are referred to as switching points.
The coverage prediction is calculated for a given set of a terminal type, a mobility type, a service, a carrier, and a timeslot.
The best server for the coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the
highest P-CCPCH power, or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the
coverage prediction is calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will
not be any pixels covered by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates
the RSCP considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The mobility, service, and terminal are used to calculate the best server coverage of the interfered cell.
Assuming that a transmitter is interfering a studied transmitter on a timeslot, on the same carrier ic or on another
carrier jc, the cell to cell interference is given by:
Where and using a smart antenna, and
and otherwise.
and otherwise.
is the path loss calculated using the ITU526-5 propagation model without antenna loss.
is the angle for the smart antenna pattern.
is the main antenna attenuation.
is the main antenna gain.
Atoll calculates the cell to cell interference on each pixel of the best server coverage area. The pixel colour
depends on the cell to cell interference level. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction properties).
For each layer, a pixel is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
RSCP
TCH DL
TX
i
i c ( )
RSCP
TCH DL
Req
Servi ce Mobi l i ty , ( ) >
RSCP
TCH UL
TX
i
i c ( )
RSCP
TCH UL
Req
Servi ce Mobi l i ty , ( ) >
E
b
N
t
------
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
>
C
I
----
\ .
| |
TCH DL
TX
i
i c ( )
Q
TCH DL
Req
>
E
b
N
t
------
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
>
C
I
----
\ .
| |
TCH UL
TX
i
i c ( )
Q
TCH UL
Req
>
TX
j
TX
i
I
C2C
TX
i
TX
j
, ( ) RSCP
TCH DL
TX
j
i c ( )
RSCP
OCCH
TX
j
i c ( )
+ ( )
TX
j

RSCP
TCH DL
TX
j
j c ( )
RSCP
OCCH
TX
j
j c ( )
+ ( )
TX
j

F
IRF
i c j c , ( )
------------------------------------------------------------------------------------------- + =
RSCP
TCH DL
TX
j
i c ( ) P
TCH DL
TX
j
i c ( )
u ( )
L
T
--------------------------------- = RSCP
TCH DL
TX
j
j c ( ) P
TCH DL
TX
j
j c ( )
u ( )
L
T
--------------------------------- =
RSCP
TCH DL
TX
j
i c ( ) P
TCH DL
TX
j
i c ( )
L
T
------------------------
G
Ant
TX
j
L
Ant
TX
j
------------ = RSCP
TCH DL
TX
j
j c ( ) P
TCH DL
TX
j
j c ( )
L
T
------------------------
G
Ant
TX
j
L
Ant
TX
j
------------ =
RSCP
OCCH
TX
j
i c ( ) P
OCCH
TX
j
i c ( )
L
T
------------------
G
Ant
TX
j
L
Ant
TX
j
------------ = RSCP
OCCH
TX
j
j c ( ) P
OCCH
TX
j
j c ( )
L
T
------------------
G
Ant
TX
j
L
Ant
TX
j
------------ =
L
T
L
Path
ITU526 5
L
TX
TX
j
L
RX
TX
i
=
L
Path
ITU526 5
u
L
Ant
TX
j
G
Ant
TX
j
TX
i
i c ( )
I
C2C
TX
i
TX
j
, ( ) Threshol d >
Forsk 2010 AT283_TRG_E2 435
Chapter 8: TD-SCDMA Networks
8.4.10 UpPCH Interference
UpPCH is usually carried by the UpPTS timeslot. However, if the interference on UpPTS is high, from unsynchronised
DwPTS or TS0 timeslots of other cells, it is possible to shift the UpPCH to TS1. This is called UpPCH shifting. If some cells
in a network use UpPCH shifting, you can use this coverage prediction to study the interference on the shifted UpPCH of
these cells from other cells. The interference from other cells is in this case generated by the traffic on the TS1 of interfering
cells.
This coverage prediction calculates and displays the uplink interference on the TS1, . The coverage prediction is
calculated for a given set of a terminal type, a mobility type, a service, a carrier, and for TS1. The best server for the
coverage prediction is determined according to the P-CCPCH RSCP from the carrier with the highest P-CCPCH power,
or from the master carrier in case of N-frequency mode compatible transmitters. Afterwards, the coverage prediction is
calculated for the selected carrier. If the selected carrier does not exist on a transmitter, there will not be any pixels covered
by this transmitter. If you perform this coverage prediction for all the carriers, Atoll calculates the interference for all the
carriers but keeps the worst case value, i.e., the most interfered carrier. You can choose to display the minimum, the
maximum, or the average total noise. The coverage prediction is calculated using the main antenna.
Pixels in the coverage area where and are
covered and coloured according to the selected display option.
The uplink interference on TS1 is calculated from the uplink load calculated in the simulations or manually defiend for the
TS1.
The uplink interference on TS1 is given by:
8.4.11 HSDPA Coverage
This coverage prediction calculates and displays the RLC peak rate or the MAC rate per pixel covered by HSDPA cells.
The coverage prediction is calculated for a given set of an HSDPA terminal type, a mobility type, an HSDPA service, a
carrier, and for all downlink timeslots. The best server for the coverage prediction is determined according to the P-CCPCH
RSCP from the carrier with the highest P-CCPCH power, or from the master carrier in case of N-frequency mode
compatible transmitters. Afterwards, the coverage predictions are calculated for the selected carrier. If the selected carrier
does not exist on a transmitter or if it does not support HSDPA, there will not be any pixels covered by this transmitter. If
you perform these coverage predictions for all the carriers, Atoll calculates the RLC or MAC rate considering:
the preferred carrier of the selected service, or
the carrier with the highest P-CCPCH power, if no preferred carrier is defined for the service, or
the master carrier in case of N-frequency mode compatible transmitters.
The pixels in the coverage area are covered and coloured if:
,
, and
is enough to select a bearer for the pixels.
For more information on HSDPA bearer selection, see "HSDPA Part of the Algorithm" on page 421.
Coverage Display
It is possible to colour the pixels in the coverage areas by criteria such as:
Min HS-PDSCH RSCP: On each pixel, Atoll calculates for all timeslots and selects the lowest
value.
Average HS-PDSCH RSCP: On each pixel, Atoll calculates for all timeslots and calculates the
average of these values.
Max HS-PDSCH RSCP: On each pixel, Atoll calculates for all timeslots and selects the highest
value.
Min HS-PDSCH Ec/Nt: On each pixel, Atoll calculates for all timeslots and selects the lowest
value.
Average HS-PDSCH Ec/Nt: On each pixel, Atoll calculates for all timeslots and calculates the
average of these values.
I
TS1 UL
TX
i
i c ( ) RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) > I
TS1 UL
TX
i
i c ( )
Threshol d >
I
TS1 UL
TX
i
i c ( )
N
0
TX
i
X
TS1 UL
TX
i
i c ( )
1 X
TS1 UL
TX
i
i c ( )
( )
------------------------------------- =
TX
i
i c ( )
RSCP
P CCPCH
TX
i
i c ( )
TAdd
P CCPCH
Mobi l i ty ( ) >
E
C
N
t
-------
\ .
| |
HS PDSCH
TX
i
i c ( )
Q
HS PDSCH
Req
>
E
C
N
t
-------
\ .
| |
HS PDSCH
TX
i
i c ( )
RSCP
HS SCCH
TX
i
i c ( )
RSCP
HS SCCH
TX
i
i c ( )
RSCP
HS SCCH
TX
i
i c ( )
E
C
N
t
-------
\ .
| |
HS PDSCH
TX
i
i c ( )
E
C
N
t
-------
\ .
| |
HS PDSCH
TX
i
i c ( )
436 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Max HS-PDSCH Ec/Nt: On each pixel, Atoll calculates for all timeslots and selects the highest
value.
RLC Peak Rate: After selecting the bearer, Atoll reads the corresponding RLC peak rate. This is the highest rate
that the bearer can provide on each pixel. The pixel colour depends on the RLC peak rate. Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as
thresholds defined in the Display tab (Prediction properties). Each layer is assigned a colour and displayed with
intersections between layers.
MAC Rate: Atoll displays the MAC rate ( ) provided on each pixel. The MAC rate is calculated as follows:
Where, is the transport block size (in kbits) of the selected HSDPA bearer; it is defined for each HSDPA
bearer in the related table. The value 500 corresponds to the number of blocks per second (there are 4 blocks per
TTI and 2000 TTI in one second, i.e blocks per second).
The pixel colour depends on the MAC rate. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as thresholds defined in the Display tab (Prediction
properties). Each layer is assigned a colour and displayed with intersections between layers.
Max DL A-DPCH Eb/Nt: Atoll displays the A-DPCH Eb/Nt at the receiver ( ) for the best server
and the selected timeslot. No power control is performed as in simulations. Here, Atoll determines downlink traffic
channel quality at the receiver for a maximum traffic channel power allowed for the best server.
Max UL A-DPCH Eb/Nt: Atoll displays the A-DPCH Eb/Nt at the best server ( ) and the selected
timeslot. No power control is performed as in simulations. Here, Atoll determines uplink traffic channel quality for
the maximum terminal power allowed.
HS-SCCH Power: On each pixel, Atoll calculates for the selected timeslot.
HS-SCCH RSCP: On each pixel, Atoll calculates for the selected timeslot.
HS-SCCH Ec/Nt: On each pixel, Atoll calculates for the selected timeslot.
HS-SICH Power: On each pixel, Atoll calculates for the selected timeslot.
HS-SICH RSCP: On each pixel, Atoll calculates for the selected timeslot.
HS-SICH Ec/Nt: On each pixel, Atoll calculates for the selected timeslot.
HS-PDSCH RSCP: On each pixel, Atoll calculates for the selected timeslot.
HS-PDSCH Ec/Nt: On each pixel, Atoll calculates for the selected timeslot.
8.5 Smart Antenna Modelling
Atoll calculates the smart antenna gains and losses in the direction of a user during the simulations, and in the direction
of each pixel in coverage predictions. During simulations, Atoll determines the gains and losses using the smart antenna
models. In coverage predictions, Atoll determines the gains and losses from the angular distributions calculated during
the simulations for each timeslot and stored in the Cell Parameters per Timeslot table.
If a smart antenna model is only downlink or only uplink, the other direction uses the main antenna gain and losses for
calculations. Therefore,
If a smart antenna is available on the downlink and uplink:
, and ,
If a smart antenna is available on the downlink only:
, and ,
If a smart antenna is available on the uplink only:
, and ,
If no smart antenna equipment is defined:
E
C
N
t
-------
\ .
| |
HS PDSCH
TX
i
i c ( )
R
DL
MAC
R
DL
MAC
S
Bl ock
500 =
S
Bl ock
2000
4
-------------
E
b
N
t
------
\ .
| |
TCH DL Max
TX
i
i c TS , ( )
E
b
N
t
------
\ .
| |
TCH UL Max
TX
i
i c TS , ( )
P
HS SCCH
TX
i
i c ( )
RSCP
HS SCCH
TX
i
i c ( )
E
c
N
t
------
\ .
| |
HS SCCH
TX
i
i c ( )
P
HS SICH
M
i
RSCP
HS SICH
M
i
E
c
N
t
------
\ .
| |
HS SICH
M
i
RSCP
HS PDSCH
TX
i
i c ( )
E
c
N
t
------
\ .
| |
HS PDSCH
TX
i
i c ( )
G
UL
TX
G
UL
SA
= L
UL
TX
L
UL
SA
= G
DL
TX
G
DL
SA
= L
DL
TX
L
DL
SA
=
G
DL
TX
G
DL
SA
= L
DL
TX
L
DL
SA
= G
UL
TX
G
Ant
TX
= L
UL
TX
L
TX
L
Total UL
= =
G
UL
TX
G
UL
SA
= L
UL
TX
L
UL
SA
= G
DL
TX
G
Ant
TX
= L
DL
TX
L
TX
L
Total DL
= =
Forsk 2010 AT283_TRG_E2 437
Chapter 8: TD-SCDMA Networks
, , and
8.5.1 Modelling in Simulations
8.5.1.1 Grid of Beams Modelling
A grid-of-beams smart antenna, called GOB, consists of more than one directional antenna pattern (beam) in different
directions. Each beam of a GOB has a different azimuth so that the GOB as a whole covers an entire sector. During the
simulations, Atoll determines the most suitable beam from the GOB for each user served by the smart antenna. The most
suitable beam (best beam) is the one which provides the highest gain towards the served user:
Where , , and are the gains, horizontal, and vertical attenuations of the beams of the GOB. In words,
the best beam is the one among all the beams of a GOB that has the highest difference between gain, and horizontal and
vertical attenuations. The gains and losses of the GOB ( , , , and ) are determined from the selected
best beam.
The following example shows how Atoll calculates the GOB gains and losses.
Example:
Let us assume a GOB with 5 beams that have the same vertical patterns, and whose horizontal patterns are pointed
towards different directions as shown in the figure below:
Let us assume that all the beams and the main antenna have the same 18 dBi gain, and the vertical attenuation at the
user location is 15 dB, which is also the same for all the beams because we assume that the vertical patterns are the same.
If the user is located at azimuth, as shown in the figure below, Atoll determines the best beam, which has the
highest gain towards , as follows:
G
DL
TX
G
UL
TX
G
Ant
TX
= = L
UL
TX
L
TX
L
Total UL
= = L
DL
TX
L
TX
L
Total DL
= =
Figure 8.3Grid Of Beams Modelling
Beam Gain (dBi)
Horizontal
Attenuation
(dB)
Vertical
Attenuation
(dB)
Total Gain
(dB)
0 18 60 15 18 - 60 - 15 -57
30 18 60 15 18 - 60 - 15 -57
60 18 2.21 15 18 - 2.21- 15 0.79
-30 18 60 15 18 - 60 - 15 -57
-60 18 60 15 18 - 60 - 15 -57
Beam
Best
Beam
Max G
Beam
L
Beam
H
L
Beam
V
( )
=
G
Beam
L
Beam
H
L
Beam
V
G
DL
SA
G
UL
SA
L
DL
SA
L
UL
SA
o 70 =
o
G
Beam
L
Beam
H
L
Beam
V

438 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
In our example, the total gain of the beam at 60is the highest. Therefore this beam is selected as the best beam.
If this beam has been selected in the downlink,
and
If this beam has been selected in the uplink,
and
8.5.1.2 Adaptive Beam Modelling
An adaptive beam smart antenna is capable of steering a given antenna pattern towards the direction of the served signal.
In Atoll, this is modelled using a single antenna pattern, called a beam because of its highly directional shape. During the
simulations, this adaptive beam is oriented in the direction of each served user in order to model the effect of the smart
antenna.
The adaptive beam gains ( and ) are the antenna gains defined for the beam, and the adaptive beam losses
( and ) are the horizontal and vertical pattern attenuations towards the user direction.
The following example shows how Atoll calculates the adaptive beam gains and losses.
Example:
Let us assume an adaptive beam smart antenna selected for a transmitter along with a main antenna. Let us assume that
the adaptive beam and the main antenna have the same 18 dBi gain, and the vertical attenuation at the user location is
15 dB.
If the user is located at azimuth, as shown in the figure below:
If the adaptive beam smart antenna is selected in the downlink, the gain and losses of the adaptive beam at are:
and
If the adaptive beam smart antenna is selected in the uplink, the gain and losses of the adaptive beam at are:
and
In fact, as the ideal beam steering algorithm steers the beam towards the served user, . These values are used
in interference calculation to determine the downlink interfering signal due to transmission towards the served user, as well
as for calculating the uplink interfering signals received at transmitter when decoding signal received from the served user.
Figure 8.4GOB Modelling - Determination of the Best Beam
Transmitter
Centre of the pixel where the served user is located
Angle between the user and the transmitter azimuth o
o
G
DL
SA
18 dB = L
DL
SA
L
Beam
H
L
Beam
V
+ 17.21 dB = =
G
UL
SA
18 dB = L
UL
SA
L
Beam
H
L
Beam
V
+ 17.21 dB = =
Figure 8.5Adaptive Beam Modelling - Determination of the Best Beam
G
DL
SA
G
UL
SA
L
DL
SA
L
UL
SA
L
Beam
H
L
Beam
V
+
o 60 =
Transmitter
Centre of the pixel where the served user is located
Angle between the user and the transmitter azimuth o
o
o
G
DL
SA
18 dB = L
DL
SA
L
Beam
H
L
Beam
V
+ 15 dB = =
o
G
UL
SA
18 dB = L
UL
SA
L
Beam
H
L
Beam
V
+ 15 dB = =
L
Beam
H
0 =
Forsk 2010 AT283_TRG_E2 439
Chapter 8: TD-SCDMA Networks
8.5.1.3 Statistical Modelling
A statistical modelling approach is also available in Atoll which can be used to model the effect of smart antennas through
C/I gains. You can create smart antenna equipment in Atoll based on the statistical approach by providing C/I gains and
their cumulative probabilities for different spreading angles, .
You can assign a spreading angle to each clutter class in your document. Atoll reads the clutter class in which the served
user is located to determine the spreading angle. Different clutter types have different spreading effects on the propagation
of radio waves. Urban and dense urban clutter types introduce more multipath and spread the signal at a wider angle than
an open or rural clutte type.
Once you have assigned the spreading angles to clutter classes, you can enter the C/I gains and their cumulative
probabilities for each spreading angle, in the smart antenna equipment based on the statistical model. For each smart
antenna equipment based on statistical modelling, you can set a probability threshold, .
To find the smart antenna gain, Atoll determines the clutter class of the served user, it reads the spreading angle from the
clutter class properties, it reads the probability threshold from the smart antenna properties, and reads the smart antenna
C/I gain defined for the corresponding to the spreading angle.
The following example shows how Atoll calculates the statistical C/I gains and losses.
Example:
Let us assume that the served user is located at a an urban clutter class with . The smart antenna
equipment has . Atoll will read the smart antenna C/I gain for . If a gain for the
exact probability value of 20% is not defined, Atoll linearly interpolates the gain value from the two surrounding values.
If and , then
The smart antenna gains are the same for uplink and downlink. Their are no losses for this type of smart antenna
equipment. Negative values of C/I gains are considered as losses.
8.5.1.4 Beamforming Smart Antenna Models
Adaptive antenna systems use more than one antenna elements, along with smart signal processing, to locate and track
various types of signals, to dynamically minimize interference, and maximize useful signal reception. The signal processor
dynamically applies weights to each element of the adaptive antenna system to create array patterns in real-time.
Beamforming smart antennas dynamically create antenna patterns with a main beam pointed in the direction of the user
being served, i.e., the useful signal. Adaptive algorithms can also be used in order to minimize the interference received
by the cells. These algorithms are based on optimization methods such as the minimum mean square error method.
The following beamforming smart antenna models are available in Atoll. These smart antenna models support linear
adaptive array systems, such as the one shown in Figure 8.6 on page 440.
Optimum Beamformer: The Optimum Beamformer smart antenna model performs dynamic beamforming in
downlink as explained in "Downlink Beamforming" on page 440, and beamforming and interference cancellation
in uplink using the minimum mean square error algorithm as explained in "Uplink Beamforming and Interference
Cancellation (MMSE)" on page 442. Smart antenna results are later on used in coverage prediction calculations.
Conventional Beamformer: The Conventional Beamformer smart antenna model performs dynamic
beamforming in downlink and uplink as explained in "Downlink Beamforming" on page 440 and "Uplink
Beamforming" on page 441, respectively. Smart antenna results are later on used in coverage prediction
calculations.
u
Spread
TProb
SA
Probabi l i ty 1 TProb
SA
=
u
Spread
10 =
TProb
SA
80 % = G
SA
Prob 20 % =
G
SA
Prob 19% =
4.6298 dB = G
SA
Prob 20.4% =
4.7196 dB = G
SA
Prob 20% =
4.6941 dB =
440 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
In the following explanations, we assume:
There are a total of elements in the adaptive antenna system.
is the angle of arrival for the useful signal.
is the angle at which we want to calculate the smart antenna gain.
d is the distance between two adjacent antenna elements.
8.5.1.4.1 Downlink Beamforming
Beamforming dynamically creates a beam towards the served user. The smart antenna processor applies complex
weights, , to each antenna element in order to form a beam towards the served user. The magnitude of these complex
weights is set to 1. The beamforming is performed using only the phase of the complex weights. The steering vector, ,
representing the complex weights for forming a beam towards the served user, i.e., at the angle of arrival is given by:
Where the notation T represents the transpose of a matrix.
Therefore, the complex weight at any n
th
antenna element can be given by:
In Atoll, , therefore, .
Figure 8.6Linear Adaptive Antenna Array
E
SA
u

Figure 8.7Downlink Beamforming


w
n
S
u
u
S
u
1 e
j
2t

------- d u sin
e
j
2t

------- 2d u sin
... e
j
2t

------- E
SA
1 ( )d u sin
, , , ,
T
=
w
n
e
j
2t

------- nd u sin
=
d

2
--- = w
n
e
j t n u sin
=
Forsk 2010 AT283_TRG_E2 441
Chapter 8: TD-SCDMA Networks
The smart antenna gain in any direction can be given by:
Where the notation H represents the Hilbert transform, which is the complex conjugate transpose of a matrix, is the
gain of the n
th
antenna element in the direction , and is the array correlation matrix for a given user direction , given
by:
For the direction of the served user, i.e., , the smart antenna gain is calculated as follows:
The smart antenna gain includes the gain of the beamforming as well as the gain of power combination.
The smart antenna gain in dB will be .
The smart antenna is able to form the beam only in the horizontal plane, therefore, the vertical pattern is assumed to
remain the same.
Power Combination Gain
Cell transmission power is fed to each antenna element of the smart antenna system. Since each element transmits the
same input power, this results in a gain due to power combination, i.e., the powers fed to each antenna element are
combined for transmission.
Additional Processing in Monte Carlo Simulations
During Monte Carlo simulations, as Atoll calculates the smart antenna gains for each victim mobile in a cells coverage
area, it averages the array correlation matrix over all the iterations in order to generate the angular distribution of the
downlink traffic power.
The average array correlation matrix is given by:
Where is the average downlink array correlation matrix, J is the number of served mobiles during the simulation,
is the probability of presence of the mobile j, is the EIRP transmitted towards the mobile j, and is the array correlation
matrix for the mobile j.
8.5.1.4.2 Uplink Beamforming
Let represent the vector of E
SA
complex weights for the beamformer. is given by:
Where is the steering vector in the direction of the served user, .

G
SA
( ) g
n
( ) S

H
R
u
S

=
g
n
( )
R
u
u
R
u
S
u
S
u
H
=
u
G
SA
u ( ) g
n
u ( ) S
u
H
R
u
S
u
g
n
u ( ) S
u
H
S
u
S
u
H
S
u
g
n
u ( ) E
SA
2
= = =
G
SA
( ) 10 Log G
SA
( ) ( ) =
R
u
R
Avg

j
p
j
R
j

j 1 =
J

=
R
Avg

j
p
j
R
j
Figure 8.8Uplink Beamforming
w w
w
S
u
E
SA
-------------- =
S
u
u
442 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The total noise received in the uplink, i.e., interference and thermal noise, is stored in a total noise correlation matrix, .
The total noise correlation matrix is the sum of the thermal noise correlation matrix , and the interference correlation
matrix , given by:
Where and
is the thermal noise power. I is the identity matrix. is the power received by one element of the smart antenna from
the j
th
interfering mobile. is the steering vector in the direction of the j
th
interfering mobile, . J is the total number of
interfering mobiles.
The total noise power, including thermal noise and interference from all uplink interferers, received by a cell is given by:
And, the total power received from the served user is given by:
Where is the power received by one element of the smart antenna from the served user.
The uplink signal quality is calculated by:
From the above equation, we can determine the uplink smart antenna beamforming gain in the direction of the served user,
which equals the number of smart antenna elements, i.e., .
Additional Processing in Monte Carlo Simulations
The noise correlation matrix for each iteration k includes the effect of the matrix calculated for the previous iteration.
The result is the angular distribution of the uplink load, which is calculated from the noise correlation matrix obtained at
the end of the last iteration of a Monte Carlo simulation. This angular distribution of the uplink load can be stored in the
Cell Parameters per Timeslot table. The average of the noise correlation matrices is calculated as follows:
Where is the average of the noise correlation matrices of all the iterations from k = 1 to K, and is the noise
correlation matrix of the k
th
iteration. The uplink load is calculated from the average noise correlation matrix.
8.5.1.4.3 Uplink Beamforming and Interference Cancellation (MMSE)
The optimum beamformer uses the Minimum Mean Square Error algorithm in the uplink in order to cancel interference.
The Minimum Mean Square Error algorithm optimizes the useful signal as well as maximizes the signal quality.
A simple null steering beamformer can cancel the interference from the most interfering interfering mobiles. The
optimum beamforming method used in Atoll overcomes this limitation. It calculates the optimum smart antenna weights
using the knowledge of directions and power levels of interference. These weights do not try to fully cancel
interference signals, but rather try to reduce the overall received interference as much as possible.
R
N
R
n
R
I
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+ = =
R
n
o
n
2
I = R
I
p
j
S
j
S
j
H

j 1 =
J

=
o
n
2
p
j
S
j

P
N
w
H
R
N
w =
P
u
p
u
w
H
S
u
S
u
H
w p
u
E
SA
= =
p
u
Q
UL
SA
P
u
P
N
-------
p
u
E
SA

w
H
R
N
w
---------------------------- = =
G
SA
E
SA
=
R
N
R
N
Avg
1
K
--- - R
N
k
k 1 =
K

=
R
N
Avg
R
N
k
E
SA
1
E
SA
1
Forsk 2010 AT283_TRG_E2 443
Chapter 8: TD-SCDMA Networks
Let represent the vector of E
SA
complex weights for the beamformer. is given by:
Where is the steering vector in the direction of the served user, . , which is a constant value for a given useful
signal that optimizes the beamformer weights. It is given by the equation:
is the inverse of the total noise correlation matrix. The total noise correlation matrix is the sum of the thermal noise
correlation matrix , and the interference correlation matrix , given by:
Where and
is the thermal noise power. I is the identity matrix. is the power received by one element of the smart antenna from
the j
th
interfering mobile. is the steering vector in the direction of the j
th
interfering mobile, . J is the total number of
interfering mobiles.
The total noise power, including thermal noise and interference from all uplink interferers, received by a cell is given by:
And, the total power received from the served user is given by:
Where is the power received by one element of the smart antenna from the served user.
The uplink signal quality is calculated by:
From the above equation, we can determine the uplink smart antenna beamforming gain in the direction of the served user.
can be calculated from the above equation by considering the interference and noise to be null, i.e.,
. This gives:
Figure 8.9Uplink Adaptive Algorithm
w


u
R
N
1
S
u
=
S
u
u
u

u
E
SA
S
u
H
R
N
1
S
u

----------------------------------- =
R
N
1
R
n
R
I
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+ = =
R
n
o
n
2
I = R
I
p
j
S
j
S
j
H

j 1 =
J

=
o
n
2
p
j
S
j

P

N

u
2
S
u
H
R
N
1
S
u
=
P

u
p
u

u
2
S
u
H
R
N
1
S
u
( )
2
=
p
u
Q
UL
SA P

u
P

N
------- p
u
S
u
H
R
N
1
S
u
= =
RSCP
TCH UL
R
N
1
I =
RSCP
TCH UL
p
u
S
u
H
I S
u
p
u
E
SA
= =
444 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
From the above equation, the uplink smart antenna beamforming gain equals the number of smart antenna elements, i.e.,
.
Additional Processing in Monte Carlo Simulations
The inverse noise correlation matrix for each iteration k includes the effect of the matrix calculated for the previous
iteration. Hence, Atoll is able to calculate an average of the smart antenna interference-cancellation effect. The result is
the angular distribution of the uplink load, which is calculated from the inverse of the noise correlation matrix obtained at
the end of the last iteration of a Monte Carlo simulation. This angular distribution of the uplink load can be stored in the
Cell Parameters per Timeslot table. The average of the inverse noise correlation matrices is calculated as follows:
Where is the average of the inverse noise correlation matrices of all the iterations from k = 1 to K, and is
the inverse noise correlation matrix of the k
th
iteration. The uplink load is calculated from the average inverse noise
correlation matrix.
8.5.1.5 3rd Party Smart Antenna Modelling
3rd party smart antenna models can be used in Atoll to determine the gains and losses during the simulations for a given
user distribution generated. The smart antenna gains and losses are used during the simulations and the results are stored
in the Cell Parameters per Timeslot table, which can be used in coverage predictions.
8.5.2 Construction of the Geographic Distributions
During simulations, Atoll uses the smart antenna model selected for each transmitter to calculate the smart antenna gains
and losses. These values are calculated and stored for each user generated for the simulations. Therefore, these values
are calculated and are available for the given locations of the users, i.e., points, only. Atoll uses the Angular Step value
that you set when creating and running simulations to construct the geographic distributions of these results.
Once Atoll has calculated the downlink traffic power and the uplink load using the smart antenna gains and losses
determined as explained in the previous section, at the location of a given user, it calculates the same for points located
at the angle equal to that of the Angular Step of the simulations.
At the end of the simulations, Atoll has a number of points, Angular Step apart, available with the values of these results.
The geographic distribution of these results, i.e., downlink traffic power and uplink loads, is constructed by connecting the
resulting value points.
The following example explains how the geographic distribution of downlink traffic power is created. The geographic
distribution of uplink loads is constructed in the same manner.
Example:
Let us assume a smart antenna equipment using adaptive beam modelling. The angular step defined for the simulations
is . Therefore, the results are calculated for each point located at regular steps of , i.e., 12 points. The
downlink traffic power at the served user (W) with the adaptive beam pointing in the users direction is . The downlink
traffic powers, using the same adaptive beam pointed towards the served user, at the 12 other points are also determined.
G
SA
E
SA
=
R
N
1
R
N
1
Avg
1
K
---- R
N
1
k
k 1 =
K

=
R
N
1
Avg
R
N
1
k
u
Step
30 = 30
P
W
Forsk 2010 AT283_TRG_E2 445
Chapter 8: TD-SCDMA Networks
The resulting geographic distribution is formed by linearly joining the obtained results.
The accuracy of the geographic distribution depends upon the value of the angular step. A radiation pattern created at a
step will be much more accurate than one created at , for example. But, the latter will be computed 45 times faster
than the first. The value of the Angular Step should be the best possible compromise between calculation speed and
accuracy.
8.5.3 Modelling in Coverage Predictions
The results of Monte Carlo simulations, including the smart antenna results, can be stored in the Cells and in the Cell
Parameters per Timeslot tables, and can be used to carry out coverage predictions. The main results of Monte Carlo
simulations used in coverage predictions are:
If a smart antenna is used in both uplink and downlink:
Geographic distribution of UL load and DL traffic power
If a smart antenna is used in downlink only:
Geographic distribution of DL traffic power
Without smart antenna:
UL load and DL traffic power
The uplink load and the downlink traffic power at a given pixel are determined by calculating the angle of that pixel with
respect to the transmitter azimuth, and reading the uplink load and downlink traffic power from the geographic distribution
results. If an exact value for the angle is not available, the load and power are determined using linear interpolation for the
given angle between two available values.
Figure 8.10Construction of the Geographic Distribution of Downlink Traffic Power
Figure 8.11Geographic Distribution of Downlink Traffic Power
1 45
X
UL o Z
P
Traffi c
DL o Z
P
Traffi c
DL o Z
X
UL
P
Traffi c
DL
o
446 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For example, the figure below shows the distribution of downlink traffic power and uplink traffic load results from a
simulation. For a pixel located at , the downlink traffic power and the uplink load are
read from these results. In this example, , and .
For each pixel, Atoll determines the downlink traffic powers and the uplink loads from all the transmitters.
8.5.4 HSDPA Coverage Prediction
Fast link adaptation (or Adaptive Modulation and Coding) is used in HSDPA. The power on the HS-DSCH channel is
transmitted at a constant power while the modulation, the coding, and the number of codes are changed to adapt to the
radio conditions variations. Based on the reported channel quality indicator (CQI), the Node-B may change the modulation
(QPSK and optionally 16QAM), the coding, and the number of codes every 2 ms during a communication.
Fast link adaptation is modelled in a dedicated HSDPA coverage prediction. Let us assume each bin on the map
corresponds to a probe receiver with HSDPA capable terminal, mobility, and HSDPA service. The probe receiver on each
bin is allocated the cells HSDPA. This receiver may be using a specific carrier or all of them. The probe receiver does not
create any interference.
Atoll calculates on each bin either the best pilot quality (P-CCPCH Ec/Nt) or the best HS-PDSCH quality (HS-PDSCH Ec/
Nt); this depends on the option selected in Global parameters (HSDPA part): CQI based on P-CCPCH quality or CQI
based on HS-PDSCH quality (CQI means channel quality indicator). Then, it determines the HS-PDSCH CQI, deduces
the best HSDPA bearer that can be used and selects the suitable bearer so as to comply with cell and terminal user
equipment capabilities. Once the bearer selected, Atoll finds the highest downlink rate that can be carried at each bin and
may deduce the application throughput. Coverage area is limited by the RSCP P-CCPCH threshold.
The coverage prediction can be calculated for an HSDPA compatible terminal, an HSDPA service, a mobility, a carrier,
and a downlink timeslot. Smart antenna results are taken into account in the computation of this study.
8.5.4.1 Fast Link Adaptation Modelling
As explained above, the way of calculating the dedicated HSDPA study depends on if CQI is based on the P-CCPCH
quality or on the HS-PDSCH quality.
8.5.4.1.1 CQI Based on P-CCPCH Quality
When the option CQI based on CPICH quality is selected, Atoll proceeds as follows.
P-CCPCH Quality Calculation
Let us assume the following notation: corresponds to the P-CCPCH quality.
Two options, available in Global Parameters, may be used to calculate Nt: option Without useful signal or option Total
noise.
Therefore, we have:
for the total noise option,
And
for the without useful signal option.
Figure 8.12Geographic Distribution of downlink traffic power and uplink load
o 315 = P
Traffi c
DL 315 Z
X
UL 315 Z
P
Traffi c
DL 315 Z
30 dBm ~ X
UL 315 Z
2.75 % =
Ec
Nt
------- i c ( )
\ .
| |
P CCPCH
Ec
Nt
------- i c ( )
\ .
| |
P CCPCH

BTS
o RSCP
P CCPCH
TXi
i c ( )
N
Tot
DL
i c ( )
---------------------------------------------------------------------------------- =
Ec
Nt
------- i c ( )
\ .
| |
P CCPCH

BTS
o RSCP
P CCPCH
TXi
i c ( )
N
Tot
DL
i c ( ) 1 o ( )
BTS
RSCP
P CCPCH
TXi
i c ( )
---------------------------------------------------------------------------------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 447
Chapter 8: TD-SCDMA Networks
With
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced
by the interference reduction factor defined for the pair (ic, jc).
, and are defined in "Definitions and Formulas" on page 395.
P-CCPCH CQI Determination
Let us assume the following notation: corresponds to the P-CCPCH CQI. is deduced from
the table . This table is defined for the terminal reception equipment and the
specified mobility.
HS-PDSCH Quality Calculation
Atoll proceeds as follows:
1
st
step: Atoll calculates the HS-PDSCH power ( ).
is the power available for HSDPA on the carrier ic. This parameter is a user-defined cell input.
Therefore, we have:
is the number of HS-SCCH channels and is the HS-SCCH power on carrier ic. It is either fixed
by the user. is controlled so as to reach the required HS-SCCH Ec/Nt ( ). It is specified
in mobility properties.
We have:
for the total noise option,
And
for the without useful signal
option.
With
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced
by the interference reduction factor defined for the pair (ic, jc).
and
, , and are defined in "Definitions and Formulas" on page 395.
Therefore,
N
Tot
DL
i c ( ) I
Intra
DL
i c ( ) I
Extra
DL
i c ( ) I
Inter Carri er
DL
i c j c , ( ) N
0
Term
+ + + =
I
Inter Carri er
DL
i c j c , ( )
F
IRF
i c j c , ( )
RSCP
P CCPCH
TXi
i c ( )
P
P CCPCH
i c ( )
L
T
--------------------------------------- =
L
T
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
C I

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =

BTS
o N
0
Term
CQI
P CCPCH
CQI
P CCPCH
CQI
P CCPCH
f
Ec
Nt
------- i c ( )
\ .
| |
P CCPCH
\ .
| |
=
P
HS PDSCH
P
HSDPA
i c ( )
P
HSDPA
i c ( ) P
HS PDSCH
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) + =
P
HS PDSCH
i c ( ) P
HSDPA
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) =
n
HS SCCH
P
HS SCCH
i c ( )
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
RSCP
HS SCCH
TXi
i c ( )
N
Tot
DL
i c ( )
------------------------------------------------------------------------ =
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
RSCP
HS SCCH
TXi
i c ( )
N
Tot
DL
i c ( ) 1 F
Ortho
DL
( ) 1 F
JD
Term
( )
BTS
RSCP
HS SCCH
TXi
i c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
Tot
DL
i c ( ) I
Intra
DL
i c ( ) I
Extra
DL
i c ( ) I
Inter Carri er
DL
i c j c , ( ) N
0
Term
+ + + =
I
Inter Carri er
DL
i c j c , ( )
F
IRF
i c j c , ( )
RSCP
HS SCCH
TXi
i c ( )
P
HS SCCH
i c ( )
L
T
--------------------------------------- =
L
T
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
C I

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
Ortho
F
JD
Term
N
0
Term
448 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
for the total noise option,
And
for the without useful signal
option.
2
nd
step: Then, Atoll calculates the HS-PDSCH quality
Let us assume the following notation: corresponds to the HS-PDSCH quality.
Therefore, we have:
for the total noise option,
And
for the without useful signal
option.
Here, Atoll works on the assumption that five HS-PDSCH channels are used (n=5).
With
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced
by the interference reduction factor defined for the pair (ic, jc).
And
, , and are defined in "Definitions and Formulas" on page 395.
HS-PDSCH CQI Determination
The best bearer that can be used depends on the HS-PDSCH CQI. Let us assume the following notation:
corresponds to the HS-PDSCH CQI. Atoll deduces as follows:
Bearer Selection
Knowing the HS-PDSCH CQI, Atoll finds the best bearer that can be used in the table Best Bearer=f(HS-PDSCH CQI).
This table is defined for the terminal reception equipment and the specified mobility.
Then, Atoll checks if best bearer characteristics are compliant with cell and user equipment category capabilities. Atoll
selects the bearer which is the best bearer compliant with the cell and UE category capabilities.
Bearer characteristics are provided in the HSDPA Bearer table. Assuming the best bearer = 23. Characteristics of this
bearer are:
Transport block size: 9719 Bytes
Number of HS-PDSCH channels used: 7
16QAM modulation used: Yes
Peak Rate: 4.48 Mb/s
RSCP
HS SCCH
TXi
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
N
Tot
DL
i c ( )

BTS
----------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
=
RSCP
HS SCCH
TXi
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
N
Tot
DL
i c ( )

BTS
1 1 F
Ortho
DL
( ) 1 F
JD
Term
( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
+
\ .
| |

-----------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
=
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
RSCP
HS PDSCH
TXi
i c ( )
N
Tot
DL
i c ( )
--------------------------------------------------------------------------- =
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
RSCP
HS PDSCH
TXi
i c ( )
N
Tot
DL
i c ( ) 1 F
Ortho
DL
( ) 1 F
JD
Term
( )
BTS
RSCP
HS PDSCH
TXi
i c ( )
n
--------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
Tot
DL
i c ( ) I
Intra
DL
i c ( ) I
Extra
DL
i c ( ) I
Inter Carri er
DL
i c j c , ( ) N
0
Term
+ + + =
I
Inter Carri er
DL
i c j c , ( )
F
IRF
i c j c , ( )
RSCP
HS PDSCH
TXi
i c ( )
P
HS PDSCH
i c ( )
L
T
------------------------------------------ =
L
T
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
C I

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
Ortho
F
JD
Term
N
0
Term
CQI
HS PDSCH
CQI
HS PDSCH
CQI
HS PDSCH
CQI
P CCPCH
P
P CCPCH
P
HS PDSCH
+ =
Forsk 2010 AT283_TRG_E2 449
Chapter 8: TD-SCDMA Networks
Assuming user equipment category = 3. Its capabilities are:
Maximum transport block size: 7298 Bytes
Maximum number of HS-PDSCH channels used: 5
16QAM modulation used: Yes
Minimum number of TTI between two TTI used: 2
HSDPA cell capabilities are:
Maximum number of HS-PDSCH channels: 15.
The bearer 23 cannot be selected because:
The number of HS-PDSCH channels (7) exceeds the maximum number of HS-PDSCH channels the terminal can
use (5),
And the transport block size (9719 Bytes) exceeds the maximum transport block size (7298 Bytes) the terminal
can carried.
In the Bearer table, Atoll searches a suitable bearer and selects the bearer index 22.
The number of HS-PDSCH channels (5) does not exceed the maximum number of HS-PDSCH channels the
terminal can use (5) and the maximum number of HS-PDSCH channels available at the cell level (15),
The transport block size (7168 Bytes) does not exceed the maximum transport block size (7298 Bytes) the terminal
can carried.
16QAM modulation is supported by the terminal.
Figure 8.13Radio Bearers Table
Figure 8.14UE Categories Table
450 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
HS-PDSCH Quality Update
Once the bearer selected, Atoll knows the number of HS-PDSCH channels. Therefore, when the method Without useful
signal is used, Atoll can recalculate the HS-PDSCH quality with the real number of HS-PDSCH channels (A default value
of 5 was taken into account in the first HS-PDSCH quality calculation).
8.5.4.1.2 CQI Based on HS-PDSCH Quality
When the option CQI based on HS-PDSCH quality is selected, Atoll proceeds as follows.
HS-PDSCH Quality Calculation
Atoll proceeds as follows:
1
st
step: Atoll calculates the HS-PDSCH power ( ).
is the power available for HSDPA on the carrier ic. This parameter is a user-defined cell input.
Therefore, we have:
is the number of HS-SCCH channels and is the HS-SCCH power on carrier ic fixed by the
user. The HS-SCCH power is controlled so as to reach the required HS-SCCH Ec/Nt ( ) specified in
mobility properties.
We have:
for the total noise option,
And
for the without useful signal
option.
With
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced
by the interference reduction factor defined for the pair (ic, jc).
And
, , and are defined in "Definitions and Formulas" on page 395.
Therefore,
for the total noise option,
And
for the without useful signal option.
2
nd
step: Then, Atoll evaluates the HS-PDSCH quality
Let us assume the following notation: corresponds to the HS-PDSCH quality.
P
HS PDSCH
P
HSDPA
i c ( )
P
HSDPA
i c ( ) P
HS PDSCH
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) + =
P
HS PDSCH
i c ( ) P
HSDPA
i c ( ) n
HS SCCH
P
HS SCCH
i c ( ) =
n
HS SCCH
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
RSCP
HS SCCH
TXi
i c ( )
N
Tot
DL
i c ( )
------------------------------------------------------------------------ =
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH

BTS
RSCP
HS SCCH
TXi
i c ( )
N
Tot
DL
i c ( ) 1 F
Ortho
DL
( ) 1 F
JD
Term
( )
BTS
RSCP
HS SCCH
TXi
i c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
Tot
DL
i c ( ) I
Intra
DL
i c ( ) I
Extra
DL
i c ( ) I
Inter Carri er
DL
i c j c , ( ) N
0
Term
+ + + =
I
Inter Carri er
DL
i c j c , ( )
F
IRF
i c j c , ( )
RSCP
HS SCCH
TXi
i c ( )
P
HS SCCH
i c ( )
L
T
i
--------------------------------------- =
L
T
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
C I

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
Ortho
F
JD
Term
N
0
Term
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
N
Tot
DL
i c ( )

BTS
----------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
=
P
HS SCCH
i c ( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
N
Tot
DL
i c ( )

BTS
1 1 F
Ortho
DL
( ) 1 F
JD
Term
( )
Ec
Nt
------- i c ( )
\ .
| |
HS SCCH
Req
+
\ .
| |

-----------------------------------------------------------------------------------------------------------------------------------------------------------
\ .
|
|
|
| |
L
T
=
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
Forsk 2010 AT283_TRG_E2 451
Chapter 8: TD-SCDMA Networks
Two options, available in Global parameters, may be used to calculate Nt: option Without useful signal or option Total
noise.
We have:
for the total noise option,
And
for the without useful signal
option.
Here, Atoll works on the assumption that five HS-PDSCH channels are used (n=5). Then, it deduces the HS-PDSCH CQI
and the bearer to be used. Once the bearer selected, Atoll exactly knows the number of HS-PDSCH channels and
recalculates the HS-PDSCH quality with the real number of HS-PDSCH channels.
With
is the inter-carrier interference from a carrier jc to another carrier ic on the downlink, which is reduced
by the interference reduction factor defined for the pair (ic, jc).
And
, , and are defined in "Definitions and Formulas" on page 395.
HS-PDSCH CQI Determination
Let us assume the following notation: corresponds to the HS-PDSCH CQI. is deduced
from the table . This table is defined for the terminal reception equipment and
the specified mobility.
Bearer Selection
Thebearerisselectedasdescribedin"BearerSelection"onpage 448.
8.5.4.2 Coverage Prediction Display Options
Three display options are available in the study property dialogue.
8.5.4.2.1 Colour per CQI
Atoll displays either the P-CCPCH CQI when the selected option in Global Parameters (HSDPA part) is CQI based on P-
CCPCH quality, or the HS-PDSCH CQI when considering the CQI based on HS-PDSCH quality option.
Coverage consists of several layers with a layer per CQI threshold ( ). For each layer, area is covered if
. Each layer is assigned a colour and displayed with intersections between layers.
8.5.4.2.2 Colour per Peak Throughput
After selecting the bearer, Atoll reads the corresponding RLC peak rate. This is the highest rate that the bearer can
provide on each bin.
Coverage consists of several layers with a layer per possible peak rate ( ). For each layer, area is covered if the
peak rate can be provided. Each layer is assigned a colour and displayed with intersections between layers.
8.5.4.2.3 Colour per HS-PDSCH Ec/Nt
Atoll displays on each bin the HS-PDSCH quality. Coverage consists of several layers with a layer per threshold. For each
layer, area is covered if . Each layer is assigned a colour and displayed with
intersections between layers.
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
RSCP
HS PDSCH
TXi
i c ( )
N
Tot
DL
i c ( )
--------------------------------------------------------------------------- =
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH

BTS
RSCP
HS PDSCH
TXi
i c ( )
N
Tot
DL
i c ( ) 1 F
Ortho
DL
( ) 1 F
JD
Term
( )
BTS
RSCP
HS PDSCH
TXi
i c ( )
n
--------------------------------------------------------
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- =
N
Tot
DL
i c ( ) I
Intra
DL
i c ( ) I
Extra
DL
i c ( ) I
Inter Carri er
DL
i c j c , ( ) N
0
Term
+ + + =
I
Inter Carri er
DL
i c j c , ( )
F
IRF
i c j c , ( )
RSCP
HS PDSCH
TXi
i c ( )
P
HS PDSCH
i c ( )
L
T
------------------------------------------ =
L
T
L
Path
L
TX
L
Term
L
Body
L
Indoor
M
Shadowi ng
C I

G
TX
G
Term

------------------------------------------------------------------------------------------------------------------------------------- =

BTS
F
Ortho
F
JD
Term
N
0
Term
CQI
HS PDSCH
CQI
HS PDSCH
CQI
HS PDSCH
f
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
\ .
| |
=
CQI
Threshol d
CQI CQI
Threshol d
>
R
Peak
DL
Ec
Nt
------- i c ( )
\ .
| |
HS PDSCH
Threshol d >
452 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.6 N-Frequency Mode and Carrier Allocation
Transmitters that support N-frequency mode are multi carrier transmitters with a master and one or more slave carrier.
You can assign master and slave carriers to transmitters manually, or use the automatic frequency allocation in Atoll to
assign carrier types automatically.
8.6.1 Automatic Carrier Allocation
For each transmitter, Atoll determines a list of "near" transmitters. For any transmitter TX
i
, its "near" transmitters are
geographically located close to the transmitter, and are sorted according to their distance from it. The calculation of
distance between TX
i
and any other transmitter TX
j
is performed using the equation below:
Where is the weighted distance between TX
i
and TX
j
, is the real distance between between TX
i
and
TX
j
considering any offsets with respect to the site locations, x is set to 15 % so that the maximum variation in
due to the azimuths does not exceed 60 %. and are calculated from the azimuths of the two cells as shown in
Figure 8.15 on page 452.
The above formula implies that two transmitters facing each other will have a shorter weighted distance between them
than the real distance, and two transmitters pointing in opposite directions will have a greater weighted distance.
Allocation of All Carriers
Allocation of Master Carriers
Atoll assigns one master carrier to each transmitter TX
i
, such that the master carrier of TX
i
is different from the master
carrier of TX
j
, where TX
j
belongs to the list of "near" transmitters. The master carrier is one of the cells defined in the
transmitter. All the other cells of the transmitter are assigned the carrier-type "slave".
For transmitters that support the N-frequency mode and have master carriers properly assigned, Atoll performs the
neighbour and scrambling code allocation for the master carrier only.
8.7 Neighbour Allocation
Atoll permits the automatic allocation of intra-technology neighbours in a TD-SCDMA document. The intra-technology
neighbour allocation algorithms take into account all the cells of TBC transmitters. It means that all the cells of TBC
transmitters of your .atl document are potential neighbours.
Figure 8.15Weighted Distance Between Transmitters
Co-N-Frequency Allocation Diff-N-Frequency Allocation
Atoll assigns the same carriers to cells of each co-site
transmitter.
Atoll assigns different carriers to cells of each co-site
transmitter.
D
TX
i
TX
j

d
TX
i
TX
j

1 x | ( ) cos o ( ) cos 2 ( ) + ( ) =
D
TX
i
TX
j

d
TX
i
TX
j

D
TX
i
TX
j

o |
Forsk 2010 AT283_TRG_E2 453
Chapter 8: TD-SCDMA Networks
The cells to be allocated will be called TBA cells. They must fulfill the following conditions:
They are active
Their transmitters support the N-frequency mode, and the cells are master carriers of their transmitters
(neighbours are not allocated to standalone carriers)
They satisfy the filter criteria applied to the Transmitters folder
They are located inside the focus zone
They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder
or a group of transmitters or a single transmitter.
Only TBA cells may be assigned neighbours.
In this section, the following are explained:
"Neighbour Allocation for All Transmitters" on page 453.
"Neighbour Allocation for a Group of Transmitters or One Transmitter" on page 456.
"Importance Calculation" on page 456.
8.7.1 Neighbour Allocation for All Transmitters
We assume that we have a reference cell A and a candidate neighbour, cell B. When automatic allocation starts, Atoll
checks following conditions:
1. The distance between both cells must be less than the user-defined maximum inter-site distance. If the distance
between the reference cell and the candidate neighbour is greater than this value, the candidate neighbour is
discarded.
2. The calculation options:
Force co-site cells as neighbours: This option enables you to force cells located on the same site as reference cell
in the candidate neighbour list. This constraint can be weighted among the others and ranks the neighbours
through the importance field.
Force adjacent cells as neighbours: This option enables you to force cells geographically adjacent to the reference
cell in the candidate neighbour list. This constraint can be weighted among the others and ranks the neighbours
through the importance field.
Force neighbour symmetry: This option enables you to force the reciprocity of a neighbourhood link. Therefore, if
the reference cell is a candidate neighbour of another cell, the later will be considered as candidate neighbour of
the reference cell.
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Note:
Adjacency criterion: Geographically adjacent cells are determined on the basis of their
best server coverages in TD-SCDMA projects. Let CellA be a candidate neighbour cell of
CellB. CellA is considered adjacent to CellB if there exists at least one pixel in the CellB
best server coverage area (and P-CCPCH RSCP of CellB > P-CCPCH RSCP T_Add)
where CellA is best server (of several cells have the same best server value) or CellA is the
second best server that enters the handover set (i.e., P-CCPCH RSCP of CellA > P-
CCPCH RSCP T_Drop and P-CCPCH RSCP of CellA > P-CCPCH RSCP of CellB -
T_Comp.)
When this option is selected, adjacent cells are sorted and listed from the most adjacent to
the least, depending on the above criterion. Adjacency is relative to the number of pixels
satisfying the criterion.
454 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you
may force/forbid a cell to be candidate neighbour of the reference cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current
neighbours and carries out a new neighbour allocation. If not selected, the existing neighbours are kept.
3. There must be an overlapping zone ( ) with a given cell edge coverage probability.
N-frequency handover is a baton handover. Assuming that the reference cell A and the candidate cell B are
located inside a continuous layer of cells:
S
A
is the area where the cell A is the best serving cell.
- The P-CCPCH RSCP from the cell A is greater than the P-CCPCH RSCP T_Add.
- The P-CCPCH RSCP from the cell A is greater than the P-CCPCH RSCP from all other cells.
S
B
is the area where the cell B can enter the handover set.
- The P-CCPCH RSCP from the cell B is greater than the P-CCPCH RSCP T_Drop.
- The P-CCPCH RSCP from the cell B is greater than the P-CCPCH RSCP from the cell A minus the P-CCPCH
RSCP T_Comp.
Atoll calculates the percentage of covered area ( ), which it compares with the % minimum covered
area. If this percentage is not exceeded, the candidate neighbour B is discarded.
The coverage condition can be weighted among the others and ranks the neighbours through the importance field.
Figure 8.16N-frequency Neighbour Allocation
S
A
S
B

S
A
S
B

S
A
---------------------- 100
Forsk 2010 AT283_TRG_E2 455
Chapter 8: TD-SCDMA Networks
4. The importance of neighbours.
For information on the importance calculation, see "Importance Calculation" on page 456.
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason.
Atoll lists all neighbours and sorts them by importance value so as to eliminate some of them from the neighbour
list if the maximum number of neighbours to be allocated to each transmitter is exceeded.
If we consider the case for which there are 15 candidate neighbours and the maximum number of neighbours to
be allocated to the reference cell is 8. Among these 15 candidate neighbours, only 8 (having the highest
importance values) will be allocated to the reference cell. Note that maximum numbers of neighbours can be
defined at the cell level (properties dialogue or Cells table). If defined there, this value is taken into account instead
of the default one available in the dialogue.
In the Results part, Atoll provides the list of neighbours, the number of neighbours, and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason, i.e., a neighbour may be marked as exceptional pair, co-site, adjacent, coverage, or symmetric. For neighbours
accepted for co-site, adjacency, and coverage reasons, Atoll displays the percentage of area that satisfies the coverage
conditions and the corresponding surface area (km
2
), the percentage of area that satisfies the adjacency conditions and
the corresponding surface area (km
2
). Finally, if cells have previous allocations in the list, neighbours are marked as
existing.
Figure 8.17Overlapping Coverages
Notes:
You do not require simulations or coverage predictions for an automatic neighbour
allocation. For automatic neighbour allocation, Atoll automatically calculates the missing
path loss matrices.
Although no specific terminal, mobility, or service is selected for automatic neighbour
allocation, the algorithm tries to find the maximum number of neighbours by selecting:
- The service with the lowest body loss
- The terminal with the highest difference between Gain and Losses. If this is the same
for all terminals, Atoll uses the terminal with the lowest noise figure.
- Mobility does not impact the allocation
A forbidden neighbour must not be listed as neighbour except if the neighbourhood
relationship already exists and the Delete existing neighbours option is not selected. In this
case, Atoll displays a warning message in the Event Viewer indicating that the constraint
on the forbidden neighbour will be ignored by the algorithm because the neighbour already
exists.
Symmetric neighbour relations are only added to the neighbour lists if the neighbour lists
are not already full. Thus, if the cell B is a neighbour of the cell A, but cell A is not a
neighbour of the cell B, there can be two possibilities:
i. There is space in the cell B neighbour list: cell A will be added to the list. It will be the
last one.
ii. The cell B neighbour list is full: Atoll will not include cell A in the list and will remove the
symmetric relation by deleting cell B from the cell A neighbour list.
456 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.7.2 Neighbour Allocation for a Group of Transmitters or One
Transmitter
In this case, Atoll allocates neighbours to:
TBA cells
Neighbours of TBA cells marked as exceptional pair, adjacent, or symmetric
Neighbours of TBA cells that satisfy coverage conditions
Automatic neighbour allocation parameters are described in "Neighbour Allocation for All Transmitters" on page 453.
8.7.3 Importance Calculation
Importance values are used by the allocation algorithm to rank the neighbours according to the allocation reason, and to
quantify the neighbour importance. As indicated in the table below, the neighbour importance depends on the
neighbourhood cause; this value varies between from 0 and 100%.
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is determined
using the Importance Function (IF). The IF considers three factors for calculating the importance:
The co-site factor (C) which is a Boolean
The adjacency factor (A) which deals with the percentage of adjacency
The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
The IF evaluates importance as follows:
Where
If you select Force exceptional pairs and Force symmetry options, Atoll considers the
constraints between exceptional pairs in both directions so as to respect the symmetric
relation. On the other hand, if a neighbour relation is forced in one direction and forbidden
in the other, symmetry cannot be respected. In this case, Atoll displays a warning
message in the Event Viewer.
In the results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a
TBA cell has already reached its maximum number of neighbours before starting the new
allocation, it will not appear in the Results table.
Neighbourhood cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected IF
Adjacent transmitter If the Force adjacent cells as neighbours option is selected IF
Neighbourhood relationship that fulfils
coverage conditions
If the % minimum covered area is exceeded IF
Symmetric neighbourhood
relationship
If the Force neighbour symmetry option is selected IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 30%
Adjacency factor (A) 30% 60%
Co-site factor (C) 60% 100%
Neighbourhood
cause
IF
Resulting IF using the
default values from the
table above
Co-site Adjacent
No No
No Yes
Yes Yes
Mi n O ( ) Max O ( )
Mi n A ( ) Max A ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 29% O ( ) +
Mi n A ( ) A A ( ) Max O ( ) O ( ) 100% Max O ( ) ( ) A ( ) + { } + 30% 30% 30% O ( ) 70% A ( ) + { } +
Mi n C ( ) A C ( ) Max O ( ) O ( ) 100% Max O ( ) ( ) A ( ) + { } + 60% 40% 30% O ( ) 70% A ( ) + { } +
A X ( ) Max X ( ) Mi n X ( ) =
Forsk 2010 AT283_TRG_E2 457
Chapter 8: TD-SCDMA Networks
8.8 Scrambling Code Allocation
Downlink scrambling codes enable mobile to distinguish one cell from another. In TD-SCDMA, there are 128 scrambling
codes (or P-CCPCH midamble codes) distributed in 32 clusters of 4 codes each. A different DL synchronisation code, or
SYNC_DL code, is assigned to each cluster. Scrambling codes are numbered from 0 to 127, and SYNC_DL codes from
0 to 31.
Depending on the options you select for automatic allocation of scrambling and SYNC_DL codes, Atoll takes into account
either all the cells of TBC transmitters, or only cells of active and filtered transmitters located inside the computation zone.
Atoll calculates a scrambling code and a SYNC_DL code to all these cells. But, it allocates scrambling codes and
SYNC_DL codes only to TBA cells (cells to be allocated). TBA cells are the cells that fulfill the following conditions:
They are active
They satisfy the filter criteria applied to the Transmitters folder
They are located inside the focus zone
They belong to the folder on which allocation has been executed. This folder can be either the Transmitters folder
or a group of transmitters or a single transmitter.
Furthermore, if there are transmitters that support the N-frequency mode among the TBC transmitters of your network, the
scrambling code allocation also considers the master and slave carrier allocations.
8.8.1 Automatic Allocation Description
8.8.1.1 Allocation Constraints and Options
The scrambling code and SYNC_DL code allocation algorithm can take into account following constraints:
1. Neighbour relations between cells
You may consider:
- First order neighbours: The neighbours of TBA cells listed in the Intra-technology neighbours table,
- Second order neighbours: The neighbours of neighbours,
- Third order neighbours: The neighbours neighbours neighbours.
2. The scrambling code reuse distance
Reuse Distance: It is a constraint on the allocation of scrambling codes. The same scarmbling code or SYNC_DL
code cannot be allocated to two sites that are not farther apart than the reuse distance. Scrambling code reuse
distance can be defined for each cell in the cell properties. If this value is not defined, Atoll uses the default reuse
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Adjacent neighbours
iii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
The ranking between neighbours from the same category depends on the factors (A) and
(O).
The default value of Min(O) = 1% ensures that neighbours selected for symmetry will have
an importance greater than 0%. With a value of Min(O) = 0%, neighbours selected for
symmetry will have an importance field greater than 0% only if there is some coverage
overlapping.
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Notes:
Atoll can take into account inter-technology neighbour relations as constraints to allocate
different scrambling codes to the TD-SCDMA neighbours of a GSM transmitter. In order to
consider inter-technology neighbour relations in the scrambling code allocation, you must
make the Transmitters folder of the GSM .atl document accessible in the TD-SCDMA .atl
document. For information on making links between GSM and TD-SCDMA .atl documents,
see the User Manual.
Atoll considers symmetry relationship between a cell, its first order neighbours, its second
order neighbours and its third order neighbours.
458 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
distance defined in the Automatic Scrambling Code and SYNC_DL code Allocation dialogue. The reuse
distance constraint is used for clustered and distributed per cell allocation strategies.
3. The carrier for which you want to perform the automatic allocation
Carrier: You can select "All" or a specific carrier. If you select "All", Atoll allocates the same scrambling code to
each carrier of a transmitter.
4. The number of scrambling codes per SYNC_DL code
Each SYNC_DL code corresponds to a group of scrambling codes as defined in 3GPP specifications. 3GPP
specifications define 32 SYNC_DL codes with 4 corresponding scrambling codes each (SYNC_DL codes are
numbered from 0 to 31). However, it is possible to define a different value (e.g. if you set the number of scrambling
codes per SYNC_DL codes to 2, scrambling codes will be distributed among 64 SYNC_DL codes).
When the allocation is based on a Distributed strategy (Distributed per Cell or Distributed per Site), this parameter
can also be used to define the interval between the scrambling codes assigned to cells on a same site. The defined
interval is applied by adding the following lines in the Atoll.ini file:
For more information about setting options in the atoll.ini file, see the Administrator Manual.
5. Atoll can use a maximum of codes
Use a Maximum of Codes: If you choose to use a maximum of codes, Atoll will try to spread the allocated
spectrum of scrambling codes as much as possible.
6. Existing allocation
Delete All Codes: If you select this option, Atoll will delete any existing scrambling code allocation and perform a
fresh allocation. Otherwise, Atoll keeps the existing allocation.
8.8.1.2 Allocation Strategies
You can choose from the following four allocation strategies:
Clustered: The purpose of this strategy is to choose for a group of mutually constrained cells, scrambling codes
among a minimum number of clusters. In this case, Atoll will preferentially allocate all the codes within the same
cluster.
Distributed per Cell: This strategy consists in using as many clusters as possible. Atoll will preferentially allocate
codes from different clusters.
One SYNC_DL code per site: This strategy allocates one cluster, i.e., one SYNC_DL code, per site, then one
scrambling code from the cluster to each cell of the site. When all the clusters have been allocated but there are
still sites remaining, Atoll reuses the clusters as far as possible at another site.
Distributed per site: This strategy allocates a group of adjacent clusters, i.e., consecutive SYNC_DL codes, to
each site, then one cluster, or SYNC_DL code, to each transmitter on the site according to its azimuth, and finally
one scrambling code from each cluster to each cell of each transmitter. The number of adjacent clusters, or
consecutive SYNC_DL codes, depends on the number of transmitters per site. When all the sites have been
allocated adjacent clusters, and there are still sites remaining to be allocated, Atoll reuses the adjacent clusters
as far as possible at another site.
In the Results table, Atoll only displays scrambling codes and SYNC_DL codes allocated to TBA cells.
8.8.1.3 Allocation Process
For each TBA cell, Atoll lists all cells which have constraints with the cell. They are referred to as near cells. The near cells
of a TBA cell may be:
Its neighbour cells: the neighbours listed in the Intra-technology neighbours table (options Existing neighbours
and "First Order"),
The neighbours of its neighbours (options Existing neighbours and Second Order),
The third order neighbours (options Existing neighbours and Third Order),
The cells with distance from the TBA cell less than the reuse distance,
The cells that make exceptional pairs with the TBA cell.
Additional constraints are considered when:
The cell and its near cells are neighbours of a same GSM transmitter (only if the Transmitters folder of the GSM
.atl document is accessible in the UMTS .atl document),
The neighbour cells cannot share the same cluster (for the "Distributed per site" allocation strategy only).
These constraints have a certain weight taken into account to determine the TBA cell priority during the allocation process
and the cost of the scrambling code plan. During the allocation, Atoll tries to assign different scrambling codes to the TBA
[PSC]
ConstantStep=1
Notes:
Same carriers must be assigned different scrambling codes. Different carriers of the same
site can be assigned the same scrambling code. Therefore, cells of a transmitter (i.e.
different carriers) are assigned the same scrambling code, if the scrambling code domains
associated with the carriers have a common cluster or enough codes in one cluster.
Forsk 2010 AT283_TRG_E2 459
Chapter 8: TD-SCDMA Networks
cell and its near cells. If it respects all the constraints, the cost of the scrambling code plan is 0. When a cell has too many
constraints and there are not anymore scrambling codes available, Atoll breaks the constraint with the lowest cost so as
to generate the scrambling code plan with the lowest cost. For information on the cost generated by each constraint, see
"Cell Priority" on page 460.
8.8.1.3.1 Single Carrier Network
The allocation process depends on the selected strategy. Algorithm works as follows:
Strategies: Clustered and Distributed per Cell
Atoll processes TBA cells according to their priority. It allocates scrambling codes starting with the highest priority cell and
its near cells, and continuing with the lowest priority cells not allocated yet and their near cells. For information on
calculating cell priority, see "Cell Priority" on page 460.
Strategy: One SYNC_DL Code per Site
All sites which have constraints with the studied site are referred to as near sites.
Atoll assigns a cluster, i.e., a SYNC_DL code, to each site, starting with the highest priority site and its near sites, and
continuing with the lowest priority sites not allocated yet and their near sites. When all the clusters have been allocated
but there are still sites remaining, Atoll reuses the clusters at the other sites. When the Reuse Distance option is selected,
the algorithm reuses the clusters as soon as the reuse distance is exceeded. Otherwise, when the option is not selected,
the algorithm tries to assign reused clusters as spaced out as possible.
Then, Atoll allocates a scrambling code from the cluster to each cell located on the sites (codes belong to the assigned
clusters). It starts with the highest priority cell and its near cells and goes on with the lowest priority cells not allocated yet
and their near cells.
For information on calculating site priority, see "Site Priority" on page 463. For information on calculating cell priority, see
"Cell Priority" on page 460.
Strategy: Distributed per Site
All sites which have constraints with the studied site are referred to as near sites.
Atoll assigns a group of adjacent clusters, i.e., SYNC_DL codes, to each site, starting with the highest priority site and its
near sites, and continuing with the lowest priority sites not allocated yet and their near sites. When all the sites have been
allocated adjacent clusters, and there are still sites remaining to be allocated, Atoll reuses the adjacent clusters at other
sites. When the Reuse Distance option is selected, the algorithm reuses the clusters as soon as the reuse distance is
exceeded. Otherwise, when the option is not selected, the algorithm tries to assign reused clusters as spaced out as
possible.
Then, Atoll assigns each cluster of the group to each transmitter of the site according to the transmitter azimuth and
selected neighbourhood constraints (options "Neighbours in Other Clusters" and "Secondary Neighbours in Other
Clusters"). Then, Atoll allocates a scrambling code to each cell located on the transmitters (codes belong to the assigned
clusters). It starts with the highest priority cell and its near cells and goes on with the lowest priority cells not allocated yet
and their near cells.
For information on calculating site priority, see "Site Priority" on page 463. or information on calculating cell priority, see
"Cell Priority" on page 460.
Determination of Groups of Adjacent Clusters
In order to determine the groups of adjacent clusters to be used, Atoll:
Defines theoretical groups of adjacent clusters, independent of the defined domain, considering the 128
scrambling codes available and 4 codes per cluster.
Starts the distribution of clusters to groups from the cluster 0
Takes into account the maximum number of transmitters per site in order to determine the number of clusters in
each group
Determines the total number of groups
If the number of scrambling codes per cluster is set to 4 and the maximum number of transmitters per site in the network
is 3, the theoretical groups of adjacent clusters will be:
If no domain is assigned to cells, Atoll can use all these groups for the allocation. On the other hand, if a domain is used,
Atoll compares adjacent clusters actually available in the assigned domain with the theoretical groups and only keeps
adjacent clusters common with the theoretical groups.
If we have a domain comprising 12 clusters: clusters 1 to 8 and clusters 12 to 15. In this case, Atoll will use the following
groups of adjacent clusters:
Group 2 with cluster 3, 4 and 5
Group 3 with cluster 6, 7 and 8
Group 1 Group 2 Group 3 Group 4 ... Group 11
Cluster 0 Cluster 3 Cluster 6 Cluster 9
...
Cluster 30
Cluster 1 Cluster 4 Cluster 7 Cluster 10 Cluster 31
Cluster 2 Cluster 5 Cluster 8 Cluster 11
460 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Group 6 with cluster 12, 13 and 14
The clusters 1, 2 and 15 will not be used.
If a domain does not contain any adjacent clusters, Atoll displays a warning message in the Event Viewer.
8.8.1.3.2 Multi-Carrier Network
In case you have a multi-carrier network and you run the scrambling code allocation on all the carriers, the allocation order
changes. It is no longer based on the cell priority but depends on the transmitter priority. All transmitters which have
constraints with the studied transmitter will be referred to as near transmitters.
In case of a "Per cell" strategy (Clustered and Distributed per cell), Atoll starts scrambling code allocation with the highest
priority transmitter and its near transmitters and continues with the lowest priority transmitters not allocated yet and their
near transmitters. The same scrambling code is assigned to each cell of the transmitter.
In case of the "One SYNC_DL code per site" strategy, Atoll assigns a cluster, i.e., a SYNC_DL code, to each site and
then, allocates a scrambling code to each transmitter. It starts with the highest priority transmitter and its near transmitters
and continues with the lowest priority transmitters not allocated yet and their near transmitters. The same scrambling code
is assigned to each cell of the transmitter.
In case of the "Distributed per site" strategy, Atoll assigns a group of adjacent clusters, i.e., SYNC_DL codes, to each site,
then a cluster to each transmitter and finally, allocates a scrambling code to each transmitter. It starts with the highest
priority transmitter and its near transmitters and continues with the lowest priority transmitters not allocated yet and their
near transmitters. The same scrambling code is assigned to each cell of the transmitter.
For information on calculating transmitter priority, see "Transmitter Priority" on page 462.
8.8.1.4 Priority Determination
8.8.1.4.1 Cell Priority
Scrambling code allocation algorithm in Atoll allots priorities to cells before performing the actual allocation. Priorities
assigned to cells depend upon how much constrained each cell is and the cost defined for each constraint. A cell without
any constraint has a default cost, , equal to 0. The higher the cost on a cell, the higher the priority it has for the scrambling
code allocation process.
There are seven criteria employed to determine the cell priority. The total cost due to constraints on any cell i is defined as:
With
All the cost components are described below:
Scrambling Code Domain Criterion
The cost due to the domain constraint, , depends on the number of scrambling codes available for the allocation.
The domain constraint is mandatory and cannot be broken.
When no domain is assigned to cells, 128 scrambling codes are available and we have:
When domains of scrambling codes are assigned to cells, each unavailable scrambling code generates a cost. The higher
the number of codes available in the domain, the less will be the cost due to this criterion. The cost is given as:
Distance Criterion
The constraint level of any cell i depends on the number of cells (j) present within a radius of "reuse distance" from its
centre. The total cost due to the distance constraint is given as:
Each cell j within the reuse distance generates a cost given as:
Where
is a weight depending on the distance between i and j. This weight is inversely proportional to the inter-cell distance.
For a reuse distance of 2000m, the weight for an inter-cell distance of 1500m is 0.25, the weight for co-site cells is 1 and
the weight for two cells spaced out 2100m apart is 0.
Note:
When cells, transmitters or sites have the same priority, processing is based on an
alphanumeric order.
C
C
i
C
i
Dom ( ) C
i
U ( ) + =
C
i
U ( ) C
i
Di st ( ) C
i
EP ( ) C
i
N ( ) C
i
N
2G
( ) C
i
Cl uster ( ) C
i
CN ( ) + + + + + =
C
i
Dom ( )
C
i
Dom ( ) 0 =
C
i
Dom ( ) 128 Number of scrambling codes in the domain =
C
i
Di st ( ) C
j
Di st i ( ) ( )
j

=
C
j
Di st i ( ) ( ) w d
i j
( ) c
di s ce tan
=
w d
i j
( )
Forsk 2010 AT283_TRG_E2 461
Chapter 8: TD-SCDMA Networks
is the cost of the distance constraint. This value can be defined in the Constraint Cost dialogue.
Exceptional Pair Criterion
The constraint level of any cell i depends on the number of exceptional pairs (j) for that cell. The total cost due to
exceptional pair constraint is given as:
Where
is the cost of the exceptional pair constraint. This value can be defined in the Constraint Cost dialogue.
Neighbourhood Criterion
The constraint level of any cell i depends on the number of its neighbour cells j, the number of second order neighbours k
and the number of third order neighbours l.
Lets consider the following neighbour schema:
The total cost due to the neighbour constraint is given as:
Each first order neighbour cell j generates a cost given as:
Where
is the importance of the neighbour cell j.
is the cost of the first order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two first order neighbours must not have the same scrambling code, Atoll considers the cost created by two first
order neighbours to be each other.
Each second order neighbour cell k generates a cost given as:
Where
is the cost of the second order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two second order neighbours must not have the same scrambling code, Atoll considers the cost created by two
second order neighbours to be each other.
Each third order neighbour cell l generates a cost given as:
Where
is the cost of the third order neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Because two third order neighbours must not have the same scrambling code, Atoll considers the cost created by two
third order neighbours to be each other.
Figure 8.18Neighbourhood Constraints
c
di s ce tan
C
i
EP ( ) c
EP
i j ( )
j

=
c
EP
C
i
N ( ) C
j
N1 i ( ) ( ) C
j j '
N1 i ( ) ( )
j '

+
j

\ .
|
| |
C
k
N2 i ( ) ( ) C
k k'
N2 i ( ) ( )
k'

+
k

\ .
|
| |
C
l
N3 i ( ) ( ) C
l l '
N3 i ( ) ( )
l '

+
l

\ .
|
| |
+ + =
C
j
N1 i ( ) ( ) I
j
c
N1
=
I
j
c
N1
C
j j '
N1 i ( ) ( )
C
j
N1 i ( ) ( ) C
j '
N1 i ( ) ( ) +
2
----------------------------------------------------------- =
C
k
N2 i ( ) ( ) Max C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) ( ) C
j '
N1 i ( ) ( ) C
k
N1 j ' ( ) ( ) ( ) ( , ) c
N2
=
c
N2
C
k k'
N2 i ( ) ( )
C
k
N2 i ( ) ( ) C
k'
N2 i ( ) ( ) +
2
------------------------------------------------------------- =
C
l
N3 i ( ) ( ) Max
C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) C
l
N1 k ( ) ( ) C
j '
N1 i ( ) ( ) C
k
N1 j ' ( ) ( ) C
l
N1 k ( ), ,
C
j
N1 i ( ) ( ) C
k'
N1 j ( ) ( ) ( ) C
l
N1 k' ( ) C
j '
N1 i ( ) ( ) C
k'
N1 j ' ( ) ( ) C
l
N1 k' ( ) , \ .
|
| |
c
N3
=
c
N3
C
l l '
N3 i ( ) ( )
C
l
N3 i ( ) ( ) C
l '
N3 i ( ) ( ) +
2
----------------------------------------------------------- =
462 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Close Neighbour Criterion
The constraint level of any cell i depends on the number of its close neighbour cells j. The close neighbour cost ( )
depends on two components: the importance of the neighbour relation ( ) and the distance ( ) relative to maximum
close neighbour distance ( ).
Where
is the cost of the close neighbour constraint. This value can be defined in the Constraint Cost dialogue.
GSM Neighbour Criterion
This criterion is considered when the co-planning mode is activated (i.e. the Transmitters folder of the GSM .atl document
is made accessible in the UMTS .atl document) and inter-technology neighbours have been allocated. If the cell i is
neighbour of a GSM transmitter, the cell constraint level depends on how many cells j are neighbours of the same GSM
transmitter. The total cost due to GSM neighbour constraint is given as:
Where
is the cost of the GSM neighbour constraint. This value can be defined in the Constraint Cost dialogue.
Cluster Criterion
When the "Distributed per Site" allocation strategy is used, you can consider additional constraints on allocated clusters
(one cell, its first order neighbours and its second order neighbours must be assigned scrambling codes from different
clusters). In this case, the constraint level of any cell i depends on the number of first and second order neighbours, j and
k. The total cost due to the cluster constraint is given as:
Where
is the cost of the cluster constraint. This value can be defined in the Constraint Cost dialogue.
8.8.1.4.2 Transmitter Priority
In case you have a multi-carrier network and you run scrambling code allocation on "all" the carriers, Atoll allots priorities
to transmitters. Priorities assigned to transmitters depend on how much constrained each transmitter is and the cost
defined for each constraint. The higher the cost on a transmitter, the higher the priority it has for the scrambling code
allocation process.
Let us consider a transmitter Tx with two cells using carriers 0 and 1. The cost due to constraints on the transmitter is given
as:
With and
Here, the domain available for the transmitter is the intersection of domains assigned to cells of the transmitter. The
domain constraint is mandatory and cannot be broken.
Note:
Atoll considers the highest cost of both links when a neighbour relation is symmetric and the
importance value is different.
In this case, we have:
And
C
j
N1 i ( ) ( ) Max I
i j
I
j i
, ( ) c
N1
=
C
k
N2 i ( ) ( ) Max C
j
N1 i ( ) ( ) C
k
N1 j ( ) ( ) C
j
N1 k ( ) ( ) C
i
N1 j ( ) ( ) ( , ) c
N2
=
C
i
CN ( )
I
i j
d
i j
d
CN
Max
C
i
CN ( )
I
i j
1
d
i j
d
CN
Max
------------
\ .
|
| |
+
2
------------------------------------------ c
CN

\ .
|
|
|
|
|
| |
j

=
c
CN
C
i
N
2G
( ) c
N
2G
j Tx
2G
( )
j

=
c
N
2G
C
i
Cl uster ( ) C
j
N1 i ( ) ( ) c
Cl uster

C
k
N2 i ( ) ( ) c
Cl uster

+ =
c
Cl uster
C
Tx
C
Tx
Dom ( ) C +
Tx
U ( ) =
C
Tx
U ( )
Max
i Tx e
C
i
U ( ) ( ) = C
Tx
Dom ( ) 128 Number of scrambling codes in the domain =
Forsk 2010 AT283_TRG_E2 463
Chapter 8: TD-SCDMA Networks
8.8.1.4.3 Site Priority
In case of "Per Site" allocation strategies (One SYNC_DL code per Site and Distributed per Site), Atoll allots priorities to
sites. Priorities assigned to sites depend on how much constrained each site is and the cost defined for each constraint.
The higher the cost on a site, the higher the priority it has for the scrambling code allocation process.
Let us consider a site S with three transmitters; each of them has two cells using carriers 0 and 1. The cost due to
constraints on the site is given as:
With and
Here, the domain considered for the site is the intersection of domains available for transmitters of the site. The domain
constraint is mandatory and cannot be broken.
8.8.2 Scrambling Code Allocation Example
8.8.2.1 Single Carrier Network
In order to understand the differences between the different allocation strategies and the behaviour of algorithm when
using a maximum of codes or not, let us consider the following sample scenario:
Let Site0, Site1, Site2, and Site3 be four sites, with 3 transmitters each using carrier 0, to whom scrambling codes have
to be allocated out of 6 clusters of 4 scrambling codes. This implies that the domain of scrambling codes for the four sites
is from 0 to 23 (cluster 0 to cluster 5). The reuse distance is supposed to be less than the inter-site distance. Only co-site
neighbours exist.
The following section shows the results of each combination of options with explanations where necessary.
C
S
C
S
U ( ) C
S
Dom ( ) + =
C
S
U ( )
Max
Tx S e
C
Tx
U ( ) ( ) = C
S
Dom ( ) 128 Number of scrambling codes in the domain =
Figure 8.19Scrambling Code Allocation Example
464 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
8.8.2.1.1 Strategy: Clustered
Since the restrictions of neighbourhood only apply to co-sites and, in our case, the distances between sites are greater
than the reuse distance, every cell has the same priority. Allocation is performed in an alphanumeric order.
8.8.2.1.2 Strategy: Distributed per Cell
Since the restrictions of neighbourhood only apply to co-sites and, in our case, the distances between sites are greater
than the reuse distance, every cell has the same priority. Allocation is performed in an alphanumeric order.
Without "Use a Maximum of Code" With "Use a Maximum of Code"
Atoll starts allocating the codes from the start of cluster 0
at each site.
As it is possible to use a maximum of codes, Atoll starts
allocation at the start of a different cluster at each site.
When a cluster is reused, and there are non allocated
codes left in the cluster, Atoll first allocates those codes
before reusing the already used ones.
Without "Use a Maximum of Code" With "Use a Maximum of Code"
Atoll allocates codes from different clusters to each cell of
the same site. Under given constraints of neighbourhood
and reuse distance, same codes can be allocated to each
sites cells.
Atoll allocates codes from different clusters to each sites
cells. As it is possible to use a maximum of codes, Atoll
allocates the codes so that there is least repetition of
codes.
Forsk 2010 AT283_TRG_E2 465
Chapter 8: TD-SCDMA Networks
8.8.2.1.3 Strategy: One SYNC_DL Code per Site
Since the restrictions of neighbourhood only apply to co-sites, therefore, every site has the same priority. Cluster allocation
to sites is performed in an alphanumeric order.
8.8.2.1.4 Strategy: Distributed per Site
Since the restrictions of neighbourhood only apply to co-sites, therefore, every site has the same priority. Cluster allocation
to sites is performed in an alphanumeric order.
8.8.2.2 Multi Carrier Network
If you have a multi carrier network, i.e., transmitters with more than one cells using different carriers, and you run
scrambling code allocation on "all" the carriers, Atoll allocates the same scrambling code to each carrier of a transmitter.
Let Site0, Site1, Site2, and Site3 be four sites with 3 cells using carrier 0 and 3 cells using carrier 1. Scrambling codes
have to be allocated out of 6 clusters consisted of 4 scrambling codes. This implies that the domain of scrambling codes
for the four sites is from 0 to 23 (cluster 0 to cluster 5). The reuse distance is supposed to be less than the inter-site
Without "Use a Maximum of Code" With "Use a Maximum of Code"
In this strategy, a cluster of codes is limited to be used at
just one site at a time unless all codes and clusters have
been allocated and there are still sites remaining to be
allocated. In this case, Atoll reuses the cluster as far as
possible at another site.
When it is possible to use a maximum of codes, Atoll can
allocate different codes from a reused cluster at another
site.
Without "Use a Maximum of Code" With "Use a Maximum of Code"
A group of adjacent clusters is allocated to one site at a
time, unless all the codes and groups of adjacent clusters
have been allocated but there are still sites remaining to
be allocated. In this case (here only one group of adjacent
clusters 0, 1, and 2 is available), Atoll reuses the group as
far as possible at another site.
When it is possible to use a maximum of codes, Atoll can
allocate different codes from a reused groups of adjacent
clusters at another site.
466 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
distance. Only co-site neighbours exist. Every site has the same priority and the cluster allocation to sites is performed in
an alphanumeric order.
Atoll allocates one cluster at each site and then, one code to each transmitter. Then, the same code is given to each cell
of the transmitter.
8.9 Automatic GSM/TD-SCDMA Neighbour Allocation
It is possible to automatically calculate and allocate neighbours between GSM and TD-SCDMA networks. In Atoll, it is
called inter-technology neighbour allocation.
Inter-technology handover is used in two cases:
When the TD-SCDMA coverage is not continuous. In this case, the TD-SCDMA coverage is extended by TD-
SCDMA to GSM handovers.
In order to balance traffic and service distribution between both networks.
Atolls automatic inter-technology neighbour allocation algorithm takes into account both cases.
In order to be able to use the inter-technology neighbour allocation algorithm, you must have:
An .atl document containing the GSM network, GSM.atl, and another one containing the TD-SCDMA network, TD-
SCDMA.atl,
An existing link on the Transmitters folder of GSM.atl into TD-SCDMA.atl.
The external neighbour allocation algorithm takes into account all the GSM TBC transmitters. It means that all the TBC
transmitters of GSM.atl are potential neighbours. The TD-SCDMA cells, in TD-SCDMA.atl, to be allocated neighbours are
called TBA cells which fulfill following conditions:
They are active
They satisfy the filter criteria applied to Transmitters folder
They are located inside the focus zone
They belong to the folder for which allocation has been executed. This folder can be either the Transmitters folder
or one of its subfolders.
Only TD-SCDMA TBA cells can be assigned neighbours.
8.9.1 Automatic Allocation Description
The allocation algorithm takes into account criteria listed below:
The inter-transmitter distance
The maximum number of neighbours
Allocation options
The selected allocation strategy
Two allocation strategies are available: the first one is based on distance and the second one on coverage overlapping.
We assume we have a TD-SCDMA reference cell, A, and a GSM candidate neighbour transmitter, B.
Figure 8.20Scrambling Code Allocation to All Carriers
Forsk 2010 AT283_TRG_E2 467
Chapter 8: TD-SCDMA Networks
8.9.1.1 Algorithm Based on Distance
When automatic allocation starts, Atoll checks following conditions:
1. The distance between the TD-SCDMA reference cell and the GSM neighbour must be less than the user-defined
maximum inter-site distance. If the distance between the TD-SCDMA reference cell and the GSM neighbour is
greater than this value, then the candidate neighbour is discarded.
Candidate neighbours are sorted in descending order with respect to distance.
2. The calculation options:
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose
one or more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same
site than the reference TD-SCDMA cell in the candidate neighbour list. This option is automatically selected.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you
may force/forbid a GSM transmitter to be candidate neighbour of the reference TD-SCDMA cell.
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current
neighbours and carries out a new neighbour allocation. If not selected, existing neighbours are kept.
3. The importance of neighbours.
Next, Atoll calculates the importance of the automatically allocated neighbours. Atoll sorts the neighbours by
decreasing importance in order to keep the ones with high importance. If the maximum number of neighbours to
be allocated to each cell is exceeded, Atoll keeps the ones with high importance.
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies
between 0 to 100%.
Where is the distance between the UMTS reference cell and the GSM neighbour and is the maximum
inter-site distance.
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site, or distance. For neighbours accepted for
distance reasons, Atoll displays the distance from the reference cell (m). Finally, if cells have previous allocations in the
list, neighbours are marked as existing.
8.9.1.2 Algorithm Based on Coverage Overlapping
When automatic allocation starts, Atoll checks following conditions:
1. The distance between the TD-SCDMA reference cell and the GSM neighbour must be less than the user-defined
maximum inter-site distance. If the distance between the TD-SCDMA reference cell and the GSM neighbour is
greater than this value, then the candidate neighbour is discarded.
2. The calculation options:
Carriers: This option enables you to select the carrier(s) on which you want to run the allocation. You may choose
one or more carriers. Atoll will allocate neighbours to cells using the selected carriers.
Force co-site cells as neighbours: It enables you to automatically include GSM transmitters located on the same
site than the reference TD-SCDMA cell in the candidate neighbour list. This option is automatically selected.
Force exceptional pairs: This option enables you to force/forbid some neighbourhood relationships. Therefore, you
may force/forbid a GSM transmitter to be candidate neighbour of the reference TD-SCDMA cell.
Note:
Transmitter azimuths are taken into account to evaluate the inter-transmitter distance. For
further information on inter-transmitter distance calculation, please refer to "Calculation of
Inter-Transmitter Distance" on page 469.
Neighbourhood cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected 100 %
Neighbourhood relationship that fulfils
distance conditions
If the maximum distance is not exceeded
1
d
d
max
------------
d d
max
Note:
The inter-transmitter distance is not effected by the azimuths. Only the geographical inter-
transmitter distance is considered.
468 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Delete existing neighbours: When selecting the Delete existing neighbours option, Atoll deletes all the current
neighbours and carries out a new neighbour allocation. If not selected, existing neighbours are kept.
3. There must be an overlapping zone ( ) with a given cell edge coverage probability.
Two different cases may be considered for S
A
:
- 1
st
case: S
A
is the area where the cell A is the best serving cell of the TD-SCDMA network.
- The pilot signal received from A is greater than the minimum pilot signal level and is the highest one.
- The margin is set to 0 dB.
- 2
nd
case: The margin is different from 0 dB and S
A
is the area where:
- The pilot signal level received from A exceeds the user-defined minimum pilot signal level and is within a
margin from the highest signal level.
Two different cases may be considered for S
B
:
- 1
st
case: S
B
is the area where the cell B is the best serving transmitter of the GSM network.
In this case, the margin must be set to 0 dB.
- The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and
is the highest one.
- 2
nd
case: The margin is different from 0 dB and S
B
is the area where:
- The signal level received from B on the BCCH TRX type exceeds the user-defined minimum threshold and
is within a margin from the best BCCH signal level.
Atoll calculates the percentage of covered area ( ) and compares this value to the % minimum
covered area. If this percentage is less than the minimum, the candidate neighbour B is discarded.
Candidate neighbours fulfilling coverage conditions are sorted in descending order with respect to percentage of
covered area.
4. The importance of neighbours.
Next, Atoll calculates the importance of the automatically allocated neighbours. Atoll sorts the neighbours by
decreasing importance in order to keep the ones with high importance. If the maximum number of neighbours to
be allocated to each cell is exceeded, Atoll keeps the ones with high importance.
As indicated in the table below, the neighbour importance depends on the neighbourhood cause; this value varies
between 0 to 100%.
Except the case of forced neighbours (importance = 100%), priority assigned to each neighbourhood cause is
determined using the Importance Function (IF). The IF considers two factors for calculating the importance:
- The co-site factor (C) which is a Boolean
- The overlapping factor (O) meaning the percentage of overlapping
The IF is user-definable using the Min importance and Max importance fields.
The IF evaluates importance as follows:
Where
Neighbourhood reason When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter If the Force co-site cells as neighbours option is selected IF
Neighbourhood relationship that fulfils
coverage conditions
If the % minimum covered area is exceeded IF
Factor Min importance Default value Max importance Default value
Overlapping factor (O) 1% 60%
Co-site factor (C) 60% 100%
Co-site neighbourhood reason IF
Resulting IF using the default
values from the table above
No
Yes
S
A
S
B

S
A
S
B

S
A
---------------------- 100
Mi n O ( ) Max O ( )
Mi n C ( ) Max C ( )
Mi n O ( ) A O ( ) O ( ) + 1% 59% O ( ) +
Mi n C ( ) A C ( ) O ( ) + 60% 40% O ( ) +
A X ( ) Max X ( ) Mi n X ( ) =
Forsk 2010 AT283_TRG_E2 469
Chapter 8: TD-SCDMA Networks
In the Results part, Atoll provides the list of neighbours, the number of neighbours and the maximum number of
neighbours allowed for each cell. In addition, it indicates the importance (in %) of each neighbour and the allocation
reason. Therefore, a neighbour may be marked as exceptional pair, co-site or coverage. For neighbours accepted for co-
site and coverage reasons, Atoll displays the percentage of area meeting the coverage conditions and the corresponding
surface area (km
2
). Finally, if cells have previous allocations in the list, neighbours are marked as existing.
8.9.1.3 Appendices
8.9.1.3.1 Delete Existing Neighbours Option
As explained above, Atoll keeps the existing inter-technology neighbours when the Delete existing neighbours option is
not selected. If a new TBA cell i is created in TD-SCDMA.atl, you can run the automatic allocation with the Delete existing
neighbours option not selected, in order to allocate neighbours to the new cell i only.
If you change some allocation criteria (e.g., increase the maximum number of neighbours or create a new GSM TBC
transmitter) and start a new allocation without selecting the Delete existing neighbours option, Atoll examines the
neighbour list of the TBA cells and checks allocation criteria only if there is still space left in their neighbour lists. A new
GSM TBC transmitter can enter the TBA cell neighbour list if allocation criteria are satisfied. It will be the first one in the
neighbour list.
8.9.1.3.2 Calculation of Inter-Transmitter Distance
When allocation algorithm is based on distance, Atoll takes into account the real distance and azimuths of antennas in
order to calculate the effective inter-transmitter distance.
Where x = 0.5% so that the maximum variation in D does not to exceed 1%. D is stated in m.
The formula above implies that two cells facing each other have a smaller effective distance than the real physical
distance. It is this effective distance that is taken into account rather than the real distance.
This formula is not used when allocation algorithm is based on coverage overlapping. In this case, the actual inter-
transmitter distance is considered.
Notes:
If there is no overlapping between the range of each factor, the neighbours will be ranked
by neighbourhood cause. Using the default values for minimum and maximum importance
fields, neighbours will be ranked in the following order:
i. Co-site neighbours
ii. Neighbours based on coverage overlapping
If the ranges of the importance factors overlap, the neighbours may not be ranked
according to the neighbourhood cause.
The ranking between neighbours from the same category depends on the factor (O).
Notes:
No prediction study is needed to perform an automatic neighbour allocation. When starting
an automatic neighbour allocation, Atoll automatically calculates the path loss matrices if
not found.
A forbidden neighbour must not be listed as neighbour except if the neighbourhood
relationship already exists and the Delete existing neighbours option is unchecked when
you start the new allocation. In this case, Atoll displays a warning in the Event viewer
indicating that the constraint on the forbidden neighbour will be ignored by algorithm
because the neighbour already exists.
In the Results, Atoll displays only the cells for which it finds new neighbours. Therefore, if a
TBA cell has already reached its maximum number of neighbours before starting the new
allocation, it will not appear in the Results table.
Figure 8.21Inter-Transmitter Distance Computation
Di st Cel l A Cel l B , ( ) D 1 x | cos x o cos + ( ) =
470 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Chapter 9
WiMAX BWA Networks
Forsk 2010 AT283_TRG_E2 473
Chapter 9: WiMAX BWA Networks
9 WiMAX BWA Networks
This chapter describes all the calculations performed in Atoll WiMAX BWA documents, i.e, WiMAX 802.16d and WiMAX
802.16e. The titles of sections that present 16d- or 16e-specific algorithms include the name of the technology for you to
recognize them easily.
The first part of this chapter lists all the input parameters in the WiMAX BWA documents, their significance, location in the
Atoll GUI, and their usage. It also contains the lists of the formulas used for the calculations.
The second part describes all the calculation processes, i.e., signal level coverage predictions, point analysis calculations,
signal quality coverage predictions, calculations on subscriber lists, and Monte Carlo simulations. The calculation
algorithms used by these calculation processes are available in the next part.
The third part describes all the calculation algorithms used in all the calculations. These algorithms include the calculation
of signal levels, noise, and interference for downlink and uplink considering the effects of smart antennas, power control,
subchannelisation, MIMO etc., and the radio resource management algorithms used by the different available schedulers.
The third part also describes Forsks conventional and optimum beamformer smart antenna models in detail.
If you are new to WiMAX, you can also see the Glossary of WiMAX Terms in the User Manual for information on WiMAX
terms and concepts, especially in the context of their user in Atoll.
9.1 Definitions and Formulas
The tables in the following subsections list the input and output parameters, and formulas used in simulations and other
computations.
9.1.1 Input
This table lists the input to computations, coverage predictions, and simulations.
Important:
All the calculations are performed on TBC (to be calculated) transmitters. For the definition
of TBC transmitters please refer to "Path Loss Matrices" on page 74.
A cell refers to a transmitter-carrier (TX-c) pair. The cell being studied during a calculation
is referred to as TX
i
(ic) in this chapter.
All the calculation algorithms in this section are described for two types of cells.
- A studied cell (represented by the subscript "i") comprising the studied transmitter TX
i
and
its carrier ic. It is the cell which is currently the focus of the calculation. For example, a victim
cell when calculating the interference it is receiving from other cells.
- Other cells (represented by the subscript "j") comprising the other transmitter TX
j
and its
carrier jc. The other cells in the network can be interfering cells (downlink) or the serving
cells of interfering mobiles (uplink).
All the calculation algorithms in this section are described for two types of receivers.
- M
i
: A pixel (coverage predictions), subscriber (calculations on subscriber lists), or mobile
(Monte Carlo simulations) covered/served by the studied cell TX
i
(ic).
- M
j
: A mobile (Monte Carlo simulations) covered/served by any other cell TX
j
(jc).
Logarithms used in this chapter (Log function) are base-10 unless stated otherwise.
Name Value Unit Description
K
1.38 x 10
-23
J/K Boltzmanns constant
T 290 K Ambient temperature
Calculation result ( ) dBm/Hz
Power spectral density of thermal
noise
Global parameter ms
Frame Duration
Choice List: 2, 2.5, 4, 5, 8, 10, 12.5, 20
Global parameter None
Cyclic Prefix Ratio
Choice List: 1/4, 1/8, 1/16, 1/32
Global parameter SD Fixed time-domain overhead (DL)
Global parameter SD Fixed time-domain overhead (UL)
Global parameter % Variable time-domain overhead (DL)
Global parameter % Variable time-domain overhead (UL)
n
0
10 Log K T 1000 ( ) 174 dBm/Hz =
D
Frame
r
CP
O
Fi xed
DL
O
Fi xed
UL
O
Vari abl e
DL
O
Vari abl e
UL
474 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Global parameter %
Ratio of the DL subframe to the entire
frame (TDD only)
Global parameter None
Number of symbol durations per frame
that corresponds to the DL subframe
(TDD only)
Global parameter None
Number of symbol durations per frame
that corresponds to the UL subframe
(TDD only)
Global parameter ms Transmit Time Guard (TDD only)
Global parameter ms Receive Time Guard (TDD only)
Global parameter dB Uplink power control margin
Global parameter
a
dB
Minimum signal to thermal noise
threshold (interferer cutoff)
or
Global parameter (WiMAX 802.16d)
Permutation zone parameter (WiMAX 802.16e)
None
Number of subchannels per channel
in UL subframe
Permutation zone parameter (WiMAX 802.16e) None
Number of subchannels per channel
in DL subframe
Global parameter (WiMAX 802.16d)
Frame configuration parameter (WiMAX 802.16e)
None
Total number of subcarriers per
channel (FFT size)
Frame configuration parameter (WiMAX 802.16e) None
Number of subcarriers used by the
preamble
or
Global parameter (WiMAX 802.16d)
Permutation zone parameter (WiMAX 802.16e)
None
Number of used subcarriers per
channel
or
Global parameter (WiMAX 802.16d)
Permutation zone parameter (WiMAX 802.16e)
None
Number of subcarriers per channel
used for data transfer
Hard-coded parameter ( ) None
Number of DC subcarriers per
channel
or Calculation result ( or
)
None
Number of pilot subcarriers per
channel
or
Calculation result
( or
)
None
Number of guard subcarriers per
channel
Permutation zone parameter (WiMAX 802.16e) None Uplink permutation zone
Permutation zone parameter (WiMAX 802.16e) None Downlink permutation zone
Permutation zone parameter (WiMAX 802.16e) dB
Quality threshold: Required preamble
C/N or C/(I+N) for accessing a zone
Permutation zone parameter (WiMAX 802.16e) Km/hr
Speed limit for mobiles trying to
access a permutation zone
Permutation zone parameter (WiMAX 802.16e) m
Maximum distance from the
transmitter covered by a zone
Permutation zone parameter (WiMAX 802.16e) None Permutation zone priority
Frequency band parameter MHz Channel bandwidth
Frequency band parameter None
First channel number of the frequency
band
Frequency band parameter None
Last channel number of the frequency
band
Frequency band parameter MHz
Start frequency of the TDD frequency
band
Frequency band parameter MHz
DL Start frequency of the FDD
frequency band
Frequency band parameter MHz
UL Start frequency of the FDD
frequency band
Frequency band parameter None Sampling factor
r
DL-Frame
TDD
N
SD DL
TDD
N
SD UL
TDD
D
TTG
TDD
D
RTG
TDD
M
PC
CNR
Mi n
N
SC UL
N
SC UL
PZ
N
SC DL
PZ
N
SCa Total
N
SCa Preambl e
N
SCa Used
N
SCa Used
PZ
N
SCa Data
N
SCa Data
PZ
N
SCa DC
N
SCa DC
1 =
N
SCa Pi l ot
N
SCa Pi l ot
PZ
N
SCa Pi l ot
N
SCa Used
N
SCa Data
=
N
SCa Pi l ot
PZ
N
SCa Used
PZ
N
SCa Data
PZ
=
N
SCa Guard
N
SCa Guard
PZ
N
SCa Guard
N
SCa Total
N
SCa Used
N
SCa DC
=
N
SCa Guard
PZ
N
SCa Total
N
SCa Used
PZ
N
SCa DC
=
PZ
UL
PZ
DL
QT
PZ
Speed
Max PZ
d
Max PZ
p
PZ
W
Channel
N
Channel
Fi rst
N
Channel
Last
F
Start FB TDD
F
Start FB FDD DL
F
Start FB FDD UL
f
Sampl i ng
Forsk 2010 AT283_TRG_E2 475
Chapter 9: WiMAX BWA Networks
Frequency band parameter dB Adjacent Channel Suppression Factor
Network parameter dB
Inter-technology interference
reduction factor
Bearer parameter None Bearer index
Bearer parameter None Modulation used by the bearer
Bearer parameter None Coding rate of the bearer
Bearer parameter
bits/
symbol
Bearer Efficiency
Bearer parameter dB Bearer selection threshold
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
dB Transmitter noise figure
Transmitter parameter None
Number of antennas used for MIMO in
transmission
Transmitter parameter None
Number of antennas used for MIMO in
reception
Antenna parameter dB Transmitter antenna gain
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
dB Transmitter loss
Cell parameter None Cells channel number
Cell parameter dBm Preamble power
Cell parameter in dB
in %
dB Traffic power reduction
Cell parameter in dB
in %
dB Pilot power reduction
Cell parameter in dB
in %
dB Idle pilot power reduction
Cell parameter % Downlink traffic load
Cell parameter % Uplink traffic load
Cell parameter % Maximum downlink traffic load
Cell parameter % Maximum uplink traffic load
Cell parameter dB Uplink noise rise
Cell parameter None Maximum number of users per cell
Cell parameter % Segmentation usage ratio
Cell parameter % AAS usage ratio
Cell parameter dB Adaptive MIMO switch threshold
Cell parameter dB Multi-user MIMO threshold
Cell parameter None Preamble index
Cell parameter dB Preamble C/N threshold
Cell parameter m
Channel and preamble index reuse
distance
Cell parameter None Uplink MU-MIMO gain
Cell parameter dB Inter-technology downlink noise rise
Cell parameter dB Inter-technology uplink noise rise
f
ACS FB
f
IRF
Inter Tech
B
Mod
B
CR
B
q
B
T
B
nf
TX
N
Ant TX
N
Ant RX
G
TX
L
TX
N
Channel
P
Preambl e
AP
Traffi c
P
Traffi c
P
Preambl e
AP
Traffi c
=
AP
Traffi c
Rati o
10
AP
Traf fi c
10
------------------------
=
AP
Pi l ot
P
Pi l ot
P
Preambl e
AP
Pi l ot
=
AP
Pi l ot
Rati o
10
AP
Pi l ot
10
-------------------
=
AP
Idl e Pi l ot
P
Idl e Pi l ot
P
Preambl e
AP
Idl e Pi l ot
=
AP
Idl e Pi l ot
Rati o
10
AP
Idl e Pi l ot
10
---------------------------------
=
TL
DL
TL
UL
TL
DL Max
TL
UL Max
NR
UL
N
Users Max
SU
AU
T
AMS
T
MU MIMO
PI
T
Preambl e
D
Reuse
G
MU MIMO
NR
DL
Inter Tech
NR
UL
Inter Tech
476 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Cell WiMAX equipment parameter None Maximum SU-MIMO gain
Cell WiMAX equipment parameter dB Uplink STTD/MRC gain
Scheduler parameter % QoS class bias factor
Service parameter None QoS class of the service
Service parameter None Service priority
Service parameter None
Highest bearer used by a service in
the downlink
Service parameter None
Highest bearer used by a service in
the uplink
Service parameter % Uplink activity factor for voice services
Service parameter %
Downlink activity factor for voice
services
Service parameter kbps
Minimum throughput demand in the
uplink
Service parameter kbps
Minimum throughput demand in the
downlink
Service parameter kbps
Maximum throughput demand in the
uplink
Service parameter kbps
Maximum throughput demand in the
downlink
Service parameter kbps
Average requested throughput in the
uplink
Service parameter kbps
Average requested throughput in the
downlink
Service parameter kbps Throughput offset
Service parameter % Scaling factor
Service parameter dB Body loss
Terminal parameter dBm Minimum terminal power allowed
Terminal parameter dBm Maximum terminal power allowed
Terminal parameter dB Terminal noise figure
Terminal parameter dB Terminal antenna gain
Terminal parameter dB Terminal loss
Terminal parameter None
Number of antennas used for MIMO in
transmission
Terminal parameter None
Number of antennas used for MIMO in
reception
Terminal WiMAX equipment parameter None Maximum SU-MIMO gain
Terminal WiMAX equipment parameter dB Downlink STTD/MRC gain
Clutter parameter dB Additional uplink STTD/MRC gain
Clutter parameter dB Additional downlink STTD/MRC gain
Clutter parameter None SU-MIMO gain factor
Clutter parameter dB Indoor loss
Propagation model result dB Path loss
Monte Carlo simulations: Random result calculated from model
standard deviation
Coverage Predictions: Result calculated from cell edge coverage
probability and model standard deviation
dB Model Shadowing margin
Coverage Predictions: Result calculated from cell edge coverage
probability and C/I standard deviation
dB C/I Shadowing margin
G
SU MIMO
Max
G
STTD
UL
f
Bi as
QoS
QoS
p
B
DL Hi ghest
B
UL Hi ghest
f
Act
UL
f
Act
DL
TPD
Mi n UL
TPD
Mi n DL
TPD
Max UL
TPD
Max DL
TP
Average
UL
TP
Average
DL
TP
Offset
f
TP Scal i ng
L
Body
P
Mi n
P
Max
nf
G
L
N
Ant TX
N
Ant RX
G
SU MIMO
Max
G
STTD
DL
AG
STTD
UL
AG
STTD
DL
f
SU MIMO
L
Indoor
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
Forsk 2010 AT283_TRG_E2 477
Chapter 9: WiMAX BWA Networks
9.1.2 Co- and Adjacent Channel Overlaps Calculation
9.1.3 Preamble Signal Quality Calculations
9.1.3.1 Preamble Signal Level Calculation
a. Any interfering cell whose signal to thermal noise ratio is less than will be discarded. CNR
Mi n
Name Value Unit Description
MHz
Start frequency for the channel
number assigned to a cell
MHz
End frequency for the channel number
assigned to a cell
MHz Co-channel overlap bandwidth
None Co-channel overlap ratio
MHz
Bandwidth of the lower-frequency
adjacent channel overlap
None
Lower-frequency adjacent channel
overlap ratio
MHz
Bandwidth of the higher-frequency
adjacent channel overlap
None
Higher-frequency adjacent channel
overlap ratio
None Adjacent channel overlap ratio
if interferer uses a TDD frequency band and victim uses
an FDD frequency band, 1 otherwise
None FDD TDD overlap ratio
None Total overlap ratio
F
Start
TX
i
i c ( )
F
Start FB
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst
( ) +
F
End
TX
i
i c ( )
F
Start FB
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst
1 + ( ) +
W
CCO
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( )
r
CCO
TX
i
i c ( ) TX
j
j c ( )
W
CCO
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
---------------------------------------
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
W
Channel
TX
i
i c ( )
, ( )
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
---------------------------------------
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
W
Channel
TX
i
i c ( )
+ , ( ) Max F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( )
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
---------------------------------------
r
ACO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
+
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( )
r
DL Frame
TDD
100
---------------------------
r
O
TX
i
i c ( ) TX
j
j c ( )
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS FB
TX
i
i c ( )

10
---------------------------
+
\ .
|
|
|
| |
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( )

if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
>
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS FB
TX
i
i c ( )

10
---------------------------
+
\ .
|
|
|
| |
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( ) W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------
if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
<
Name Value Unit Description
dBm Received preamble signal level
Without smart antennas:
With smart antennas:
dBm Preamble EIRP of a cell
C
Preambl e
TX
i
i c ( ) EIRP
Preambl e
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i

+
EIRP
Preambl e
TX
i
i c ( )
P
Preambl e
TX
i
i c ( )
G
TX
i
L
TX
i
+
P
Preambl e
TX
i
i c ( )
G
TX
i
L
TX
i
10 Log E
SA
TX
i
( ) + +
478 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.1.3.2 Preamble Noise Calculation
9.1.3.3 Preamble Interference Calculation
9.1.3.4 Preamble C/N Calculation
9.1.3.5 Preamble C/(I+N) Calculation
dB Path loss
dB Total losses
L
Path L
Model
L
Ant
TX
i
+
L
Total
L
Path
L
TX
i
L
Indoor
M
Shadowi ng Model
+ + + G
TX
i
L
M
i
G
M
i

L
Ant
M
i
+
+ L
Body
M
i
+
Name Value Unit Description
WiMAX 802.16d:
WiMAX 802.16e:
dBm Preamble thermal noise for a cell
WiMAX 802.16d: and WiMAX 802.16e: None Preamble segmenting factor
dBm Preamble noise for a cell
n
0 Preambl e
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Preambl e
TX
i
i c ( )
N
SCa Total
TX
i
i c ( )
----------------------------------------
\ .
|
|
| |
+
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Preambl e
TX
i
i c ( )
N
SCa Total
TX
i
i c ( )
---------------------------------------- f
Segment
Preambl e

\ .
|
|
| |
+
f
Segment
Preambl e
1
1
3
---
n
Preambl e
TX
i
i c ( )
n
0 Preambl e
TX
i
i c ( )
nf
M
i
+
Name Value Unit Description
dBm
Total interference generated by an
interfering cell
dB
Interference reduction factor due to
the co- and adjacent channel overlap
WiMAX 802.16d:
WiMAX 802.16e:
dB
Interference reduction factor due to
segmentation (WiMAX 802.16e)
WiMAX 802.16d: 1
WiMAX 802.16e: 1 if and 0 if
None
Preamble subcarrier collision
probability
I
Preambl e
TX
j
j c ( )
C
Preambl e
TX
j
j c ( )
f
O
TX
i
i c ( ) TX
j
j c ( )
f
Seg
TX
i
i c ( ) TX
j
j c ( )
I
DL
Inter Tech
+ + +
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( )
f
Seg
TX
i
i c ( ) TX
j
j c ( )
0
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( )
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
= N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
=
Name Value Unit Description
dB Preamble C/N for a cell
CNR
Preambl e
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
n
Preambl e
TX
i
i c ( )

Name Value Unit Description


dB Preamble C/(I+N) for a cell
dBm Preamble Total Noise (I+N) for a cell
CINR
Preambl e
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
10 Log
10
I
Preambl e
TX
j
j c ( )
10
-------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Preambl e
TX
i
i c ( )
10
---------------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

I N + ( )
Preambl e
TX
i
i c ( )
10 Log
10
I
Preambl e
TX
j
j c ( )
10
-------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Preambl e
TX
i
i c ( )
10
---------------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
Forsk 2010 AT283_TRG_E2 479
Chapter 9: WiMAX BWA Networks
9.1.4 Traffic and Pilot Signal Quality Calculations
9.1.4.1 Traffic and Pilot Signal Level Calculation (DL)
9.1.4.2 Traffic and Pilot Noise Calculation (DL)
9.1.4.3 Traffic and Pilot Interference Calculation (DL)
Name Value Unit Description
dBm Received traffic signal level
dBm Received pilot signal level
dBm Traffic EIRP of a cell
dBm Pilot EIRP of a cell
dBm Traffic transmission power of a cell
dBm Pilot transmission power of a cell
C
Traffi c
TX
i
i c ( ) EIRP
Traffi c
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i

+
C
Pi l ot
TX
i
i c ( ) EIRP
Pi l ot
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i

+
EIRP
Traffi c
TX
i
i c ( )
P
Traffi c
TX
i
i c ( )
G
TX
i
L
TX
i
+
EIRP
Pi l ot
TX
i
i c ( )
P
Pi l ot
TX
i
i c ( )
G
TX
i
L
TX
i
+
P
Traffi c
TX
i
i c ( )
P
Preambl e
TX
i
i c ( )
AP
Traffi c
TX
i
i c ( )

P
Pi l ot
TX
i
i c ( )
P
Preambl e
TX
i
i c ( )
AP
Pi l ot
TX
i
i c ( )

Name Value Unit Description


WiMAX 802.16d:
WiMAX 802.16e:
With Segmentation (WiMAX 802.16e):
dBm Thermal noise for a cell
WiMAX 802.16d:
WiMAX 802.16e: without segmentation, with
segmentation
None Segmenting factor
dBm Downlink noise for a cell
n
0 DL
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
N
SCa Total
------------------------------
\ .
| |
+
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
PZ
DL
M
i
N
SCa Total
TX
i
i c ( )
------------------------------
\ .
|
|
|
| |
+
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
PZ
DL
M
i
N
SCa Total
TX
i
i c ( )
------------------------------ f
Segment

\ .
|
|
|
| |
+
f
Segment
1
1
3 PSG 2 SSG +
15
----------------------------------------------------
n
DL
TX
i
i c ( )
n
0 DL
TX
i
i c ( )
nf
M
i
+
Name Value Unit Description
Monte Carlo Simulations: without
smart antennas, or with smart antennas
Coverage Predictions:
dBm
Total interference generated by an
interfering cell
I
Total
TX
j
j c ( )
10 Log 10
I
Non AAS
TX
j
j c ( )
10
---------------------------
10
I
Idl e
TX
j
j c ( )
10
------------------
+
\ .
|
|
|
| |

10 Log 10
I
AAS
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |

10 Log 10
I
Non AAS
TX
j
j c ( )
10
---------------------------
10
I
Idl e
TX
j
j c ( )
10
------------------
10
I
AAS
TX
j
j c ( )
10
------------------
+ +
\ .
|
|
|
| |

480 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
9.1.4.4 Traffic and Pilot C/N Calculation (DL)
Monte Carlo Simulations:
Coverage Predictions:
dBm
Traffic interference power of an
interfering cell
Monte Carlo Simulations:
Coverage Predictions:
dBm
Pilot interfering power of an interfering
cell
dBm Traffic EIRP of an interfering cell
dBm Pilot EIRP of an interfering cell
dBm
Interference from the loaded part of
the frame transmitted using the
transmitter antenna of an interfering
cell
Monte Carlo Simulations:
Coverage Predictions:
dBm
Interference power of an interfering
cell transmitted using smart antenna
dBm
Traffic EIRP of an interfering cell using
smart antenna
dBm
Interference from empty part of the
frame transmitted using the
transmitter antenna of an interfering
cell
dBm Idle pilot EIRP of an interfering cell
dBm
Interference from the empty part of the
frame transmitted using the
transmitter antenna of an interfering
cell
dB
Interference reduction factor due to
the co- and adjacent channel overlap
dB
Interference reduction factor due to
segmentation (WiMAX 802.16e)
I
Traffi c
TX
j
j c ( )
EIRP
Traffi c
TX
j
j c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+
EIRP
Traffi c
TX
j
j c ( )
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
L
Indoor
+
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+
I
Pi l ot
TX
j
j c ( )
EIRP
Pi l ot
TX
j
j c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+
EIRP
Pi l ot
TX
j
j c ( )
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
L
Indoor
+
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+
EIRP
Traffi c
TX
j
j c ( )
P
Traffi c
TX
j
j c ( )
G
TX
j
L
TX
j
+
EIRP
Pi l ot
TX
j
j c ( )
P
Pi l ot
TX
j
j c ( )
G
TX
j
L
TX
j
+
I
Non AAS
TX
j
j c ( )
10 Log TL
DL
TX
j
j c ( )
1 AU
TX
j
j c ( )
( ) 10
I
Traf f i c
TX
j
j c ( )
10
------------------
N
SCa Data
TX
j
j c ( )
N
SCa Used
TX
j
j c ( )
------------------------------
10
I
Pi l ot
TX
j
j c ( )
10
------------------
1
N
SCa Data
TX
j
j c ( )
N
SCa Used
TX
j
j c ( )
------------------------------
\ .
|
|
| |

+
\
.

|
|
|

\
.

|
|
|

I
AAS
TX
j
j c ( )
EIRP
AAS
TX
j
j c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+
EIRP
AAS
TX
j
j c ( )
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
L
Indoor
+
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+
EIRP
AAS
TX
j
j c ( )
P
Traffi c
TX
j
j c ( )
G
TX
j
L
TX
j
+
I
Idl e Pi l ot
TX
j
j c ( )
EIRP
Idl e Pi l ot
TX
j
j c ( )
L
Path
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+
EIRP
Idl e Pi l ot
TX
j
j c ( )
P
Idl e Pi l ot
TX
j
j c ( )
G
TX
j
L
TX
j
+
I
Idl e
TX
j
j c ( )
10 Log 1 TL
DL
TX
j
j c ( )
( ) 10
I
Idl e Pi l ot
TX
j
j c ( )
10
---------------------------
1
N
SCa Data
TX
j
j c ( )
N
SCa Used
TX
j
j c ( )
------------------------------
\ .
|
|
| |

\ .
|
|
|
| |

\ .
|
|
|
| |

f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( )
f
Seg
TX
i
i c ( ) TX
j
j c ( )
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( )
Name Value Unit Description
With MIMO (STTD/MRC):
With MIMO (AMS) if or
:
dB Traffic C/N for a cell
CNR
Traffi c
TX
i
i c ( )
C
Traffi c
TX
i
i c ( )
n
DL
TX
i
i c ( )

CNR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CNR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
Forsk 2010 AT283_TRG_E2 481
Chapter 9: WiMAX BWA Networks
9.1.4.5 Traffic and Pilot C/(I+N) Calculation (DL)
9.1.4.6 Traffic Signal Level Calculation (UL)
9.1.4.7 Traffic Noise Calculation (UL)
With MIMO (STTD/MRC):
With MIMO (AMS) if or
:
dB Pilot C/N for a cell
CNR
Pi l ot
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
n
DL
TX
i
i c ( )

CNR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CNR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
Name Value Unit Description
With MIMO (STTD/MRC):
With MIMO (AMS) if or
:
dB Traffic C/(I+N) for a cell
With MIMO (STTD/MRC):
With MIMO (AMS) if or
:
dB Pilot C/(I+N) for a cell
dBm Traffic Total Noise (I+N) for a cell
CINR
Traffi c
TX
i
i c ( )
C
Traffi c
TX
i
i c ( )
10 Log
10
I
DL
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
DL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

CINR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
CINR
Pi l ot
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
10 Log 10
I
DL
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
DL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

CINR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ +
I N + ( )
DL
TX
i
i c ( )
10 Log 10
I
DL
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
DL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
Name Value Unit Description

dBm Received uplink signal level
With without power control and after power
control
dBm Uplink EIRP of a user equipment
C
UL
M
i
EIRP
UL
M
i
L
Path
M
Shadowi ng Model
L
Indoor
G
TX
i
L
TX
i
L
Ant
M
i
L
Body
M
i

+
EIRP
UL
M
i
P
M
i
G
M
i
L
M
i
+
P
M
i
P
Max
M
i
= P
M
i
P
Eff
M
i
=
Name Value Unit Description
WiMAX 802.16d:
WiMAX 802.16e:
dBm Thermal noise for a cell
dBm Uplink noise for a cell
n
0 UL
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
N
SCa Total
------------------------------
\ .
| |
+
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
PZ
UL
M
i
N
SCa Total
TX
i
i c ( )
------------------------------
\ .
|
|
|
| |
+
n
UL
TX
i
i c ( )
n
0 UL
TX
i
i c ( )
nf
TX
i
i c ( )
+
482 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.1.4.8 Traffic Interference Calculation (UL)
9.1.4.9 Traffic C/N Calculation (UL)
9.1.4.10 Traffic C/(I+N) Calculation (UL)
9.1.5 Throughput Calculation
9.1.5.1 Calculation of Total Cell Resources
Name Value Unit Description

dBm Uplink interference received at a cell
dB
Interference reduction factor due to
the co- and adjacent channel overlap
dB
Interference reduction factor due to
the interfering mobiles uplink traffic
load
dB
Uplink noise at a cell without smart
antennas
dBm Total Noise (I+N) for a cell
dB
Uplink noise at a cell with smart
antenna
dBm
Total Noise (I+N) for a cell in case of
smart antennas
I
UL
M
j
C
UL
M
j
f
O
TX
i
i c ( ) TX
j
j c ( )
f
TL UL
M
j
+ +
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( )
f
TL UL
M
j
10 Log TL
UL
M
j
( )
NR
UL
TX
i
i c ( )
10 Log
10
I
UL
M
j
10
--------
\ .
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
UL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
|
|
| |
NR
UL
Inter Tech
n
UL
TX
i
i c ( )
+
I N + ( )
UL
TX
i
i c ( )
10 Log
10
I
UL
M
j
10
--------
\ .
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
UL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
|
|
| |
NR
UL
Inter Tech
+
NR
UL
( )
I
UL
( ) o
n
2
I +
o
n
2
I
-----------------------------------
I N + ( )
UL
TX
i
i c ( )
( ) I
UL
( ) o
n
2
I +
Name Value Unit Description
With MIMO (STTD/MRC):
With MIMO (AMS) if or
:
dB Uplink C/N at a cell
CNR
UL
M
i
C
UL
M
i
n
UL
TX
i
i c ( )

CNR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ +
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CNR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ +
Name Value Unit Description
Without smart antennas:
With smart antennas:
With MIMO (STTD/MRC):
With MIMO (AMS) if or
:
dB Uplink C/(I+N) at a cell
CINR
UL
M
i
CNR
UL
M
i
NR
UL
TX
i
i c ( )

CNR
UL
M
i
NR
UL
TX
i
i c ( )
( )
CINR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ +
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ +
Name Value Unit Description
Hz Sampling frequency
F
Sampl i ng
TX
i
i c ( )
Fl oor f
Sampl i ng
W
Channel
TX
i
i c ( )
10
6

8000
----------------------------------------
\ .
|
| |
8000
Forsk 2010 AT283_TRG_E2 483
Chapter 9: WiMAX BWA Networks
kHz Inter-subcarrier distance
ms Useful symbol duration
ms Cyclic prefix duration
ms Symbol duration
ms Used frame duration
SD
Frame duration in terms of symbol
durations
If DL:UL ratio is defined in percentage:
If DL:UL ratio is defined in fraction:
SD
Downlink subframe duration in terms
of symbol durations
=
WiMAX 802.16d:
WiMAX 802.16e:
Symbols
Total downlink cell resources, i.e., the
number of symbols in the downlink
subframe
If DL:UL ratio is defined in percentage:
If DL:UL ratio is defined in fraction:
SD
Uplink subframe duration in terms of
symbol durations
=
WiMAX 802.16d:
WiMAX 802.16e:
Symbols
Total uplink cell resources, i.e., the
number of symbols in the uplink
subframe
AF
TX
i
i c ( )
F
Sampl i ng
TX
i
i c ( )
10
3

N
SCa Total
TX
i
i c ( )
-------------------------------------------
D
Sym Useful
TX
i
i c ( )
1
AF
TX
i
i c ( )
----------------------
D
CP
r
CP
AF
--------
D
Symbol
TX
i
i c ( )
D
Sym Useful
TX
i
i c ( )
D
CP
+
D
Frame
Used
D
Frame
D
TTG
TDD
D
RTG
TDD

N
SD Used ( ) Frame
TX
i
i c ( )
Fl oor
D
Frame
Used
D
Symbol
TX
i
i c ( )
---------------------
\ .
|
|
| |
N
SD DL ( ) Subframe
TX
i
i c ( )
RoundUp N
SD Used ( ) Frame
TX
i
i c ( )
r
DL Frame
TDD
( ) O
Fi xed
DL

RoundUp N
SD Used ( ) Frame
TX
i
i c ( ) N
SD DL
TDD
N
SD DL
TDD
N
SD UL
TDD
+
-------------------------------------------------
\ .
|
| |
O
Fi xed
DL

R
DL
TX
i
i c ( )
N
Sym DL ( ) Subframe
TX
i
i c ( )
Fl oor N
SD DL ( ) Subframe
TX
i
i c ( )
N
SCa Data
TX
i
i c ( )
1
O
Vari abl e
DL
100
-----------------------
\ .
|
| |

)
`

Fl oor N
SD DL ( ) Subframe
TX
i
i c ( )
N
SCa Data
PZ
DL
M
i
1
O
Vari abl e
DL
100
-----------------------
\ .
|
| |

)
`

N
SD UL ( ) Subframe
TX
i
i c ( )
RoundDown N
SD Used ( ) Frame
TX
i
i c ( )
1 r
DL Frame
TDD
( ) ( ) O
Fi xed
UL

RoundDown N
SD Used ( ) Frame
TX
i
i c ( ) N
SD UL
TDD
N
SD DL
TDD
N
SD UL
TDD
+
-------------------------------------------------
\ .
|
| |
O
Fi xed
UL

R
UL
TX
i
i c ( )
N
Sym UL ( ) Subframe
TX
i
i c ( )
Fl oor N
SD UL ( ) Subframe
TX
i
i c ( )
N
SCa Data
TX
i
i c ( )
1
O
Vari abl e
UL
100
-----------------------
\ .
|
| |

)
`

Fl oor N
SD UL ( ) Subframe
TX
i
i c ( )
N
SCa Data
PZ
UL
M
i
1
O
Vari abl e
UL
100
-----------------------
\ .
|
| |

)
`

484 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.1.5.2 Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation
Name Value Unit Description
Without segmentation:
With segmentation:
With MIMO (SU-MIMO):
With MIMO (AMS): if
or
kbps
Downlink peak MAC channel
throughput
kbps
Downlink effective MAC channel
throughput
kbps
Downlink application channel
throughput
kbps Downlink peak MAC cell capacity
kbps Downlink effective MAC cell capacity
kbps Downlink application cell capacity
Without segmentation:
With MIMO (SU-MIMO):
With MIMO (AMS): if
or
With MIMO (MU-MIMO) in uplink throughput coverage predictions:
kbps Uplink peak MAC channel throughput
kbps
Uplink effective MAC channel
throughput
kbps Uplink application channel throughput
kbps Uplink peak MAC cell capacity
kbps Uplink effective MAC cell capacity
kbps Uplink application cell capacity
kbps
Uplink peak MAC allocated bandwidth
throughput
CTP
P DL
M
i
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
-------------------------------------
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
------------------------------------- f
Segment

q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
> CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CTP
E DL
M
i
CTP
P DL
M
i
1 BLER B
DL
M
i
( ) ( )
CTP
A DL
M
i
CTP
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

Cap
P DL
M
i
CTP
P DL
M
i
TL
DL Max
TX
i
i c ( )

Cap
E DL
M
i
Cap
P DL
M
i
1 BLER B
DL
M
i
( ) ( )
Cap
A DL
M
i
Cap
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

CTP
P UL
M
i
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
-------------------------------------
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
> CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
------------------------------------- G
MU MIMO
TX
i
i c ( )

CTP
E UL
M
i
CTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( )
CTP
A UL
M
i
CTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

Cap
P UL
M
i
CTP
P UL
M
i
TL
UL Max
TX
i
i c ( )

Cap
E UL
M
i
Cap
P UL
M
i
1 BLER B
UL
M
i
( ) ( )
Cap
A UL
M
i
Cap
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

ABTP
P UL
M
i CTP
P UL
M
i
N
SC UL
M
i
N
SC
PZ
UL
M
i
---------------------
Forsk 2010 AT283_TRG_E2 485
Chapter 9: WiMAX BWA Networks
9.1.6 Scheduling and Radio Resource Management
kbps
Uplink effective MAC allocated
bandwidth throughput
kbps
Uplink application allocated bandwidth
throughput
ABTP
E UL
M
i
ABTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( )
ABTP
A UL
M
i
ABTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

Name Value Unit Description


None
Resources allocated to a mobile to
satisfy its minimum throughput
demand in downlink
None
Resources allocated to a mobile to
satisfy its minimum throughput
demand in uplink
None
Remaining downlink cell resources
after allocation for minimum
throughput demands
None
Remaining uplink cell resources after
allocation for minimum throughput
demands
kbps
Remaining throughput demand for a
mobile in downlink
kbps
Remaining throughput demand for a
mobile in uplink
None
Remaining resource demand for a
mobile in downlink
None
Remaining resource demand for a
mobile in uplink
Proportional Fair:
Proportional Demand:
Biased (QoS Class):
Max Aggregate Throughput:
None
Resources allocated to a mobile to
satisfy its maximum throughput
demand in downlink
R
Mi n DL
M
i
Sel TPD
Mi n DL
M
i
Sel
CTP
P DL
M
i
Sel
-------------------------------
R
Mi n UL
M
i
Sel TPD
Mi n UL
M
i
Sel
CTP
P UL
M
i
Sel
-------------------------------
R
Rem DL
TX
i
i c ( ) TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

R
Rem UL
TX
i
i c ( ) TL
DL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

TPD
Rem DL
M
i
Sel
TPD
Max DL
M
i
Sel
TPD
Mi n DL
M
i
Sel

TPD
Rem UL
M
i
Sel
TPD
Max UL
M
i
Sel
TPD
Mi n UL
M
i
Sel

RD
Rem DL
M
i
Sel TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
---------------------------------
RD
Rem UL
M
i
Sel TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
---------------------------------
R
Max DL
M
i
Sel
Mi n RD
Rem DL
M
i
Sel
R
Rem DL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
R
Eff Rem DL
TX
i
i c ( ) RD
Rem DL
M
i
Sel
RD
Rem DL
M
i
Sel
M
i
Sel

----------------------------------------
Mi n RD
Rem DL
M
i
Sel
R
QoS DL
TX
i
i c ( )
N
QoS
------------------------ ,
\ .
|
| |
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
---------------------------------
486 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.1.6.1 User Throughput Calculation
Proportional Fair:
Proportional Demand:
Biased (QoS Class):
Max Aggregate Throughput:
None
Resources allocated to a mobile to
satisfy its maximum throughput
demand in uplink
None
Effective remaining downlink
resources in a cell
(Proportional Demand)
None
Effective remaining uplink resources
in a cell
(Proportional Demand)
None
QoS class bias
(Biased (QoS Class))
None
Remaining downlink cell resources
after allocation for minimum
throughput demands for a QoS class
(Biased (QoS Class))
None
Remaining downlink cell resources
after allocation for minimum
throughput demands for a QoS class
(Biased (QoS Class))
None
Total resources assigned to a mobile
in downlink
(Downlink traffic load of the mobile)
None
Total resources assigned to a mobile
in uplink
(Uplink traffic load of the mobile)
R
Max UL
M
i
Sel
Mi n RD
Rem UL
M
i
Sel
R
Rem UL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
R
Eff Rem UL
TX
i
i c ( ) RD
Rem UL
M
i
Sel
RD
Rem UL
M
i
Sel
M
i
Sel

----------------------------------------
Mi n RD
Rem UL
M
i
Sel
R
QoS UL
TX
i
i c ( )
N
QoS
------------------------ ,
\ .
|
| |
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
---------------------------------
R
Eff Rem DL
TX
i
i c ( )
Mi n R
Rem DL
TX
i
i c ( )
RD
Rem DL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
R
Eff Rem UL
TX
i
i c ( )
Mi n R
Rem UL
TX
i
i c ( )
RD
Rem UL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
| 1
f
Bi as
QoS
100
----------- +
R
Max ErtPS
M
i
Sel
R
Max rtPS
M
i
Sel
-------------------------------
R
Max rtPS
M
i
Sel
R
Max nrtPS
M
i
Sel
------------------------------
R
Max nrtPS
M
i
Sel
R
Max BE
M
i
Sel
------------------------------ = = =
R
QoS DL
TX
i
i c ( )
R
Rem DL
TX
i
i c ( )
N
QoS
1
|
---
\ .
| |
r
QoS

N
QoS
1
|
---
\ .
| |
r
QoS

All QoS

------------------------------------------------------------
R
QoS UL
TX
i
i c ( )
R
Rem UL
TX
i
i c ( )
N
QoS
1
|
---
\ .
| |
r
QoS

N
QoS
1
|
---
\ .
| |
r
QoS

All QoS

------------------------------------------------------------
TL
DL
M
i
Sel
R
DL
M
i
Sel
= R
Mi n DL
M
i
Sel
R
Max DL
M
i
Sel
+
TL
UL
M
i
Sel
R
UL
M
i
Sel
= R
Mi n UL
M
i
Sel
R
Max UL
M
i
Sel
+
Name Value Unit Description
kbps Downlink peak MAC user throughput
kbps
Downlink effective MAC user
throughput
kbps Downlink application user throughput
kbps Uplink peak MAC user throughput
kbps Uplink effective MAC user throughput
kbps Uplink application user throughput
UTP
P DL
M
i
Sel
R
DL
M
i
Sel
CTP
P DL
M
i
Sel

UTP
E DL
M
i
Sel
UTP
P DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |

UTP
A DL
M
i
Sel
UTP
E DL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel

UTP
P UL
M
i
Sel
R
UL
M
i
Sel
CTP
P UL
M
i
Sel

UTP
E UL
M
i
Sel
UTP
P UL
M
i
Sel
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |

UTP
A UL
M
i
Sel
UTP
E UL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel

Forsk 2010 AT283_TRG_E2 487


Chapter 9: WiMAX BWA Networks
9.1.7 Smart Antenna Models
9.1.7.1 Downlink Beamforming
9.1.7.2 Uplink Beamforming
Name Value Unit Description
Smart antenna model parameter None Number of smart antenna elements
Calculation parameter Degrees Angle of arrival for the useful signal
Calculation parameter Degrees
Angle at which the smart antenna
effect is calculated
d , where is the wavelength of the signal m
Distance between two adjacent
antenna elements
E
SA
u

2
---
Name Value Unit Description
Smart antenna model parameter None Gain of a single element
None Steering vector for the direction of
with
None Complex smart antenna weight
None
Array correlation matrix for a given
user direction
None Smart antenna gain in any direction
None Average array correlation matrix
g
n
( )
S
u 1 e
j
2t

------- d u sin
e
j
2t

------- 2d u sin
... e
j
2t

------- E
SA
1 ( )d u sin
, , , ,
T
u
w
n
e
j
2t

------- nd u sin
e
j t n u sin
d

2
--- =
R
u S
u
S
u
H

u
G
SA
( )
g
n
( ) S

H
R
u
S

g
n
( ) S

H
S
u
S
u
H
S

g
n
u ( ) E
SA
2
= =

R
Avg

j
p
j
R
j

j 1 =
J

Name Value Unit Description


None
Vector of E
SA
complex weights for the
conventional beamformer
= None Total noise correlation matrix
None Thermal noise correlation matrix
None Interference correlation matrix
W Total uplink noise power
W
Total power received from the served
user
None C/(I+N) in the uplink
None
Uplink smart antenna beamforming
gain in the direction of the served user
W Average noise correlation matrix
W Uplink interference
w
S
u
E
SA
--------------
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+
R
n o
n
2
I
R
I
p
j
S
j
S
j
H

j 1 =
J

P
N w
H
R
N
w
P
u p
u
w
H
S
u
S
u
H
w p
u
E
SA
=
CINR
UL
P
u
P
N
-------
p
u
E
SA

w
H
R
N
w
---------------------------- =
G
SA
E
SA
R
N
Avg
1
K
---- R
N
k
k 1 =
K

I
UL
( ) w
H
R
N
Avg
w o
n
2

488 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
9.1.7.3 Uplink Beamforming and Interference Cancellation (MMSE)
9.2 Calculation Processes
The following sections describe the processes of different calculations performed in Atoll and their results.
9.2.1 Point Analysis: Profile Tab
The point analysis profile tab displays the following calculation results for the selected transmitter based on the calculation
algorithm described in "Preamble Signal Level Calculation" on page 512.
Preamble signal level
Path loss
Total losses
, , , and are not used in the calculations performed for the profile tab.
9.2.2 Point Analysis: Reception Tab
Analysis provided in the Reception tab is based on path loss matrices. So, you can display received signal levels from the
cells for which calculated path loss matrices are available. For each cell, Atoll displays the received preamble, pilot or
traffic signal level or C/N.
None
Angular distribution of uplink noise
rise
NR
UL
( )
I
UL
( ) o
n
2
+
o
n
2
-----------------------------
Name Value Unit Description
None
Vector of E
SA
complex weights for the
optimum beamformer
None MMSE optimization constant
= None Total noise correlation matrix
None Thermal noise correlation matrix
None Interference correlation matrix
W
Total uplink noise power (optimum
beamformer)
W
Total power received from the served
user (optimum beamformer)
None C/(I+N) in the uplink
None
Uplink smart antenna beamforming
gain in the direction of the served user
W
Average inverse noise correlation
matrix
W Uplink interference
None
Angular distribution of uplink noise
rise
w

u
R
N
1
S
u

u
E
SA
S
u
H
R
N
1
S
u

-----------------------------------
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+
R
n o
n
2
I
R
I
p
j
S
j
S
j
H

j 1 =
J

N
u
2
S
u
H
R
N
1
S
u

P

u p
u

u
2
S
u
H
R
N
1
S
u
( )
2

CINR
UL
P
u
P
N
-------
P

u
P

N
------- p
u
S
u
H
R
N
1
S
u
= =
G
SA S
u
H
I S
u
E
SA
=
R
N
1
Avg
1
K
---- R
N
1
k
k 1 =
K

I
UL
( )
E
SA
S

H
R
N
1
Avg
S


------------------------------------------- o
n
2

NR
UL
( )
I
UL
( ) o
n
2
+
o
n
2
-----------------------------
C
Preambl e
TX
i
i c ( )
L
Path
L
Total
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
Forsk 2010 AT283_TRG_E2 489
Chapter 9: WiMAX BWA Networks
Reception level bar graphs show the signal levels or C/N in decreasing order. The maximum number of bars in the graph
depends on the preamble signal level of the best server. The bar graph displays cells whose received preamble signal
levels are higher than their preamble C/N thresholds and are within a 30 dB margin from the highest preamble signal level.
You can use a value other than 30 dB for the margin from the highest preamble signal level, for example a smaller value
for improving the calculation speed. For more information on defining a different value for this margin, see the
Administrator Manual.
The Reception tab calculates:
The preamble signal level as explained in "Preamble Signal Level Calculation" on page 512.
The preamble C/N as explained in "Preamble C/N Calculation" on page 516.
The preamble C/(I+N) and total noise (I+N) as explained in "Preamble C/(I+N) Calculation" on page 517.
The best server as explained in "Best Server Determination" on page 517.
The service availability as explained in "Service Area Calculation" on page 518.
The permutation zone as explained in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
The downlink traffic and pilot signal levels as explained in "Traffic and Pilot Signal Level Calculation (DL)" on
page 520.
The downlink traffic and pilot C/N as explained in "Traffic and Pilot C/N Calculation (DL)" on page 530.
The downlink traffic and pilot C/(I+N) and the traffic total noise (I+N) as explained in "Traffic and Pilot C/(I+N) and
Bearer Calculation (DL)" on page 532.
The uplink signal level as explained in "Traffic Signal Level Calculation (UL)" on page 534.
The uplink C/(I+N) and total noise (I+N) as explained in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
The downlink and uplink bearers as explained in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on
page 532 and "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
The different throughputs as explained in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
9.2.3 Point Analysis: Interference Tab
Analysis provided in the Interference tab is based on path loss matrices. So, you can display the received signal level from
the best server and interfering signal levels from other cells for which calculated path loss matrices are available. For each
cell, Atoll displays the best server preamble, pilot or traffic signal level and, interference from other cells.
Ten interferer bar graphs are displayed by default. This number can be changed through the Atoll.ini file. For more
information on defining a different number of interferers, see the Administrator Manual.
The Interference tab calculates:
The preamble signal level as explained in "Preamble Signal Level Calculation" on page 512.
The preamble C/(I+N) and total noise (I+N) as explained in "Preamble C/(I+N) Calculation" on page 517.
The best server as explained in "Best Server Determination" on page 517.
The service availability as explained in "Service Area Calculation" on page 518.
The permutation zone as explained in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
The downlink traffic and pilot signal levels as explained in "Traffic and Pilot Signal Level Calculation (DL)" on
page 520.
The downlink traffic and pilot C/(I+N) and the traffic total noise (I+N) as explained in "Traffic and Pilot C/(I+N) and
Bearer Calculation (DL)" on page 532.
The channel overlap as explained in "Co- and Adjacent Channel Overlaps Calculation" on page 477.
The collision probability due to segmentation as explained in "Traffic and Pilot C/(I+N) and Bearer Calculation
(DL)" on page 532.
The interference reduction due to the downlink traffic load as explained in "Traffic and Pilot C/(I+N) and Bearer
Calculation (DL)" on page 532.
9.2.4 Preamble Signal Level Coverage Predictions
The following coverage predictions are based on the received preamble signal levels:
Coverage by Transmitter
Coverage by Signal Level
Overlapping Zones
These coverage predictions do not depend on the traffic input. Therefore, these calculations are of special interest before
and during the deployment stage of the network to study the coverage footprint of the system.
For these calculations, Atoll calculates the received preamble signal level ( ) as explained in "Preamble Signal
Level Calculation" on page 512. Then, Atoll determines the selected display criterion on each pixel inside the cells
calculation area. Each pixel within the calculation area of TX
i
(ic) is considered a non-interfering receiver.
, , , and are not considered in the calculations performed for the preamble signal level based coverage
predictions.
Coverage prediction parameters to be set are:
The coverage prediction conditions to determine the coverage area of each studied cell, and
The display settings to colour the coverage areas.
C
Preambl e
TX
i
i c ( )
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
490 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The following sections describe the determination of coverage area of each cell ("Coverage Area Determination" on
page 490), and the display options ("Coverage Display" on page 490) of the coverage predictions.
9.2.4.1 Coverage Area Determination
Atoll uses parameters entered in the Condition tab of the coverage prediction properties dialogue to determine coverage
areas to display. There are three possibilities.
9.2.4.1.1 All Servers
The coverage area of each cell TX
i
(ic) corresponds to the pixels where.
9.2.4.1.2 Best Signal Level and a Margin
The coverage area of each cell TX
i
(ic) corresponds to the pixels where.
AND
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received preamble signal level from TX
i
(ic) is the highest.
If M = 2 dB, Atoll considers pixels where the received preamble signal level from TX
i
(ic) is either the highest or
within a 2 dB margin from the highest.
If M = -2 dB, Atoll considers pixels where the received preamble signal level from TX
i
(ic) is 2 dB higher than the
received preamble signal levels from the cells which are 2
nd
best servers.
9.2.4.1.3 Second Best Signal Level and a Margin
The coverage area of each cell TX
i
(ic) corresponds to the pixels where.
AND
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received preamble signal level from TX
i
(ic) is the second highest.
If M = 2 dB, Atoll considers pixels where the received preamble signal level from TX
i
(ic) is either the second
highest or within a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received preamble signal level from TX
i
(ic) is 2 dB higher than the
received preamble signal levels from the cells which are 3
rd
best servers.
9.2.4.2 Coverage Display
9.2.4.2.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
9.2.4.2.2 Display Types
It is possible to display the coverage predictions with colours depending on any transmitter or cell attribute, and other
criteria such as:
Signal Level (dBm, dBV, dBV/m)
Atoll calculates preamble signal levels received from cells on each pixel of the cells coverage areas. A pixel of a coverage
area is coloured if the preamble signal level exceeds ( ) the defined minimum thresholds (pixel colour depends on
received preamble signal level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as cell coverage areas. Each layer shows the different preamble signal levels
received in the cell coverage area.
Mi ni mumThreshol d C
Preambl e
TX
i
i c ( )
or L
Total
TX
i
i c ( )
or L
Path
TX
i
i c ( )
( ) s Maxi mumThreshol d <
Mi ni mumThreshol d C
Preambl e
TX
i
i c ( )
or L
Total
TX
i
i c ( )
or L
Path
TX
i
i c ( )
( ) s Maxi mumThreshol d <
C
Preambl e
TX
i
i c ( )
Best
j i =
C
Preambl e
TX
j
j c ( )
( ) M >
Mi ni mumThreshol d C
Preambl e
TX
i
i c ( )
or L
Total
TX
i
i c ( )
or L
Path
TX
i
i c ( )
( ) s Maxi mumThreshol d <
C
Preambl e
TX
i
i c ( )
2
nd
Best
j i =
C
Preambl e
TX
j
j c ( )
( ) M >
>
Forsk 2010 AT283_TRG_E2 491
Chapter 9: WiMAX BWA Networks
Best Signal Level (dBm, dBV, dBV/m)
Atoll calculates preamble signal levels received from cells on each pixel of the cells coverage areas. Where other
coverage areas overlap the studied one, Atoll chooses the highest value. A pixel of a coverage area is coloured if the
preamble signal level exceeds ( ) the defined thresholds (the pixel colour depends on the preamble signal level).
Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as defined thresholds. Each layer corresponds to an area where the preamble signal level from the best server
exceeds a defined threshold.
Path Loss (dB)
Atoll calculates path losses from cells on each pixel of the cells coverage areas. A pixel of a coverage area is coloured if
the path loss exceeds ( ) the defined minimum thresholds (pixel colour depends on path loss). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as cell coverage
areas. Each layer shows different path loss levels in the cells coverage area.
Total Losses (dB)
Atoll calculates total losses from cells on each pixel of the cells coverage areas. A pixel of a coverage area is coloured if
total losses exceed ( ) the defined minimum thresholds (pixel colour depends on total losses). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as cell coverage
areas. Each layer shows different total losses levels in the cells coverage areas.
Best Server Path Loss (dB)
Atoll calculates preamble signal levels received from cells on each pixel of the cells coverage areas. Where other
coverage areas overlap the studied one, Atoll determines the best cell (i.e., the cell with the highest preamble signal level)
and evaluates the path loss from this cell. A pixel of a coverage area is coloured if the path loss exceeds ( ) the defined
thresholds (pixel colour depends on path loss). Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where
the path loss from the best server exceeds a defined threshold.
Best Server Total Losses (dB)
Atoll calculates preamble signal levels received from cells on each pixel of the cells coverage areas. Where coverage
areas overlap the studied one, Atoll determines the best cell (i.e., the cell with the highest preamble signal level) and
evaluates total losses from this cell. A pixel of a coverage area is coloured if the total losses exceed ( ) the defined
thresholds (pixel colour depends on total losses). Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where
the total losses from the best server exceed a defined threshold.
Number of Servers
Atoll evaluates the number of cells that cover a pixel (i.e., the pixel falls within the coverage areas of these cells). The
pixel colour depends on the number of servers. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where
the number of servers exceeds ( ) a defined threshold.
9.2.5 Effective Signal Analysis Coverage Predictions
The following coverage predictions are based on the received preamble, traffic, or pilot signal levels and noise, and take
into account the receiver characteristics ( , , , and ) when calculating the required parameter:
Effective Signal Analysis (DL)
Effective Signal Analysis (UL)
For these calculations, Atoll calculates the received signal level and noise at each pixel for the signal type being studied,
i.e., preamble, traffic, or pilot. Each pixel within the calculation area of TX
i
(ic) is considered a non-interfering receiver. The
properties of the non-interfering probe receiver are set by selecting a terminal, a mobility type, and a service.
These coverage predictions do not depend on the traffic input. Therefore, these calculations are of special interest before
and during the deployment stage of the network to study the coverage footprint of the system.
Coverage prediction parameters to be set are:
The coverage prediction conditions, and
The display settings to colour the coverage areas.
The following sections describe the determination of coverage area of each cell ("Coverage Area Determination" on
page 492), the calculation of the coverage parameter ("Coverage Parameter Calculation" on page 492), and the display
options ("Coverage Display" on page 492) of the coverage predictions.
>
>
>
>
>
>
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
492 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.2.5.1 Coverage Area Determination
These coverage predictions are all best server coverage predictions, i.e., the coverage area of each cell comprises the
pixels where the cell is the best server. Best server for each pixel is calculated as explained in "Best Server Determination"
on page 517.
9.2.5.2 Coverage Parameter Calculation
The following parameters are calculated for the Effective Signal Analysis (DL) coverage prediction.
Best Preamble Signal Level (DL) (dBm): as explained in "Preamble Signal Level Calculation" on
page 512.
Best Pilot Signal Level (DL) (dBm): as explained in "Traffic and Pilot Signal Level Calculation (DL)" on
page 520.
Best Traffic Signal Level (DL) (dBm): as explained in "Traffic and Pilot Signal Level Calculation (DL)"
on page 520.
Preamble C/N Level (DL) (dB): as explained in "Preamble C/N Calculation" on page 516.
Pilot C/N Level (DL) (dB): as explained in "Traffic and Pilot C/N Calculation (DL)" on page 530.
Traffic C/N Level (DL) (dB): as explained in "Traffic and Pilot C/N Calculation (DL)" on page 530.
Permutation Zone (DL): as explained in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
The following parameters are calculated for the Effective Signal Analysis (UL) coverage prediction.
Signal Level (UL) (dBm): as explained in "Traffic Signal Level Calculation (UL)" on page 534.
C/N Level (UL) (dB): as explained in "Traffic C/N Calculation (UL)" on page 537.
Permutation Zone (UL): as explained in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
9.2.5.3 Coverage Display
9.2.5.3.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
9.2.5.3.2 Effective Signal Analysis (DL) Display Types
It is possible to display the Effective Signal Analysis (DL) coverage prediction with colours depending on the following
display options.
Best Preamble Signal Level (DL) (dBm)
Atoll calculates preamble signal levels received from the best serving cells on each pixel of their coverage areas. A pixel
of a coverage area is coloured if the preamble signal level exceeds ( ) the defined thresholds (the pixel colour depends
on the preamble signal level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the preamble signal
level from the best server exceeds a defined threshold.
Best Pilot Signal Level (DL) (dBm)
Atoll calculates pilot signal levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the pilot signal level exceeds ( ) the defined thresholds (the pixel colour depends on the pilot
signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There
are as many layers as defined thresholds. Each layer corresponds to an area where the pilot signal level from the best
server exceeds a defined threshold.
Best Traffic Signal Level (DL) (dBm)
Atoll calculates traffic signal levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the traffic signal level exceeds ( ) the defined thresholds (the pixel colour depends on the
traffic signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the traffic signal level from the
best server exceeds a defined threshold.
C
Preambl e
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
C
Traffi c
TX
i
i c ( )
CNR
Preambl e
TX
i
i c ( )
CNR
Pi l ot
TX
i
i c ( )
CNR
Traffi c
TX
i
i c ( )
PZ
DL
M
i
C
UL
M
i
CNR
UL
M
i
PZ
UL
M
i
>
>
>
Forsk 2010 AT283_TRG_E2 493
Chapter 9: WiMAX BWA Networks
Preamble C/N Level (DL) (dB)
Atoll calculates preamble C/N levels received from the best serving cells on each pixel of their coverage areas. A pixel of
a coverage area is coloured if the preamble C/N level exceeds ( ) the defined thresholds (the pixel colour depends on
the preamble C/N level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the preamble C/N
level from the best server exceeds a defined threshold.
Pilot C/N Level (DL) (dB)
Atoll calculates pilot C/N levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the pilot C/N level exceeds ( ) the defined thresholds (the pixel colour depends on the pilot
C/N level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are
as many layers as defined thresholds. Each layer corresponds to an area where the pilot C/N level from the best server
exceeds a defined threshold.
Traffic C/N Level (DL) (dB)
Atoll calculates traffic C/N levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the traffic C/N level exceeds ( ) the defined thresholds (the pixel colour depends on the traffic
C/N level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are
as many layers as defined thresholds. Each layer corresponds to an area where the traffic C/N level from the best server
exceeds a defined threshold.
Permutation Zone (DL)
Atoll calculates the permutation zone assigned to each pixel of each best servers coverage area. A pixel of a coverage
area is coloured according to the permutation zone assigned to it (the pixel colour depends on the frame configuration -
permutation zone pair). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as frame configuration - permutation zone pairs. Each layer corresponds to an area
where a frame configuration - permutation zone pair is used.
Segment
Atoll calculates the permutation zone assigned to each pixel of each best servers coverage area. Pixels are coloured
according to the segment number (calculated from the best servers preamble index) when the assigned permutation zone
is the first downlink PUSC zone and the best servers frame configuration supports segmentation. For all other cases, i.e.,
other permutation zones or segmentation not supported in the best servers frame configuration, pixels are assigned a
unique colour. Coverage consists of four independent layers whose visibility in the workspace can be managed. Three of
these layers correspond to a segment number each, and one corresponds to the case where segmentation is not
supported, i.e., all segments are used.
9.2.5.3.3 Effective Signal Analysis (UL) Display Types
It is possible to display the Effective Signal Analysis (UL) coverage prediction with colours depending on the following
display options.
Signal Level (UL) (dBm)
Atoll calculates uplink signal levels received from each pixel, of the coverage areas of the best serving cells, at the cells.
A pixel of a coverage area is coloured if the uplink signal level exceeds ( ) the defined thresholds (the pixel colour
depends on the uplink signal level). Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the uplink signal
level at the best server exceeds a defined threshold.
C/N Level (UL) (dB)
Atoll calculates uplink C/N levels received from each pixel, of the coverage areas of the best serving cells, at the cells. A
pixel of a coverage area is coloured if the uplink C/N level exceeds ( ) the defined thresholds (the pixel colour depends
on the uplink C/N level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the uplink C/N level
at the best server exceeds a defined threshold.
Permutation Zone (UL)
Atoll calculates the permutation zone assigned to each pixel of each best servers coverage area. A pixel of a coverage
area is coloured according to the permutation zone assigned to it (the pixel colour depends on the frame configuration -
permutation zone pair). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as frame configuration - permutation zone pairs. Each layer corresponds to an area
where a frame configuration - permutation zone pair is used.
>
>
>
>
>
494 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.2.6 Calculations on Subscriber Lists
When calculations are performed on a list of subscribers by running the Automatic Server Allocation, Atoll calculates the
path loss again for the subscriber locations and heights because the subscriber heights can be different from the default
receiver height used for calculating the path loss matrices.
Atoll calculates the following parameters for each subscriber in the list whose Lock Status is set to None.
Serving Base Station and Reference Cell as described in "Best Server Determination" on page 517.
Atoll calculates the following parameters for each subscriber in the list that has a serving base station assigned and whose
Lock Status is set to None or Server.
Azimuth ( ): Angle with respect to the north for pointing the subscriber terminal antenna towards its serving base
station.
Mechanical Downtilt ( ): Angle with respect to the horizontal for pointing the subscriber terminal antenna
towards its serving base station.
Atoll calculates the following parameters for each subscriber in the list that has a serving base station assigned, using the
properties of the default terminal and service.
Received Preamble Power (DL) (dBm) as described in "Preamble Signal Level Calculation" on page 512.
Received Traffic Power (DL) (dBm) as described in "Traffic and Pilot Signal Level Calculation (DL)" on page 520.
Received Pilot Power (DL) (dBm) as described in "Traffic and Pilot Signal Level Calculation (DL)" on page 520.
Preamble Total Noise (I+N) (DL) (dBm) as described in "Preamble C/(I+N) Calculation" on page 517.
Traffic Total Noise (I+N) (DL) (dBm) as described in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on
page 532.
Preamble C/(I+N) (DL) (dB) as described in "Preamble C/(I+N) Calculation" on page 517.
Traffic C/(I+N) (DL) (dB) as described in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on page 532.
Pilot C/(I+N) (DL) (dB) as described in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on page 532.
Bearer (DL) as described in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on page 532.
Permutation Zone (DL) as described in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
BLER (DL): Downlink block error rate read from the BLER vs. graph available in the WiMAX
equipment assigned to the terminal used by the subscriber.
Diversity Mode (DL): Antenna diversity mode supported by the cell or permutation zone assigned to the
subscriber in downlink.
Peak MAC Channel Throughput (DL) (kbps) as described in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 547.
Effective MAC Channel Throughput (DL) (kbps) as described in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 547.
Received Power (UL) (dBm) as described in "Traffic Signal Level Calculation (UL)" on page 534.
Total Noise (I+N) (UL) (dBm) as described in "Noise Rise Calculation (UL)" on page 537.
C/(I+N) (UL) (dB) as described in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
Bearer (UL) as described in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
Permutation Zone (UL) as described in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
BLER (UL): Uplink block error rate read from the BLER vs. graph available in the WiMAX equipment
assigned to the serving cell of the subscriber.
Diversity Mode (UL): Antenna diversity mode supported by the cell or permutation zone assigned to the
subscriber in uplink.
Transmission Power (UL) as described in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
Allocated Bandwidth (UL) (No. of Subchannels) as described in "Traffic C/(I+N) and Bearer Calculation (UL)"
on page 541.
Peak MAC Channel Throughput (DL) (kbps) as described in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 547.
Effective MAC Channel Throughput (DL) (kbps) as described in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 547.
9.2.7 Monte Carlo Simulations
The simulation process is divided into two steps.
Generating a realistic user distribution as explained in "Generating a Realistic User Distribution" on page 494.
Atoll generates user distributions as part of the Monte Carlo algorithm based on traffic data. The resulting user
distribution complies with the traffic database and maps selected when creating simulations.
Scheduling and Radio Resource Management as explained under "Simulation Process" on page 498.
9.2.7.1 Generating a Realistic User Distribution
During each simulation, Atoll performs two random trials. The first random trial generates the number of users and their
activity status as explained in the following sections depending on the type of traffic input.
"Simulations Based on User Profile Traffic Maps and Subscriber Lists" on page 495.
"Simulations Based on Sector Traffic Maps" on page 496.

CINR
Traffi c
TX
i
i c ( )
CINR
UL
M
i
Forsk 2010 AT283_TRG_E2 495
Chapter 9: WiMAX BWA Networks
Once all the user characteristics have been determined, a second random trial is performed to obtain their geographical
locations weighted according to the clutter classes, and whether they are indoor or outdoor according to the percentage
of indoor users per clutter class.
9.2.7.1.1 Simulations Based on User Profile Traffic Maps and Subscriber Lists
User profile environment based traffic maps: Each pixel of the map is assigned an environment class which contains a list
of user profiles with an associated mobility type and a given density, i.e., number of users of a user profile per km.
User profile traffic maps: Each polygon or line of the map is assigned a density of users with a given user profile and
mobility type. If the map is composed of points, each point is assigned a number of users with given user profile and
mobility type.
Fixed subscribers listed in subscriber lists have a user profile assigned to each of them.
User profiles model the behaviour of the different user categories. Each user profile contains a list of services and
parameters describing how these services are accessed by the user.
The number of users of each user profile is calculated from the surface area (S
Env
) of each environment class map (or
each polygon) and the user profile density (D
UP
).
Atoll calculates the probability for a user being active at a given instant in the uplink and in the downlink according to the
service usage characteristics described in the user profiles, i.e., the number of voice calls or data sessions, the average
duration of each voice call, or the volume of the data transfer in the uplink and the downlink in each data session.
Voice Service (v)
User profile parameters for voice type services are:
- The user terminal equipment used for the service (from the Terminals table).
- The average number of calls per hour .
- The average duration of a call (seconds) .
Calculation of the service usage duration per hour ( : probability of an active call):
Calculation of the number of users trying to access the service v ( ):
The activity status of each user depends on the activity periods during the call, i.e., the uplink and downlink activity
factors defined for the voice type service v, and .
Calculation of activity probabilities:
Probability of being inactive:
Probability of being active in the uplink:
Probability of being active in the downlink:
Probability of being active in the uplink and downlink both:
Calculation of number of users per activity status:
Number of inactive users:
Number of users active in the uplink:
Note:
Atoll follows a Poisson distribution to determine the total number of users attempting a
connection in each simulation. In order for Atoll to use a constant total number of users
attempting a connection, the following lines must be added to the Atoll.ini file:
[CDMA]
RandomTotalUsers=0
Notes:
In case of user profile traffic maps composed of lines, the number of users of each user
profile is calculated from the line length (L) and the user profile density (D
UP
) (users per
km):
The number of users is a direct input when a user profile traffic map is composed of points.
N
Users
S
Env
D
UP
=
N
Users
L D
UP
=
N
Cal l
D
Cal l
p
0
p
0
N
Cal l
D
Cal l

3600
--------------------------------- =
n
v
n
v
N
Users
p
0
=
f
Act
UL
f
Act
DL
p
Inacti ve
1 f
Act
UL
( ) 1 f
Act
DL
( ) =
p
Acti ve
UL
f
Act
UL
1 f
Act
DL
( ) =
p
Acti ve
DL
f
Act
DL
1 f
Act
UL
( ) =
p
Acti ve
UL DL +
f
Act
UL
f
Act
DL
=
n
v Inacti ve
n
v
p
Inacti ve
=
n
v Acti ve
UL
n
v
p
Acti ve
UL
=
496 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Number of users active in the downlink:
Number of users active in the uplink and downlink both:
Therefore, a user can be either active on both links, inactive on both links, active on UL only, or active on DL only.
Data Service (d)
User profile parameters for data type services are:
- The user terminal equipment used for the service (from the Terminals table).
- The average number of data sessions per hour .
- The average data volume (in kBytes) transferred in the downlink and the uplink during a session.
- The average throughputs in the downlink and the uplink for the service d.
Calculation of activity probabilities: and
Probability of being inactive:
Probability of being active in the uplink:
Probability of being active in the downlink:
Probability of being active in the uplink and downlink both:
Calculation of number of users:
Number of inactive users:
Number of users active in the uplink:
Number of users active in the downlink:
Number of users active in the uplink and downlink both:
Calculation of the number of active users trying to access the service d (n
d
):
Inactive users are not taken into account.
9.2.7.1.2 Simulations Based on Sector Traffic Maps
Sector traffic maps per sector are also referred to as live traffic maps. Live traffic data from the OMC is spread over the
best server coverage areas of the transmitters included in the traffic map. Either throughput demands per service or the
number of active users per service are assigned to the coverage areas of each transmitter.
For each transmitter TX
i
and each service s,
Sector Traffic Maps (Throughputs)
Atoll calculates the number of active users of each service s on UL and DL in the coverage area of TX
i
as follows:
and
Where is the total uplink throughput demand defined in the map for any service s for the coverage area of
the transmitter, is the total downlink throughput demand defined in the map for any service s for the
Note:
The user distribution per service and the activity status distribution between the users are
average distributions. The service and the activity status of each user are randomly drawn
in each simulation. Therefore, if you calculate several simulations at once, the average
number of users per service and average numbers of inactive, active on UL, active on DL
and active on UL and DL users, respectively, will correspond to calculated distributions. But
if you check each simulation, the user distribution between services as well as the activity
status distribution between users can be different in each of them.
n
v Acti ve
DL
n
v
p
Acti ve
DL
=
n
v Acti ve
UL DL +
n
v
p
Acti ve
UL DL +
=
N
Sessi on
V
DL
V
UL
TP
Average
DL
TP
Average
UL
f
UL
N
Sessi on
V
UL
8
TP
Average
UL
3600
------------------------------------------------ = f
DL
N
Sessi on
V
DL
8
TP
Average
DL
3600
------------------------------------------------ =
p
Inacti ve
1 f
UL
( ) 1 f
DL
( ) =
p
Acti ve
UL
f
UL
1 f
DL
( ) =
p
Acti ve
DL
f
DL
1 f
UL
( ) =
p
Acti ve
UL DL +
f
UL
f
DL
=
n
d Inacti ve
N
Users
p
Inacti ve
=
n
d Acti ve
UL
N
Users
p
Acti ve
UL
=
n
d Acti ve
DL
N
Users
p
Acti ve
DL
=
n
d Acti ve
UL DL +
N
Users
p
Acti ve
UL DL +
=
n
d
n
d Acti ve
UL
n
d Acti ve
DL
n
d Acti ve
UL DL +
+ + =
N
UL
TP
Cel l
UL
TP
Average
UL
--------------------------- = N
DL
TP
Cel l
DL
TP
Average
DL
--------------------------- =
TP
Cel l
UL
TP
Cel l
DL
Forsk 2010 AT283_TRG_E2 497
Chapter 9: WiMAX BWA Networks
coverage area of the transmitter, is the average uplink requested throughput of the service s, and
is the average downlink requested throughput of the service s.
Sector Traffic Maps (# Active Users)
Atoll directly uses the defined and values, i.e., the number of active users on UL and DL in the
transmitter coverage area using the service s.
At any given instant, Atoll calculates the probability for a user being active in the uplink and in the downlink as follows:
Voice Service (v)
Users active in the uplink and downlink both are included in the and values. Therefore, it is necessary
to accurately determine the number of active users in the uplink ( ), in the downlink ( ), and both
( ). As for the other types of traffic maps, Atoll considers both active and inactive users for voice services.
The activity status of each user depends on the activity periods during the call, i.e., the uplink and downlink activity
factors defined for the voice type service v, and .
Calculation of activity probabilities:
Probability of being inactive:
Probability of being active in the uplink:
Probability of being active in the downlink:
Probability of being active in the uplink and downlink both:
Calculation of the number of active users trying to access the voice service v:
We have: and
Where, n
v
is the total number of active users in the transmitter coverage area using the service v.
Calculation of number of users per activity status:
Number of users active in the uplink and downlink both: or
simply,
Number of users active in the uplink:
Number of users active in the downlink:
And,
Calculation of the number of inactive users attempting to access the service v:
Number of inactive users:
Data Service (d)
Here, Atoll considers all the users as active. Activity probabilities are not calculated.
Calculation of the number of users attempting to access the service d:
If
If
TP
Average
UL
TP
Average
DL
N
UL
N
DL
N
UL
N
DL
n
v Acti ve
UL
n
v Acti ve
DL
n
v Acti ve
UL DL +
f
Act
UL
f
Act
DL
p
Inacti ve
1 f
Act
UL
( ) 1 f
Act
DL
( ) =
p
Acti ve
UL
f
Act
UL
1 f
Act
DL
( ) =
p
Acti ve
DL
f
Act
DL
1 f
Act
UL
( ) =
p
Acti ve
UL DL +
f
Act
UL
f
Act
DL
=
N
UL
p
Acti ve
UL
p
Acti ve
UL DL +
+ ( ) n
v
= N
DL
p
Acti ve
DL
p
Acti ve
UL DL +
+ ( ) n
v
=
n
v Acti ve
UL DL +
Mi n
N
UL
p
Acti ve
UL DL +

p
Acti ve
UL
p
Acti ve
UL DL +
+
--------------------------------------------
N
DL
p
Acti ve
UL DL +

p
Acti ve
DL
p
Acti ve
UL DL +
+
-------------------------------------------- ,
\ .
|
| |
=
n
v Acti ve
UL DL +
Mi n N
UL
f
Act
DL
N
DL
f
Act
UL
, ( ) =
n
v Acti ve
UL
N
UL
n
v Acti ve
UL DL +
=
n
v Acti ve
DL
N
DL
n
v Acti ve
UL DL +
=
n
v
n
v Acti ve
UL
n
v Acti ve
DL
n
v Acti ve
UL DL +
+ + =
n
v Inacti ve
n
v
1 p
Inacti ve

------------------------------ p
Inacti ve
=
N
UL
N
DL
<
n
d Acti ve
UL DL +
N
UL
=
n
d Acti ve
UL
0 =
n
d Acti ve
DL
N
DL
N
UL
=
N
UL
N
DL
>
498 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
n
d
is the total number of active users in the TX
i
coverage area using the service d:
9.2.7.2 Simulation Process
WiMAX cells include intelligent schedulers and radio resource management features for regulating network traffic loads,
optimising spectral efficiency, and satisfying the QoS demands of the users. Each Monte Carlo simulation in the Atoll
WiMAX BWA module is a snap-shot of the network with resource allocation carried out over a duration of 1 second. The
number of WiMAX frames in 1 second depends on the selected frame duration, . The steps of this algorithm are
listed below.
The simulation process can be summed up into the following iterative steps.
For each simulation, the simulation process,
1. Generates mobiles according to the input traffic data as explained in "Generating a Realistic User Distribution" on
page 494.
2. Sets initial values for the following parameters:
- Cell transmission powers and reductions ( , , , and ) are set to the
values defined by the user.
- Mobile transmission power is set to the maximum mobile power ( ).
- Cell loads ( , , , , and ) are set to their current values in the
Cells table.
3. Determines the best servers for all the mobiles generated for the simulation as explained in "Best Server
Determination" on page 517.
Note:
The activity status distribution between users is an average distribution. In fact, in each
simulation, the activity status of each user is randomly drawn. Therefore, if you calculate
several simulations at once, average numbers of inactive, active on UL, active on DL and
active on UL and DL users correspond to the calculated distribution. But if you check each
simulation, the activity status distribution between users can be different in each of them.
n
d Acti ve
UL DL +
N
DL
=
n
d Acti ve
DL
0 =
n
d Acti ve
UL
N
UL
N
DL
=
n
d
n
d Acti ve
UL
n
d Acti ve
DL
n
d Acti ve
UL DL +
+ + =
D
Frame
P
Preambl e
TX
i
i c ( )
AP
Traffi c
TX
i
i c ( )
AP
Pi l ot
TX
i
i c ( )
AP
Idl e Pi l ot
TX
i
i c ( )
P
Max
M
i
TL
DL
TX
i
i c ( )
TL
UL
TX
i
i c ( )
NR
UL
TX
i
i c ( )
SU
TX
i
i c ( )
AU
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 499
Chapter 9: WiMAX BWA Networks
For each iteration k, the simulation process,
4. Determines the mobiles which are within the service areas of their best serving cells as explained in "Service Area
Calculation" on page 518.
5. Determines the permutation zone assigned to each mobile as explained in "Permutation Zone Selection (WiMAX
802.16e)" on page 519.
6. Determines the downlink and uplink traffic C/(I+N) and bearers for each of these mobiles as explained in "Traffic
and Pilot C/(I+N) and Bearer Calculation (DL)" on page 532 and "Traffic C/(I+N) and Bearer Calculation (UL)" on
page 541 respectively.
The C/(I+N) is calculated in different ways depending on whether a smart antenna has been assigned to a
transmitter or not.
- Without smart antennas:
The downlink traffic loads of cells are used to calculate the downlink interference, i.e., the interference
received from each interfering cell in the downlink is weighted by its downlink traffic load. The uplink traffic
loads of interfering mobiles are used to calculate the uplink interference, i.e., the interference received from
each interfering mobile in the uplink is weighted by its uplink traffic load.
- With smart antennas:
Victim and Interfering Mobiles:
In WiMAX simulations, the terms victim and interfering mobiles are used for mobiles served by the victim and
interfering cells respectively. In the downlink, victim mobiles receive interfering signals from interfering cells.
In the uplink, victim cells receive interfering signals from interfering mobiles.
Figure 9.1WiMAX Simulation Algorithm
500 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Atoll assumes that a different beam is formed for each victim mobile.
Time-Slot Scenario:
For each victim mobile, instead of weighting the interference by traffic loads of the interfering mobiles or cells,
a Time-Slot Scenario (TSS) is generated. A time-slot scenario is a list of interfering mobiles per victim mobile.
In other words, a time-slot scenario generated for any victim mobile contains at most one (1) interfering mobile
in each interfering cell. Each time-slot scenario can generate either one (1) or no (0) interfering mobile in each
interfering cell for each victim mobile. One and only one time-slot scenario is generated per victim mobile. And,
there are as many time-slot scenarios generated as there are victim mobiles generated during the simulation.
For a given time-slot scenario, the probability that an interfering mobile is present in an interfering cell depends
on the traffic loads of the potential interfering mobiles in the interfering cell. All mobiles in an interfering cell
are potential interfering mobiles. Which one (1), if any, of these potential interfering mobiles is included in the
time-slot scenario is determined by weighting their probability of selection by the mobile traffic loads.
Interference Averaging Over Iterations:
Interference is averaged over iterations of a simulation. This process considers the probabilities of collision
between slots used by victim and interfering mobiles, which depend upon their transmission times, or in other
words, their traffic loads. The averaging of interferences over all the iterations in a simulation gives a realistic
average interference at the end of the simulation.
The process is the same for uplink and downlink. In this way, Atoll simulates the simultaneous connections
of victim and interfering mobiles, and considers the effect of the smart antenna, because beamforming is
performed for all victim and interfering mobiles for all time-slot scenarios.
Each iteration starts with the initial conditions which are the results from the previous iteration, i.e., interference
information are input to each iteration. The averaging of interferences over all the iterations in a simulation is
performed in a successive manner. This is done because each time-slot scenario may have a large number
of interfering mobiles for each victim mobile.
Successive averaging means that the interference information input to an iteration takes into account the
output interference information of the preceding iteration as well as the weighted input interference information
of all the previously carried out iterations. If I represents the interference information, the interference
information input to the k
th
iteration can be given by:
Where k is the iteration number, n is any given victim mobile, and is a stability factor used to help
simulations converge quickly. The stability factor is currently set to 0.2. The effect of the stability factor can be
understood by the following figure.
Figure 9.2Victim and Interfering Mobiles
Figure 9.3Simulation Convergence Stability Factor
I
i n
n k ,
I
out
n k 1 ,
o k 2 ( ) I
i n
n k 2 ,
+
1 o k 2 ( ) +
----------------------------------------------------------------------- =
o
Forsk 2010 AT283_TRG_E2 501
Chapter 9: WiMAX BWA Networks
7. Determines the channel throughputs at the mobile as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 547.
8. Performs radio resource management and scheduling to determine the amount of resources to allocate to each
mobile according to the QoS and throughput demands of each mobile using the selected scheduler as explained
in "Scheduling and Radio Resource Allocation" on page 551.
9. Calculates the user throughputs after allocating resources to each mobile as explained in "User Throughput
Calculation" on page 557.
10. Updates the traffic loads, and noise rise values of all the cells according to the resources in use and the total
resources as follows:
Calculation of Traffic Loads:
Atoll calculates the traffic loads for all the cells TX
i
(ic).
and
For uplink MU-MIMO,
Calculation of Uplink Noise Rise:
For each victim cell TX
i
(ic), the uplink noise rise is calculated and updated by considering each interfering mobile
M
j
as explained in "Noise Rise Calculation (UL)" on page 537.
Calculation of Segmentation Usage (WiMAX 802.16e):
Atoll calculates the segmentation usages for all the cells as follows:
Where is the sum of the percentages of the downlink cell resources allocated to
mobiles served by the segmented permutation zone.
Calculation of AAS Usage:
Atoll calculates the AAS usages for all the cells as follows:
Where is the sum of the percentages of the downlink cell resources allocated to mobiles served
by the smart antenna equipment.
Calculation of Uplink MU-MIMO Gain:
Atoll calculates the uplink MU-MIMO gain for all the cells as follows:
Where is the sum of the percentages of the uplink cell resources allocated to MU-MIMO
mobiles and is the sum of the real resource consumption of MU-MIMO mobiles.
TL
DL
TX
i
i c ( )
R
DL
M
i
M
i

= TL
UL
TX
i
i c ( )
R
UL
M
i
M
i

=
TL
UL
TX
i
i c ( )
RC
UL
M
i
MU MIMO
M
i
MU MI MO

=
SU
TX
i
i c ( )
R
DL
M
i
PZ
DL
M
i
Seg =
M
i
PZ
DL
M
i
Seg =

TL
DL
TX
i
i c ( )
------------------------------------------------------------------- =
R
DL
M
i
PZ
DL
M
i
Seg =
M
i
PZ
DL
M
i
Seg =

AU
TX
i
i c ( )
R
DL
M
i
AAS
M
i
AAS

TL
DL
TX
i
i c ( )
------------------------------------- =
R
DL
M
i
AAS
M
i
AAS

G
MU MIMO
TX
i
i c ( )
R
UL
M
i
MU MI MO
M
i
MU MI MO

RC
UL
M
i
MU MIMO
M
i
MU MI MO

----------------------------------------------------------- =
R
UL
M
i
MU MI MO
M
i
MU MIMO

RC
UL
M
i
MU MIMO
M
i
MU MIMO

502 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
11. Performs the convergence test to see whether the differences between the current and the new loads are within
the convergence thresholds.
The convergence criteria are evaluated at the end of each iteration k, and can be written as follows:
If , , and are the simulation convergence thresholds defined when
creating the simulation, Atoll stops the simulation in the following cases.
Convergence: Simulation has converged between iteration k - 1 and k if:
AND AND
No convergence: Simulation has not converged even after the last iteration, i.e., k = Max Number of Iterations
defined when creating the simulation, if:
OR OR
12. Repeats the above steps (from step 3.) for the iteration k+1 using the new calculated loads as the current loads.
Simulation Results
At the end of the simulation process, the main results obtained are:
Downlink traffic loads
Uplink traffic loads
Uplink noise rise received at the main antenna
Angular distributions of downlink traffic power density for cells with smart antennas
Angular distributions of uplink noise rise for cells with smart antennas
Downlink AAS usage
Downlink segmentation usage
Uplink MU-MIMO capacity gain
These results can be used as input for C/(I+N)-based coverage predictions.
In addition to the above parameters, the simulations also list the connection status of each mobile. Mobiles can be rejected
due to:
No Coverage: If the mobile does not have any best serving cell (step 3.) or if the mobile is not within the service
area of its best server (step 4.).
No Service: If the mobile is not able to access a bearer in the direction of its activity (step 6.), i.e., UL, DL, or
UL+DL.
Scheduler Saturation: If the mobile is not in the list of mobiles selected for scheduling (step 8.)
Resource Saturation: If all the cell resources are used up before allocation to the mobile or if, for a user active
in uplink, the minimum uplink throughput demand is higher than the uplink allocated bandwidth throughput
(step 8.)
Connected mobiles (step 8.) can be:
Connected UL: If a mobile active in UL is allocated resources in UL.
Connected DL: If a mobile active in DL is allocated resources in DL.
Connected UL+DL: If a mobile active in UL+DL is allocated resources in UL+DL.
9.2.8 C/(I+N)-Based Coverage Predictions
The following coverage predictions are based on the received signal levels, total noise, and interference.
Coverage by C/(I+N) Level (DL)
Coverage by Best Bearer (DL)
Coverage by Throughput (DL)
Coverage by Quality Indicator (DL)
Coverage by C/(I+N) Level (UL)
Coverage by Best Bearer (UL)
Coverage by Throughput (UL)
Coverage by Quality Indicator (UL)
ATL
DL
TX
i
i c ( )
k
Max
All TX
i
i c ( )
TL
DL
TX
i
i c ( )
k
TL
DL
TX
i
i c ( )
k 1

\ .
| |
=
ATL
UL
TX
i
i c ( )
k
Max
All TX
i
i c ( )
TL
UL
TX
i
i c ( )
k
TL
UL
TX
i
i c ( )
k 1

\ .
| |
=
ANR
UL
TX
i
i c ( )
k
Max
All TX
i
i c ( )
NR
UL
TX
i
i c ( )
k
NR
UL
TX
i
i c ( )
k 1

\ .
| |
=
ATL
DL
TX
i
i c ( )
Req
ATL
UL
TX
i
i c ( )
Req
ANR
UL
TX
i
i c ( )
Req
ATL
DL
TX
i
i c ( )
k
ATL
DL
TX
i
i c ( )
Req
s ATL
UL
TX
i
i c ( )
k
ATL
UL
TX
i
i c ( )
Req
s ANR
UL
TX
i
i c ( )
k
ANR
UL
TX
i
i c ( )
Req
s
ATL
DL
TX
i
i c ( )
k
ATL
DL
TX
i
i c ( )
Req
> ATL
UL
TX
i
i c ( )
k
ATL
UL
TX
i
i c ( )
Req
> ANR
UL
TX
i
i c ( )
k
ANR
UL
TX
i
i c ( )
Req
>
Forsk 2010 AT283_TRG_E2 503
Chapter 9: WiMAX BWA Networks
These coverage predictions take into account the receiver characteristics ( , , , and ) when calculating
the required parameter. For these calculations, Atoll calculates the received signal level, noise, and interference at each
pixel. Each pixel within the calculation area of TX
i
(ic) is considered a non-interfering receiver. The properties of the non-
interfering probe receiver are set by selecting a terminal, a mobility type, and a service.
The downlink coverage predictions are based on the downlink traffic loads of the cells, and the uplink coverage predictions
are based on the uplink noise rise values. These parameters can either be calculated by Atoll during the Monte Carlo
simulations, or set manually by the user for all the cells.
Coverage prediction parameters to be set are:
The coverage prediction conditions, and
The display settings to colour the coverage areas.
The minimum thresholds at the receiver are defined in the Display parameters.
The following sections describe the determination of coverage area of each cell ("Coverage Area Determination" on
page 503), the calculation of the coverage parameter ("Coverage Parameter Calculation" on page 503), and the display
options ("Coverage Display" on page 504) of the coverage predictions.
9.2.8.1 Coverage Area Determination
These coverage predictions are all best server coverage predictions, i.e., the coverage area of each cell comprises the
pixels where the cell is the best server. Best server for each pixel is calculated as explained in "Best Server Determination"
on page 517.
9.2.8.2 Coverage Parameter Calculation
The following parameters are calculated for the Coverage by C/(I+N) Level (DL) coverage prediction.
Preamble C/(I+N) Level (DL) (dB): as explained in "Preamble C/(I+N) Calculation" on page 517.
Preamble Total Noise (I+N) (DL) (dBm): as explained in "Preamble C/(I+N) Calculation" on
page 517.
Traffic C/(I+N) Level (DL) (dB): as explained in "Traffic and Pilot C/(I+N) and Bearer Calculation
(DL)" on page 532.
Traffic Total Noise (I+N) (DL) (dBm): as explained in "Traffic and Pilot C/(I+N) and Bearer
Calculation (DL)" on page 532.
Pilot C/(I+N) Level (DL) (dB): as explained in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)"
on page 532.
The following parameters are calculated for the Coverage by Best Bearer (DL) coverage prediction.
Best Bearer (DL): as explained in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on page 532.
Modulation (DL): Modulation used by the bearer calculated as explained in "Traffic and Pilot C/(I+N) and
Bearer Calculation (DL)" on page 532.
The following parameters are calculated for the Coverage by Throughput (DL) coverage prediction.
Peak MAC Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 547.
Effective MAC Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell
Capacity, and Allocated Bandwidth Throughput Calculation" on page 547.
Application Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 547.
Peak MAC Cell Capacity (DL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 547.
Effective MAC Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell
Capacity, and Allocated Bandwidth Throughput Calculation" on page 547.
Application Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 547.
The following parameters are calculated for the Coverage by C/(I+N) Level (UL) coverage prediction.
C/(I+N) Level (UL) (dB): as explained in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
Total Noise (I+N) (UL) (dBm): as explained in "Noise Rise Calculation (UL)" on page 537.
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
CINR
Preambl e
TX
i
i c ( )
I N + ( )
Preambl e
TX
i
i c ( )
CINR
Traffi c
TX
i
i c ( )
I N + ( )
DL
TX
i
i c ( )
CINR
Pi l ot
TX
i
i c ( )
B
DL
M
i
B
DL
M
i
CTP
P DL
M
i
CTP
E DL
M
i
CTP
A DL
M
i
Cap
P DL
M
i
Cap
E DL
M
i
Cap
A DL
M
i
CINR
UL
M
i
I N + ( )
UL
TX
i
i c ( )
504 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Allocated Bandwidth (UL) (No. of Subchannels): as explained in "Traffic C/(I+N) and Bearer
Calculation (UL)" on page 541.
C/(I+N) Level for 1 Subchannel (UL) (dB): as explained in "Traffic C/(I+N) and Bearer Calculation (UL)"
on page 541 but by fixing
Transmission Power (UL) (dBm): as explained in "Traffic C/(I+N) and Bearer Calculation (UL)" on
page 541.
The following parameters are calculated for the Coverage by Best Bearer (UL) coverage prediction.
Best Bearer (UL): as explained in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
Modulation (UL): Modulation used by the bearer calculated as explained in "Traffic C/(I+N) and Bearer
Calculation (UL)" on page 541.
The following parameters are calculated for the Coverage by Throughput (UL) coverage prediction.
Peak MAC Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 547.
Effective MAC Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell
Capacity, and Allocated Bandwidth Throughput Calculation" on page 547.
Application Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 547.
Peak MAC Cell Capacity (UL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 547.
Effective MAC Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell
Capacity, and Allocated Bandwidth Throughput Calculation" on page 547.
Application Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 547.
Peak MAC Allocated Bandwidth Throughput (UL) (kbps): as explained in "Channel Throughput,
Cell Capacity, and Allocated Bandwidth Throughput Calculation" on page 547.
Effective MAC Allocated Bandwidth Throughput (UL) (kbps): as explained in "Channel
Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation" on page 547.
Application Allocated Bandwidth Throughput (UL) (kbps): as explained in "Channel Throughput,
Cell Capacity, and Allocated Bandwidth Throughput Calculation" on page 547.
9.2.8.3 Coverage Display
9.2.8.3.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
9.2.8.3.2 Coverage by C/(I+N) Level (DL) Display Types
It is possible to display the Coverage by C/(I+N) Level (DL) coverage prediction with colours depending on the following
display options.
Preamble C/(I+N) Level (DL) (dB)
Atoll calculates preamble C/(I+N) levels received from the best serving cells on each pixel of their coverage areas. A pixel
of a coverage area is coloured if the preamble C/(I+N) level exceeds ( ) the defined thresholds (the pixel colour depends
on the preamble C/(I+N) level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the preamble C/
(I+N) level from the best server exceeds a defined threshold.
Preamble Total Noise (I+N) (DL) (dBm)
Atoll calculates preamble total noise (I+N) levels received from the interfering cells on each pixel of the coverage areas
of the best serving cells. A pixel of a coverage area is coloured if the preamble total noise (I+N) level exceeds ( ) the
defined thresholds (the pixel colour depends on the preamble total noise (I+N) level). Coverage consists of several
independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds.
N
SC UL
M
i
CINR
UL
M
i
N
SC UL
M
i
1 =
P
Eff
M
i
B
UL
M
i
B
UL
M
i
CTP
P UL
M
i
CTP
E UL
M
i
CTP
A UL
M
i
Cap
P UL
M
i
Cap
E UL
M
i
Cap
A UL
M
i
ABTP
P UL
M
i
ABTP
E UL
M
i
ABTP
A UL
M
i
>
>
Forsk 2010 AT283_TRG_E2 505
Chapter 9: WiMAX BWA Networks
Each layer corresponds to an area where the preamble total noise (I+N) level from the interfering cells exceeds a defined
threshold.
Traffic C/(I+N) Level (DL) (dB)
Atoll calculates traffic C/(I+N) levels received from the best serving cells on each pixel of their coverage areas. A pixel of
a coverage area is coloured if the traffic C/(I+N) level exceeds ( ) the defined thresholds (the pixel colour depends on the
traffic C/(I+N) level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the traffic C/(I+N) level from
the best server exceeds a defined threshold.
Traffic Total Noise (I+N) (DL) (dBm)
Atoll calculates traffic total noise (I+N) levels received from the interfering cells on each pixel of the coverage areas of the
best serving cells. A pixel of a coverage area is coloured if the traffic total noise (I+N) level exceeds ( ) the defined
thresholds (the pixel colour depends on the traffic total noise (I+N) level). Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the traffic total noise (I+N) level from the interfering cells exceeds a defined threshold.
Pilot C/(I+N) Level (DL) (dB)
Atoll calculates pilot C/(I+N) levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the pilot C/(I+N) level exceeds ( ) the defined thresholds (the pixel colour depends on the
pilot C/(I+N) level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the pilot C/(I+N) level from the
best server exceeds a defined threshold.
9.2.8.3.3 Coverage by Best Bearer (DL) Display Types
It is possible to display the Coverage by Best Bearer (DL) coverage prediction with colours depending on the following
display options.
Best Bearer (DL)
Atoll determines the best bearer available on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if a bearer is available (the pixel colour depends on the available bearer). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as available
bearers. Each layer corresponds to an area covered by an available bearer.
Modulation (DL)
Atoll determines the modulation used by the best bearer available on each pixel of the coverage areas of the best serving
cells. A pixel of a coverage area is coloured if a bearer is available (the pixel colour depends on the modulation used by
the available bearer). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as modulation used by bearers. Each layer corresponds to an area covered the modulation used
by available bearers.
9.2.8.3.4 Coverage by Throughput (DL) Display Types
It is possible to display the Coverage by Throughput (DL) coverage prediction with colours depending on the following
display options.
Peak MAC Channel Throughput (DL) (kbps)
Atoll calculates peak MAC channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the peak MAC channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the peak MAC channel throughput). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the peak MAC channel throughput exceeds a defined threshold.
Effective MAC Channel Throughput (DL) (kbps)
Atoll calculates effective MAC channel throughputs available on each pixel of the coverage areas of the best serving cells.
A pixel of a coverage area is coloured if the effective MAC channel throughput exceeds ( ) the defined thresholds (the
pixel colour depends on the effective MAC channel throughput). Coverage consists of several independent layers whose
visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to
an area where the effective MAC channel throughput exceeds a defined threshold.
Application Channel Throughput (DL) (kbps)
Atoll calculates application channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the application channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the application channel throughput). Coverage consists of several independent layers whose visibility
>
>
>
>
>
>
506 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the application channel throughput exceeds a defined threshold.
Peak MAC Cell Capacity (DL) (kbps)
Atoll calculates peak MAC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the peak MAC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the peak
MAC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the peak MAC cell capacity
exceeds a defined threshold.
Effective MAC Cell Capacity (DL) (kbps)
Atoll calculates effective MAC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if the effective MAC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends
on the effective MAC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the effective MAC
cell capacity exceeds a defined threshold.
Application Cell Capacity (DL) (kbps)
Atoll calculates application cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the application cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the
application cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the application cell
capacity exceeds a defined threshold.
9.2.8.3.5 Coverage by Quality Indicator (DL) Display Types
It is possible to display the Coverage by Quality Indicator (DL) coverage prediction with colours depending on quality
indicators available in the document (Quality Indicators table).
Atoll calculates the traffic C/(I+N) levels received from the best serving cells at each pixel of their coverage areas. From
the C/(I+N), Atoll determines the best bearer available on each pixel. Then, for the calculated C/(I+N) and bearer, it
determines the value of the selected quality indicator from the quality graphs defined in the WiMAX equipment of the
selected terminal. A pixel of a coverage area is coloured if the quality indicator value exceeds ( ) the defined thresholds
(the pixel colour depends on the quality indicator value). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the quality indicator value exceeds a defined threshold.
9.2.8.3.6 Coverage by C/(I+N) Level (UL) Display Types
It is possible to display the Coverage by C/(I+N) Level (UL) coverage prediction with colours depending on the following
display options.
C/(I+N) Level (UL) (dB)
Atoll calculates uplink C/(I+N) levels received at the best serving cells from each pixel of their coverage areas. A pixel of
a coverage area is coloured if the uplink C/(I+N) level exceeds ( ) the defined thresholds (the pixel colour depends on the
uplink C/(I+N) level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the uplink C/(I+N) level from
the pixels at the best serving cells exceeds a defined threshold.
Total Noise (I+N) (UL) (dBm)
Atoll calculates total noise (I+N) levels received at the best serving cells from each pixel of their coverage areas. A pixel
of a coverage area is coloured if the total noise (I+N) level exceeds ( ) the defined thresholds (the pixel colour depends
on the total noise (I+N) level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the total noise (I+N)
level from the pixels at the best serving cells exceeds a defined threshold.
Allocated Bandwidth (UL) (No. of Subchannels)
Atoll calculates the number of used subchannels at each pixel of each best serving cells coverage area. A pixel of a
coverage area is coloured if the number of used subchannels exceeds ( ) the defined thresholds (the pixel colour
depends on the number of used subchannels). Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where
the number of used subchannels at the pixels of the best serving cells exceeds a defined threshold.
C/(I+N) Level for 1 Subchannel (UL) (dB)
Atoll calculates uplink C/(I+N) levels for 1 subchannel received at the best serving cells from each pixel of their coverage
areas. A pixel of a coverage area is coloured if the uplink C/(I+N) level for 1 subchannel exceeds ( ) the defined thresholds
(the pixel colour depends on the uplink C/(I+N) level for 1 subchannel). Coverage consists of several independent layers
>
>
>
>
>
>
>
>
Forsk 2010 AT283_TRG_E2 507
Chapter 9: WiMAX BWA Networks
whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the uplink C/(I+N) level for 1 subchannel from the pixels at the best serving cells exceeds
a defined threshold.
Transmission Power (UL) (dBm)
Atoll calculates the uplink transmission powers corresponding to the uplink C/(I+N) received at the best serving cells from
each pixel of their coverage areas. A pixel of a coverage area is coloured if the uplink transmission power exceeds ( )
the defined thresholds (the pixel colour depends on the uplink transmission power level). Coverage consists of several
independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds.
Each layer corresponds to an area where the uplink transmission power from the pixels at the best serving cells exceeds
a defined threshold.
9.2.8.3.7 Coverage by Best Bearer (UL) Display Types
It is possible to display the Coverage by Best Bearer (UL) coverage prediction with colours depending on the following
display options.
Best Bearer (UL)
Atoll determines the best bearer available on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if a bearer is available (the pixel colour depends on the available bearer). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as available
bearers. Each layer corresponds to an area covered by an available bearer.
Modulation (UL)
Atoll determines the modulation used by the best bearer available on each pixel of the coverage areas of the best serving
cells. A pixel of a coverage area is coloured if a bearer is available (the pixel colour depends on the modulation used by
the available bearer). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as modulation used by bearers. Each layer corresponds to an area covered the modulation used
by available bearers.
9.2.8.3.8 Coverage by Throughput (UL) Display Types
It is possible to display the Coverage by Throughput (UL) coverage prediction with colours depending on the following
display options.
Peak MAC Channel Throughput (UL) (kbps)
Atoll calculates peak MAC channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the peak MAC channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the peak MAC channel throughput). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the peak MAC channel throughput exceeds a defined threshold.
Effective MAC Channel Throughput (UL) (kbps)
Atoll calculates effective MAC channel throughputs available on each pixel of the coverage areas of the best serving cells.
A pixel of a coverage area is coloured if the effective MAC channel throughput exceeds ( ) the defined thresholds (the
pixel colour depends on the effective MAC channel throughput). Coverage consists of several independent layers whose
visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to
an area where the effective MAC channel throughput exceeds a defined threshold.
Application Channel Throughput (UL) (kbps)
Atoll calculates application channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the application channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the application channel throughput). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the application channel throughput exceeds a defined threshold.
Peak MAC Cell Capacity (UL) (kbps)
Atoll calculates peak MAC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the peak MAC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the peak
MAC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the peak MAC cell capacity
exceeds a defined threshold.
Effective MAC Cell Capacity (UL) (kbps)
Atoll calculates effective MAC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if the effective MAC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends
>
>
>
>
>
>
508 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
on the effective MAC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the effective MAC
cell capacity exceeds a defined threshold.
Application Cell Capacity (UL) (kbps)
Atoll calculates application cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the application cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the
application cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the application cell
capacity exceeds a defined threshold.
Peak MAC Allocated Bandwidth Throughput (UL) (kbps)
Atoll calculates peak MAC allocated bandwidth throughputs available on each pixel of the coverage areas of the best
serving cells. A pixel of a coverage area is coloured if the peak MAC allocated bandwidth throughput exceeds ( ) the
defined thresholds (the pixel colour depends on the peak MAC allocated bandwidth throughput). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the peak MAC allocated bandwidth throughput exceeds a defined
threshold.
Effective MAC Allocated Bandwidth Throughput (UL) (kbps)
Atoll calculates effective MAC allocated bandwidth throughputs available on each pixel of the coverage areas of the best
serving cells. A pixel of a coverage area is coloured if the effective MAC allocated bandwidth throughput exceeds ( ) the
defined thresholds (the pixel colour depends on the effective MAC allocated bandwidth throughput). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the effective MAC allocated bandwidth throughput exceeds a defined
threshold.
Application Allocated Bandwidth Throughput (UL) (kbps)
Atoll calculates application allocated bandwidth throughputs available on each pixel of the coverage areas of the best
serving cells. A pixel of a coverage area is coloured if the application allocated bandwidth throughput exceeds ( ) the
defined thresholds (the pixel colour depends on the application allocated bandwidth throughput). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the application allocated bandwidth throughput exceeds a defined
threshold.
9.2.8.3.9 Coverage by Quality Indicator (UL) Display Types
It is possible to display the Coverage by Quality Indicator (UL) coverage prediction with colours depending on quality
indicators available in the document (Quality Indicators table).
Atoll calculates the uplink C/(I+N) levels received at the best serving cells from each pixel of their coverage areas. From
the C/(I+N), Atoll determines the best bearer available on each pixel. Then, for the calculated C/(I+N) and bearer, it
determines the value of the selected quality indicator from the quality graphs defined in the WiMAX equipment of the best
serving cell. A pixel of a coverage area is coloured if the quality indicator value exceeds ( ) the defined thresholds (the
pixel colour depends on the quality indicator value). Coverage consists of several independent layers whose visibility in
the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the quality indicator value exceeds a defined threshold.
9.3 Calculation Algorithms
The following sections describe all the calculation algorithms used in point analysis, calculation of coverage predictions,
calculations on subscriber lists, and Monte Carlo simulations.
9.3.1 Co- and Adjacent Channel Overlaps Calculation
A WiMAX network can consist of cells that use different channel bandwidths. Therefore, the start and end frequencies of
all the channels may not exactly coincide. Channel bandwidths of cells can overlap each other with different ratios.
>
>
>
>
>
Forsk 2010 AT283_TRG_E2 509
Chapter 9: WiMAX BWA Networks
The following sections describe how the co- and adjacent channel overlaps are calculated between the channels used by
any studied cell TX
i
(ic) and any other cell TX
j
(jc) of the network. In terms of interference calculation, the studied cell can
be considered a victim of interference received from the other cells that might be interfering the studied cell.
If the studied cell is assigned a channel number , it receives co-channel interference on the channel bandwidth
of , and adjacent channel interference on the adjacent channel bandwidths, i.e., corresponding to
and .
In order to calculate the co- and adjacent channel overlaps between two channels, it is necessary to calculate the start
and end frequencies of both channels (explained in "Conversion From Channel Numbers to Start and End Frequencies"
on page 509). Once the start and end frequencies are known for the studied and other cells, the co- and adjacent overlaps
and the total overlap ratio are calculated as respectively explained in:
"Co-Channel Overlap Calculation" on page 510.
"Adjacent Channel Overlap Calculation" on page 510.
"Total Overlap Ratio Calculation" on page 512.
9.3.1.1 Conversion From Channel Numbers to Start and End Frequencies
Input
and : Start frequency of the frequency band assigned to the cells TX
i
(ic) and TX
j
(jc).
can be the start frequency of a TDD frequency band ( ), or the uplink or the downlink
start frequency of an FDD frequency band ( or ).
and : First channel numbers the frequency band assigned to the cells TX
i
(ic) and
TX
j
(jc).
and : Channel numbers assigned to cells TX
i
(ic) and TX
j
(jc).
For FDD networks, Atoll considers that the same channel number is assigned to a cell in the downlink and uplink,
i.e., the channel number you assign to a cell is considered for uplink and downlink both.
and : Bandwidths of the channels assigned to cells TX
i
(ic) and TX
j
(jc).
Calculations
Channel numbers are converted into start and end frequencies as follows:
For cell TX
i
(ic):
Figure 9.4Co-Channel and Adjacent Channel Overlaps
N
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
1
N
Channel
TX
i
i c ( )
1 +
F
Start FB
TX
i
i c ( )
F
Start FB
TX
j
j c ( )
F
Start FB
F
Start FB TDD
F
Start FB FDD UL
F
Start FB FDD DL
N
Channel
Fi rst TX
i
i c ( )
N
Channel
Fi rst TX
j
j c ( )
N
Channel
TX
i
i c ( )
N
Channel
TX
j
j c ( )
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
F
Start
TX
i
i c ( )
F
Start FB
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst TX
i
i c ( )
( ) + =
510 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For cell TX
j
(jc):
Output
and : Start frequencies for the cells TX
i
(ic) and TX
j
(jc).
and : End frequencies for the cells TX
i
(ic) and TX
j
(jc).
9.3.1.2 Co-Channel Overlap Calculation
Input
and : Start frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 509.
and : End frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 509.
: Bandwidth of the channel assigned to the studied cell TX
i
(ic).
Calculations
Atoll first verifies that co-channel overlap exists between the cells TX
i
(ic) and TX
j
(jc).
Co-channel overlap exists if:
AND
Otherwise there is no co-channel overlap.
Atoll calculates the bandwidth of the co-channel overlap as follows:
The co-channel overlap ratio is given by:
Output
: Co-channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc).
9.3.1.3 Adjacent Channel Overlap Calculation
Input
and : Start frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 509.
and : End frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 509.
: Bandwidth of the channel assigned to the studied cell TX
i
(ic).
Calculations
Atoll first verifies that adjacent channel overlaps exist between (the lower-frequency and the higher-frequency adjacent
channels of) the cells TX
i
(ic) and TX
j
(jc).
F
End
TX
i
i c ( )
F
Start FB
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst TX
i
i c ( )
1 + ( ) + =
F
Start
TX
j
j c ( )
F
Start FB
TX
j
j c ( )
W
Channel
TX
j
j c ( )
N
Channel
TX
j
j c ( )
N
Channel
Fi rst TX
j
j c ( )
( ) + =
F
End
TX
j
j c ( )
F
Start FB
TX
j
j c ( )
W
Channel
TX
j
j c ( )
N
Channel
TX
j
j c ( )
N
Channel
Fi rst TX
j
j c ( )
1 + ( ) + =
F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
W
Channel
TX
i
i c ( )
F
Start
TX
i
i c ( )
F
End
TX
j
j c ( )
< F
End
TX
i
i c ( )
F
Start
TX
j
j c ( )
>
W
CCO
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( ) =
r
CCO
TX
i
i c ( ) TX
j
j c ( ) W
CCO
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
--------------------------------------- =
r
CCO
TX
i
i c ( ) TX
j
j c ( )
F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
W
Channel
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 511
Chapter 9: WiMAX BWA Networks
Adjacent channel overlap exists on the lower-frequency adjacent channel if:
AND
Adjacent channel overlap exists on the higher-frequency adjacent channel if:
AND
Otherwise there is no adjacent channel overlap.
Atoll determines the adjacent channel overlap ratio as follows:
Bandwidth of the lower-frequency adjacent channel overlap:
The lower-frequency adjacent channel overlap ratio is given by:
Bandwidth of the higher-frequency adjacent channel overlap:
The higher-frequency adjacent channel overlap ratio is given by:
The adjacent channel overlap ratio is given by:
Output
: Adjacent channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc).
9.3.1.4 FDD TDD Overlap Ratio Calculation
There are many different interference scenarios possible in a WiMAX network depending on the type of duplexing used
by the cells of the network. The most common interference scenarios are FDD-only and TDD-only interferences. However,
co-existing FDD and TDD cells may also exist and interfere each other. Atoll models the co-existence of FDD and TDD
cells in a network by determining the FDD TDD overlap ratio as follows:
Input
: Downlink subframe ratio defined in the Global Parameters.
Calculations
The FDD TDD overlap ratio is calculated as follows depending on the frequency bands assigned to the cells TX
i
(ic) and
TX
j
(jc):
Output
: FDD TDD overlap ratio between the cells TX
i
(ic) and TX
j
(jc).
F
Start
TX
i
i c ( )
W
Channel
TX
i
i c ( )
F
End
TX
j
j c ( )
< F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
>
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
< F
End
TX
i
i c ( )
W
Channel
TX
i
i c ( )
+ F
Start
TX
j
j c ( )
>
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
W
Channel
TX
i
i c ( )
, ( ) =
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
--------------------------------------- =
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
W
Channel
TX
i
i c ( )
+ , ( ) Max F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( ) =
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
--------------------------------------- =
r
ACO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
+ =
r
ACO
TX
i
i c ( ) TX
j
j c ( )
Frequency Band
Overlap Ratio
TX
i
(ic) TX
j
(jc)
TDD TDD 1
TDD FDD 1
FDD TDD
FDD FDD 1
r
DL Frame
TDD
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( )
r
DL Frame
TDD
100
---------------------------
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( )
512 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.3.1.5 Total Overlap Ratio Calculation
Input
: Co-channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Co-Channel
Overlap Calculation" on page 510.
: Adjacent channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Adjacent
Channel Overlap Calculation" on page 510.
: FDD TDD overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "FDD TDD
Overlap Ratio Calculation" on page 511.
: Adjacent channel suppression factor defined for the frequency band of the cell TX
i
(ic).
and : Bandwidths of the channels assigned to the cells TX
i
(ic) and TX
j
(jc).
Calculations
The total overlap ratio is:
The multiplicative factor is used to normalise the transmission power of the interfering cell TX
j
(jc). This means
that if the interfering cell transmits at X dBm over a bandwidth of , and it interferes over a bandwidth less than
, the interference from this cell should not be considered at X dBm but less than that. The factor
converts X dBm over to Y dBm (which is less than X dBm) over less than .
Output
: Total co- and adjacent channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc).
9.3.2 Preamble Signal Level and Quality Calculations
These calculations include the calculation of the received preamble signal level, and the noise and interference on the
preamble. The following sections also describe how the received preamble signal level, the noise and interference, C/N,
and C/(I+N) ratios are calculated in Atoll:
"Preamble Signal Level Calculation" on page 512.
"Preamble Noise Calculation" on page 514.
"Preamble C/N Calculation" on page 516.
"Preamble Interference Calculation" on page 515.
"Preamble C/(I+N) Calculation" on page 517.
9.3.2.1 Preamble Signal Level Calculation
Input
: Preamble transmission power of the cell TX
i
(ic).
: Number of antenna elements defined for the smart antenna equipment used by the transmitter TX
i.
: Transmitter antenna gain for the antenna used by the transmitter TX
i.
: Total transmitter losses for the transmitter TX
i
( ).
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( )
f
ACS FB
TX
i
i c ( )
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS FB
TX
i
i c ( )

10
---------------------------
+
\ .
|
|
|
| |
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( )
if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
>
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS FB
TX
i
i c ( )

10
---------------------------
+
\ .
|
|
|
| |
r
FDD TDD
TX
i
i c ( ) TX
j
j c ( ) W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------ if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
<

=
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------
W
Channel
TX
j
j c ( )
W
Channel
TX
j
j c ( ) W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------
W
Channel
TX
j
j c ( )
W
Channel
TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
P
Preambl e
TX
i
i c ( )
E
SA
TX
i
G
TX
i
L
TX
i
L
TX
i
L
Total DL
=
Forsk 2010 AT283_TRG_E2 513
Chapter 9: WiMAX BWA Networks
: Loss on the transmitter-receiver path (path loss) calculated using a propagation model.
: Antenna attenuation (from antenna patterns) calculated for the antenna used by the transmitter TX
i.
: Shadowing margin based on the Model standard deviation.
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Indoor losses taken into account when the option "Indoor coverage" is selected.
: Receiver terminal losses for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna gain for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna attenuation calculated for the pixel, subscriber, or mobile M
i
.
For calculating the useful signal level from the best serving cell, is determined in the direction (H,V) = (0,0)
from the antenna patterns of the antenna used by M
i
. For calculating the interfering signal level from any interferer,
is determined in the direction of the interfering cell from the antenna patterns of the antenna used by M
i
, while
the antenna is pointed towards M
i
s best serving cell.
: Body loss defined for the service used by the pixel, subscriber, or mobile M
i
.
Calculations
The received preamble signal level (dBm) from any cell TX
i
(ic) is calculated for a pixel, subscriber, or mobile M
i
as follows:
Where EIRP is the effective isotropic radiated power of the cell calculated as follows:
Without smart antennas:
With smart antennas:
is the path loss (dB) calculated as follows:
Furthermore, the total losses between the cell and the pixel, subscriber, or mobile M
i
can be calculated as follows:
Output
: Received preamble signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Path loss between the cell TX
i
(ic) and the pixel, subscriber, or mobile M
i
.
: Total losses between the cell TX
i
(ic) and the pixel, subscriber, or mobile M
i
.
Note:
, , , and are not used in the calculations performed for the point
analysis tools profile tab and the preamble signal level based coverage predictions.
Note:
If you wish to exclude the the energy corresponding to the cyclic prefix part of the
total symbol duration from the useful signal level, you must add the following lines in
the Atoll.ini file:
[WiMAX]
ExcludeCPFromUsefulPower = 1
When this option is active, the cyclic prefix energy is excluded from . In other
words, the factor is added to .
Independant of the option, interference levels are calculated for the total symbol durations,
i.e., the energy of the useful symbol duration and the cyclic prefix energy.
L
Model
L
Ant
TX
i
M
Shadowi ng Model
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Ant
M
i
L
Ant
M
i
L
Body
M
i
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
C
Preambl e
TX
i
i c ( )
EIRP
Preambl e
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
EIRP
Preambl e
TX
i
i c ( )
P
Preambl e
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
EIRP
Preambl e
TX
i
i c ( )
P
Preambl e
TX
i
i c ( )
G
TX
i
L
TX
i
10 Log E
SA
TX
i
( ) + + =
L
Path
L
Path
L
Model
L
Ant
TX
i
+ =
L
Total
L
Path
L
TX
i
L
Indoor
M
Shadowi ng Model
+ + + G
TX
i
L
M
i
G
M
i
L
Ant
M
i
+ + = L
Body
M
i
+
C
Preambl e
TX
i
i c ( )
10 Log 1 r
CP
( ) C
Preambl e
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
L
Path
L
Total
514 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.3.2.2 Preamble Noise Calculation
For determining the preamble C/N and C/(I+N), Atoll calculates the preamble noise over the bandwidth used by the cell.
The used bandwidth depends on the number of subcarriers used by the preamble. In WiMAX 802.16d, the number of
subcarriers used by the preamble is the same as the number of subcarriers used by the cell over the rest of the WiMAX
frame. But, in WiMAX 802.16e, the number of subcarriers used by the preamble can be different from the number of
subcarriers used by the permutation zones.
The preamble noise comprises thermal noise and the noise figure of the equipment. The thermal noise density depends
on the temperature, i.e., it remains constant for a given temperature. However, the value of the thermal noise varies with
the used bandwidth.
Input
K: Boltzmanns constant.
T: Temperature in Kelvin.
: Number of used subcarriers defined in the Global Parameters (WiMAX 802.16d) or the number
of subcarriers used by the preamble defined for the frame configuration of the cell TX
i
(ic) (WiMAX 802.16e).
: Total number of subcarriers defined in the Global Parameters (WiMAX 802.16d) or for the frame
configuration of the cell TX
i
(ic) (WiMAX 802.16e).
: Sampling frequency for the cell TX
i
(ic) as calculated in "Calculation of Sampling Frequency" on
page 544.
: Noise figure of the terminal used for calculations by the pixel, subscriber, or mobile M
i
.
Calculations
The power spectral density of thermal noise is calculated as follows:
For WiMAX 802.16d, the thermal noise over the preamble for a cell is calculated as:
For WiMAX 802.16e, the thermal noise over the preamble for a cell is calculated as:
Effect of Segmentation (WiMAX 802.16e):
The preamble is segmented and one of the three preamble carrier sets is used for transmission. Each preamble
carrier set uses 1/3
rd
of the total number of preamble subcarriers. The power transmitted over the preamble has
higher spectral density than the power transmitted over the entire channel bandwidth. This power concentration
due to segmentation segmentation on the C/N and C/(I+N) results in an increase in the coverage footprint of the
preamble. Hence, the thermal noise at the pixel, subscriber, or mobile M
i
covered by the preamble is reduced by
a factor of .
The following table shows the different types of subcarriers and their numbers for preamble transmission in
WiMAX 802.16e.
Segment
Guard Subcarriers DC
Subcarrier
Left Right Total
128
All
10 10 20
1 (54) 107 1
0 1 (54) 35 0.3271
1 None 36 0.3364
2 None 36 0.3364
512
All
42 41 83
1 (214) 428 1
0 None 143 0.3341
1 1 (214) 142 0.3318
2 None 143 0.3341
N
SCa Preambl e
TX
i
i c ( )
N
SCa Total
TX
i
i c ( )
F
Sampl i ng
TX
i
i c ( )
nf
M
i
n
0
10 Log K T 1000 ( ) 174 dBm/Hz = =
n
0 Preambl e
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Preambl e
TX
i
i c ( )
N
SCa Total
TX
i
i c ( )
----------------------------------------
\ .
|
|
| |
+ =
n
0 Preambl e
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Preambl e
TX
i
i c ( )
N
SCa Total
TX
i
i c ( )
---------------------------------------- f
Segment
Preambl e

\ .
|
|
| |
+ =
f
Segment
Preambl e 1
3
--- =
N
SCa Total
N
SCa Preambl e f
Segment
Preambl e
Forsk 2010 AT283_TRG_E2 515
Chapter 9: WiMAX BWA Networks
The preamble noise is the sum of the thermal noise and the noise figure of the terminal used for the calculations by the
pixel, subscriber, or mobile M
i
.
Output
: Preamble noise for the cell TX
i
(ic).
9.3.2.3 Preamble Interference Calculation
The interference received by any pixel, subscriber, or mobile, served by a cell TX
i
(ic) from other cells TX
j
(jc) can be defined
as the preamble signal levels received from interfering cells TX
j
(jc) depending on the overlap that exists between the
channels used by the cells TX
i
(ic) and TX
j
(jc) and (for WiMAX 802.16e) which preamble carrier sets are used by the two
cells.
Input
: Preamble signal level received from an interfering cell TX
j
(jc) as calculated in "Preamble Signal Level
Calculation" on page 512 at the pixel, subscriber, or mobile M
i
covered by the cell TX
i
(ic).
: Shadowing margin based on the Model standard deviation.
: Shadowing margin based on the C/I standard deviation.
In Monte Carlo simulations, interfering signal levels already include , as explained in "Preamble
Signal Level Calculation" on page 477.
In coverage predictions, the ratio is applied to the interfering signals (for
more information, see "Shadowing Model" on page 115). As the received interfering signal levels already include
, is added to the received interfering signal levels in order to achieve the ratio
:
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Total channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Co- and Adjacent
Channel Overlaps Calculation" on page 508.
and : (WiMAX 802.16e) Segment numbers assigned to the cells TX
i
(ic) and TX
j
(jc) calculated
from their respective preamble indexes ( and ) as follows:
: Inter-technology interference reduction factor.
Calculations
The received preamble interference (dBm) from any cell TX
j
(jc) is calculated for a pixel, subscriber, or mobile M
i
as follows:
1024
All
86 86 172
1 (426) 851 1
0 1 (426) 283 0.3325
1 None 284 0.3337
2 None 284 0.3337
2048
All
172 172 344
1 (852) 1703 1
0 1 (852) 567 0.3329
1 None 568 0.3335
2 None 568 0.3335
n
Preambl e
TX
i
i c ( )
n
0 Preambl e
TX
i
i c ( )
nf
M
i
+ =
n
Preambl e
TX
i
i c ( )
0 to 31, 96, 99, 102, 105, 108, 111 0
32 to 63, 97, 100, 103, 106, 109, 112 1
64 to 95, 98, 101, 104, 107, 110, 113 2
C
Preambl e
TX
j
j c ( )
M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
M
Shadowi ng Model
M
Shadowi ng C I

M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
M
Shadowi ng C I

C
Preambl e
TX
j
j c ( )
C
Preambl e
TX
j
j c ( )
M
Shadowi ng C I
+ =
r
O
TX
i
i c ( ) TX
j
j c ( )
N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
n
Preambl e
TX
i
i c ( )
n
Preambl e
TX
j
j c ( )
n
Preambl e
N
Seg
f
IRF
Inter Tech
516 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where is the interference reduction factor due to channel overlap between the cells TX
i
(ic) and TX
j
(jc),
calculated as follows:
is the interference reduction factor due to preamble segmentation (WiMAX 802.16e only), calculated as
follows:
For WiMAX 802.16d, .
The probability of preamble subcarrier collision between the cells TX
i
(ic) and TX
j
(jc) is 0 if
and 1 if .
is the inter-technology downlink interference from transmitters of an external network (linked document of any
technology) calculated as follows:
Where is the downlink EIRP of the external transmitter, is the path loss from the external
transmitters to the pixel, subscriber, or mobile location, is the indoor losses taken into account when the option
"Indoor coverage" is selected, is the receiver terminal losses for the pixel, subscriber, or mobile M
i
, is the receiver
terminals antenna gain for the pixel, subscriber, or mobile M
i
, is the receiver terminals antenna attenuation
calculated for the pixel, subscriber, or mobile M
i
, and is the body loss defined for the service used by the pixel,
subscriber, or mobile M
i
.
Output
: Preamble interference received from any interfering cell TX
j
(jc) at the pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic).
9.3.2.4 Preamble C/N Calculation
Input
: Received preamble signal level from the cell TX
i
(ic) as calculated in "Preamble Signal Level
Calculation" on page 512.
: Preamble noise for the cell TX
i
(ic) as calculated in "Preamble Noise Calculation" on page 514.
Note:
In case of smart antennas, in already includes the effect of the
number of antenna elements ( ). If you wish to include the effect of the number of
antennas in case of MIMO, you must add the following lines in the Atoll.ini file:
[WiMAX]
MultiAntennaInterference
When the multi-antenna interference option is active, and TX
j
(jc) does not have a smart
antenna equipment assigned, the interference is incremented by .
Where is the number of MIMO transmission (downlink) antennas defined for the
cell TX
j
(jc).
I
Preambl e
TX
j
j c ( )
C
Preambl e
TX
j
j c ( )
f
O
TX
i
i c ( ) TX
j
j c ( )
f
Seg
TX
i
i c ( ) TX
j
j c ( )
I
DL
Inter Tech
+ + + =
f
O
TX
i
i c ( ) TX
j
j c ( )
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( ) =
f
Seg
TX
i
i c ( ) TX
j
j c ( )
f
Seg
TX
i
i c ( ) TX
j
j c ( )
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( ) =
f
Seg
TX
i
i c ( ) TX
j
j c ( )
0 =
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
= N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
=
C
Preambl e
TX
j
j c ( )
I
Preambl e
TX
j
j c ( )
E
SA
TX
j
10 Log N
Ant TX
TX
j
j c ( )
( ) +
N
Ant TX
TX
j
j c ( )
I
DL
Inter Tech
I
DL
Inter Tech
EIRP
DL
TX External
L
Path
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
IRF
Inter Tech
+
All External TXs

=
EIRP
DL
TX External
L
Path
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
I
Preambl e
TX
j
j c ( )
C
Preambl e
TX
i
i c ( )
n
Preambl e
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 517
Chapter 9: WiMAX BWA Networks
Calculations
The preamble C/N for a cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
Output
: Preamble C/N from the cell TX
i
(ic) at any pixel, subscriber, or mobile M
i
.
9.3.2.5 Preamble C/(I+N) Calculation
The carrier signal to interference and noise ratio is calculated in three steps. First Atoll calculates the received preamble
signal level from the studied cell (as explained in "Preamble Signal Level Calculation" on page 512) at the pixel, subscriber
or mobile under study. Next, Atoll calculates the interference received at the same studied pixel, subscriber, or mobile
from all the interfering cells (as explained in "Preamble Interference Calculation" on page 515). Interference from each cell
is weighted according to the co- and adjacent channel overlap between the studied and the interfering cells, and (in WiMAX
802.16e) the probabilities of subcarrier collision. Finally, Atoll takes the ratio of the preamble signal level, and the sum of
the total interference from all interfering cells and the noise (as calculated in "Preamble Noise Calculation" on page 514).
The receiver terminal is always considered to be oriented towards its best server, except when the "Lock Status" is set to
"Server+Orientation" for a subscriber in a subscriber list and its azimuth and tilt manually edited. In the case of NLOS
between the receiver and the best server, Atoll does not try to find the direction of the strongest signal, the receiver is
oriented towards the best server just as in the case of LOS.
Input
: Preamble signal level received from the cell TX
i
(ic) at a pixel, subscriber, or mobile M
i
as calculated
in "Preamble Signal Level Calculation" on page 512.
: Preamble noise for the cell TX
i
(ic) as calculated in "Preamble Noise Calculation" on page 514.
: Preamble interference received from any cell TX
j
(jc) at a pixel, subscriber, or mobile M
i
covered by a
cell TX
i
(ic) as calculated in "Preamble Interference Calculation" on page 515.
: Inter-technology downlink noise rise.
Calculations
The preamble C/(I+N) for a cell TX
i
(ic) is calculated as follows at any pixel, subscriber, or mobile M
i
:
The preamble total noise (I+N) for a cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
Output
: Preamble C/(I+N) from the cell TX
i
(ic) at a pixel, subscriber, or mobile M
i
.
: Preamble total noise from the interfering cells TX
j
(jc) at the pixel, subscriber, or mobile M
i
covered
by a cell TX
i
(ic).
9.3.3 Best Server Determination
In WiMAX, best server refers to a cell ("serving transmitter"-"reference cell" pair) from which a pixel, subscriber, or mobile
M
i
gets the highest preamble signal level ( ).
This calculation also determines whether the pixel, subscriber, or mobile M
i
is within the coverage area of any transmitter
or not.
CNR
Preambl e
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
n
Preambl e
TX
i
i c ( )
=
CNR
Preambl e
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
n
Preambl e
TX
i
i c ( )
I
Preambl e
TX
j
j c ( )
NR
DL
Inter Tech
CINR
Preambl e
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
10 Log
10
I
Preambl e
TX
j
j c ( )
10
-------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Preambl e
TX
i
i c ( )
10
---------------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
I N + ( )
Preambl e
TX
i
i c ( )
10 Log
10
I
Preambl e
TX
j
j c ( )
10
-------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Preambl e
TX
i
i c ( )
10
---------------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+ =
CINR
Preambl e
TX
i
i c ( )
I N + ( )
Preambl e
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
518 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Input
: Preamble signal level received from any cell TX
i
(ic) at a pixel, subscriber, or mobile M
i
as calculated
in "Preamble Signal Level Calculation" on page 512 using the terminal and service parameters ( , , ,
and ) of M
i
.
Calculations
The best server of any pixel, subscriber, or mobile M
i
, , is the cell from which the received preamble signal level is
the highest among the preamble signal levels received from all the cells. The best server is determined as follows:
Here ic is the cell of the transmitter TX
i
with the highest preamble power. However, if more than one cell of the same
transmitter covers the pixel, subscriber, or mobile, the final reference cell ic might be different from the initial cell ic (the
one with the highest power) depending on the serving cell selection method:
Random: In coverage prediction calculations and in calculations on subsriber lists, the cell of the lowest layer is
selected as the serving (reference) cell. In Monte Carlo simulations, a random cell is selected as the serving
(reference) cell.
Distributive: In coverage prediction calculations and in calculations on subsriber lists, the cell of the lowest layer
is selected as the serving (reference) cell. In Monte Carlo simulations, mobiles are distributed among cell layers
one by one, i.e., if more than one cell layer covers a set of mobiles, the first mobile is assigned to the lowest cell
layer, the 2nd mobile to the second lowest cell layer, and so on.
When using either the Random or the Distributive cell selection method, the reference cell once assigned to a
mobile does not change during Monte Carlo simulations.
Min DL Traffic Load: (Not implemented yet) The cell with the lowest downlink traffic load is selected as the
serving (reference) cell. If more than one cell has the same lowest downlink traffic load, the first cell among all
such cells is selected. During Monte Carlo simulations, as the cell traffic loads may vary, the serving cell for
mobiles may also change from one iteration to the next.
Min UL Traffic Load: (Not implemented yet) The cell with the lowest uplink traffic load is selected as the serving
(reference) cell. If more than one cell has the same lowest uplink traffic load, the first cell among all such cells is
selected. During Monte Carlo simulations, as the cell traffic loads may vary, the serving cell for mobiles may also
change from one iteration to the next.
The Min DL Traffic Load and Min UL Traffic Load options model load balancing between cells. In coverage
predictions as the probe mobile selects the least loaded cell, i.e., tries to keep the traffic load balanced between
cells of the transmitter. Instead of loading already loaded cells even more, the base station chooses to load the
least loaded among them.
Output
: Best serving cell of the pixel, subscriber, or mobile M
i
.
9.3.4 Service Area Calculation
In WiMAX, a pixel, subscriber, or mobile M
i
can be covered by a cell (as calculated in "Best Server Determination" on
page 517) but can be outside the service area. A pixel, subscriber, or mobile M
i
is said to be within the service area of its
best serving cell TX
i
(ic) if the preamble C/N from the cell at the pixel, subscriber, or mobile is greater than or equal to the
preamble C/N threshold defined for the cell.
Input
: Preamble C/N from the cell TX
i
(ic) at a pixel, subscriber, or mobile M
i
as calculated in "Preamble
C/N Calculation" on page 516.
: Preamble C/N threshold defined for the cell TX
i
(ic).
Calculations
A pixel, subscriber, or mobile M
i
is within the service area of its best serving cell TX
i
(ic) if:
C
Preambl e
TX
i
i c ( )
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
BS
M
i
BS
M
i
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
Best
All TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
)
`

=
=
BS
M
i
CNR
Preambl e
TX
i
i c ( )
T
Preambl e
TX
i
i c ( )
CNR
Preambl e
TX
i
i c ( )
T
Preambl e
TX
i
i c ( )
>
Forsk 2010 AT283_TRG_E2 519
Chapter 9: WiMAX BWA Networks
Output
True: If the calculation criterion is satisfied.
False: Otherwise.
9.3.5 Permutation Zone Selection (WiMAX 802.16e)
In order to be able to calculate the traffic C/(I+N) and the throughputs, a permutation zone is assigned to each pixel,
subscriber, or mobile M
i
located within the service area (as calculated in "Service Area Calculation" on page 518) of its
best serving cell. The permutation zone assigned to M
i
is one which covers M
i
in terms of distance and preamble C/N or
C/(I+N), and accepts user speeds equal to or higher than M
i
s speed selected for the calculation.
A pixel, subscriber, or mobile M
i
which is unable to get a permutation zone is considered to be outside the service area.
Input
: Maximum distance covered by a permutation zone of a cell TX
i
(ic).
: Minimum preamble C/N or C/(I+N) required at the pixel, subscriber, or mobile M
i
to connect to a
permutation zone of a cell TX
i
(ic).
: Maximum speed supported by a permutation zone of a cell TX
i
(ic).
: Distance between the pixel, subscriber, or mobile M
i
and a cell TX
i
(ic).
: Preamble C/N from the cell TX
i
(ic) as calculated in "Preamble C/N Calculation" on page 516.
: Preamble C/(I+N) from the cell TX
i
(ic) as calculated in "Preamble C/(I+N) Calculation" on
page 517.
: Speed of the pixel, subscriber, or mobile M
i
.
Calculations
M
i
is assigned the permutation zone with the highest priority among the permutation zones whose selection criteria M
i
satisfies. M
i
satisfies the selection criteria of a permutation zone if:
The distance between M
i
and TX
i
(ic) is less than or equal to the maximum distance covered by the permutation
zone:
The preamble C/N or C/(I+N) at M
i
is better than or equal to the quality threshold defined for the permutation zone:
or
The mobility of M
i
is less than or equal to the maximum mobile speed supported by the permutation zone:
Therefore, the permutation zones assigned to a pixel, subscriber, or mobile M
i
in the downlink and uplink are:
d
Max PZ
TX
i
i c ( )
QT
PZ
TX
i
i c ( )
Speed
Max PZ
TX
i
i c ( )
d
M
i
TX
i
i c ( )
CNR
Preambl e
TX
i
i c ( )
CINR
Preambl e
TX
i
i c ( )
Mobi l i ty M
i
( )
d
M
i
TX
i
i c ( )
d
Max PZ
TX
i
i c ( )
s
CNR
Preambl e
TX
i
i c ( )
QT
PZ
TX
i
i c ( )
> CINR
Preambl e
TX
i
i c ( )
QT
PZ
TX
i
i c ( )
>
Mobi l i ty M
i
( ) Speed
Max PZ
TX
i
i c ( )
s
PZ
DL
M
i
Highest Priority PZ
DL
TX
i
i c ( )
d
M
i
TX
i
i c ( )
d
Max PZ
TX
i
i c ( )
s
\ .
| |
AND
CNR
Preambl e
TX
i
i c ( )
QT
PZ
TX
i
i c ( )
>
OR
CINR
Preambl e
TX
i
i c ( )
QT
PZ
TX
i
i c ( )
>
\ .
|
|
|
|
|
| |
AND Mobi l i ty M
i
( ) Speed
Max PZ
TX
i
i c ( )
s
\ .
| |
\ .
|
|
|
|
|
|
|
|
|
| |
=
PZ
UL
M
i
Highest Priority PZ
UL
TX
i
i c ( )
d
M
i
TX
i
i c ( )
d
Max PZ
TX
i
i c ( )
s
\ .
| |
AND
CNR
Preambl e
TX
i
i c ( )
QT
PZ
TX
i
i c ( )
>
OR
CINR
Preambl e
TX
i
i c ( )
QT
PZ
TX
i
i c ( )
>
\ .
|
|
|
|
|
| |
AND Mobi l i ty M
i
( ) Speed
Max PZ
TX
i
i c ( )
s
\ .
| |
\ .
|
|
|
|
|
|
|
|
|
| |
=
520 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
If more than 1 permutation zone satisfies the distance, speed, and quality threshold criteria, and all have the same priority,
the permutation zone assigned to the pixel, subscriber, or mobile will be the first in the list of permutation zones (frame
configuration) among these zones.
Output
and : Downlink and uplink permutation zones assigned to the pixel, subscriber, or mobile M
i
.
9.3.6 Traffic and Pilot Signal Level and Quality Calculations
Traffic and pilot subcarriers can be transmitted with different transmission powers than the preamble power of a cell, and
do not suffer the same interference and noise as the preamble. The following sections describe how traffic and pilot signal
levels, noise and interference, C/N, and C/(I+N) ratios are calculated on the downlink and uplink.
"Traffic and Pilot Signal Level Calculation (DL)" on page 520.
"Traffic and Pilot Noise Calculation (DL)" on page 521.
"Traffic and Pilot Interference Calculation (DL)" on page 522.
"Traffic and Pilot C/N Calculation (DL)" on page 530.
"Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on page 532.
"Traffic Signal Level Calculation (UL)" on page 534.
"Traffic Noise Calculation (UL)" on page 535.
"Traffic Interference Calculation (UL)" on page 536.
"Traffic C/N Calculation (UL)" on page 537.
"Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
9.3.6.1 Traffic and Pilot Signal Level Calculation (DL)
Input
: Preamble transmission power of the cell TX
i
(ic).
: Traffic power reduction of the cell TX
i
(ic).
: Pilot power reduction of the cell TX
i
(ic).
: Transmitter antenna gain for the antenna used by the transmitter TX
i.
- Without smart antennas: is the transmitter antenna gain, i.e., .
- With smart antennas: is the smart antenna gain in the direction of the pixel, subscriber, or mobile M
i
,
i.e., . Where is the direction in which M
i
is located. For more information on the calculation
of , refer to section "Smart Antenna Models" on page 558.
: Total transmitter losses for the transmitter TX
i
( ).
: Path loss ( ).
: Loss on the transmitter-receiver path (path loss) calculated using a propagation model.
: Antenna attenuation (from antenna patterns) calculated for the antenna used by the transmitter TX
i.
: Shadowing margin based on the Model standard deviation.
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Indoor losses taken into account when the option "Indoor coverage" is selected.
: Receiver terminal losses for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna gain for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna attenuation calculated for the pixel, subscriber, or mobile M
i
.
For calculating the useful signal level from the best serving cell, is determined in the direction (H,V) = (0,0)
from the antenna patterns of the antenna used by M
i
. For calculating the interfering signal level from any interferer,
is determined in the direction of the interfering cell from the antenna patterns of the antenna used by M
i
, while
the antenna is pointed towards M
i
s best serving cell.
: Body loss defined for the service used by the pixel, subscriber, or mobile M
i
.
PZ
DL
M
i
PZ
UL
M
i
P
Preambl e
TX
i
i c ( )
AP
Traffi c
TX
i
i c ( )
AP
Pi l ot
TX
i
i c ( )
G
TX
i
G
TX
i
G
TX
i
G
Ant
TX
i
=
G
TX
i
G
TX
i
G
SA
u ( ) = u
G
SA
u ( )
L
TX
i
L
TX
i
L
Total DL
=
L
Path
L
Path
L
Model
L
Ant
TX
i
+ =
L
Model
L
Ant
TX
i
M
Shadowi ng Model
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Ant
M
i
L
Ant
M
i
L
Body
M
i
Forsk 2010 AT283_TRG_E2 521
Chapter 9: WiMAX BWA Networks
Calculations
The received traffic and pilot signal levels (dBm) from any cell TX
i
(ic) are calculated for a pixel, subscriber, or mobile M
i
as follows:
and
Where EIRP is the effective isotropic radiated power of the cell calculated as follows:
and
With and being the traffic and pilot transmission powers of the cell TX
i
(ic) calculated as follows:
and
Output
: Received traffic signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Received pilot signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
9.3.6.2 Traffic and Pilot Noise Calculation (DL)
For determining the traffic and pilot C/N and C/(I+N), Atoll calculates the downlink noise over the channel bandwidth used
by the cell. The used bandwidth depends on the number of used subcarriers. In WiMAX 802.16e, the numbers of
subcarriers used by each permutation zone can be different.
The downlink noise comprises thermal noise and the noise figure of the equipment. The thermal noise density depends
on the temperature, i.e., it remains constant for a given temperature. However, the value of the thermal noise varies with
the used bandwidth.
Input
K: Boltzmanns constant.
T: Temperature in Kelvin.
: Number of used subcarriers defined in the Global Parameters (WiMAX 802.16d).
: Total number of subcarriers defined in the Global Parameters (WiMAX 802.16d).
: Number of subcarriers used by the downlink permutation zone of a WiMAX 802.16e cell TX
i
(ic)
assigned to M
i
.
: Total number of subcarriers defined for the frame configuration of a WiMAX 802.16e cell TX
i
(ic).
: Sampling frequency for the cell TX
i
(ic) as calculated in "Calculation of Sampling Frequency" on
page 544.
: Noise figure of the terminal used for calculations by the pixel, subscriber, or mobile M
i
.
Calculations
The power spectral density of thermal noise is calculated as follows:
The thermal noise for a cell is calculated as:
Note:
If you wish to exclude the the energy corresponding to the cyclic prefix part of the
total symbol duration from the useful signal level, you must add the following lines in
the Atoll.ini file:
[WiMAX]
ExcludeCPFromUsefulPower = 1
When this option is active, the cyclic prefix energy is excluded from . In other
words, the factor is added to .
Independant of the option, interference levels are calculated for the total symbol durations,
i.e., the energy of the useful symbol duration and the cyclic prefix energy.
C
Traffi c
TX
i
i c ( )
EIRP
Traffi c
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
C
Pi l ot
TX
i
i c ( )
EIRP
Pi l ot
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
EIRP
Traffi c
TX
i
i c ( )
P
Traffi c
TX
i
i c ( )
G
TX
i
L
TX
i
+ = EIRP
Pi l ot
TX
i
i c ( )
P
Pi l ot
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
P
Traffi c
TX
i
i c ( )
P
Pi l ot
TX
i
i c ( )
P
Traffi c
TX
i
i c ( )
P
Preambl e
TX
i
i c ( )
AP
Traffi c
TX
i
i c ( )
= P
Pi l ot
TX
i
i c ( )
P
Preambl e
TX
i
i c ( )
AP
Pi l ot
TX
i
i c ( )
=
C
Preambl e
TX
i
i c ( )
10 Log 1 r
CP
( ) C
Preambl e
TX
i
i c ( )
C
Traffi c
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
N
SCa Used
N
SCa Total
N
SCa Used
PZ
DL
M
i
N
SCa Total
TX
i
i c ( )
F
Sampl i ng
TX
i
i c ( )
nf
M
i
n
0
10 Log K T 1000 ( ) 174 dBm/Hz = =
522 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
WiMAX 802.16d:
WiMAX 802.16e:
The downlink noise is the sum of the thermal noise and the noise figure of the terminal used for the calculations by the
pixel, subscriber, or mobile M
i
.
Effect of Segmentation (WiMAX 802.16e):
If you select the Segmentation Support check box in the Frame Configurations table for the frame configuration
used by the cell, it means that the first downlink PUSC permutation zone is segmented. All other zones are pooled
together to form a non-segmented zone.
The segmenting factor, , is calculated from the number of secondary subchannel groups assigned to the
permutation zone in the Permutation Zones table.
Where, PSG is the number of primary subchannel groups and SSG is the number of used secondary subchannel
groups.
represents the fraction of the channel bandwidth used by a segment. The power transmitted over a
segment has times the spectral density of the power transmitted over the entire channel bandwidth.
When calculating the downlink C/N and C/(I+N) ratios, the increase in power by due to this power
concentration is equivalent to a reduction in the noise level by . Hence, if segmentation is used, the
thermal noise power at the pixel, subscriber, or mobile M
i
covered by the segmented permutation zone is reduced
by
a factor of . Which means that the thermal noise for the a segment of the channel used by a cell is
calculated as:
Output
: Downlink noise for the cell TX
i
(ic).
9.3.6.3 Traffic and Pilot Interference Calculation (DL)
The interference received by any pixel, subscriber, or mobile, served by a cell TX
i
(ic) from other cells TX
j
(jc) can be defined
as the traffic and pilot signal levels received from interfering cells TX
j
(jc) depending on the overlap that exists between the
channels used by the cells TX
i
(ic) and TX
j
(jc), on the traffic loads of the interfering cells TX
j
(jc), and whether the cells use
segmentation or not. Moreover, the interference can come from cells using classical as well as smart antennas.
The calculation can be divided into the two parts.
"Traffic and Pilot Interference Signal Levels Calculation (DL)" on page 523.
"Effective Traffic and Pilot Interference Calculation (DL)" on page 527.
Note:
The multiplicative coefficients of 3 and 2 are derived from the ratio of the numbers of
subchannels that belong to the primary and to the secondary subchannel gourps. For
example, for the FFT size of 1024 (or 2048), each primary subchannel group contains 6 (or
12) subchannels, and each secondary subchannel group contains 4 (or 8) subchannels,
which gives the ratio of 3:2. And, the denominator of 15 = 3 x 3 + 2 x 3.
n
0 DL
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
N
SCa Total
------------------------------
\ .
| |
+ =
n
0 DL
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
PZ
DL
M
i
N
SCa Total
TX
i
i c ( )
------------------------------
\ .
|
|
|
| |
+ =
n
DL
TX
i
i c ( )
n
0 DL
TX
i
i c ( )
nf
M
i
+ =
f
Segment
f
Segment
3 PSG 2 SSG +
15
---------------------------------------------------- =
f
Segment
1
f
Segment
----------------------
1
f
Segment
----------------------
f
Segment
f
Segment
n
0 DL
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
PZ
DL
M
i
N
SCa Total
TX
i
i c ( )
------------------------------ f
Segment

\ .
|
|
|
| |
+ =
n
DL
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 523
Chapter 9: WiMAX BWA Networks
9.3.6.3.1 Traffic and Pilot Interference Signal Levels Calculation (DL)
The traffic and pilot signal levels received from interfering cells TX
j
(jc) at a pixel, subscriber, or mobile M
i
, covered by a
cell TX
i
(ic), are calculated in a different manner than the traffic and pilot signal levels from the studied cell TX
i
(ic). This
section explains how these interfering signals are calculated.
Input
: Preamble transmission power of the cell TX
j
(jc).
: Pilot power reduction of the interfering cell TX
j
(jc).
: Traffic power reduction of the interfering cell TX
j
(jc).
: Idle pilot power reduction of the interfering cell TX
j
(jc).
: Total transmitter losses for the transmitter TX
j
( ).
: Path loss ( ).
: Loss on the transmitter-receiver path (path loss) calculated using a propagation model.
: Antenna attenuation (from antenna patterns) calculated for the antenna used by the transmitter TX
j.
: Shadowing margin based on the Model standard deviation.
: Shadowing margin based on the C/I standard deviation.
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Indoor losses taken into account when the option "Indoor coverage" is selected.
: Receiver terminal losses for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna gain for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna attenuation calculated for the pixel, subscriber, or mobile M
i
.
is determined in the direction of TX
j
(jc) from the antenna patterns of the antenna used by M
i
while the
antenna is pointed towards TX
i
(ic).
: Body loss defined for the service used by the pixel, subscriber, or mobile M
i
.
: Downlink traffic load of the interfering cell TX
j
(jc).
Traffic loads can either be calculated using Monte Carlo simulations, or entered manually for each cell. Calculation
of traffic loads is explained in "Simulation Process" on page 498.
: AAS usage ratio of the interfering cell TX
j
(jc).
AAS usage ratios are calculated using Monte Carlo simulations as explained in "Simulation Process" on page 498.
: Number of used subcarriers defined in the global parameters for WiMAX 802.16d or for the first
downlink permutation zone in the frame configuration assigned to the interfering cell TX
j
(jc) in WiMAX 802.16e.
: Number of data subcarriers defined in the global parameters for WiMAX 802.16d or for the first
downlink permutation zone in the frame configuration assigned to the interfering cell TX
j
(jc) in WiMAX 802.16e.
Calculations
WiMAX cells can transmit different powers on pilot (N
Used
N
Data
) and data (N
Data
) subcarriers for the part of the frame
with traffic, and a different pilot power for the part of the frame that does not have traffic bursts. Data subcarriers are off
during the empty part of the frame. Therefore, the interference received from a cell depends on the traffic load and the
different powers of the cell, i.e., pilot, traffic, and idle pilot powers.
Monte Carlo simulations and coverage prediction calculations present different scenarios for interference calculations in
the case of smart antennas.
Monte Carlo Simulations:
In the case of Monte Carlo simulations, the interferer is either using the transmitter antenna or the smart antenna
at any given moment. So, for each interfered pixel, subscriber, or mobile, Atoll already knows the type of the
interference source. Therefore, the interference received from any cell TX
j
(jc) can be given by:
P
Preambl e
TX
j
j c ( )
AP
Pi l ot
TX
j
j c ( )
AP
Traffi c
TX
j
j c ( )
AP
Idl e Pi l ot
TX
j
j c ( )
L
TX
j
L
TX
j
L
Total DL
=
L
Path
L
Path
L
Model
L
Ant
TX
j
+ =
L
Model
L
Ant
TX
j
M
Shadowi ng Model
M
Shadowi ng C I
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Ant
M
i
L
Body
M
i
TL
DL
TX
j
j c ( )
AU
TX
j
j c ( )
N
SCa Used
TX
j
j c ( )
N
SCa Data
TX
j
j c ( )
524 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Without smart antennas:
With smart antennas:
Coverage Predictions:
In the case of coverage prediction calculations, the interferer could either be transmitting using the transmitter
antenna, or using the smart antenna, or it could be empty, or not transmitting.Therefore, the interference received
from any cell TX
j
(jc) can be given by:
Where, the three components of the interference are:
: Interference from the loaded part of the frame transmitted using the main antenna,
: Interference from the loaded part of the frame transmitted using the smart antenna,
: Interference from the empty, or idle, part of the frame.
The above components of the interference are calculated as follows:
The interference from the loaded part of the frame transmitted using the main antenna is calculated as
follows:
The received interfering traffic and pilot signal levels (dBm) from any cell TX
j
(jc) are calculated for a pixel,
subscriber, or mobile M
i
as follows:
In Monte Carlo simulations:
In coverage prediction:
Where EIRP is the effective isotropic radiated power of the cell calculated as follows:
and
With and being the traffic and pilot transmission powers of the cell TX
j
(jc) calculated as follows:
and
And , i.e., the transmitter antenna gain for the antenna used by the transmitter TX
j
.
The interference from the loaded part of the frame transmitted using the main antenna is given as:
I
Total
TX
j
j c ( )
10 Log 10
I
Non AAS
TX
j
j c ( )
10
---------------------------
10
I
Idl e
TX
j
j c ( )
10
------------------
+
\ .
|
|
|
| |
=
I
Total
TX
j
j c ( )
10 Log 10
I
AAS
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |
=
I
Total
TX
j
j c ( )
10 Log 10
I
Non AAS
TX
j
j c ( )
10
---------------------------
10
I
Idl e
TX
j
j c ( )
10
------------------
10
I
AAS
TX
j
j c ( )
10
------------------
+ +
\ .
|
|
|
| |
=
I
Non AAS
TX
j
j c ( )
I
AAS
TX
j
j c ( )
I
Idl e
TX
j
j c ( )
I
Traffi c
TX
j
j c ( )
EIRP
Traffi c
TX
j
j c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
I
Pi l ot
TX
j
j c ( )
EIRP
Pi l ot
TX
j
j c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
I
Traffi c
TX
j
j c ( )
EIRP
Traffi c
TX
j
j c ( )
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
L
Indoor
+ G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
I
Pi l ot
TX
j
j c ( )
EIRP
Pi l ot
TX
j
j c ( )
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
L
Indoor
+ G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
EIRP
Traffi c
TX
j
j c ( )
P
Traffi c
TX
j
j c ( )
G
TX
j
L
TX
j
+ = EIRP
Pi l ot
TX
j
j c ( )
P
Pi l ot
TX
j
j c ( )
G
TX
j
L
TX
j
+ =
P
Traffi c
TX
j
j c ( )
P
Pi l ot
TX
j
j c ( )
P
Traffi c
TX
j
j c ( )
P
Preambl e
TX
j
j c ( )
AP
Traffi c
TX
j
j c ( )
= P
Pi l ot
TX
j
j c ( )
P
Preambl e
TX
j
j c ( )
AP
Pi l ot
TX
j
j c ( )
=
G
TX
j
G
Ant
TX
j
=
I
Non AAS
TX
j
j c ( )
10 Log TL
DL
TX
j
j c ( )
1 AU
TX
j
j c ( )
( ) 10
I
Traf fi c
TX
j
j c ( )
10
------------------
N
SCa Data
TX
j
j c ( )
N
SCa Used
TX
j
j c ( )
------------------------------ 10
I
Pi l ot
TX
j
j c ( )
10
------------------
1
N
SCa Data
TX
j
j c ( )
N
SCa Used
TX
j
j c ( )
------------------------------
\ .
|
|
| |
+
\ .
|
|
|
| |

\ .
|
|
|
| |
=
Forsk 2010 AT283_TRG_E2 525
Chapter 9: WiMAX BWA Networks
The interference from the loaded part of the frame transmitted using the smart antenna is calculated as
follows:
The received interfering traffic signal level (dBm) from any cell TX
j
(jc) is calculated for a pixel, subscriber, or mobile
M
i
as follows:
In Monte Carlo simulations:
In coverage prediction:
Where EIRP is the effective isotropic radiated power of the cell calculated as follows:
With being the traffic transmission power of the cell TX
j
(jc) calculated as follows:
And, is the smart antenna gain in the direction of the victim mobile M
i
, calculated as follows:
- Monte Carlo Simulations:
is calculated in the direction of the victim mobile M
i
, while the smart antenna at the interfering
cell has a beam formed in the direction of an interfering mobile M
j
. is the direction, with respect to the
azimuth of the cell TX
j
(jc), in which the victim mobile M
i
is located. For more information on the calculation of
, refer to section "Smart Antenna Models" on page 558. Victim and interfering mobiles are generated
by a time-slot scenario as explained in "Simulation Process" on page 498.
In the figure below, is calculated from the victim cell TX
i
(ic) to calculate , and is
calculated from the interfering cell TX
j
(jc) to calculate . In other words, a beam is formed from the victim
cell towards the victim mobile, and a beam is formed by the interfering cell towards the interfering mobile.
- Coverage Predictions:
is calculated in the direction of the victim mobile M
i
from the angular distribution of the
downlink traffic power density available at the end of the simulations. The angular distribution of the downlink
traffic power density, which represents the average array correlation matrix, is calculated during Monte Carlo
simulations and can be stored in the Cells table. is the direction in which the victim pixel or subscriber M
i
is
located. For more information on the calculation of , refer to section "Smart Antenna Models" on
page 558.
Note:
If you wish to include the effect of the number of antennas in case of MIMO, you must add
the following lines in the Atoll.ini file:
[WiMAX]
MultiAntennaInterference = 1
When the multi-antenna interference option is active, the interference is incremented by
. Where is the number of MIMO transmission (downlink)
antennas defined for the cell TX
j
(jc).
Figure 9.5Downlink C/(I+N) calculation in Simulations
10 Log N
Ant TX
TX
j
j c ( )
( ) + N
Ant TX
TX
j
j c ( )
I
AAS
TX
j
j c ( )
EIRP
AAS
TX
j
j c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
I
AAS
TX
j
j c ( )
EIRP
AAS
TX
j
j c ( )
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
L
Indoor
+ G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
EIRP
AAS
TX
j
j c ( )
P
Traffi c
TX
j
j c ( )
G
TX
j
L
TX
j
+ =
P
Traffi c
TX
j
j c ( )
P
Traffi c
TX
j
j c ( )
P
Preambl e
TX
j
j c ( )
AP
Traffi c
TX
j
j c ( )
=
G
TX
j
G
TX
j
G
SA
( ) =

G
SA
( )
G
SA
1
o ( ) C
Traffi c
TX
i
i c ( )
G
SA
2
| ( )
I
AAS
TX
j
j c ( )
G
TX
j
G
SA
( ) =

G
SA
( )
526 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
In the figure below, is calculated from the victim cell TX
i
(ic) to calculate , and is
calculated from the interfering cell TX
j
(jc) to calculate . In other words, a beam is formed from the victim
cell towards the victim pixel or subscriber, and the interference is calculated from the simulation results.
The average array correlation matrix (at the interfering cell) are given by:
Where is the average array correlation matrix, J is the number of served mobiles during the simulation,
is the probability of presence of the mobile j, is the EIRP transmitted towards the mobile j, and is the
array correlation matrix for the mobile j.
The probability of presence of the mobile j is the ratio between the downlink resources provided to the mobile
j and the total amount of available downlink resources. For example, if a mobile has been granted 10% of the
number of available slots in the downlink subframe, its probability of presence is 10%.
The gain of the interfering signal, , transmitted in the direction of each pixel is given by:
Where is the steering vector in the direction (probe mobile/pixel), H denotes the Hilbert transformation,
is the average array correlation matrix, and is the gain of the n
th
antenna element in the direction
of .
The interference from the empty, or idle, part of the frame transmitted using the transmitter antenna is
calculated as follows:
The received interfering pilot signal level (dBm) from any cell TX
j
(jc) is calculated for a pixel, subscriber, or mobile
M
i
as follows:
Where EIRP is the effective isotropic radiated power of the cell calculated as follows:
With being the idle pilot transmission power of the cell TX
j
(jc) calculated as follows:
And, , i.e., the transmitter antenna gain for the antenna used by the transmitter TX
j.
The interference from the empty, or idle, part of the frame transmitted using the transmitter antenna is given as:
Figure 9.6Downlink C/(I+N) calculation in Coverage Predictions
G
SA
1
o ( ) C
Traffi c
TX
i
i c ( )
G
SA
2
| ( )
I
AAS
TX
j
j c ( )
R
Avg

j
p
j
R
j

j 1 =
J

=
R
Avg

j
p
j
R
j
G
SA
( )
G
SA
( ) g
n
( ) S

H
R
Avg
S

=
S


R
Avg
g
n
( )

I
Idl e Pi l ot
TX
j
j c ( )
EIRP
Idl e Pi l ot
TX
j
j c ( )
L
Path
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ =
EIRP
Idl e Pi l ot
TX
j
j c ( )
P
Idl e Pi l ot
TX
j
j c ( )
G
TX
j
L
TX
j
+ =
P
Idl e Pi l ot
TX
j
j c ( )
P
Idl e Pi l ot
TX
j
j c ( )
P
Preambl e
TX
j
j c ( )
AP
Idl e Pi l ot
TX
j
j c ( )
=
G
TX
j
G
Ant
TX
j
=
I
Idl e
TX
j
j c ( )
10 Log 1 TL
DL
TX
j
j c ( )
( ) 10
I
Idl e Pi l ot
TX
j
j c ( )
10
---------------------------
1
N
SCa Data
TX
j
j c ( )
N
SCa Used
TX
j
j c ( )
------------------------------
\ .
|
|
| |

\ .
|
|
|
| |

\ .
|
|
|
| |
=
Forsk 2010 AT283_TRG_E2 527
Chapter 9: WiMAX BWA Networks
Output
: Interference received at the pixel, subscriber, or mobile M
i
from any interfering cell TX
j
(jc).
9.3.6.3.2 Effective Traffic and Pilot Interference Calculation (DL)
The effective downlink traffic and pilot interference received at a pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic)
from interfering cells TX
j
(jc) depends on the co- and adjacent channel overlap that exists between the channel used by
the studied cell and the interfering cells, and the segmentation parameters of the studied and interfering cells (WiMAX
802.16e). The first downlink PUSC zone can be segmented at the studied and the interfering cells. The probability of
subcarrier collision depends on the lengths of the segmented zones and on the subchannel groups used at both sides.
Input
: Interference received at the pixel, subscriber, or mobile M
i
from any interfering cell TX
j
(jc) as calculated
in "Traffic and Pilot Interference Signal Levels Calculation (DL)" on page 523.
: Total channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Co- and Adjacent
Channel Overlaps Calculation" on page 508.
and : Segmentation usage ratios defined for WiMAX 802.16e cells TX
i
(ic) and TX
j
(jc).
Calculations
The total traffic and pilot interference (dBm) from any cell TX
j
(jc) is calculated for a pixel, subscriber, or mobile M
i
as
follows:
For WiMAX 802.16d, .
Calculations for the interference reduction factors due to channel overlapping and segmentation are explained below:
Interference reduction due to the co- and adjacent channel overlap between the studied and the interfering
cells:
Interference reduction due to the co- and adjacent channel overlap between the cells TX
i
(ic) and TX
j
(jc) is
calculated as follows:
Interference reduction due to segmentation (WiMAX 802.16e):
If you select the Segmentation Support check box in the Frame Configurations table for the frame configuration
that you are using, it means that the first zone in the downlink, i.e., the DL PUSC zone, is segmented. All other
zones are pooled together to form a group of non-segmented zones. There are two effects of segmentation:
1. Power concentration, which means that the spectral density of the power transmitted over one segment is higher
than the spectral density of the same power transmitted over the entire channel bandwidth. The effect of power
concentration is visible when calculating the downlink C/(I+N). The power transmitted over a segmented zone has
times the spectral density of the power transmitted over the entire channel bandwidth. When calculating
the C/(I+N) ratio, the increase in power by is equivalent to decreasing the noise and interference by
. Hence, if segmentation is used, the interference received at the pixel, subscriber, or mobile Mi covered
by the segmented zone is reduced by a factor of .
2. Collision probability between the subcarriers used by the subchannels belonging to the segment of the studied cell
and the subcarriers used by other sectors, segmented or not. The following paragraphs explain how the collision
probability is calculated.
Note:
If you wish to include the effect of the number of antennas in case of MIMO, you must add
the following lines in the Atoll.ini file:
[WiMAX]
MultiAntennaInterference = 1
When the multi-antenna interference option is active, the interference is incremented by
. Where is the number of MIMO transmission (downlink)
antennas defined for the cell TX
j
(jc).
10 Log N
Ant TX
TX
j
j c ( )
( ) + N
Ant TX
TX
j
j c ( )
I
Total
TX
j
j c ( )
I
Total
TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
SU
TX
i
i c ( )
SU
TX
j
j c ( )
I
DL
TX
j
j c ( )
I
Total
TX
j
j c ( )
f
O
TX
i
i c ( ) TX
j
j c ( )
f
Seg
TX
i
i c ( ) TX
j
j c ( )
I
DL
Inter Tech
+ + + =
f
Seg
TX
i
i c ( ) TX
j
j c ( )
0 =
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( ) =
1
f
Segment
----------------------
1
f
Segment
----------------------
f
Segment
f
Segment
528 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The Segmentation Usage (SU) ratio is the percentage of the total downlink traffic load present in the segmented
downlink PUSC zone. For example, if the downlink traffic load is 80 %, and the segmentation usage ratio is 50 %,
then this means that the downlink traffic load of the segmented zone is 40 % (i.e., 50 % of 80 %), and the downlink
traffic load of the non-segmented zones is 40 %.
In coverage predictions, Atoll uses the segmentation usage ratios stored in the cell properties for determining the
interference. In simulations, Atoll resets the segmentation usage ratios for all the cells to 0, and then calculates
the segmentation usage ratios according to the traffic loads of the mobiles allocated to the segmented zone and
in the non-segmented zones.
Atoll determines the switching point between the segmented and the non-segmented zones using the
segmentation usage ratio.
The switching points between the segmented and non-segmented zones of the victim and interfering cells, TX
i
(ic)
and TX
j
(jc) respectively, are calculated as follows:
and
Where, SP is the switching point between the segmented and the non-segmented zones, SU is the segmentation
usage ratios of the cells, and is segmenting factor, which gives the bandwidth used by a segment.
The segmenting factor, , is calculated from the number of secondary subchannel groups assigned to the
first downlink PUSC permutation zone in the Permutation Zones table.
Where, PSG is the number of primary subchannel groups and SSG is the number of secondary subchannel
groups.
If the segmentation usage ratio is set to 0, it means that the segmented zone does not exist. Setting SU to 0 gives
SP = 0, and setting SU to 1 gives SP = 1 (or 100%), which shows how the switching point varies with the
segmentation usage ratio.
With cells using segmentation, there can be four different interference scenarios.
Figure 9.7Segmentation
Note:
The multiplicative coefficients of 3 and 2 are derived from the ratio of the numbers of
subchannels that belong to the primary and to the secondary subchannel gourps. For
example, for the FFT size of 1024 (or 2048), each primary subchannel group contains 6 (or
12) subchannels, and each secondary subchannel group contains 4 (or 8) subchannels,
which gives the ratio of 3:2. And, the denominator of 15 = 3 x 3 + 2 x 3.
Derivation of the switching point formula:
The Segmentation Usage ratio is used to partition the total downlink traffic load into
segmented and non-segmented zones. Therefore, the switching point formula is derived
from the equation:
SP
TX
i
i c ( )
SU
TX
i
i c ( )
SU
TX
i
i c ( )
f
Segment
TX
i
i c ( )
1 SU
TX
i
i c ( )
( ) +
------------------------------------------------------------------------------------------------ =
SP
TX
j
j c ( )
SU
TX
j
j c ( )
SU
TX
j
j c ( )
f
Segment
TX
j
j c ( )
1 SU
TX
j
j c ( )
( ) +
------------------------------------------------------------------------------------------------ =
f
Segment
f
Segment
f
Segment
3 PSG 2 SSG +
15
---------------------------------------------------- =
SU TL
DL

SP f
Segment
W
Channel

-------------------------------------------------------------------
1 SU ( ) TL
DL

1 SP ( ) W
Channel

----------------------------------------------------- =
Forsk 2010 AT283_TRG_E2 529
Chapter 9: WiMAX BWA Networks
- Between the segmented zone of the victim and the segmented zone of the interferer.
- Between the segmented zone of the victim and the non-segmented zone of the interferer.
- Between the non-segmented zone of the victim and the segmented zone of the interferer.
- Between the non-segmented zone of the victim and the non-segmented zone of the interferer.
Therefore, Atoll calculates the probabilities of collision for each scenario and weights the total interference
according to the total collision probability. The probability of collision for each scenario is given by the
following formula:
Where, PSG
Com
is the number of primary subchannel groups common in TX
i
(ic) and TX
j
(jc), SSG
Com
is the
number of secondary subchannel groups common in TX
i
(ic) and TX
j
(jc), is the number of primary
subchannel groups in the cell TX
i
(ic), and is the number of secondary subchannel groups in the cell
TX
i
(ic).
The segment numbers and the cell permutation base numbers (Cell PermBase) are determined from the cells
preamble index. The mapping between the preamble index, the segment number, and Cell PermBase is available
in the IEEE specifications. This mapping is performed in Atoll as follows:
There can be 2 cases for calculating the total probability of collision.
- Case 1: If the pixel, subscriber, or mobile M
i
is covered by the segmented zone of TX
i
(ic), the total collision
probability for the pixel, subscriber, or mobile M
i
is calculated as follows:
- Case 2: If the pixel, subscriber, or mobile M
i
is covered by the non-segmented zone of TX
i
(ic), the total
collision probability for the pixel, subscriber, or mobile M
i
is calculated as follows:
Figure 9.8Segmentation Interference Scenarios
Preamble Index ( )
Range: 0 to 113
Cell PermBase ( )
Range: 0 to 31
Segment Number ( )
Range: 0, 1, 2
p
Col l
p
Col l
3 PSG
Com
2 SSG
Com
+
3 PSG
TX
i
i c ( )
2 SSG
TX
i
i c ( )
+
---------------------------------------------------------------------------------- =
PSG
TX
i
i c ( )
SSG
TX
i
i c ( )
PI
PI 96 < 96 PI s 114 <
PB
PI Modulo 32 PI 96
N
Seg
Fl oor
PI
32
------
\ .
| |
PI 96 ( ) Modulo 3
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
p
Col l
SS
If SP
TX
j
j c ( )
SP
TX
i
i c ( )
>
p
Col l
SS
SP
TX
j
j c ( )
p
Col l
SN
SP
TX
i
i c ( )
SP
TX
j
j c ( )
( ) +
SP
TX
i
i c ( )
---------------------------------------------------------------------------------------------------------------------------- If SP
TX
j
j c ( )
SP
TX
i
i c ( )
<

=
530 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The interference reduction factor due to segmentation for the pixel, subscriber, or mobile M
i
is calculated as
follows:
is the inter-technology downlink interference from transmitters of an external network (linked document of any
technology) calculated as follows:
Where is the downlink EIRP of the external transmitter, is the path loss from the external
transmitters to the pixel, subscriber, or mobile location, is the indoor losses taken into account when the option
"Indoor coverage" is selected, is the receiver terminal losses for the pixel, subscriber, or mobile M
i
, is the receiver
terminals antenna gain for the pixel, subscriber, or mobile M
i
, is the receiver terminals antenna attenuation
calculated for the pixel, subscriber, or mobile M
i
, and is the body loss defined for the service used by the pixel,
subscriber, or mobile M
i
.
Output
: Effective downlink traffic and pilot interference received at the pixel, subscriber, or mobile M
i
from any
interfering cell TX
j
(jc).
9.3.6.4 Traffic and Pilot C/N Calculation (DL)
Input
: Received traffic signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in
"Traffic and Pilot Signal Level Calculation (DL)" on page 520.
: Received pilot signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in
"Traffic and Pilot Signal Level Calculation (DL)" on page 520.
: Downlink noise for the cell TX
i
(ic) as calculated in "Traffic and Pilot Noise Calculation (DL)" on page 521.
: Preamble C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in "Preamble
C/N Calculation" on page 516.
: AMS threshold defined for the cell TX
i
(ic).
: Bearer selection thresholds of the bearers defined in the WiMAX equipment used by M
i
s terminal.
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of MIMO transmission (downlink) antennas defined for the cell TX
i
(ic).
: Number of MIMO reception (downlink) antennas defined for the terminal used by the pixel, subscriber,
or mobile M
i
.
: Mobility used for the calculations.
Subchannel allocation mode used by the downlink permutation zone assigned to the pixel, subscriber, or
mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
: Downlink block error rate read from the graphs available in the WiMAX equipment assigned to the
terminal used by the pixel, subscriber, or mobile M
i
.
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
p
Col l
NN
If SP
TX
j
j c ( )
SP
TX
i
i c ( )
s
p
Col l
NN
1 SP
TX
j
j c ( )
( ) p
Col l
NS
SP
TX
j
j c ( )
SP
TX
i
i c ( )
( ) +
1 SP
TX
i
i c ( )
( )
------------------------------------------------------------------------------------------------------------------------------------------ If SP
TX
j
j c ( )
SP
TX
i
i c ( )
>

=
f
Seg
TX
i
i c ( ) TX
j
j c ( )
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( ) =
I
DL
Inter Tech
I
DL
Inter Tech
EIRP
DL
TX External
L
Path
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
IRF
Inter Tech
+
All External TXs

=
EIRP
DL
TX External
L
Path
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
I
DL
TX
j
j c ( )
C
Traffi c
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
n
DL
TX
i
i c ( )
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
T
B
M
i
B
DL Hi ghest
M
i
Servi ce ( )
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Mobi l i ty M
i
( )
PZ
DL
M
i
BLER B
DL
M
i
( )
Forsk 2010 AT283_TRG_E2 531
Chapter 9: WiMAX BWA Networks
Calculations
The traffic and pilot C/N for a cell TX
i
(ic) are calculated as follows for any pixel, subscriber, or mobile M
i
:
Bearer Determination:
The bearers available for selection in the pixel, subscriber, or mobile M
i
s WiMAX equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the traffic or pilot C/N at M
i
: or
If the cell supports STTD/MRC or AMS, the STTD/MRC gain, , corresponding to the bearer is applied
to its selection threshold. The gain is read from the properties of the WiMAX equipment assigned to the pixel,
subscriber, or mobile M
i
for , , the subchannel allocation mode of , ,
.
The additional STTD/MRC gain defined for the clutter class of the pixel, subscriber, or mobile M
i
is
also applied. Therefore, the bearers available for selection are all the bearers defined in the WiMAX equipment
for which the following is true:
In case of STTD/MRC:
In case of AMS:
if or
if or
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest downlink peak
MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
- Effective MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest downlink
effective MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 547.
MIMO STTD/MRC Gain:
Once the bearer is known, the traffic and pilot C/N calculated above become:
In case of STTD/MRC:

In case of AMS:
if or
CNR
Traffi c
TX
i
i c ( )
C
Traffi c
TX
i
i c ( )
n
DL
TX
i
i c ( )
=
CNR
Pi l ot
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
n
DL
TX
i
i c ( )
=
T
B
M
i
CNR
Traffi c
TX
i
i c ( )
< T
B
M
i
CNR
Pi l ot
TX
i
i c ( )
<
G
STTD
DL
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
PZ
DL
M
i
Mobi l i ty M
i
( )
BLER B
DL
M
i
( )
AG
STTD
DL
T
B
M
i
G
STTD
DL
AG
STTD
DL
CNR
Traffi c
TX
i
i c ( )
<
T
B
M
i
G
STTD
DL
AG
STTD
DL
CNR
Pi l ot
TX
i
i c ( )
<
T
B
M
i
G
STTD
DL
AG
STTD
DL
CNR
Traffi c
TX
i
i c ( )
< CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
T
B
M
i
G
STTD
DL
AG
STTD
DL
CNR
Pi l ot
TX
i
i c ( )
< CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CNR
Traffi c
TX
i
i c ( )
CNR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + =
CNR
Pi l ot
TX
i
i c ( )
CNR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + =
CNR
Traffi c
TX
i
i c ( )
CNR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
532 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
if or
Where is the STTD/MRC gain corresponding to the selected bearer.
Output
: Traffic C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Pilot C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
9.3.6.5 Traffic and Pilot C/(I+N) and Bearer Calculation (DL)
The carrier signal to interference and noise ratio is calculated in three steps. First Atoll calculates the received signal level
from the studied cell (as explained in "Traffic and Pilot Signal Level Calculation (DL)" on page 520) at the pixel, subscriber,
or mobile under study. Next, Atoll calculates the interference received at the same studied pixel, subscriber, or mobile
from all the interfering cells (as explained in "Traffic and Pilot Interference Calculation (DL)" on page 522). Interference
from each cell is weighted according to the co- and adjacent channel overlap between the studied and the interfering cells,
the traffic loads of the interfering cells, and (in WiMAX 802.16e) the probabilities of subcarrier collision if segmentation is
used. Finally, Atoll takes the ratio of the signal level and the sum of the total interference from other cells and the downlink
noise (as calculated in "Traffic and Pilot Noise Calculation (DL)" on page 521).
The receiver terminal is always considered to be oriented towards its best server, except when the "Lock Status" is set to
"Server+Orientation" for a subscriber in a subscriber list and its azimuth and tilt manually edited. In the case of NLOS
between the receiver and the best server, Atoll does not try to find the direction of the strongest signal, the receiver is
oriented towards the best server just as in the case of LOS.
Input
: Received traffic signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in
"Traffic and Pilot Signal Level Calculation (DL)" on page 520.
: Received pilot signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in
"Traffic and Pilot Signal Level Calculation (DL)" on page 520.
: Downlink noise for the cell TX
i
(ic) as calculated in "Traffic and Pilot Noise Calculation (DL)" on page 521.
: Effective downlink traffic and pilot interference from any cell TX
j
(jc) calculated for a pixel, subscriber, or
mobile M
i
covered by a cell TX
i
(ic) as explained in "Traffic and Pilot Interference Calculation (DL)" on page 522.
: Inter-technology downlink noise rise.
: Preamble C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in "Preamble
C/N Calculation" on page 516.
: AMS threshold defined for the cell TX
i
(ic).
: Bearer selection thresholds of the bearers defined in the WiMAX equipment used by M
i
s terminal.
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of MIMO transmission (downlink) antennas defined for the cell TX
i
(ic).
: Number of MIMO reception (downlink) antennas defined for the terminal used by the pixel, subscriber,
or mobile M
i
.
: Mobility used for the calculations.
Subchannel allocation mode used by the downlink permutation zone assigned to the pixel, subscriber, or
mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
: Downlink block error rate read from the graphs available in the WiMAX equipment assigned to the
terminal used by the pixel, subscriber, or mobile M
i
.
Calculations
The traffic and pilot C/(I+N) for a cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
and
CNR
Pi l ot
TX
i
i c ( )
CNR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
STTD
DL
CNR
Traffi c
TX
i
i c ( )
CNR
Pi l ot
TX
i
i c ( )
C
Traffi c
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
n
DL
TX
i
i c ( )
I
DL
TX
j
j c ( )
NR
DL
Inter Tech
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
T
B
M
i
B
DL Hi ghest
M
i
Servi ce ( )
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Mobi l i ty M
i
( )
PZ
DL
M
i
BLER B
DL
M
i
( )
CINR
Traffi c
TX
i
i c ( )
C
Traffi c
TX
i
i c ( )
10 Log
10
I
DL
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
DL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
Forsk 2010 AT283_TRG_E2 533
Chapter 9: WiMAX BWA Networks
The Traffic Total Noise (I+N) for a cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
Bearer Determination:
The bearers available for selection in the pixel, subscriber, or mobile M
i
s WiMAX equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the traffic or pilot C/(I+N) at M
i
: or
If the cell supports STTD/MRC or AMS, the STTD/MRC gain, , corresponding to the bearer is applied
to its selection threshold. The gain is read from the properties of the WiMAX equipment assigned to the pixel,
subscriber, or mobile M
i
for , , the subchannel allocation mode of , ,
.
The additional STTD/MRC gain defined for the clutter class of the pixel, subscriber, or mobile M
i
is
also applied. Therefore, the bearers available for selection are all the bearers defined in the WiMAX equipment
for which the following is true:
In case of STTD/MRC:
In case of AMS:
if or
if or
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest downlink peak
MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
- Effective MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest downlink
effective MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 547.
MIMO STTD/MRC Gain:
Once the bearer is known, the traffic and pilot C/(I+N) calculated above become:
In case of STTD/MRC:

CINR
Pi l ot
TX
i
i c ( )
C
Pi l ot
TX
i
i c ( )
10 Log
10
I
DL
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
DL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
I N + ( )
DL
TX
i
i c ( )
10 Log
10
I
DL
TX
j
j c ( )
10
------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
DL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+ =
T
B
M
i
CINR
Traffi c
TX
i
i c ( )
<
T
B
M
i
CINR
Pi l ot
TX
i
i c ( )
<
G
STTD
DL
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
PZ
DL
M
i
Mobi l i ty M
i
( )
BLER B
DL
M
i
( )
AG
STTD
DL
T
B
M
i
G
STTD
DL
AG
STTD
DL
CINR
Traffi c
TX
i
i c ( )
<
T
B
M
i
G
STTD
DL
AG
STTD
DL
CINR
Pi l ot
TX
i
i c ( )
<
T
B
M
i
G
STTD
DL
AG
STTD
DL
CINR
Traffi c
TX
i
i c ( )
< CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
T
B
M
i
G
STTD
DL
AG
STTD
DL
CINR
Pi l ot
TX
i
i c ( )
< CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Traffi c
TX
i
i c ( )
CINR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + =
CINR
Pi l ot
TX
i
i c ( )
CINR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + =
534 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
In case of AMS:
if or
if or
Where is the STTD/MRC gain corresponding to the selected bearer.
Output
: Traffic C/(I+N) from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Pilot C/(I+N) from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Traffic Total noise from the interfering cells TX
j
(jc) at the pixel, subscriber, or mobile M
i
covered by
a cell TX
i
(ic).
: Bearer assigned to the pixel, subscriber, or mobile M
i
in the downlink.
9.3.6.6 Traffic Signal Level Calculation (UL)
Input
: Maximum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
without power
control.
: Effective transmission power of the terminal used by the pixel, subscriber, or mobile M
i
after power control
as calculated in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
: Number of antenna elements defined for the smart antenna equipment used by the transmitter TX
i.
: Transmitter antenna gain for the antenna used by the transmitter TX
i.
- Without smart antennas: is the transmitter antenna gain, i.e., .
- With smart antennas: is the uplink smart antenna beamforming gain, i.e.,
. For more information on the calculation of , refer to section "Smart
Antenna Models" on page 558.
: Total transmitter losses for the transmitter TX
i
( ).
: Path loss ( ).
: Loss on the transmitter-receiver path (path loss) calculated using a propagation model.
: Antenna attenuation (from antenna patterns) calculated for the antenna used by the transmitter TX
i.
: Shadowing margin based on the Model standard deviation.
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Indoor losses taken into account when the option "Indoor coverage" is selected.
: Receiver terminal losses for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna gain for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna attenuation calculated for the pixel, subscriber, or mobile M
i
.
For calculating the useful signal level from the best serving cell, is determined in the direction (H,V) = (0,0)
from the antenna patterns of the antenna used by M
i
. For calculating the interfering signal level from any interferer,
is determined in the direction of the interfering cell from the antenna patterns of the antenna used by M
i
, while
the antenna is pointed towards M
i
s best serving cell.
: Body loss defined for the service used by the pixel, subscriber, or mobile M
i
.
CINR
Traffi c
TX
i
i c ( )
CINR
Traffi c
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
Pi l ot
TX
i
i c ( )
CINR
Pi l ot
TX
i
i c ( )
G
STTD
DL
AG
STTD
DL
+ + = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
STTD
DL
CINR
Traffi c
TX
i
i c ( )
CINR
Pi l ot
TX
i
i c ( )
I N + ( )
DL
TX
i
i c ( )
B
DL
M
i
P
Max
M
i
P
Eff
M
i
E
SA
TX
i
G
TX
i
G
TX
i
G
TX
i
G
Ant
TX
i
=
G
TX
i
G
TX
i
G
SA
10 Log E
SA
TX
i
( ) = = G
SA
L
TX
i
L
TX
i
L
Total UL
=
L
Path
L
Path
L
Model
L
Ant
TX
i
+ =
L
Model
L
Ant
TX
i
M
Shadowi ng Model
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Ant
M
i
L
Ant
M
i
L
Body
M
i
Forsk 2010 AT283_TRG_E2 535
Chapter 9: WiMAX BWA Networks
Calculations
The received traffic signal level (dBm) from a pixel, subscriber, or mobile M
i
at its serving cell TX
i
(ic) is calculated as
follows:
Where EIRP is the effective isotropic radiated power of the terminal calculated as follows:
With without power control at the start of the calculations, and is the after power control.
Output
: Received uplink signal level from the pixel, subscriber, or mobile M
i
at a cell TX
i
(ic).
9.3.6.7 Traffic Noise Calculation (UL)
For determining the uplink C/N and C/(I+N), Atoll calculates the uplink noise over the channel bandwidth used by the cell.
The used bandwidth depends on the number of used subcarriers. In WiMAX 802.16e, the numbers of subcarriers used by
each permutation zone can be different.
The uplink noise comprises thermal noise and the noise figure of the equipment. The thermal noise density depends on
the temperature, i.e., it remains constant for a given temperature. However, the value of the thermal noise varies with the
used bandwidth.
Input
K: Boltzmanns constant.
T: Temperature in Kelvin.
: Number of used subcarriers defined in the Global Parameters (WiMAX 802.16d).
: Total number of subcarriers defined in the Global Parameters (WiMAX 802.16d).
: Number of subcarriers used by the uplink permutation zone of a WiMAX 802.16e cell TX
i
(ic)
assigned to M
i
.
: Total number of subcarriers defined for the frame configuration of a WiMAX 802.16e cell TX
i
(ic).
: Sampling frequency for the cell TX
i
(ic) as calculated in "Calculation of Sampling Frequency" on
page 544.
: Noise figure of the cell TX
i
(ic).
Calculations
The power spectral density of thermal noise is calculated as follows:
The thermal noise for a cell is calculated as:
WiMAX 802.16d:
WiMAX 802.16e (UL):
The uplink noise is the sum of the thermal noise and the noise figure of the cell TX
i
(ic).
Output
: Uplink noise for the cell TX
i
(ic).
C
UL
M
i
EIRP
UL
M
i
L
Path
M
Shadowi ng Model
L
Indoor
G
TX
i
L
TX
i
L
Ant
M
i
L
Body
M
i
+ =
EIRP
UL
M
i
P
M
i
G
M
i
L
M
i
+ =
P
M
i
P
Max
M
i
= P
M
i
P
Eff
M
i
=
C
UL
M
i
N
SCa Used
N
SCa Total
N
SCa Used
PZ
UL
M
i
N
SCa Total
TX
i
i c ( )
F
Sampl i ng
TX
i
i c ( )
nf
TX
i
i c ( )
n
0
10 Log K T 1000 ( ) 174 dBm/Hz = =
n
0 UL
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
N
SCa Total
------------------------------
\ .
| |
+ =
n
0 UL
TX
i
i c ( )
n
0
10 Log F
Sampl i ng
TX
i
i c ( ) N
SCa Used
PZ
UL
M
i
N
SCa Total
TX
i
i c ( )
------------------------------
\ .
|
|
|
| |
+ =
n
UL
TX
i
i c ( )
n
0 UL
TX
i
i c ( )
nf
TX
i
i c ( )
+ =
n
UL
TX
i
i c ( )
536 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.3.6.8 Traffic Interference Calculation (UL)
The uplink traffic interference is only calculated during Monte Carlo simulations. In coverage predictions, the uplink noise
rise values already available in simulation results or in the Cells table are used.
The interference received by a cell TX
i
(ic) from an interfering mobile covered by a cell TX
j
(jc) can be defined as the uplink
signal level received from interfering mobiles M
j
depending on the overlap that exists between the channels used by the
cells TX
i
(ic) and TX
j
(jc), on the traffic loads of the interfering mobile M
j
.
The calculation of uplink interference can be divided into two parts:
Calculation of the uplink interference from each individual interfering mobile as explained in "Traffic Interference
Signal Levels Calculation (UL)" on page 536.
Calculation of the uplink noise rise which represents the total uplink interference from all the interfering mobiles as
explained in "Noise Rise Calculation (UL)" on page 537.
9.3.6.8.1 Traffic Interference Signal Levels Calculation (UL)
Input
: Uplink signal level received at a cell TX
i
(ic) from an interfering mobile M
j
covered by a cell TX
j
(jc) as
calculated in "Traffic Signal Level Calculation (UL)" on page 534.
: Shadowing margin based on the Model standard deviation.
: Shadowing margin based on the C/I standard deviation.
In Monte Carlo simulations, interfering signal levels already include , as explained in "Traffic
Signal Level Calculation (UL)" on page 534.
In coverage predictions, the ratio is applied to the interfering signals (for
more information, see "Shadowing Model" on page 115). As the interfering signal levels already include
, is added to the received interfering signal levels in order to achieve the ratio
:
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Total channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Co- and Adjacent
Channel Overlaps Calculation" on page 508.
: Uplink traffic load of the interfering mobile M
j
.
Traffic loads are calculated during Monte Carlo simulations as explained in "Scheduling and Radio Resource
Allocation" on page 551.
Calculations
The uplink interference received at a cell TX
i
(ic) from an interfering mobile M
j
covered by a cell TX
j
(jc) is calculated as
follows:
Calculations for the interference reduction factors due to channel overlapping and uplink traffic load are explained below:
Interference reduction due to the co- and adjacent channel overlap between the studied and the interfering
cells:
Interference reduction due to the co- and adjacent channel overlap between the cells TX
i
(ic) and TX
j
(jc) is
calculated as follows:
Interference reduction due to interfering mobiles traffic load:
The interference reduction factor due to the interfering mobiles uplink traffic load is calculated as follows:
- Without smart antennas: All the mobiles present in other cells TX
j
(jc) that are transmitting in uplink contribute
to the interference received by TX
i
(ic) in uplink.
C
UL
M
j
M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
M
Shadowi ng Model
M
Shadowi ng C I

M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
M
Shadowi ng C I

C
UL
M
j
C
UL
M
j
M
Shadowi ng C I
+ =
r
O
TX
i
i c ( ) TX
j
j c ( )
TL
UL
M
j
I
UL
M
j
C
UL
M
j
f
O
TX
i
i c ( ) TX
j
j c ( )
f
TL UL
M
j
+ + =
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( ) =
f
TL UL
M
j
10 Log TL
UL
M
j
( ) =
Forsk 2010 AT283_TRG_E2 537
Chapter 9: WiMAX BWA Networks
- With smart antennas: A set of interfering mobiles is generated for each mobile being served by the victim
cell TX
i
(ic). The probability of generating a mobile as an interferer depends on its uplink traffic load (see "Time-
Slot Scenario:" on page 500). As the traffic load has already been taken into account for generating the list of
interfering mobiles,
Output
: Uplink interference signal level received at a cell TX
i
(ic) from an interfering mobile M
j
covered by a cell TX
j
(jc).
9.3.6.8.2 Noise Rise Calculation (UL)
The uplink noise rise is defined as the ratio of the total uplink interference received by any cell TX
i
(ic) from interfering
mobiles M
j
present in the coverage areas of other cells TX
j
(jc) to the uplink noise of the cell TX
i
(ic). In other words, it is the
ratio (I+N)/N.
Input
: Uplink interference signal levels received at a cell TX
i
(ic) from interfering mobiles M
j
covered by other cells
TX
j
(jc) as calculated in "Traffic Interference Signal Levels Calculation (UL)" on page 536.
: Uplink noise for the cell TX
i
(ic) as calculated in "Traffic Noise Calculation (UL)" on page 535.
: Inter-technology uplink noise rise.
Calculations
The uplink noise rise and total noise (I+N) for the cell TX
i
(ic) are calculated as follows:
Without smart antennas:
With smart antennas:
The angular distribution of the uplink noise rise is calculated during Monte Carlo simulations and can be stored in
the Cells table in order to be used in coverage predictions. The angular distribution of the uplink noise rise is given
by:
Output
or : Uplink noise rise or the angular distribution of the uplink noise rise for the cell TX
i
(ic).
or : Total Noise for a cell TX
i
(ic) calculated for any pixel, subscriber, or mobile M
i
.
9.3.6.9 Traffic C/N Calculation (UL)
Input
: Received uplink signal level from the pixel, subscriber, or mobile M
i
at its serving cell TX
i
(ic) as calculated
in "Traffic Signal Level Calculation (UL)" on page 534.
: Uplink noise for the cell TX
i
(ic) as calculated in "Traffic Noise Calculation (UL)" on page 535.
f
TL UL
M
j
0 =
I
UL
M
j
I
UL
M
j
n
UL
TX
i
i c ( )
NR
UL
Inter Tech
NR
UL
TX
i
i c ( )
10 Log
10
I
UL
M
j
10
--------
\ .
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
UL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
|
|
| |
NR
UL
Inter Tech
n
UL
TX
i
i c ( )
+ =
I N + ( )
UL
TX
i
i c ( )
10 Log
10
I
UL
M
j
10
--------
\ .
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
UL
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
|
|
| |
NR
UL
Inter Tech
+ =
NR
UL
( )
I
UL
( ) o
n
2
I +
o
n
2
I
----------------------------------- =
I N + ( )
UL
TX
i
i c ( )
( ) I
UL
( ) o
n
2
I + =
NR
UL
TX
i
i c ( )
NR
UL
TX
i
i c ( )
( )
I N + ( )
UL
TX
i
i c ( )
I N + ( )
UL
TX
i
i c ( )
( )
C
UL
M
i
n
UL
TX
i
i c ( )
538 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Preamble C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in "Preamble
C/N Calculation" on page 516.
: AMS threshold defined for the cell TX
i
(ic).
: Number of subchannels per channel (WiMAX 802.16d).
: Bearer selection threshold of the lowest bearer in the WiMAX equipment assigned to the cell TX
i
(ic).
: Number of subchannels per channel defined for the uplink permutation zone assigned to the pixel,
subscriber, or mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
: Maximum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Minimum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Power control margin defined in the Global Parameters.
: Bearer selection thresholds of the bearers defined in the WiMAX equipment used bythe cell TX
i
(ic).
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of MIMO transmission (uplink) antennas defined for the terminal used by the pixel, subscriber,
or mobile M
i
.
: Number of MIMO reception (uplink) antennas defined for the cell TX
i
(ic).
: Mobility used for the calculations.
Subchannel allocation mode used by the uplink permutation zone assigned to the pixel, subscriber, or
mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
: Uplink block error rate read from the graphs available in the WiMAX equipment assigned to the cell
TX
i
(ic).
Calculations
The uplink C/N from a pixel, subscriber, or mobile M
i
at its serving cell TX
i
(ic) is calculated as follows:
Bearer Determination:
The bearers available for selection in the cell TX
i
(ic)s WiMAX equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the uplink C/N at M
i
:
If the cell supports STTD/MRC or AMS, the STTD/MRC gain, , corresponding to the bearer is applied
to its selection threshold. The gain is read from the properties of the WiMAX equipment assigned to the cell
TX
i
(ic) for , , the subchannel allocation mode of , , .
The additional STTD/MRC gain defined for the clutter class of the pixel, subscriber, or mobile M
i
is
also applied. Therefore, the bearers available for selection are all the bearers defined in the WiMAX equipment
for which the following is true:
In case of STTD/MRC:
In case of AMS:
if or
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
N
SC UL
T
B Lowest
TX
i
i c ( )
N
SC
PZ
UL
M
i
P
Max
M
i
P
Mi n
M
i
M
PC
T
B
M
i
B
UL Hi ghest
M
i
Servi ce ( )
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( )
PZ
UL
M
i
BLER B
UL
M
i
( )
CNR
UL
M
i
C
UL
M
i
n
UL
TX
i
i c ( )
=
T
B
M
i
CNR
UL
M
i
<
G
STTD
UL
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
PZ
UL
M
i
Mobi l i ty M
i
( ) BLER B
UL
M
i
( )
AG
STTD
UL
T
B
M
i
G
STTD
UL
AG
STTD
UL
CNR
UL
M
i
<
T
B
M
i
G
STTD
UL
AG
STTD
UL
CNR
UL
M
i
< CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
Forsk 2010 AT283_TRG_E2 539
Chapter 9: WiMAX BWA Networks
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink peak
MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
- Effective MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink effective
MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
MIMO STTD/MRC Gain:
Once the bearer is known, the uplink C/N calculated above become:
In case of STTD/MRC:
In case of AMS:
if or
Where is the STTD/MRC gain corresponding to the selected bearer.
Uplink Subchannelisation (WiMAX 802.16d):
Subchannelisation decreases the bandwidth used by a mobile hence increasing the power spectral density for
transmission, and decreasing the noise and interference received. WiMAX terminals can perform
subchannelisation in uplink to improve uplink coverage. In WiMAX 802.16d networks, if a terminal is unable to
connect to its serving cell using all 16 subchannels, it can use less number of subchannels (8, 4, 2, or 1) in the
uplink in order to concentrate its transmission power on a smaller bandwidth, hence increasing its power spectral
density and increasing transmission range.
The uplink C/N is calculated above using the number of subchannels per channel set in the Global Parameters,
which is 16 by default. The number of subchannels in uplink is provided by the IEEE specifications.
If the uplink C/N before subchannelisation from the pixel, subscriber, or mobile M
i
is not enough to get the lowest
bearer, i.e., , Atoll performs subchannelisation as follows:
Until AND ,
Atoll improves the uplink C/N by adding the subchannelisation gain to it:
And reduces the number of subchannels used in the uplink by half.
The value of is calculated by determining the number of used subcarriers as follows:
Even if after performing subchannelisation, the uplink C/N from the pixel, subscriber, or mobile M
i
is not enough
to get a bearer in the uplink, i.e., , the pixel, subscriber, or mobile M
i
is considered not covered
by the cell TX
i
(ic) in the uplink.
Subchannelisation From Number of Used Subcarriers
16 to 8
200 to 100.
(192 Data + 8 Pilot to 96 Data + 4 Pilot)
8 to 4
100 to 50.
(96 Data + 4 Pilot to 48 Data + 2 Pilot)
4 to 2
50 to 25.
(48 Data + 2 Pilot to 25 Data + 1 Pilot)
2 to 1
25 to 13.
(24 Data + 1 Pilot to 12 Data + 1 Pilot)
CNR
UL
M
i
CNR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ + =
CNR
UL
M
i
CNR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ + = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
STTD
UL
N
SC UL
16 8 4 2 or 1 , , , , =
CNR
UL
M
i
All SC
T
B Lowest
TX
i
i c ( )
<
CNR
UL
M
i
Final
T
B Lowest
TX
i
i c ( )
< N
SC UL
1 >
CNR
UL
M
i
Final
CNR
UL
M
i
All SC
G
SC UL
+ =
N
SC UL
G
SC UL
G
SC UL
10 Log
200
100
----------
\ .
| |
3 dB =
10 Log
100
50
----------
\ .
| |
3 dB =
10 Log
50
25
------
\ .
| |
3 dB =
10 Log
25
13
------
\ .
| |
2.84 dB =
CNR
UL
M
i
Final
T
B Lowest
TX
i
i c ( )
<
540 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
If you want to turn off subchannelisation in uplink, you can set the number of subchannels per channel to 1 in the
Global Parameters.
Uplink Subchannelisation (WiMAX 802.16e):
The uplink subchannelisation depends on the uplink bandwidth allocation target defined for the scheduler used by
the cell TX
i
(ic). The uplink C/N calculated above is given for the total number of subchannels associated with the
permutation zone, i.e., . Subchannelisation is performed for all the pixels, subscribers, or mobiles in the
uplink, and may reduce the number of used subchannels in order to satisfy the selected target.
- Full Bandwidth
Full channel width is used by each mobile in the uplink. As there is no reduction in the bandwidth used for
transmission, there is no gain in the uplink C/N.
- Maintain Connection
The bandwidth used for transmission by a mobile is reduced only if the uplink C/N is not enough to access the
lowest bearer. For example, as a mobile moves from good to bad radio conditions, the number of subchannels
used by it for transmission in uplink are reduced one by one in order to improve the uplink C/N. The calculation
of the gain introduced by the subchannelisation is explained below.
The definition of the lowest bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the lowest index, with the lowest peak MAC throughput, or with the lowest effective
MAC throughput.
- Best Bearer
The bandwidth used for transmission by a mobile is reduced in order to improve the uplink C/N enough to
access the best bearer. For example, if using 5 subchannels, a mobile is able to access the best bearer, and
using 6 it would only get access to the second best, it will be assigned 5 subchannels as the used uplink
bandwidth. Although using 4 subchannels, its uplink C/N will be better than when using 5, the uplink bandwidth
is not reduced to 4 because it does not provide any gain in terms of the bearer, i.e., the mobile already has
the best bearer using 5 subchannels. The calculation of the gain introduced by the bandwidth reduction is
explained below.
The definition of the best bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the highest index, with the highest peak MAC throughput, or with the highest effective
MAC throughput.
The uplink subchannelisation may result in the use of a number of subchannels which is less than the total number
of subchannels associated with the permutation zone, i.e., . The gain related to this bandwidth
reduction is applied to the uplink C/N:
Uplink Power Control:
Once the subchannelisation is performed, Atoll continues to work with the C/N given by the subchannelisation,
i.e., .
The pixel, subscriber, or mobile M
i
reduces its transmission power so that the uplink C/N from it at its cell is just
enough to get the selected bearer.
If with AND , where is the bearer selection threshold, from the
WiMAX equipment assigned to the cell TX
i
(ic), for the bearer selected for the pixel, subscriber, or mobile M
i
.
The transmission power of M
i
is reduced to determine the effective transmission power from the pixel, subscriber,
or mobile M
i
as follows:
is calculated again using .
Output
: Uplink C/N from a pixel, subscriber, or mobile M
i
at it serving cell TX
i
(ic).
N
SC
PZ
UL
M
i
N
SC UL
M
i
N
SC
PZ
UL
M
i
<
CNR
UL
M
i
Final
CNR
UL
M
i
All SC
10 Log
N
SC
PZ
UL
M
i
N
SC UL
M
i
---------------------
\ .
|
|
|
| |
+ =
CNR
UL
M
i
CNR
UL
M
i
Final
=
P
M
i
P
Max
M
i
= CNR
UL
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+ > T
B
UL
M
i
TX
i
i c ( )
P
Eff
M
i
Max P
Max
M
i
CNR
UL
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+
\ .
| |

\ .
| |
P
Mi n
M
i
,
\ .
| |
=
CNR
UL
M
i
P
Eff
M
i
CNR
UL
M
i
Forsk 2010 AT283_TRG_E2 541
Chapter 9: WiMAX BWA Networks
9.3.6.10 Traffic C/(I+N) and Bearer Calculation (UL)
The carrier signal to interference and noise ratio is calculated in three steps. First, Atoll calculates the received signal level
from each pixel, subscriber, or mobile at its serving cell using the effective power of the terminal used by the pixel,
subscriber, or mobile as explained in "Traffic Signal Level Calculation (UL)" on page 534. Next, Atoll calculates the uplink
carrier to noise ratio as explained in "Traffic C/N Calculation (UL)" on page 537. Finally, determines the uplink C/(I+N) by
dividing the previously calculated uplink C/N by the uplink noise rise value of the cell as calculated in "Noise Rise
Calculation (UL)" on page 537.
The uplink noise rise can be set by the user manually for each cell or calculated using Monte Carlo simulations.
The receiver terminal is always considered to be oriented towards its best server, except when the "Lock Status" is set to
"Server+Orientation" for a subscriber in a subscriber list and its azimuth and tilt manually edited. In the case of NLOS
between the receiver and the best server, Atoll does not try to find the direction of the strongest signal, the receiver is
oriented towards the best server just as in the case of LOS.
Input
: Uplink C/N from a pixel, subscriber, or mobile M
i
at it serving cell TX
i
(ic) as calculated in "Traffic C/N
Calculation (UL)" on page 537.
or : Uplink noise rise or the angular distribution of the uplink noise rise for the cell TX
i
(ic).
: Preamble C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in "Preamble
C/N Calculation" on page 516.
: AMS threshold defined for the cell TX
i
(ic).
: Number of subchannels per channel (WiMAX 802.16d).
: Bearer selection threshold of the lowest bearer in the WiMAX equipment assigned to the cell TX
i
(ic).
: Number of subchannels per channel defined for the uplink permutation zone assigned to the pixel,
subscriber, or mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
: Maximum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Minimum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Power control margin defined in the Global Parameters.
: Bearer selection thresholds of the bearers defined in the WiMAX equipment used bythe cell TX
i
(ic).
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of MIMO transmission (uplink) antennas defined for the terminal used by the pixel, subscriber,
or mobile M
i
.
: Number of MIMO reception (uplink) antennas defined for the cell TX
i
(ic).
: Mobility used for the calculations.
Subchannel allocation mode used by the uplink permutation zone assigned to the pixel, subscriber, or
mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
: Uplink block error rate read from the graphs available in the WiMAX equipment assigned to the cell
TX
i
(ic).
Calculations
The uplink C/(I+N) for any pixel, subscriber, or mobile M
i
at a cell TX
i
(ic) is calculated as follows:
Without smart antennas:
With smart antennas:
- Monte Carlo simulations: The uplink C/(I+N) is calculated as described in the section "Smart Antenna
Models" on page 558. Victim and interfering mobiles are generated by a time-slot scenario as explained in
"Simulation Process" on page 498.
- Coverage predictions:
Bearer Determination:
CNR
UL
M
i
NR
UL
TX
i
i c ( )
NR
UL
TX
i
i c ( )
( )
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
N
SC UL
T
B Lowest
TX
i
i c ( )
N
SC
PZ
UL
M
i
P
Max
M
i
P
Mi n
M
i
M
PC
T
B
M
i
B
UL Hi ghest
M
i
Servi ce ( )
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( )
PZ
UL
M
i
BLER B
UL
M
i
( )
CINR
UL
M
i
CNR
UL
M
i
NR
UL
TX
i
i c ( )
=
CINR
UL
M
i
( ) CNR
UL
M
i
NR
UL
TX
i
i c ( )
( ) =
542 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The bearers available for selection in the cell TX
i
(ic)s WiMAX equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the uplink C/(I+N) at M
i
: and
If the cell supports STTD/MRC or AMS, the STTD/MRC gain, , corresponding to the bearer is applied
to its selection threshold. The gain is read from the properties of the WiMAX equipment assigned to the cell
TX
i
(ic) for , , the subchannel allocation mode of , , .
The additional STTD/MRC gain defined for the clutter class of the pixel, subscriber, or mobile M
i
is
also applied. Therefore, the bearers available for selection are all the bearers defined in the WiMAX equipment
for which the following is true:
In case of STTD/MRC:
and
In case of AMS:
if or
and
if or
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink peak
MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
- Effective MAC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink effective
MAC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
MIMO STTD/MRC Gain:
Once the bearer is known, the uplink C/(I+N) calculated above become:
In case of STTD/MRC:
and
In case of AMS:
if or
and
if or
Where is the STTD/MRC gain corresponding to the selected bearer.
Uplink Subchannelisation (WiMAX 802.16d):
Subchannelisation decreases the bandwidth used by a mobile hence increasing the power spectral density for
transmission, and decreasing the noise and interference received. WiMAX terminals can perform
T
B
M
i
CINR
UL
M
i
< T
B
M
i
CINR
UL
M
i
( ) <
G
STTD
UL
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
PZ
UL
M
i
Mobi l i ty M
i
( ) BLER B
UL
M
i
( )
AG
STTD
UL
T
B
M
i
G
STTD
UL
AG
STTD
UL
CINR
UL
M
i
<
T
B
M
i
G
STTD
UL
AG
STTD
UL
CINR
UL
M
i
( ) <
T
B
M
i
G
STTD
UL
AG
STTD
UL
CINR
UL
M
i
< CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
T
B
M
i
G
STTD
UL
AG
STTD
UL
CINR
UL
M
i
( ) < CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
UL
M
i
CINR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ + =
CINR
UL
M
i
( ) CINR
UL
M
i
( ) G
STTD
UL
AG
STTD
UL
+ + =
CINR
UL
M
i
CINR
UL
M
i
G
STTD
UL
AG
STTD
UL
+ + = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
UL
M
i
( ) CINR
UL
M
i
( ) G
STTD
UL
AG
STTD
UL
+ + = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
STTD
UL
Forsk 2010 AT283_TRG_E2 543
Chapter 9: WiMAX BWA Networks
subchannelisation in uplink to improve uplink coverage. In WiMAX 802.16d networks, if a terminal is unable to
connect to its serving cell using all 16 subchannels, it can use less number of subchannels (8, 4, 2, or 1) in the
uplink in order to concentrate its transmission power on a smaller bandwidth, hence increasing its power spectral
density and increasing transmission range.
The uplink C/(I+N) is calculated above using the number of subchannels per channel set in the Global Parameters,
which is 16 by default. The number of subchannels in uplink is provided by the IEEE specifications.
If the uplink C/(I+N) before subchannelisation from the pixel, subscriber, or mobile M
i
is not enough to get the
lowest bearer, i.e., , Atoll performs subchannelisation as follows:
Until AND ,
Atoll improves the uplink C/(I+N) by adding the subchannelisation gain to it:
And reduces the number of subchannels used in the uplink by half.
The value of is calculated by determining the number of used subcarriers as follows:
Even if after performing subchannelisation, the uplink C/(I+N) from the pixel, subscriber, or mobile M
i
is not enough
to get a bearer in the uplink, i.e., , the pixel, subscriber, or mobile M
i
is considered as not
covered by the cell TX
i
(ic) in the uplink.
If you want to turn off subchannelisation in uplink, you can set the number of subchannels per channel to 1 in the
Global Parameters.
Uplink Subchannelisation (WiMAX 802.16e):
The uplink subchannelisation depends on the uplink bandwidth allocation target defined for the scheduler used by
the cell TX
i
(ic). The uplink C/(I+N) calculated above is given for the total number of subchannels associated with
the permutation zone, i.e., . Subchannelisation is performed for all the pixels, subscribers, or mobiles in the
uplink, and may reduce the number of used subchannels in order to satisfy the selected target.
- Full Bandwidth
Full channel width is used by each mobile in the uplink. As there is no reduction in the bandwidth used for
transmission, there is no gain in the uplink C/(I+N).
- Maintain Connection
The bandwidth used for transmission by a mobile is reduced only if the uplink C/(I+N) is not enough to access
the lowest bearer. For example, as a mobile moves from good to bad radio conditions, the number of
subchannels used by it for transmission in uplink are reduced one by one in order to improve the uplink C/
(I+N). The calculation of the gain introduced by the subchannelisation is explained below.
The definition of the lowest bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the lowest index, with the lowest peak MAC throughput, or with the lowest effective
MAC throughput.
- Best Bearer
The bandwidth used for transmission by a mobile is reduced in order to improve the uplink C/(I+N) enough to
access the best bearer. For example, if using 5 subchannels, a mobile is able to access the best bearer, and
using 6 it would only get access to the second best, it will be assigned 5 subchannels as the used uplink
bandwidth. Although using 4 subchannels, its uplink C/(I+N) will be better than when using 5, the uplink
bandwidth is not reduced to 4 because it does not provide any gain in terms of the bearer, i.e., the mobile
Subchannelisation From Number of Used Subcarriers
16 to 8
200 to 100.
(192 Data + 8 Pilot to 96 Data + 4 Pilot)
8 to 4
100 to 50.
(96 Data + 4 Pilot to 48 Data + 2 Pilot)
4 to 2
50 to 25.
(48 Data + 2 Pilot to 25 Data + 1 Pilot)
2 to 1
25 to 13.
(24 Data + 1 Pilot to 12 Data + 1 Pilot)
N
SC UL
16 8 4 2 or 1 , , , , =
CINR
UL
M
i
All SC
T
B Lowest
TX
i
i c ( )
<
CINR
UL
M
i
Final
T
B Lowest
TX
i
i c ( )
< N
SC UL
1 >
CINR
UL
M
i
Final
CINR
UL
M
i
All SC
G
SC UL
+ =
N
SC UL
G
SC UL
G
SC UL
10 Log
200
100
----------
\ .
| |
3 dB =
10 Log
100
50
----------
\ .
| |
3 dB =
10 Log
50
25
------
\ .
| |
3 dB =
10 Log
25
13
------
\ .
| |
2.84 dB =
CINR
UL
M
i
Final
T
B Lowest
TX
i
i c ( )
<
N
SC
PZ
UL
M
i
544 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
already has the best bearer using 5 subchannels. The calculation of the gain introduced by the bandwidth
reduction is explained below.
The definition of the best bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the highest index, with the highest peak MAC throughput, or with the highest effective
MAC throughput.
The uplink subchannelisation may result in the use of a number of subchannels which is less than the total number
of subchannels associated with the permutation zone, i.e., . The gain related to this bandwidth
reduction is applied to the uplink C/(I+N):
Uplink Power Control:
Once the subchannelisation is performed, Atoll continues to work with the C/(I+N) given by the subchannelisation,
i.e., .
The pixel, subscriber, or mobile M
i
reduces its transmission power so that the uplink C/(I+N) from it at its cell is
just enough to get the selected bearer.
If with AND , where is the bearer selection threshold, from the
WiMAX equipment assigned to the cell TX
i
(ic), for the bearer selected for the pixel, subscriber, or mobile M
i
.
The transmission power of M
i
is reduced to determine the effective transmission power from the pixel, subscriber,
or mobile M
i
as follows:
is calculated again using .
Output
or : Uplink C/(I+N) from a pixel, subscriber, or mobile M
i
at it serving cell TX
i
(ic).
: Number of subchannels used by the pixel, subscriber, or mobile M
i
in the uplink after subchannelisation.
: Effective transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Bearer assigned to the pixel, subscriber, or mobile M
i
in the uplink.
9.3.7 Throughput Calculation
Throughputs are calculated in two steps.
Calculation of uplink and downlink total resources in a cell as explained in "Calculation of Total Cell Resources"
on page 544.
Calculation of throughputs as explained in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 547.
9.3.7.1 Calculation of Total Cell Resources
The total amount of resources in a cell is the number of modulation symbols that can be used for data transfer in each
frame. The total cell resources can be calculated separately for the downlink and the uplink subframes. The following
sections describe how the cell capacities are calculated for TDD and FDD networks.
9.3.7.1.1 Calculation of Sampling Frequency
Input
: Sampling factor defined for the frequency band of the cell TX
i
(ic).
: Channel bandwidth of the cell TX
i
(ic).
N
SC UL
M
i
N
SC
PZ
UL
M
i
<
CINR
UL
M
i
Final
CINR
UL
M
i
All SC
10 Log
N
SC
PZ
UL
M
i
N
SC UL
M
i
---------------------
\ .
|
|
|
| |
+ =
CINR
UL
M
i
CINR
UL
M
i
Final
=
P
M
i
P
Max
M
i
= CINR
UL
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+ > T
B
UL
M
i
TX
i
i c ( )
P
Eff
M
i
Max P
Max
M
i
CINR
UL
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+
\ .
| |

\ .
| |
P
Mi n
M
i
,
\ .
| |
=
CINR
UL
M
i
P
Eff
M
i
CINR
UL
M
i
CINR
UL
M
i
( )
N
SC UL
M
i
P
Eff
M
i
B
UL
M
i
f
Sampl i ng
TX
i
i c ( )
W
Channel
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 545
Chapter 9: WiMAX BWA Networks
Calculations
Atoll determines the sampling frequency as follows:
Output
: Sampling frequency for the cell TX
i
(ic).
9.3.7.1.2 Calculation of Symbol Duration
Input
: Sampling frequency for the cell TX
i
(ic) as calculated in "Calculation of Sampling Frequency" on
page 544.
: Total number of subcarriers defined for the frame configuration of a WiMAX 802.16e cell TX
i
(ic).
: Cyclic prefix ratio defined for the network in the Global Parameters.
Calculations
From the sampling frequency, Atoll determines the inter-subcarrier spacing.
Atoll calculates the useful symbol duration.
And, the duration of the cyclic prefix.
Adding the Cyclic prefix ratio to the useful symbol duration, Atoll determines the total symbol duration.
Output
: Total symbol duration of one modulation symbol for a cell TX
i
(ic).
9.3.7.1.3 Calculation of Total Cell Resources - TDD Networks
Input
: Frame duration.
: TTG duration.
: RTG duration.
: Total symbol duration of one modulation symbol for a cell TX
i
(ic) as calculated in "Calculation of Symbol
Duration" on page 545.
: DL ratio.
: Number of symbol durations that correspond to the downlink subframe.
: Number of symbol durations that correspond to the uplink subframe.
: Downlink fixed overhead.
: Downlink variable overhead.
: Uplink fixed overhead.
: Uplink variable overhead.
F
Sampl i ng
TX
i
i c ( )
Fl oor f
Sampl i ng
W
Channel
TX
i
i c ( )
10
6

8000
----------------------------------------
\ .
|
| |
8000 =
F
Sampl i ng
TX
i
i c ( )
F
Sampl i ng
TX
i
i c ( )
N
SCa Total
TX
i
i c ( )
r
CP
AF
TX
i
i c ( ) F
Sampl i ng
TX
i
i c ( )
10
3

N
SCa Total
TX
i
i c ( )
------------------------------------------- =
D
Sym Useful
TX
i
i c ( )
1
AF
TX
i
i c ( )
---------------------- =
D
CP
r
CP
AF
-------- =
D
Symbol
TX
i
i c ( )
D
Sym Useful
TX
i
i c ( )
D
CP
+ =
D
Symbol
TX
i
i c ( )
D
Frame
D
TTG
TDD
D
RTG
TDD
D
Symbol
TX
i
i c ( )
r
DL Frame
TDD
N
SD DL
TDD
N
SD UL
TDD
O
Fi xed
DL
O
Vari abl e
DL
O
Fi xed
UL
O
Vari abl e
UL
546 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Number of data subcarriers for a WiMAX 802.16d cell TX
i
(ic).
: Number of data subcarriers of the downlink permutation zone of a WiMAX 802.16e cell TX
i
(ic)
assigned to M
i
.
: Number of data subcarriers of the uplink permutation zone of a WiMAX 802.16e cell TX
i
(ic) assigned
to M
i
.
Calculations
The downlink and the uplink subframes of a TDD frame are separated in time by the TTG and the RTG time guards.
First of all, Atoll calculates the useful frame duration by removing the TTG and RTG from the frame duration:
Then, Atoll calculates the frame duration in terms of number of symbol durations:
Next, Atoll calculates the downlink and uplink cell capacities as follows:
Downlink Subframe:
Atoll calculates the number of symbol durations in the downlink subframe excluding the fixed overhead defined
in the Global Parameters:
if DL:UL ratio is defined in
percentage.
Or if DL:UL ratio is defined
in fraction.
The RoundUp function rounds a float value up to the nearest integer value.
The total number of symbols in the downlink subframe after removing the variable overhead is:
WiMAX 802.16d:
WiMAX 802.16e:
Uplink Subframe:
Atoll calculates the number of symbol durations in the uplink subframe excluding the fixed overhead defined in
the Global Parameters:
if DL:UL ratio is defined in
percentage.
Or if DL:UL ratio is
defined in fraction.
The RoundDown function rounds a float value down to the nearest integer value.
The total number of symbols in the uplink subframe after removing the variable overhead is:
WiMAX 802.16d:
WiMAX 802.16e:
N
SCa Data
TX
i
i c ( )
N
SCa Data
PZ
DL
M
i
N
SCa Data
PZ
UL
M
i
D
Frame
Used
D
Frame
D
TTG
TDD
D
RTG
TDD
=
N
SD Used ( ) Frame
TX
i
i c ( )
Fl oor
D
Frame
Used
D
Symbol
TX
i
i c ( )
---------------------
\ .
|
|
| |
=
N
SD DL ( ) Subframe
TX
i
i c ( )
RoundUp N
SD Used ( ) Frame
TX
i
i c ( )
r
DL Frame
TDD
( ) O
Fi xed
DL
=
N
SD DL ( ) Subframe
TX
i
i c ( )
RoundUp N
SD Used ( ) Frame
TX
i
i c ( ) N
SD DL
TDD
N
SD DL
TDD
N
SD UL
TDD
+
-------------------------------------------------
\ .
|
| |
O
Fi xed
DL
=
R
DL
TX
i
i c ( )
N
Sym DL ( ) Subframe
TX
i
i c ( )
Fl oor N
SD DL ( ) Subframe
TX
i
i c ( )
N
SCa Data
TX
i
i c ( )
1
O
Vari abl e
DL
100
-----------------------
\ .
|
| |

)
`

= =
R
DL
TX
i
i c ( )
N
Sym DL ( ) Subframe
TX
i
i c ( )
Fl oor N
SD DL ( ) Subframe
TX
i
i c ( )
N
SCa Data
PZ
DL
M
i
1
O
Vari abl e
DL
100
-----------------------
\ .
|
| |

)
`

= =
N
SD UL ( ) Subframe
TX
i
i c ( )
RoundDown N
SD Used ( ) Frame
TX
i
i c ( )
1 r
DL Frame
TDD
( ) ( ) O
Fi xed
UL
=
N
SD UL ( ) Subframe
TX
i
i c ( )
RoundDown N
SD Used ( ) Frame
TX
i
i c ( ) N
SD UL
TDD
N
SD DL
TDD
N
SD UL
TDD
+
-------------------------------------------------
\ .
|
| |
O
Fi xed
UL
=
R
UL
TX
i
i c ( )
N
Sym UL ( ) Subframe
TX
i
i c ( )
Fl oor N
SD UL ( ) Subframe
TX
i
i c ( )
N
SCa Data
TX
i
i c ( )
1
O
Vari abl e
UL
100
-----------------------
\ .
|
| |

)
`

= =
R
UL
TX
i
i c ( )
N
Sym UL ( ) Subframe
TX
i
i c ( )
Fl oor N
SD UL ( ) Subframe
TX
i
i c ( )
N
SCa Data
PZ
UL
M
i
1
O
Vari abl e
UL
100
-----------------------
\ .
|
| |

)
`

= =
Forsk 2010 AT283_TRG_E2 547
Chapter 9: WiMAX BWA Networks
Output
: Amount of downlink resources in the cell TX
i
(ic).
: Amount of uplink resources in the cell TX
i
(ic).
9.3.7.1.4 Calculation of Total Cell Resources - FDD Networks
The total cell resources calculation is the same for downlink and uplink subframes in FDD networks. Therefore, the symbol
X is used to represent DL or UL in the expressions below.
Input
: Frame duration.
: Total symbol duration of one modulation symbol for a cell TX
i
(ic) as calculated in "Calculation of Symbol
Duration" on page 545.
: Downlink or uplink fixed overhead.
: Downlink or uplink variable overhead.
: Number of data subcarriers for a WiMAX 802.16d cell TX
i
(ic).
: Number of data subcarriers of the downlink or uplink permutation zone of a WiMAX 802.16e cell
TX
i
(ic) assigned to M
i
.
Calculations
There are no transmit and receive time guards in FDD systems. Therefore, the downlink and the uplink subframe durations
are the same as the frame duration.
The subframe durations in terms of the number of symbol durations excluding the fixed overheads are:
The total numbers of symbols in the downlink or uplink subframes after removing the variable overheads are:
WiMAX 802.16d:
WiMAX 802.16e:
Output
: Amount of downlink or uplink resources in the cell TX
i
(ic).
9.3.7.2 Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation
Channel throughputs are calculated for the entire channel resources allocated to the pixel, subscriber, or mobile M
i
. Cell
capacities are similar to channel throughputs but upper-bound by the maximum downlink and uplink traffic loads. Allocated
bandwidth throughputs are calculated for the number of used subchannels in uplink allocated to the pixel, subscriber, or
mobile M
i
.
Input
: Maximum downlink traffic load for the cell TX
i
(ic).
: Maximum uplink traffic load for the cell TX
i
(ic).
: Amount of downlink resources in the cell TX
i
(ic) as calculated in "Calculation of Total Cell Resources" on
page 544.
R
DL
TX
i
i c ( )
N
Sym DL ( ) Subframe
TX
i
i c ( )
=
R
UL
TX
i
i c ( )
N
Sym UL ( ) Subframe
TX
i
i c ( )
=
D
Frame
D
Symbol
TX
i
i c ( )
O
Fi xed
X
O
Vari abl e
X
N
SCa Data
TX
i
i c ( )
N
SCa Data
PZ
X
M
i
D
Subframe
X
D
Frame
=
N
SD X ( ) Subframe
TX
i
i c ( )
Fl oor
D
Subframe
X
D
Symbol
TX
i
i c ( )
--------------------------
\ .
|
|
| |
O
Fi xed
X
=
R
X
TX
i
i c ( )
N
Sym X ( ) Subframe
TX
i
i c ( )
Fl oor N
SD X ( ) Subframe
TX
i
i c ( )
N
SCa Data
TX
i
i c ( )
1
O
Vari abl e
X
100
-----------------------
\ .
|
| |

)
`

= =
R
X
TX
i
i c ( )
N
Sym X ( ) Subframe
TX
i
i c ( )
Fl oor N
SD X ( ) Subframe
TX
i
i c ( )
N
SCa Data
PZ
X
M
i
1
O
Vari abl e
X
100
-----------------------
\ .
|
| |

)
`

= =
R
X
TX
i
i c ( )
N
Sym X ( ) Subframe
TX
i
i c ( )
=
TL
DL Max
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
DL
TX
i
i c ( )
548 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Amount of uplink resources in the cell TX
i
(ic) as calculated in "Calculation of Total Cell Resources" on
page 544.
: Bearer efficiency (bits/symbol) of the bearer assigned to the pixel, subscriber, or mobile M
i
in the downlink
in "Traffic and Pilot C/(I+N) and Bearer Calculation (DL)" on page 532.
: Bearer efficiency (bits/symbol) of the bearer assigned to the pixel, subscriber, or mobile M
i
in the uplink in
"Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
: Frame duration.
: Segmenting factor for the first downlink PUSC zone as calculated in "Effective Traffic and Pilot
Interference Calculation (DL)" on page 527.
: Preamble C/N the cell TX
i
(ic) as calculated in "Preamble C/N Calculation" on page 516.
: AMS threshold defined for the cell TX
i
(ic).
: MU-MIMO threshold defined for the cell TX
i
(ic).
: MU-MIMO gain defined for the cell TX
i
(ic).
: Downlink block error rate read from the BLER vs. graph available in the WiMAX
equipment assigned to the terminal used by the pixel, subscriber, or mobile M
i
.
: Uplink block error rate read from the BLER vs. graph available in the WiMAX equipment
assigned to the cell TX
i
(ic).
: Throughput scaling factor defined in the properties of the service used by the pixel, subscriber, or
mobile M
i
.
: Throughput offset defined in the properties of the service used by the pixel, subscriber, or mobile M
i
.
: Number of subchannels per channel defined for the uplink permutation zone assigned to the pixel,
subscriber, or mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
: Number of uplink subchannels after subchannelisation with which the pixel, subscriber, or mobile M
i
can
get the highest available bearer, as calculated in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
Calculations
Downlink:
Peak MAC Channel Throughput:
In the above formula, the actual value of is used to calculate the channel throughput for coverage
predictions, while for Monte Carlo simulations.
Segmentation (WiMAX 802.16e):
If the permutation zone assigned to the pixel, subscriber, or mobile M
i
is the first downlink PUSC zone ( )
and it is segmented, the channel throughput is calculated as:
MIMO SU-MIMO Gain:
If the permutation zone assigned to the pixel, subscriber, or mobile M
i
(WiMAX 802.16e) or the cell (WiMAX
802.16d) supports SU-MIMO or AMS, SU-MIMO gain is applied to the bearer efficiency. The gain is
read from the properties of the WiMAX equipment assigned to the pixel, subscriber, or mobile M
i
for:
- : Number of MIMO transmission (downlink) antennas defined for the cell TX
i
(ic).
- : Number of MIMO reception (downlink) antennas defined for the terminal used by the pixel,
subscriber, or mobile M
i
.
R
UL
TX
i
i c ( )
q
B
DL
M
i
q
B
UL
M
i
D
Frame
f
Segment
CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
T
MU MIMO
TX
i
i c ( )
G
MU MIMO
TX
i
i c ( )
BLER B
DL
M
i
( ) CINR
Traffi c
TX
i
i c ( )
BLER B
UL
M
i
( ) CINR
UL
M
i
f
TP Scal i ng
M
i
TP
Offset
M
i
N
SC
PZ
UL
M
i
N
SC UL
M
i
CTP
P DL
M
i
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
------------------------------------- =
D
Frame
D
Frame
1 sec =
PZ
DL
M
i
0 =
CTP
P DL
M
i
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
------------------------------------- f
Segment
=
G
SU MIMO
Max
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Forsk 2010 AT283_TRG_E2 549
Chapter 9: WiMAX BWA Networks
- : Mobility used for the calculations.
- Subchannel allocation mode used by the downlink permutation zone assigned to the pixel, subscriber,
or mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
- : Bearer assigned to the pixel, subscriber, or mobile M
i
in the downlink as explained in "Traffic and Pilot
C/(I+N) and Bearer Calculation (DL)" on page 532.
- : Downlink block error rate read from the graphs available in the WiMAX equipment assigned to
the terminal used by the pixel, subscriber, or mobile M
i
. BLER is determined for .
Atoll also takes into account the SU-MIMO Gain Factor defined for the clutter class where the pixel,
subscriber, or mobile M
i
is located.
In case of SU-MIMO:
In case of AMS: if or
If the Max SU-MIMO Gain for the exact value of the C/(I+N) is not availabe in the table, it is interpolated from the
gain values available for the C/(I+N) just less than and just greater than the actual C/(I+N).
Effective MAC Channel Throughput:
Application Channel Throughput:
Peak MAC Cell Capacity:
Effective MAC Cell Capacity:
Application Cell Capacity:
Uplink:
Peak MAC Channel Throughput:
In the above formula, the actual value of is used to calculate the channel throughput for coverage
predictions, while for Monte Carlo simulations.
MIMO SU-MIMO Gain:
If the permutation zone assigned to the pixel, subscriber, or mobile M
i
(WiMAX 802.16e) or the cell (WiMAX
802.16d) supports SU-MIMO or AMS, SU-MIMO gain is applied to the bearer efficiency. The gain is
read from the properties of the WiMAX equipment assigned to the cell TX
i
(ic) for:
- : Number of MIMO transmission (uplink) antennas defined for the terminal used by the pixel,
subscriber, or mobile M
i
.
- : Number of MIMO reception (uplink) antennas defined for the cell TX
i
(ic).
- : Mobility used for the calculations.
- Subchannel allocation mode used by the uplink permutation zone assigned to the pixel, subscriber, or
mobile M
i
as calculated in "Permutation Zone Selection (WiMAX 802.16e)" on page 519.
- : Bearer assigned to the pixel, subscriber, or mobile M
i
in the uplink as explained in "Traffic C/(I+N) and
Bearer Calculation (UL)" on page 541.
- : Uplink block error rate read from the graphs available in the WiMAX equipment assigned to the
cell TX
i
(ic). BLER is determined for .
Mobi l i ty M
i
( )
PZ
DL
M
i
B
DL
M
i
BLER B
DL
M
i
( )
CINR
Traffi c
TX
i
i c ( )
f
SU MIMO
q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CTP
E DL
M
i
CTP
P DL
M
i
1 BLER B
DL
M
i
( ) ( ) =
CTP
A DL
M
i
CTP
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
Cap
P DL
M
i
CTP
P DL
M
i
TL
DL Max
TX
i
i c ( )
=
Cap
E DL
M
i
Cap
P DL
M
i
1 BLER B
DL
M
i
( ) ( ) =
Cap
A DL
M
i
Cap
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
CTP
P UL
M
i
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
------------------------------------- =
D
Frame
D
Frame
1 sec =
G
SU MIMO
Max
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( )
PZ
UL
M
i
B
UL
M
i
BLER B
UL
M
i
( )
CINR
UL
M
i
550 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Atoll also takes into account the SU-MIMO Gain Factor defined for the clutter class where the pixel,
subscriber, or mobile M
i
is located.
In case of SU-MIMO:
In case of AMS: if or
If the Max SU-MIMO Gain for the exact value of the C/(I+N) is not availabe in the table, it is interpolated from the
gain values available for the C/(I+N) just less than and just greater than the actual C/(I+N).
MIMO MU-MIMO Gain (for uplink throughput coverage predictions only):
If the permutation zone assigned to the pixel, subscriber, or mobile M
i
(WiMAX 802.16e) or the cell (WiMAX
802.16d) supports MU-MIMO and and , the MU-MIMO gain
is applied to the channel throughput. The MU-MIMO gain is read from the properties of the cell TX
i
(ic).
Effective MAC Channel Throughput:
Application Channel Throughput:
Peak MAC Cell Capacity:
Effective MAC Cell Capacity:
Application Cell Capacity:
Peak MAC Allocated Bandwidth Throughput:
Effective MAC Allocated Bandwidth Throughput:
Application Allocated Bandwidth Throughput:
Output
: Downlink peak MAC channel throughput at the pixel, subscriber, or mobile M
i
.
: Downlink effective MAC channel throughput at the pixel, subscriber, or mobile M
i
.
: Downlink application channel throughput at the pixel, subscriber, or mobile M
i
.
: Downlink peak MAC cell capacity at the pixel, subscriber, or mobile M
i
.
: Downlink effective MAC cell capacity at the pixel, subscriber, or mobile M
i
.
: Downlink application cell capacity at the pixel, subscriber, or mobile M
i
.
: Uplink peak MAC channel throughput at the pixel, subscriber, or mobile M
i
.
: Uplink effective MAC channel throughput at the pixel, subscriber, or mobile M
i
.
: Uplink application channel throughput at the pixel, subscriber, or mobile M
i
.
: Uplink peak MAC cell capacity at the pixel, subscriber, or mobile M
i
.
: Uplink effective MAC cell capacity at the pixel, subscriber, or mobile M
i
.
: Uplink application cell capacity at the pixel, subscriber, or mobile M
i
.
f
SU MIMO
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) = CNR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CINR
Preambl e
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CNR
Preambl e
TX
i
i c ( )
T
MU MIMO
TX
i
i c ( )
> N
Ant RX
TX
i
i c ( )
2 > G
MU MIMO
TX
i
i c ( )
CTP
P UL
M
i
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
------------------------------------- G
MU MIMO
TX
i
i c ( )
=
CTP
E UL
M
i
CTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( ) =
CTP
A UL
M
i
CTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
Cap
P UL
M
i
CTP
P UL
M
i
TL
UL Max
TX
i
i c ( )
=
Cap
E UL
M
i
Cap
P UL
M
i
1 BLER B
UL
M
i
( ) ( ) =
Cap
A UL
M
i
Cap
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
ABTP
P UL
M
i
CTP
P UL
M
i
N
SC UL
M
i
N
SC
PZ
UL
M
i
--------------------- =
ABTP
E UL
M
i
ABTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( ) =
ABTP
A UL
M
i
ABTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
CTP
P DL
M
i
CTP
E DL
M
i
CTP
A DL
M
i
Cap
P DL
M
i
Cap
E DL
M
i
Cap
A DL
M
i
CTP
P UL
M
i
CTP
E UL
M
i
CTP
A UL
M
i
Cap
P UL
M
i
Cap
E UL
M
i
Cap
A UL
M
i
Forsk 2010 AT283_TRG_E2 551
Chapter 9: WiMAX BWA Networks
: Uplink peak MAC allocated bandwidth throughput at the pixel, subscriber, or mobile M
i
.
: Uplink effective MAC allocated bandwidth throughput at the pixel, subscriber, or mobile M
i
.
: Uplink application allocated bandwidth throughput at the pixel, subscriber, or mobile M
i
.
9.3.8 Scheduling and Radio Resource Management
Atoll WiMAX BWA module includes a number of scheduling methods which can be used for scheduling and radio resource
allocation during Monte Carlo simulations. These resource allocation algorithms are explained in "Scheduling and Radio
Resource Allocation" on page 551 and the calculation of user throughputs is explained in "User Throughput Calculation"
on page 557.
9.3.8.1 Scheduling and Radio Resource Allocation
Input
: Maximum downlink traffic load for the cell TX
i
(ic).
: Maximum uplink traffic load for the cell TX
i
(ic).
: Maximum number of users defined for the cell TX
i
(ic).
: QoS class of the service (UGS, ErtPS, rtPS, nrtPS, or Best Effort) accessed by a mobile M
i
.
: Priority of the service accessed by a mobile M
i
.
: Downlink minimum throughput demand for the service accessed by a mobile M
i
.
: Uplink minimum throughput demand for the service accessed by a mobile M
i
.
: Downlink maximum throughput demand for the service accessed by a mobile M
i
.
: Uplink maximum throughput demand for the service accessed by a mobile M
i
.
: Downlink block error rate read from the BLER vs. graph available in the WiMAX
equipment assigned to the terminal used by the mobile M
i
.
: Uplink block error rate read from the BLER vs. graph available in the WiMAX equipment
assigned to the cell TX
i
(ic).
: Throughput scaling factor defined in the properties of the service used by the mobile M
i
.
: Throughput offset defined in the properties of the service used by the mobile M
i
.
: Downlink peak MAC channel throughput at the mobile M
i
as calculated in "Throughput Calculation"
on page 544.
: Uplink peak MAC channel throughput at the mobile M
i
as calculated in "Throughput Calculation" on
page 544.
: Uplink peak MAC allocated bandwidth throughput at the mobile M
i
as calculated in "Throughput
Calculation" on page 544.
: Bias factor defined for the Biased (QoS Class) scheduling method.
Calculations
The following calculations are described for any cell TX
i
(ic) containing the users M
i
for which it is the best server.
Mobile Selection:
The scheduler selects mobiles for the scheduling and RRM process. If the Monte Carlo user distribution has
generated a number of users which is less than , the scheduler keeps all the mobiles generated for the cell
TX
i
(ic).
ABTP
P UL
M
i
ABTP
E UL
M
i
ABTP
A UL
M
i
TL
DL Max
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
N
Users Max
TX
i
i c ( )
QoS
M
i
p
M
i
TPD
Mi n DL
M
i
TPD
Mi n UL
M
i
TPD
Max DL
M
i
TPD
Max UL
M
i
BLER B
DL
M
i
( ) CINR
Traffi c
TX
i
i c ( )
BLER B
UL
M
i
( ) CINR
UL
M
i
f
TP Scal i ng
M
i
TP
Offset
M
i
CTP
P DL
M
i
CTP
P UL
M
i
ABTP
P UL
M
i
f
Bi as
QoS
N
Users
TX
i
i c ( )
N
Users Max
TX
i
i c ( )
N
Users
TX
i
i c ( )
Mi n N
Users Max
TX
i
i c ( )
N
Users Generated
TX
i
i c ( )
, ( ) =
552 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
For a cell, mobiles are selected for RRM by the scheduler.
Calculation of Actual Minimum and Maximum Throughput Demands:
Depending on the selected target throughput of the scheduler assigned to the cell TX
i
(ic), the actual minimum and
maximum throughput demands can be considered as the peak MAC, effective MAC, or application throughput. Therefore:
Target Throughput = Peak MAC Throughput
Downlink: ,
Uplink: ,
Target Throughput = Effective MAC Throughput
Downlink: ,
Uplink: ,
Target Throughput = Application Throughput
Downlink: ,
Uplink: ,
The Min() function selects the lower of the two values. This calculation is performed in order to limit the maximum uplink
throughput demand to the maximum throughput that a user can get in uplink using the allocated bandwidth (number of
used subchannels) calculated for it in "Traffic C/(I+N) and Bearer Calculation (UL)" on page 541.
Resource Allocation for Minimum Throughput Demands:
1. For the QoS classes UGS, ErtPS, rtPS, and nrtPS, Atoll sorts the in order of decreasing service
priority, :
1 UGS
= n
2
... n > > 0 ...
:
= 0
: ErtPS
= n
:
... n > > 0 ...
:
= 0
: rtPS
= n
:
... n > > 0 ...
M
i
Sel
N
Users
TX
i
i c ( )
e
TPD
Mi n DL
M
i
Sel
TPD
Max DL
M
i
Sel
TPD
Mi n UL
M
i
Sel
Mi n TPD
Max UL
M
i
Sel
ABTP
P UL
M
i
,
\ .
| |
TPD
Mi n DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
--------------------------------------------------- = TPD
Max DL
M
i
Sel
TPD
Max DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
--------------------------------------------------- =
TPD
Mi n UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
--------------------------------------------------- = TPD
Max UL
M
i
Sel
Mi n TPD
Max UL
M
i
Sel
ABTP
P UL
M
i
,
\ .
| |
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
----------------------------------------------------------------------------------- =
TPD
Mi n DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
TP
Offset
M
i
+
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------- = TPD
Max DL
M
i
Sel
TPD
Max DL
M
i
Sel
TP
Offset
M
i
+
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------- =
TPD
Mi n UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
TP
Offset
M
i
+
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------- =
TPD
Max UL
M
i
Sel
Mi n TPD
Max UL
M
i
Sel
ABTP
P UL
M
i
,
\ .
| |
TP
Offset
M
i
+
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------------------------------- =
M
i
Sel
N
Users
TX
i
i c ( )
e
p
M
i
Sel
M
i
Sel
QoS
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
Forsk 2010 AT283_TRG_E2 553
Chapter 9: WiMAX BWA Networks
Where , if there are some Best Effort users, or if there are no Best Effort users selected.
2. Starting with up to , Atoll allocates the downlink and uplink resources required to satisfy
each users minimum throughput demands in downlink and uplink as follows:
and
3. Atoll stops the resource allocation in downlink or uplink,
- When/If in downlink , i.e., the resources available in downlink have been used up
for satisfying the minimum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink have been used up for
satisfying the minimum throughput demands of the mobiles.
4. Mobiles which are active UL+DL must be able to get their minimum throughput demands in both UL and DL in
order to be considered connected UL+DL. If an active UL+DL mobile is only able to get its minimum throughput
demand in one direction, it is rejected, and the resources, that were allocated to it in the one direction in which it
was able to get a throughput, are allocated to other mobiles.
5. Mobiles which are active UL and whose minimum throughput demand in UL is higher than the uplink allocated
bandwidth throughput ( ) are rejected due to Resource Saturation.
6. If or , and all the minimum throughput resources demanded
by the mobiles have been allocated, Atoll goes to the next step for allocating resources to satisfy the maximum
throughput demands.
The remaining cell resources available for the next step are:
Downlink:
Uplink:
Resource Allocation for Maximum Throughput Demands:
For each mobile, the throughput demands remaining once the minimum throughput demands have been satisfied are the
difference between the maximum and the minimum throughput demands:
Downlink:
Uplink:
For the remaining throughput demands of the mobiles belonging to the QoS classes ErtPS, rtPS, nrtPS, and Best Effort,
the following resource allocation methods are available:
1. Proportional Fair:
The goal of this scheduling method is to distribute resources among users fairly in such a way that, on the average,
each user gets the highest possible throughput that it can get under the radio conditions at its location.
:
= 0
: nrtPS
= n
N1
... n > > 0 ...
N
= 0
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
p
M
i
Sel
N N
Users
TX
i
i c ( )
< N N
Users
TX
i
i c ( )
=
M
i
Sel
1 = M
i
Sel
N =
R
Mi n DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
CTP
P DL
M
i
Sel
------------------------------- = R
Mi n UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
CTP
P UL
M
i
Sel
------------------------------- =
R
Mi n DL
M
i
Sel
M
i
Sel

TL
DL Max
TX
i
i c ( )
=
R
Mi n UL
M
i
Sel
M
i
Sel

TL
UL Max
TX
i
i c ( )
=
TPD
Mi n UL
M
i
Sel
ABTP
P UL
M
i
Sel
>
R
Mi n DL
M
i
Sel
M
i
Sel

TL
DL Max
TX
i
i c ( )
< R
Mi n UL
M
i
Sel
M
i
Sel

TL
UL Max
TX
i
i c ( )
<
R
Rem DL
TX
i
i c ( )
TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

=
R
Rem UL
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

=
TPD
Rem DL
M
i
Sel
TPD
Max DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
=
TPD
Rem UL
M
i
Sel
TPD
Max UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
=
554 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Let the total number of users belonging to the QoS classes ErtPS, rtPS, nrtPS, and Best Effort, be .
a. Atoll divides the remaining resources in the cell into equal parts for each user:
and
b. Atoll converts the remaining throughput demands of all the users to their respective remaining resource
demands:
and
Remaining resource demands of a user are given by the ratio between its remaining throughput demands and
the peak channel throughputs at the users location.
c. The resources allocated to each user by the Proportional Fair scheduling method for satisfying its maximum
throughput demands are:
and
Each user gets either the resources it needs to achieve its maximum throughput demands or an equal share
from the remaining resources of the cell, whichever is smaller.
d. Atoll stops the resource allocation in downlink or uplink,
- When/If in downlink , i.e., the resources available in downlink have been used
up for satisfying the maximum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink have been used up for
satisfying the maximum throughput demands of the mobiles.
e. If the resources allocated to a user satisfy its maximum throughput demands, this user is removed from the
list of remaining users.
f. Atoll recalculates the remaining resources as follows:
and
g. Atoll repeats the all the above steps for the users whose maximum throughput demands have not been
satisfied until either and , or all the maximum throughput demands are
satisfied.
2. Proportional Demand:
The goal of this scheduling method is to allocate resources to users weighted according to their remaining
throughput demands. Therefore, the user throughputs for users with high throughput demands will be higher than
those with low throughput demands. In other words, this scheduler distributes channel throughput between users
proportionally to their demands.
a. Atoll converts the remaining throughput demands of all the users to their respective remaining resource
demands:
and
Remaining resource demands of a user are given by the ratio between its remaining throughput demands and
the peak channel throughputs at the users location.
b. Atoll calculates the amount effective remaining resources for the cell of each user to distribute among the
users as follows:
and
N M
i
Sel
e
R
Rem DL
TX
i
i c ( )
N
-------------------------
R
Rem UL
TX
i
i c ( )
N
-------------------------
RD
Rem DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = RD
Rem UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
R
Max DL
M
i
Sel
Mi n RD
Rem DL
M
i
Sel
R
Rem DL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
= R
Max UL
M
i
Sel
Mi n RD
Rem UL
M
i
Sel
R
Rem UL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
=
R
Max DL
M
i
Sel
M
i
Sel

R
Rem DL
TX
i
i c ( )
=
R
Max UL
M
i
Sel
M
i
Sel

R
Rem UL
TX
i
i c ( )
=
R
Rem DL
TX
i
i c ( )
TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

R
Max DL
M
i
Sel
M
i
Sel

=
R
Rem UL
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

R
Max UL
M
i
Sel
M
i
Sel

=
R
Rem DL
TX
i
i c ( )
0 = R
Rem UL
TX
i
i c ( )
0 =
RD
Rem DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = RD
Rem UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
R
Eff Rem DL
TX
i
i c ( )
Mi n R
Rem DL
TX
i
i c ( )
RD
Rem DL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
= R
Eff Rem UL
TX
i
i c ( )
Mi n R
Rem UL
TX
i
i c ( )
RD
Rem UL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
=
Forsk 2010 AT283_TRG_E2 555
Chapter 9: WiMAX BWA Networks
c. The resources allocated to each user by the Proportional Demand scheduling method for satisfying its
maximum throughput demands are:
and
3. Biased (QoS Class):
The goal of this scheduling method is to distribute resources among users of each QoS class fairly in such a way
that, on the average, each user gets the highest possible throughput that it can get under the radio conditions at
its location. The resources available for allocation to users of each QoS class depend on a bias factor. The QoS
Class Bias Factor controls the amount of resources available for each QoS class.
Calculation of the Remaining Resources per QoS Class:
The bias factor represents the bias in terms of resources allocated to 1 user of a QoS class with rank r to
the resources allocated to 1 user of a QoS class with rank r1:
The ranks of QoS classes are:
The resources available for the users of each QoS class from among the remaining resources is calculated as
follows:
and
Resource Allocation:
Once the remaining resources available for the users of each QoS class have been determined, the allocation of
resources within each QoS class is performed as for the proportional fair scheduler.
Let the number of users belonging to a QoS class .
a. Atoll divides the remaining resources of the QoS class into equal parts for each user:
and
b. Atoll converts the remaining throughput demands of all the users to their respective remaining resource
demands:
and
Remaining resource demands of a user are given by the ratio between its remaining throughput demands and
the peak channel throughputs at the users location.
c. The resources allocated to each user by the Biased scheduling method for satisfying its maximum throughput
demands are:
and
Each user gets either the resources it needs to achieve its maximum throughput demands or an equal share
from the remaining resources of the QoS class, whichever is smaller.
d. Atoll stops the resource allocation for a QoS class in downlink or uplink,
QoS Class QoS Class Rank
ErtPS 1
rtPS 2
nrtPS 3
Best Effort 4
R
Max DL
M
i
Sel
R
Eff Rem DL
TX
i
i c ( ) RD
Rem DL
M
i
Sel
RD
Rem DL
M
i
Sel
M
i
Sel

---------------------------------------- = R
Max UL
M
i
Sel
R
Eff Rem UL
TX
i
i c ( ) RD
Rem UL
M
i
Sel
RD
Rem UL
M
i
Sel
M
i
Sel

---------------------------------------- =
f
Bi as
QoS
| 1
f
Bi as
QoS
100
----------- +
R
Max ErtPS
M
i
Sel
R
Max rtPS
M
i
Sel
-------------------------------
R
Max rtPS
M
i
Sel
R
Max nrtPS
M
i
Sel
------------------------------
R
Max nrtPS
M
i
Sel
R
Max BE
M
i
Sel
------------------------------ = = = =
r
QoS
R
QoS DL
TX
i
i c ( )
R
Rem DL
TX
i
i c ( )
N
QoS
1
|
---
\ .
| |
r
QoS

N
QoS
1
|
---
\ .
| |
r
QoS

All QoS

------------------------------------------------------------ = R
QoS UL
TX
i
i c ( )
R
Rem UL
TX
i
i c ( )
N
QoS
1
|
---
\ .
| |
r
QoS

N
QoS
1
|
---
\ .
| |
r
QoS

All QoS

------------------------------------------------------------ =
N
QoS
M
i
Sel
e
R
QoS DL
TX
i
i c ( )
N
QoS
------------------------
R
QoS UL
TX
i
i c ( )
N
QoS
------------------------
RD
Rem DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = RD
Rem UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
R
Max DL
M
i
Sel
Mi n RD
Rem DL
M
i
Sel
R
QoS DL
TX
i
i c ( )
N
QoS
------------------------ ,
\ .
|
| |
= R
Max UL
M
i
Sel
Mi n RD
Rem UL
M
i
Sel
R
QoS UL
TX
i
i c ( )
N
QoS
------------------------ ,
\ .
|
| |
=
556 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
- When/If in downlink , i.e., the resources available in downlink for the QoS class
have been used up for satisfying the maximum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink for the QoS class have
been used up for satisfying the maximum throughput demands of the mobiles.
e. If the resources allocated to a user satisfy its maximum throughput demands, this user is removed from the
list of remaining users.
f. Atoll recalculates the remaining resources as follows:
and
g. Atoll repeats the all the above steps for the users of the QoS class whose maximum throughput demands
have not been satisfied until either and , or all the maximum throughput
demands are satisfied.
4. Max Aggregate Throughput:
The goal of this scheduling method is to achieve the maximum aggregate throughput for the cells. This is done by
allocating as much resources as needed to mobiles with high C/(I+N) conditions. As mobiles with high C/(I+N) can
get higher bearers, and therefore require less amount of resources, more mobiles can therefore be allocated
resources in the same frame, and the end-throughput for each cell will be the highest compared to other types of
schedulers.
a. Atoll sorts the in order of decreasing downlink or uplink traffic C/(I+N), depending on whether
the allocation is being performed for the downlink or for the uplink.
b. Starting with the mobile with the highest rank, Atoll allocates the downlink and uplink resources required to
satisfy each users remaining throughput demands in downlink and uplink as follows:
and
c. Atoll stops the resource allocation in downlink or uplink,
- When/If in downlink , i.e., the resources available in downlink have been used
up for satisfying the maximum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink have been used up for
satisfying the maximum throughput demands of the mobiles.
Spatial Multiplexing with Uplink Multi-User MIMO:
MU-MIMO lets the system/scheduler work with two parallel WiMAX frames (1 for each antenna). Therefore, a mobile
connected to antenna 1 creates a corresponding resource availability on antenna 2. This resources made available on
antenna 2 can then be assigned to another mobile without any effect on the overall load of the cell. When the second
mobile is assigned to antenna 2, the resources allocated to it overlap with the resources made available by the first mobile
on antenna 1. If the second mobile is allocated more resources than the first one made available, the second mobile will
create resource availability on antenna 1. Each new mobile is either connected to antenna 1 or antenna 2. The part of the
mobiles resources which are not coupled with resources allocated to another mobile on the other antenna is called the
real resource consumption. The part of the mobiles resources which are coupled with the resources allocated to another
mobile on the other antenna is called the virtual resource consumption.
MU-MIMO can be used if the permutation zone assigned to the pixel, subscriber, or mobile M
i
(WiMAX 802.16e) or the
cell (WiMAX 802.16d) supports MU-MIMO, , and .
Let i be the index of connected MU-MIMO mobiles:
R
Max DL
M
i
Sel
M
i
Sel

R
QoS DL
TX
i
i c ( )
=
R
Max UL
M
i
Sel
M
i
Sel

R
QoS UL
TX
i
i c ( )
=
R
QoS DL
TX
i
i c ( )
TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

R
Max DL
M
i
Sel
M
i
Sel

=
R
QoS UL
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

R
Max UL
M
i
Sel
M
i
Sel

=
R
QoS DL
TX
i
i c ( )
0 = R
QoS UL
TX
i
i c ( )
0 =
M
i
Sel
N
Users
TX
i
i c ( )
e
R
Max DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = R
Max UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
R
Max DL
M
i
Sel
M
i
Sel

R
Rem DL
TX
i
i c ( )
=
R
Max UL
M
i
Sel
M
i
Sel

R
Rem UL
TX
i
i c ( )
=
CNR
Preambl e
TX
i
i c ( )
T
MU MIMO
TX
i
i c ( )
> N
Ant RX
TX
i
i c ( )
2 >
i 1 to N =
Forsk 2010 AT283_TRG_E2 557
Chapter 9: WiMAX BWA Networks
Each mobile has a corresponding traffic load . The scheduling starts with available real
resources and available virtual resources . means no MU-MIMO
mobile has yet been scheduled.
The virtual resource consumption of a mobile is given by:
The real resource consumption of a mobile is given by:
The virtual resources made available by the mobile are given by:
Saturation occurs when .
The following table gives an example:
Total Amount of Resources Assigned to Each Selected Mobile:
Atoll calculates the amounts of downlink and uplink resources allocated to each individual mobile (which can also
be referred to as the traffic loads of the mobiles) as follows:
Downlink:
Uplink: or for MU-MIMO mobiles for cell traffic
load calculation
Output
: Downlink traffic load or the amount of downlink resources allocated to the mobile .
: Uplink traffic load or the amount of uplink resources allocated to the mobile .
9.3.8.2 User Throughput Calculation
User throughputs are calculated for the percentage of resources allocated to each mobile selected by the scheduling for
RRM during the Monte Carlo simulations, .
Input
: Amount of downlink resources allocated to the mobile as calculated in "Scheduling and Radio
Resource Allocation" on page 551.
: Amount of uplink resources allocated to the mobile as calculated in "Scheduling and Radio Resource
Allocation" on page 551.
: Downlink peak MAC channel throughput at the mobile

as calculated in "Throughput Calculation"
on page 544.
: Uplink peak MAC channel throughput at the mobile

as calculated in "Throughput Calculation"
on page 544.
Mobile
(%) (%) (%) (%)
M
1
10 0 10 10
M
2
5 5 0 5
M
3
20 5 15 15
M
4
40 15 25 25

M
i
MU MIMO
TL
UL
M
i
MU MIMO
RR
UL
M
i 0 =
MU MIMO
100 % = AV
UL
M
i 0 =
MU MIMO
0 % = i 0 =
M
i
MU MIMO
VC
UL
M
i
MU MI MO
Mi n TL
UL
M
i
MU MI MO
AV
UL
M
i 1
MU MI MO
,
\ .
| |
=
M
i
MU MIMO
RC
UL
M
i
MU MIMO
TL
UL
M
i
MU MIMO
VC
UL
M
i
MU MIMO
=
M
i
MU MIMO
AV
UL
M
i
MU MIMO
AV
UL
M
i 1
MU MIMO
VC
UL
M
i
MU MIMO
RC
UL
M
i
MU MIMO
+ =
RC
UL
M
i
MU MI MO

TL
UL Max
TX
i
i c ( )
=
TL
UL
M
i
MU MIMO
VC
UL
M
i
MU MI MO
RC
UL
M
i
MU MIMO
AV
UL
M
i
MU MIMO
M
i
Sel
TL
DL
M
i
Sel
R
DL
M
i
Sel
R
Mi n DL
M
i
Sel
R
Max DL
M
i
Sel
+ = =
TL
UL
M
i
Sel
R
UL
M
i
Sel
R
Mi n UL
M
i
Sel
R
Max UL
M
i
Sel
+ = = TL
UL
M
i
Sel
RC
UL
M
i
MU MI MO
=
TL
DL
M
i
Sel
R
DL
M
i
Sel
= M
i
Sel
TL
UL
M
i
Sel
R
UL
M
i
Sel
= M
i
Sel
M
i
Sel
R
DL
M
i
Sel
M
i
Sel
R
UL
M
i
Sel
M
i
Sel
CTP
P DL
M
i
Sel
M
i
Sel
CTP
P UL
M
i
Sel
M
i
Sel
558 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Downlink block error rate read from the BLER vs. graph available in the WiMAX
equipment assigned to the terminal used by the mobile .
: Uplink block error rate read from the BLER vs. graph available in the WiMAX equipment
assigned to the cell TX
i
(ic).
: Throughput scaling factor defined in the properties of the service used by the mobile .
: Throughput offset defined in the properties of the service used by the mobile .
Calculations
Downlink:
Peak MAC User Throughput:
Effective MAC User Throughput:
Application User Throughput:
Uplink:
Peak MAC User Throughput:
Effective MAC User Throughput:
Application User Throughput:
Output
: Downlink peak MAC user throughput at the pixel, subscriber, or mobile .
: Downlink effective MAC user throughput at the pixel, subscriber, or mobile .
: Downlink application user throughput at the pixel, subscriber, or mobile .
: Uplink peak MAC user throughput at the pixel, subscriber, or mobile .
: Uplink effective MAC user throughput at the pixel, subscriber, or mobile .
: Uplink application user throughput at the pixel, subscriber, or mobile .
9.3.9 Smart Antenna Models
Adaptive antenna systems use more than one antenna elements, along with smart signal processing, to locate and track
various types of signals, to dynamically minimize interference, and maximize useful signal reception. The signal processor
dynamically applies weights to each element of the adaptive antenna system to create array patterns in real-time to
maximize the C/(I+N).
Beamforming smart antennas dynamically create antenna patterns with a main beam pointed in the direction of the user
being served, i.e., the useful signal. Adaptive algorithms can also be used in order to minimize the interference received
by the cells. These algorithms are based on optimization methods such as the minimum mean square error method.
The following smart antenna models are available in Atoll. These smart antenna models support linear adaptive array
systems, such as the one shown in Figure 9.9 on page 559.
Optimum Beamformer: The Optimum Beamformer smart antenna model performs dynamic beamforming in
downlink as explained in "Downlink Beamforming" on page 559, and beamforming and interference cancellation
in uplink using the minimum mean square error algorithm as explained in "Uplink Beamforming and Interference
Cancellation (MMSE)" on page 562. Smart antenna results are later on used in coverage prediction calculations
("Traffic and Pilot Interference Signal Levels Calculation (DL)" on page 523 and "Traffic C/(I+N) and Bearer
Calculation (UL)" on page 541).
Conventional Beamformer: The Conventional Beamformer smart antenna model performs dynamic
beamforming in downlink and uplink as explained in "Downlink Beamforming" on page 559 and "Uplink
Beamforming" on page 560, respectively. Smart antenna results are later on used in coverage prediction
BLER B
DL
M
i
Sel
\ .
| |
CINR
Traffi c
TX
i
i c ( )
M
i
Sel
BLER B
UL
M
i
Sel
\ .
| |
CINR
UL
M
i
f
TP Scal i ng
M
i
Sel
M
i
Sel
TP
Offset
M
i
Sel
M
i
Sel
UTP
P DL
M
i
Sel
R
DL
M
i
Sel
CTP
P DL
M
i
Sel
=
UTP
E DL
M
i
Sel
UTP
P DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
=
UTP
A DL
M
i
Sel
UTP
E DL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel
=
UTP
P UL
M
i
Sel
R
UL
M
i
Sel
CTP
P UL
M
i
Sel
=
UTP
E UL
M
i
Sel
UTP
P UL
M
i
Sel
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
=
UTP
A UL
M
i
Sel
UTP
E UL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel
=
UTP
P DL
M
i
Sel
M
i
Sel
UTP
E DL
M
i
Sel
M
i
Sel
UTP
A DL
M
i
Sel
M
i
Sel
UTP
P UL
M
i
Sel
M
i
Sel
UTP
E UL
M
i
Sel
M
i
Sel
UTP
A UL
M
i
Sel
M
i
Sel
Forsk 2010 AT283_TRG_E2 559
Chapter 9: WiMAX BWA Networks
calculations ("Traffic and Pilot Interference Signal Levels Calculation (DL)" on page 523 and "Traffic C/(I+N) and
Bearer Calculation (UL)" on page 541).
In the following explanations, we assume:
There are a total of elements in the adaptive antenna system.
is the angle of arrival for the useful signal.
is the angle at which we want to calculate the smart antenna gain.
d is the distance between two adjacent antenna elements.
9.3.9.1 Downlink Beamforming
Beamforming dynamically creates a beam towards the served user. The smart antenna processor applies complex
weights, , to each antenna element in order to form a beam towards the served user. The magnitude of these complex
weights is set to 1. The beamforming is performed using only the phase of the complex weights. The steering vector, ,
representing the complex weights for forming a beam towards the served user, i.e., at the angle of arrival is given by:
Where the notation T represents the transpose of a matrix.
Therefore, the complex weight at any n
th
antenna element can be given by:
Figure 9.9Linear Adaptive Antenna Array
E
SA
u

Figure 9.10Downlink Beamforming


w
n
S
u
u
S
u
1 e
j
2t

------- d u sin
e
j
2t

------- 2d u sin
... e
j
2t

------- E
SA
1 ( )d u sin
, , , ,
T
=
w
n
e
j
2t

------- nd u sin
=
560 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
In Atoll, , therefore, .
The smart antenna gain in any direction can be given by:
Where the notation H represents the Hilbert transform, which is the complex conjugate transpose of a matrix, is the
gain of the n
th
antenna element in the direction , and is the array correlation matrix for a given user direction , given
by:
For the direction of the served user, i.e., , the smart antenna gain is calculated as follows:
The smart antenna gain includes the gain of the beamforming as well as the gain of power combination.
The smart antenna gain in dB will be .
The smart antenna is able to form the beam only in the horizontal plane, therefore, the vertical pattern is assumed to
remain the same.
Power Combining Gain
Cell transmission power is fed to each antenna element of the smart antenna system. Since each element transmits the
same input power, this results in a gain due to power combination, i.e., the powers fed to each antenna element are
combined for transmission.
Additional Processing in Monte Carlo Simulations
During Monte Carlo simulations, Atoll generates a time-slot scenario for each victim mobile and calculates the downlink
C/(I+N) as described in the section "Traffic and Pilot Interference Signal Levels Calculation (DL)" on page 523. However,
as it calculates the smart antenna gains for each victim mobile in a cells coverage area, it averages the array correlation
matrix over all the iterations in order to generate an angular distribution of the downlink traffic power density, which is
a combination of signal power and angles.
The average array correlation matrix is given by:
Where is the average downlink array correlation matrix, J is the number of served mobiles during the simulation,
is the probability of presence of the mobile j, is the EIRP transmitted towards the mobile j, and is the array correlation
matrix for the mobile j.
The probability of presence of the mobile j is the ratio between the downlink resources provided to the mobile j and the
total amount of available downlink resources. For example, if a mobile has been granted 10 % of the number of available
slots in the downlink subframe, its probability of presence is 10 %.
9.3.9.2 Uplink Beamforming
d

2
--- = w
n
e
j t n u sin
=

G
SA
( ) g
n
( ) S

H
R
u
S

=
g
n
( )
R
u
u
R
u
S
u
S
u
H
=
u
G
SA
u ( ) g
n
u ( ) S
u
H
R
u
S
u
g
n
u ( ) S
u
H
S
u
S
u
H
S
u
g
n
u ( ) E
SA
2
= = =
G
SA
( ) 10 Log G
SA
( ) ( ) =
R
u
R
Avg

j
p
j
R
j

j 1 =
J

=
R
Avg

j
p
j
R
j
Figure 9.11Uplink Beamforming
Forsk 2010 AT283_TRG_E2 561
Chapter 9: WiMAX BWA Networks
Let represent the vector of E
SA
complex weights for the beamformer. is given by:
Where is the steering vector in the direction of the served user, .
The total noise received in the uplink, i.e., interference and thermal noise, is stored in a total noise correlation matrix, .
The total noise correlation matrix is the sum of the thermal noise correlation matrix , and the interference correlation
matrix , given by:
Where and
is the thermal noise power. I is the identity matrix. is the power received by one element of the smart antenna from
the j
th
interfering mobile. is the steering vector in the direction of the j
th
interfering mobile, . J is the total number of
interfering mobiles.
The total noise power, including thermal noise and interference from all uplink interferers, received by a cell is given by:
And, the total power received from the served user is given by:
Where is the power received by one element of the smart antenna from the served user.
The C/(I+N) in the uplink is then calculated by:
From the above equation, we can determine the uplink smart antenna beamforming gain in the direction of the served user,
which equals the number of smart antenna elements, i.e., .
Additional Processing in Monte Carlo Simulations
During Monte Carlo simulations, Atoll generates a time-slot scenario for each victim mobile and calculates the uplink C/
(I+N). The average interference and noise on the uplink is stored in the form of correlation matrices as follows:
The noise correlation matrix for each iteration k includes the effect of the matrix calculated for the previous iteration.
The interference power and its direction is stored at the end of each simulation. The result is the angular distribution of the
uplink noise rise, which is calculated from the noise correlation matrix obtained at the end of the last iteration of a Monte
Carlo simulation. This angular distribution of the uplink noise rise can be stored in the Cells table. The average of the noise
correlation matrices is calculated as follows:
Where is the average of the noise correlation matrices of all the iterations from k = 1 to K, and is the noise
correlation matrix of the k
th
iteration.
The interference can be isolated from the thermal noise and can be calculated for any direction using the formula.
Where is the interfering signal in the direction , E
SA
is the number of smart antenna elements, is the steering
vector in the direction , and is the thermal noise power.
The angular distribution of the uplink noise rise is given by:
w w
w
S
u
E
SA
-------------- =
S
u
u
R
N
R
n
R
I
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+ = =
R
n
o
n
2
I = R
I
p
j
S
j
S
j
H

j 1 =
J

=
o
n
2
p
j
S
j

P
N
w
H
R
N
w =
P
u
p
u
w
H
S
u
S
u
H
w p
u
E
SA
= =
p
u
CINR
UL
P
u
P
N
-------
p
u
E
SA

w
H
R
N
w
---------------------------- = =
G
SA
E
SA
=
R
N
R
N
Avg
1
K
---- R
N
k
k 1 =
K

=
R
N
Avg
R
N
k
I
UL
( ) w
H
R
N
Avg
w o
n
2
=
I
UL
( ) S

o
n
2
NR
UL
( )
I
UL
( ) o
n
2
+
o
n
2
----------------------------- =
562 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
9.3.9.3 Uplink Beamforming and Interference Cancellation (MMSE)
The optimum beamformer uses the Minimum Mean Square Error algorithm in the uplink in order to cancel interference.
The Minimum Mean Square Error algorithm optimizes the useful signal as well as maximizes the output C/(I+N).
A simple null steering beamformer can cancel the interference from the most interfering interfering mobiles. The
optimum beamforming method used in Atoll overcomes this limitation. It calculates the optimum smart antenna weights
using the knowledge of directions and power levels of interference. These weights do not try to fully cancel
interference signals, but rather try to reduce the overall received interference as much as possible.
Let represent the vector of E
SA
complex weights for the beamformer. is given by:
Where is the steering vector in the direction of the served user, . , which is a constant value for a given useful
signal that optimizes the beamformer weights. It is given by the equation:
is the inverse of the total noise correlation matrix. The total noise correlation matrix is the sum of the thermal noise
correlation matrix , and the interference correlation matrix , given by:
Where and
is the thermal noise power. I is the identity matrix. is the power received by one element of the smart antenna from
the j
th
interfering mobile. is the steering vector in the direction of the j
th
interfering mobile, . J is the total number of
interfering mobiles.
The total noise power, including thermal noise and interference from all uplink interferers, received by a cell is given by:
And, the total power received from the served user is given by:
Where is the power received by one element of the smart antenna from the served user.
The C/(I+N) in the uplink is then calculated by:
Figure 9.12Uplink Adaptive Algorithm
E
SA
1
E
SA
1
w


u
R
N
1
S
u
=
S
u
u
u

u
E
SA
S
u
H
R
N
1
S
u

----------------------------------- =
R
N
1
R
n
R
I
R
N
R
n
R
I
+ o
n
2
I p
j
S
j
S
j
H

j 1 =
J

+ = =
R
n
o
n
2
I = R
I
p
j
S
j
S
j
H

j 1 =
J

=
o
n
2
p
j
S
j

P

N

u
2
S
u
H
R
N
1
S
u
=
P

u
p
u

u
2
S
u
H
R
N
1
S
u
( )
2
=
p
u
Forsk 2010 AT283_TRG_E2 563
Chapter 9: WiMAX BWA Networks
From the above equation, we can determine the uplink smart antenna beamforming gain in the direction of the served user.
can be calculated from the above equation by considering the interference and noise to be null, i.e., . This
gives:
From the above equation, the uplink smart antenna beamforming gain equals the number of smart antenna elements, i.e.,
.
Additional Processing in Monte Carlo Simulations
During Monte Carlo simulations, Atoll generates a time-slot scenario for each victim mobile and calculates the uplink C/
(I+N). The average interference and noise on the uplink is stored in the form of correlation matrices as follows:
The inverse noise correlation matrix for each iteration k includes the effect of the matrix calculated for the previous
iteration. The interference power and its direction is stored at the end of each simulation. Hence, Atoll is able to calculate
an average of the smart antenna interference-cancellation effect. The result is the angular distribution of the uplink noise
rise, which is calculated from the inverse of the noise correlation matrix obtained at the end of the last iteration of a Monte
Carlo simulation. This angular distribution of the uplink noise rise can be stored in the Cells table. The average of the
inverse noise correlation matrices is calculated as follows:
Where is the average of the inverse noise correlation matrices of all the iterations from k = 1 to K, and is
the inverse noise correlation matrix of the k
th
iteration.
The interference can be isolated from the thermal noise and can be calculated for any direction using the formula.
Where is the interfering signal in the direction , E
SA
is the number of smart antenna elements, is the steering
vector in the direction , and is the thermal noise power.
The angular distribution of the uplink noise rise is given by:
9.4 Automatic Allocation Algorithms
The following sections describe the algorithms for:
"Automatic Neighbour Allocation" on page 563.
"Automatic Inter-Technology Neighbour Allocation" on page 566.
"Automatic Frequency Planning" on page 568.
"Automatic Preamble Index Allocation" on page 571 (fractional frequency planning).
9.4.1 Automatic Neighbour Allocation
The intra-technology neighbour allocation algorithm takes into account the cells of all the TBC transmitters. It means that
the cells of all the TBC transmitters of your .atl document are potential neighbours.
The cells to be allocated will be called TBA cells. They must fulfil the following conditions:
They are active,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone,
They belong to the folder on which allocation has been executed. This can be the Transmitters folder or a group
of transmitters (subfolder).
Only TBA cells are assigned neighbours.
CINR
UL
P

u
P

N
------- p
u
S
u
H
R
N
1
S
u
= =
C
UL
R
N
1
I =
C
UL
p
u
S
u
H
I S
u
p
u
E
SA
= =
G
SA
E
SA
=
R
N
1
R
N
1
Avg
1
K
---- R
N
1
k
k 1 =
K

=
R
N
1
Avg
R
N
1
k
I
UL
( )
E
SA
S

H
R
N
1
Avg
S


------------------------------------------- o
n
2
=
I
UL
( ) S

o
n
2
NR
UL
( )
I
UL
( ) o
n
2
+
o
n
2
----------------------------- =
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
564 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
We assume a reference cell TX
i
(ic) and a candidate neighbour cell TX
j
(jc). When automatic allocation starts, Atoll checks
the following conditions:
1. The distance between both cells must be less than the user-definable maximum inter-site distance. If the distance
between the reference cell and the candidate neighbour is greater than this value, then the candidate neighbour
is discarded.
2. The calculation options,
- Force Co-site Cells as Neighbours: If selected, Atoll adds all the cells located on the same site as the
reference cell to the candidate neighbour list. The weight of this constraint can be defined. It is used to
calculate the rank of each neighbour, and its importance.
- Force Adjacent Cells as Neighbours: If selected, Atoll adds all the cells geographically adjacent to the
reference cell to the candidate neighbour list. The weight of this constraint can be defined. It is used to
calculate the rank of each neighbour, and its importance.
Determination of Adjacent Cells: Geographically adjacent cells are determined on the basis of their best
server coverage areas. A candidate neighbour cell TX
i
(ic) is considered adjacent to the reference cell TX
i
(ic)
if there exists at least one pixel of TX
j
(jc)s best server coverage area where TX
i
(ic) is the second best server.
The ranking of adjacent neighbour cells increases with the number of such pixels. Adjacent cells are sorted in
the order of decreasing rank.
- Force Neighbour Symmetry: If selected, Atoll adds the reference cell to the candidate neighbour list of the
its candidate neighbour.
A symmetric neighbour relation is allowed only if the neighbour list of the reference cell is not already full. If
TX
j
(jc) is a neighbour of TX
i
(ic) but TX
i
(ic) is not a neighbour of TX
j
(jc), there can be two possibilities:
i. The neighbour list of TX
j
(jc) is not full, Atoll will add TX
i
(ic) to the end of the list.
ii. The neighbour list of TX
j
(jc) is full, Atoll will not be able to add TX
i
(ic) to the list, so it will also remove
TX
j
(jc) from the neighbour list of TX
i
(ic).
- Force Exceptional Pairs: This option enables you to force/forbid some neighbour relations. Exceptional pairs
are pairs of cells which will always or never be neighbours of each other.
If you select "Force exceptional pairs" and "Force symmetry", Atoll considers the constraints between
exceptional pairs in both directions so as to respect symmetry condition. On the other hand, if neighbourhood
relationship is forced in one direction and forbidden in the other, symmetry cannot be respected. In this case,
Atoll displays a warning in the Event viewer.
- Delete Existing Neighbours: If selected, Atoll deletes all the current neighbours and carries out a new
neighbour allocation. If not selected, the existing neighbours are kept in the list.
3. The coverage areas of TX
i
(ic) and TX
j
(jc) must have an overlap ( ).
- Here is the surface area covered by the cell TX
i
(ic) that comprises all the pixels where:
- The received preamble signal level is greater than or equal to the preamble signal level threshold. The
received preamble signal level ( ) and the preamble signal level threshold are calculated from
and , respectively, by adding the value of the noise ( ) to them.
- is the surface area covered by TX
i
(ic) within and .
is the margin with respect to the best preamble signal level at which the handover starts, and
is the margin with respect to the best preamble signal level at which the handover ends.
- is the coverage area where the candidate cell TX
j
(jc) is the best server.
Figure 9.13Determination of Adjacent Cells
Note:
S
TX
i
i c ( )
S
TX
j
j c ( )

S
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
CNR
Preambl e
TX
i
i c ( )
T
Preambl e
TX
i
i c ( )
n
Preambl e
TX
i
i c ( )
S
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
HO
Start
+ C
Preambl e
TX
i
i c ( )
HO
End
+
HO
Start
HO
End
S
TX
j
j c ( )
Forsk 2010 AT283_TRG_E2 565
Chapter 9: WiMAX BWA Networks
When the above conditions are met, Atoll calculates the percentage of the coverage area overlap
( ), and compares this value with the % Min Covered Area.
TX
j
(jc) is considered a neighbour of TX
i
(ic) if .
Next, Atoll calculates the importance of the automatically allocated neighbours. Atoll sorts the neighbours by decreasing
importance in order to keep the ones with high importance. If the maximum number of neighbours to be allocated to each
cell is exceeded, Atoll keeps the ones with high importance.
The importance (%) of neighbours depends on the reason of allocation:
The importance is evaluated using an Importance Function (IF), which takes into account the following factors:
Co-site factor (C): a Boolean,
Adjacency factor (A): the percentage of adjacency,
Overlapping factor (O): the percentage of overlapping.
The minimum and maximum importance assigned to each of the above factors can be defined.
If a global value of the preamble C/N threshold ( ) is set in the coverage
conditions dialogue, for each cell, Atoll uses the higher of the two values, i.e., global value
and the value defined for that cell.
For calculating the overlapping coverage areas, Atoll uses the service with the lowest body
loss, the terminal that has the highest difference between gain and losses, and the
shadowing margin calculated using the defined cell edge coverage probability, if the option
is selected. The service and terminal are selected such that the selection gives the largest
possible coverage areas for the cells.
Figure 9.14Overlapping Zones
Neighbour Cause When
Importance
Value
Existing neighbour
Only if the Delete Existing Neighbours option is not selected
and in case of a new allocation
Existing
importance
Exceptional pair Only if the Force Exceptional Pairs option is selected 100 %
Co-site cell
Only if the Force Co-site Cells as Neighbours option is
selected
Importance
Function (IF)
Adjacent cell
Only if the Force Adjacent Cells as Neighbours option is
selected
Importance
Function (IF)
Neighbourhood relationship that fulfils
coverage conditions
Only if the % Min Covered Area is exceeded
Importance
Function (IF)
Symmetric neighbourhood
relationship
Only if the Force Neighbour Symmetry option is selected
Importance
Function (IF)
Factor
Min
Importance
Default Value
Max
Importance
Default Value
Overlapping factor (O) Min(O) 1 % Max(O) 30 %
Adjacency factor (A) Min(A) 30 % Max(A) 60 %
Co-site factor (C) Min(C) 60 % Max(C) 100 %
T
Preambl e
TX
i
i c ( )
S
TX
i
i c ( )
S
TX
j
j c ( )

S
TX
i
i c ( )
--------------------------------------------- 100
S
TX
i
i c ( )
S
TX
j
j c ( )

S
TX
i
i c ( )
--------------------------------------------- 100 % Min Coverage Area >
566 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The Importance Function is evaluated as follows:
Where Delta(x) = Max(x) - Min(x)
In the results, Atoll lists only the cells for which it finds new neighbours.
9.4.2 Automatic Inter-Technology Neighbour Allocation
The inter-technology neighbour allocation algorithm takes into account all the TBC transmitters (if the other technology is
GSM) or the cells of all the TBC transmitters (for any other technology than GSM). This means that all the TBC transmitters
(GSM) or the cells of all the TBC transmitters (all other technologies) of the linked document are potential neighbours.
The cells to be allocated in the main document will be called TBA cells. They must fulfil the following conditions:
They are active,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone,
They belong to the folder on which allocation has been executed. This can be the Transmitters folder or a group
of transmitters (subfolder).
Only TBA cells are assigned neighbours.
We assume a reference cell A and a candidate neighbour B. When automatic allocation starts, Atoll checks following
conditions:
1. The distance between reference cell and the candidate neighbour must be less than the user-definable maximum
inter-site distance. If the distance is greater than this value, the candidate neighbour is discarded.
2. The calculation options:
- CDMA Carriers: This option is available when an WiMAX network is being co-planned with a UMTS, CDMA,
or TD-SCDMA network. This option enables you to select the CDMA carrier(s) that you want Atoll to consider
as potential neighbours of WiMAX cells. You may choose one or more carriers. Atoll will allocate only the cells
using the selected carriers as neighbours.
- Force co-site cells as neighbours: If selected, Atoll adds all the transmitters/cells located on the same site
as the reference cell in its candidate neighbour list. The weight of this constraint can be defined. It is used to
calculate the rank of each neighbour and its importance.
- Force exceptional pairs: This option enables you to force/forbid some neighbour relations. Exceptional pairs
are pairs of cells which will always or never be neighbours of each other.
- Delete existing neighbours: If selected, Atoll deletes all the current neighbours and carries out a new
neighbour allocation. If not selected, the existing neighbours are kept in the list.
3. Neighbour relation criterion:
- Allocation based on distance:
When allocation algorithm is based on distance, Atoll calculates the effective distance between the reference
cell and its candidate neighbour from the real distance between them and the azimuths of their antennas:
Where x = 0.5% so that the maximum variation in D does not to exceed 1%. D is stated in m.
Neighbour Cause
Importance Function IF with Default Values
Co-site Adjacent
No No Min(O) + Delta(O)(O) 1 % + 29 %(O)
No Yes Min(A)+Delta(A){Max(O)(O)+(100 %-Max(O))(A)} 30 % + 30 %{30 %(O) + 70 %(A)}
Yes Yes Min(C)+Delta(C){Max(O)(O)+(100 %-Max(O))(A)} 60 % + 40 %{30 %(O )+ 70 %(A)}
Notes:
If the Min and Max value ranges of the importance function factors do not overlap, the
neighbours will be ranked by neighbour cause. With the default values for minimum and
maximum importance fields, neighbours will be ranked in this order: co-site neighbours,
adjacent neighbours, and neighbours allocated based on coverage overlapping.
If the Min and Max value ranges of the importance function factors overlap, the neighbours
may not be ranked by neighbour cause.
The ranking between neighbours from the same category depends on (A) and (O) factors.
The default value of Min(O) = 1 % ensures that neighbours selected for symmetry will have
an importance greater than 0 %. With a value of Min(O) = 0 %, neighbours selected for
symmetry, will have an importance greater than 0 % only if there is some overlapping.
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Di st Cel l A Cel l B , ( ) D 1 x | cos x o cos + ( ) =
Forsk 2010 AT283_TRG_E2 567
Chapter 9: WiMAX BWA Networks
The formula above implies that two cells facing each other have a smaller effective distance than the actual
distance. Candidate neighbours are ranked in the order of increasing effective distance from the reference
cell.
This formula is not used when allocation algorithm is based on coverage overlapping. In this case, the actual
inter-transmitter distance is considered.
- Algorithm based on coverage overlapping:
The coverage areas of the reference cell A and the candidate neighbour B must overlap ( ).
Two cases may exist for S
A
:
- 1
st
case: S
A
is the area where the cell A is the best serving cell, with a 0dB margin.
This means that the preamble signal received from A is greater than the minimum required (calculated
from the preamble C/N threshold), and is the highest one. .
- 2
nd
case: The margin is other than 0dB. S
A
is the area where:
The preamble signal level received from A exceeds the minimum required (calculated from the preamble
C/N threshold) and is within a margin from the highest signal level.
Two cases may exist for S
B
:
- 1
st
case: S
B
is the area where the candidate neighbour is the best server. In this case, the margin must
be set to 0dB.
The signal level received from B exceeds the minimum required, and is the highest one.
- 2
nd
case: The margin is other than 0dB. S
B
is the area where:
The signal level received from B exceeds the minimum required and is within a margin from the best signal
level.
Atoll calculates the percentage of the coverage area overlap ( ) and compares this value with
the % Min Covered Area. B is considered a neighbour of A if .
Candidate neighbours are ranked in the order of decreasing coverage area overlap percentages.
Next, Atoll calculates the importance of the automatically allocated neighbours. Atoll sorts the neighbours by decreasing
importance in order to keep the ones with high importance. If the maximum number of neighbours to be allocated to each
cell is exceeded, Atoll keeps the ones with high importance.
The importance (%) of neighbours depends on the reason of allocation:
For allocation based on distance:
is the distance between the reference cell and the neighbour and is the maximum inter-site distance.
For allocation based on coverage overlapping:
Figure 9.15Inter-Transmitter Distance Calculation
Neighbour cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter/cell If the Force co-site cells as neighbours option is selected 100 %
Neighbour relation that fulfils
distance conditions
If the maximum distance is not exceeded
S
A
S
B

S
A
S
B

S
A
---------------------- 100
S
A
S
B

S
A
---------------------- 100 % Min Covered Area >
1
d
d
max
------------
d d
max
568 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The importance is evaluated using an Importance Function (IF), which takes into account the following factors:
- Co-site factor (C): a Boolean,
- Overlapping factor (O): the percentage of overlapping.
The minimum and maximum importance assigned to each of the above factors can be defined.
The IF evaluates importance as follows:
Where Delta(x) = Max(x) - Min(x)
In the results, Atoll displays only the cells for which it finds new neighbours.
9.4.3 Automatic Frequency Planning
The role of an Automatic Frequency Planning (AFP) tool is to assign frequencies (channels) to cells of a network such that
the overall network performance is optimised. In other words, the interference within the network is reduced as much as
possible. Co-channel interference is the main reason for overall network quality degradation in WiMAX. In order to improve
network performance, the WiMAX AFP tries to minimise co- and adjacent channel interference as much as possible while
respecting any constraints input to it. The main constraints are the resources available for allocation, i.e., the number of
frequencies with which the AFP can work, and the relationships to take into account, i.e., interference matrices,
neighbours, and distance between transmitters.
The AFP is based on a cost function which represents the interference level in the network. The aim of the AFP is to
minimise the cost. The best, or optimum, frequency plan is the one which corresponds to the lowest cost.
The following describes the automatic allocation method for frequencies in WiMAX networks, which takes into account
interference matrices, neighbour relations, and distance between transmitters.
The frequency allocation algorithm takes into account the cells of all the TBC transmitters. The cells to be allocated will be
called TBA cells. They must fulfil the following conditions:
They are active,
Their channel allocation status is not set to locked,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone.
Neighbour cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter/cell If the Force co-site cells as neighbours option is selected IF
Neighbourhood relationship
that fulfils coverage conditions
If the % minimum covered area is exceeded IF
Factor
Min
Importance
Default Value
Max
Importance
Default Value
Overlapping factor (O) Min(O) 1 % Max(O) 60 %
Co-site factor (C) Min(C) 60 % Max(C) 100 %
Co-site Importance Function IF with Default Values
No Min(O) + Delta(O)(O) 1 % + 59 %(O)
Yes Min(C) + Delta(C)(O) 60 % + 40 %(O)
Notes:
If the Min and Max value ranges of the importance function factors do not overlap, the
neighbours will be ranked by neighbour cause. With the default values for minimum and
maximum importance fields, neighbours will be ranked in this order: co-site neighbours and
neighbours allocated based on coverage overlapping.
If the Min and Max value ranges of the importance function factors overlap, the neighbours
may not be ranked by neighbour cause.
The ranking between neighbours from the same category depends on (A) and (O) factors.
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Forsk 2010 AT283_TRG_E2 569
Chapter 9: WiMAX BWA Networks
9.4.3.1 Separation Constraint and Relationship Weights
The AFP algorithm is based on a cost function which takes into account the following separation constraints:
Required channel separation
- For co-site cells: 2 channel bandwidths of the TBA cell.
- For neighbour cells: 1 channel bandwidth of the TBA cell.
The above separation constraints are studied between each TBA cell and its related cells. Atoll calculates the cost
between each individual TBA and related cell, and then the overall cost for the TBA cell.
Related cells of a TBA cell are:
Its neighbours, if the check box "Take Neighbours into Account" is selected,
Assigned weight
Cells that are listed in the interference matrix of the TBA cell,
Assigned weight
Cells within the cells (or the default) minimum reuse distance, if the check box "Take Min Reuse Distance into
Account" is selected,
Assigned weight
9.4.3.2 Calculation of Cost Between TBA and Related Cells
Atoll calculates the separation constraint violation level between the TBA cell TX
i
(ic) and its related cell TX
j
(jc) as follows:
Where is the required separation, and is the actual separation between channels used by
TX
i
(ic) and TX
j
(jc) calculated as follows:
Where is the start frequency of the channel used by TX
j
(jc) calculated as follows:
is the start frequency of the channel used by TX
i
(ic) calculated as follows:
Where and are the start frequencies of the frequency bands assigned to the cells TX
i
(ic) and TX
j
(jc)
respectively. can be the start frequency of a TDD frequency band ( ), or the downlink start
frequency of an FDD frequency band ( ). and are the channel numbers assigned
to cells TX
i
(ic) and TX
j
(jc) respectively. For FDD networks, Atoll considers that the same channel number is assigned to
a cell in the downlink and uplink, i.e., the channel number you assign to a cell is considered for uplink and downlink both.
And, and are the bandwidths of the channels assigned to cells TX
i
(ic) and TX
j
(jc) respectively.
The cost of the relation between the TBA cell and its related cell is calculated next:
Notes:
The sum of the weights assigned to the above relations is 1.
These default weights can be modified through the Atoll.ini file. For more information, see
the Administrator Manual.
A
Req
e
Nei ghbour
0.5 =
e
IM
0.3 =
e
Di s ce tan
0.2 =
VL
Sep
TX
i
i c ( ) TX
j
j c ( )
A
Req
TX
i
i c ( ) TX
j
j c ( )
A
TX
i
i c ( ) TX
j
j c ( )

A
Req
TX
i
i c ( ) TX
j
j c ( )
----------------------------------------------------------------------------------
\ .
|
|
| |
2
if A
TX
i
i c ( ) TX
j
j c ( )
A
Req
TX
i
i c ( ) TX
j
j c ( )
<
0 Otherwi se

=
A
Req
TX
i
i c ( ) TX
j
j c ( )
A
TX
i
i c ( ) TX
j
j c ( )
A
TX
i
i c ( ) TX
j
j c ( )
F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )

W
Channel
TX
i
i c ( )
-------------------------------------------
=
F
Start
TX
j
j c ( )
F
Start
TX
j
j c ( )
F
Start FB
TX
j
j c ( )
N
Channel
TX
j
j c ( )
W
Channel
TX
j
j c ( )
+ =
F
Start
TX
i
i c ( )
F
Start
TX
i
i c ( )
F
Start FB
TX
i
i c ( )
N
Channel
TX
i
i c ( )
W
Channel
TX
i
i c ( )
+ =
F
Start FB
TX
i
i c ( )
F
Start FB
TX
j
j c ( )
F
Start FB
F
Start FB TDD
F
Start FB FDD DL
N
Channel
TX
i
i c ( )
N
Channel
TX
j
j c ( )
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
$
TX
i
i c ( ) TX
j
j c ( )
VL
Sep
TX
i
i c ( ) TX
j
j c ( )
e
Nei ghbour
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
e
Di s ce tan
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
+ ( ) e
IM
i
IM
TX
i
i c ( ) TX
j
j c ( )
+ =
570 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where is the importance of the relationship between the TBA and its related neighbour cell,
is the importance of the relationship between the TBA cell and its related interfering cell, and is the
importance of the relationship between the TBA and its related cell with respect to the distance between them.
is calculated during automatic neighbour allocation by Atoll as explained in "Automatic Neighbour
Allocation" on page 563. For manual neighbour allocation, this value is equal to 1.
is calculated during the interference matrices calculation as follows:
Co-channel interference probability (i.e., for ):
Adjacent channel interference probability (i.e., for :
Otherwise, i.e., for other values of ,
Where is the best server coverage area of the cell TX
i
(ic), that comprises all the pixels where
as calculated in "Service Area Calculation" on page 518. is the best server
coverage area of the cell TX
i
(ic) where the given condition is true. and are the received preamble
signal levels from the cells TX
i
(ic) and TX
j
(jc) respectively, the preamble noise for the cell TX
i
(ic) as calculated
in "Preamble Noise Calculation" on page 514, is the quality margin used for the interference matrices calculation,
and is the adjacent channel suppression factor defined for the frequency band of the cell TX
i
(ic).
In words, is equivalent to a probability of interference calculated by taking the ratio of the interfered surface
area to the total surface area of a cell. Two interference probabilities are calculated for each interfered-interfering cell pair,
i.e., for co-channel and adjacent channel interference.
is calculated by the AFP as follows:
Where is the minimum reuse distance, either defined for each TBA cell individually or set for all the TBA cells in
the AFP dialogue, and is the weighted distance between the TBA cell TX
i
(ic) and its related cell TX
j
(jc)
calculated as follows:
is weighted according to the orientations of the TBA cell and its related cell with respect to the straight line
joining them. is the distance between the two cells considering any offsets with respect to the site locations.
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
=
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 0 =
S
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
10 Log 10
C
Preambl e
TX
j
j c ( )
M
Qual i t y
+
10
------------------------------------------------------------------
10
n
Preambl e
TX
i
i c ( )
10
--------------------------------
+
\ .
|
|
|
|
|
| |
T
Preambl e
TX
i
i c ( )
<
S
TX
i
i c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 1 =
S
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
10 Log 10
C
Preambl e
TX
j
j c ( )
M
Qual i t y
f
ACS FB
TX
i
i c ( )
+ +
10
------------------------------------------------------------------------------------------------------
10
n
Preambl e
TX
i
i c ( )
10
--------------------------------
+
\ .
|
|
|
|
|
| |
T
Preambl e
TX
i
i c ( )
<
S
TX
i
i c ( )
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) i
IM
TX
i
i c ( ) TX
j
j c ( )
0 =
S
TX
i
i c ( )
CNR
Preambl e
TX
i
i c ( )
T
Preambl e
TX
i
i c ( )
> S
TX
i
i c ( )
Condi ti on
C
Preambl e
TX
i
i c ( )
C
Preambl e
TX
j
j c ( )
n
Preambl e
TX
i
i c ( )
M
Qual i ty
f
ACS FB
TX
i
i c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
1 if D
TX
i
i c ( ) TX
j
j c ( )
1 <
Log
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
--------------------------------------
\ .
|
| |
2
\ .
|
| |
Log D
Reuse
2
( )
--------------------------------------------------------------- Otherwi se

=
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
1 x | ( ) cos o ( ) cos 2 ( ) + ( ) =
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
Forsk 2010 AT283_TRG_E2 571
Chapter 9: WiMAX BWA Networks
x is set to 15 % so that the maximum variation in due to the azimuths does not exceed 60 %. and
are calculated from the azimuths of the two cells as shown in Figure 9.18 on page 575.
The above formula implies that two cells facing each other will have a shorter effective distance between them than the
real distance, and two cells pointing in opposite directions will have a greater effective distance.
The importance of the distance relation is explained in Figure 9.19 on page 575. This figure shows that cells that are
located near (based on the effective distance which is weighted by the orientations of the cells) have high importance,
which is interpreted as a high cost, and cells that are located far have low importance. Cells that are further than the reuse
distance do not have any cost related to the distance relation.
Atoll calculates the quality reduction factor for the TBA cell and its related cell from the cost calculated above as follows:
The quality reduction factor is a measure of the cost of an individual relation.
The total cost of the current frequency allocation for any TBA cell is given as follows, considering all the cells with which
the TBA cell has relations:
And, the total cost of the current frequency plan for the entire network is simply the sum of the total TBA cell costs
calculated above, i.e.,
9.4.3.3 AFP Algorithm
The AFP algorithm is an iterative algorithm which:
Calculates the cost (as described above) of the initial frequency plan,
Tries different frequency plans in order to reduce the cost,
Memorises the different frequency plans in order to determine the best one, i.e., the frequency plan which provides
the lowest total cost,
Stops when it is unable to improve the cost of the network, and proposes the last known best frequency plan as
the solution.
9.4.4 Automatic Preamble Index Allocation
IEEE 802.16e defines 114 preamble indexes. Each preamble index, from 0 to 113, contains the following information:
Segment number (0, 1, or 2),
DL PermBase (0 to 31) for the obligatory first DL PUSC zone, and
A pseudo-noise sequence transmitted using the subcarriers corresponding to the preamble carrier set.
Figure 9.16Weighted Distance Between Cells
Figure 9.17Importance Based on Distance Relation
D
TX
i
i c ( ) TX
j
j c ( )
o |
QRF
TX
i
i c ( ) TX
j
j c ( )
1 $
TX
i
i c ( ) TX
j
j c ( )
=
$
Total
TX
i
i c ( )
1 QRF
TX
i
i c ( ) TX
j
j c ( )
TX
j
j c ( )
[
=
$
Total
$
Total
TX
i
i c ( )
TX
i
i c ( )

=
572 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The downlink subframe can be divided into a 3-segment structure, and includes a preamble which begins the transmission
(the first symbol of the downlink transmission). The preamble subcarriers are divided into 3 carrier sets. There are three
possible groups consisting of a carrier set each which may be used by any segment. These are defined by allocation of
different subcarriers to each one of them. The subcarriers are modulated using a BPSK modulation with a specific Pseudo-
Noise (PN) sequence.
Preamble carrier sets are defined using equation below:
Where PreambleCarrierSet
n
gives the subcarriers used by the preamble, n is the number of the preamble carrier set
indexed 0, 1, or 2, k is a running index from 0 to 567 for FFT 2048, from 0 to 283 for FFT 1024, from 0 to 142 for FFT 512,
and from 0 to 35 for FFT 128.
In a WiMAX 802.16e network, each base station transmits a different PN sequence, out of the 114 available, on the
preamble carrier set. A mobile trying to connect to the network scans all the preamble subcarriers, listens to all the
preambles (i.e., PN sequences) from all the base stations it can receive, and compares the PN sequences it is receiving
with the 114 stored in its memory in order to detect the preamble index from the PN sequence.
It selects the base station as its server whose preamble it receives with either the highest signal level or the highest C/
(I+N). Once the best server is known, its PN sequence is used to identify its transmission. The PN sequence of the best
server gives the preamble index, which in turn gives the segment number, and the IDCell (DL PermBase of the first DL
PUSC zone, referred to as Cell PermBase in Atoll). Therefore, the mobile knows which subcarriers to listen to for the FCH,
DCD, UCD, DL-MAP, and UL-MAP.
As can be understood from the above description, if all the cells in the network transmit the same preamble index, the
network will have 100% interference on downlink preambles, and it will be impossible for a mobile to identify different cells.
Cell search and selection will be impossible. Therefore, it is important to intelligently allocate preamble indexes to cells so
as to reduce preamble interference, and allow easy recognition of cells by mobiles.
The following describes the automatic allocation method for preamble indexes in a WiMAX 802.16e network, which takes
into account the distance between transmitters, the frequency plan of the network (i.e., co- and adjacent channel
interference probabilities), and the neighbour relations.
The preamble index allocation algorithm takes into account the cells of all the TBC transmitters. The cells to be allocated
will be called TBA cells. They must fulfil the following conditions:
They are active,
Their status is not set to locked,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone.
9.4.4.1 Constraint and Relationship Weights
The automatic preamble index allocation algorithm is based on a cost-based function which takes into account the
following constraints, in the order of priority:
1. Same preamble index,
Assigned weight
2. Same segment number,
Assigned weight
3. Same cell permbase,
Assigned weight
The above separation constraints are studied between each TBA cell and its related cells. Atoll calculates the cost
between each individual TBA and related cell, and then the overall cost for the TBA cell.
Related cells of a TBA cell are:
Its neighbours, if the check box "Take Neighbours into Account" is selected,
Assigned weight
Neighbours of a TBA cell are also related to each other through the TBA cell. This relation is also taken into
account,
Assigned weight
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Preambl eCarri erSet
n
n k 3 + =
Notes:
The sum of the weights assigned to the above constraints is 1.
These default weights can be modified through the Atoll.ini file. For more information, see
the Administrator Manual.
e
PI
0.6 =
e
Seg
0.38 =
e
PB
0.02 =
e
Nei ghbour
0.35 =
e
Inter Nei ghbour
0.15 =
Forsk 2010 AT283_TRG_E2 573
Chapter 9: WiMAX BWA Networks
You can choose to not take into account the inter-neighbour preamble index collision by adding an option in the
Atoll.ini file (see the Administrator Manual). If inter-neighbour collision is not taken into account, the weight
assigned to the neighbour relation alone is and that of the inter-neighbour collision is of course
.
Cells that are listed in the interference matrix of the TBA cell (available with the AFP module only),
Assigned weight
Cells within the cells (or the default) minimum reuse distance, if the check box "Take Min Reuse Distance into
Account" is selected,
Assigned weight
9.4.4.2 Calculation of Cost Between TBA and Related Cells
Atoll calculates the constraint violation level between the TBA cell TX
i
(ic) and its related cell TX
j
(jc) as follows:
If and are co-transmitter cells, and the option Allocate Same Segment to Co-transmitter Cells has been
selected, and , then . Otherwise,
Where is the total channel overlap ratio between the TX
i
(ic) and TX
j
(jc) as calculated in "Co- and Adjacent
Channel Overlaps Calculation" on page 508, , , and are the weights assigned to the preamble index,
segment number, and cell permbase constraints.
is the preamble index collision probability given by .
is the segment number collision probability. If and are co-transmitter cells, and the option Allocate
Same Segment to Co-transmitter Cells has been selected, is given by .
Otherwise, .
is the cell permbase penalty given by if
the cell permbase allocation strategy is set to "Same per Site", and by if the cell permbase allocation strategy
is set to "Free". The cell permbase penalty models the cell permbase constraint.
Next, Atoll calculates the importance of the relation between the TBA cell and its related cell.
Where is the importance of the relationship between the TBA cell and its related neighbour cell,
is the importance of the relationship between two neighbours of the TBA cell, is the
importance of the relationship between the TBA cell and its related interfering cell (available with the AFP module only),
and is the importance of the relationship between the TBA and its related cell with respect to the distance
between them.
Notes:
The sum of the weights assigned to the above relations is 1.
These default weights can be modified through the Atoll.ini file. For more information, see
the Administrator Manual.
e
Nei ghbour
0.5 =
e
Inter Nei ghbour
0 =
e
IM
0.3 =
e
Di s ce tan
0.2 =
TX
i
i c ( ) TX
j
j c ( )
N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
= VL
TX
i
i c ( ) TX
j
j c ( )
1 =
VL
TX
i
i c ( ) TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
e
PI
p
Col l
PI
e
Seg
p
Col l
Seg
e
PB
p
Penal ty
PB
+ + ( ) =
r
O
TX
i
i c ( ) TX
j
j c ( )
e
PI
e
Seg
e
PB
p
Col l
PI
p
Col l
PI 1 if PI
TX
i
i c ( )
PI
TX
j
j c ( )
=
0 if PI
TX
i
i c ( )
PI
TX
j
j c ( )
=

=
p
Col l
Seg
TX
i
i c ( ) TX
j
j c ( )
p
Col l
Seg
p
Col l
Seg
0 if N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
=
1 if N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
=

=
p
Col l
Seg
1 if N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
=
0 if N
Seg
TX
i
i c ( )
N
Seg
TX
j
j c ( )
=

=
p
Penal ty
PB
p
Penal ty
PB
1 if PB
TX
i
i c ( )
PB
TX
j
j c ( )
= AND Si te
TX
i
i c ( )
Si te
TX
j
j c ( )
=
0.001 if PB
TX
i
i c ( )
PB
TX
j
j c ( )
= AND Si te
TX
i
i c ( )
Si te
TX
j
j c ( )
=
0 Otherwise

=
p
Penal ty
PB
0 =
i
Total
TX
i
i c ( ) TX
j
j c ( )
e
Nei ghbour
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
e
Inter Nei ghbour
i
Inter Nei ghbour
+ +
e
IM
i
IM
TX
i
i c ( ) TX
j
j c ( )
e
Di s ce tan
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
+
=
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
Inter Nei ghbour
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
574 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is calculated during automatic neighbour allocation by Atoll as explained in "Automatic Neighbour
Allocation" on page 563. For manual neighbour allocation, this value is equal to 1.
is calculated from the neighbour relationship importance values calculated during automatic neighbour
allocation. If two neighbours of the TBA cell have the same preamble index assigned, the importance of the inter-neighbour
preamble index collision is the average of their neighbour importance values with the TBA cell. If more than one pair of
neighbours of the TBA cell has the same preamble index assigned, then the importance is the highest value among all the
averages:
Where and are two neighbours of the TBA cell that have the same preamble index
assigned.
is calculated during the interference matrices calculation as follows:
Co-channel interference probability (i.e., for ):
Adjacent channel interference probability (i.e., for :
Otherwise, i.e., for other values of ,
Where is the best server coverage area of the cell TX
i
(ic), that comprises all the pixels where
as calculated in "Service Area Calculation" on page 518. is the best server
coverage area of the cell TX
i
(ic) where the given condition is true. and are the received preamble
signal levels from the cells TX
i
(ic) and TX
j
(jc) respectively, the preamble noise for the cell TX
i
(ic) as calculated
in "Preamble Noise Calculation" on page 514, is the quality margin used for the interference matrices calculation,
and is the adjacent channel suppression factor defined for the frequency band of the cell TX
i
(ic).
In words, is equivalent to a probability of interference calculated by taking the ratio of the interfered surface
area to the total surface area of a cell. Two interference probabilities are calculated for each interfered-interfering cell pair,
i.e., for co-channel and adjacent channel interference.
is calculated by the preamble index allocation algorithm as follows:
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
Inter Nei ghbour
i
Inter Nei ghbour
Max
All Neighbour Pairs
with PI Collisions
i
Nei ghbour
TX
i
i c ( ) TX
j 1
j 1c ( )
i
Nei ghbour
TX
i
i c ( ) TX
j 2
j 2c ( )
+
2
-----------------------------------------------------------------------------------------
\ .
|
| |
=
TX
j 1
j 1c ( ) TX
j 2
j 2c ( ) TX
i
i c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
=
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 0 =
S
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
10 Log 10
C
Preambl e
TX
j
j c ( )
M
Qual i t y
+
10
------------------------------------------------------------------
10
n
Preambl e
TX
i
i c ( )
10
--------------------------------
+
\ .
|
|
|
|
|
| |
T
Preambl e
TX
i
i c ( )
<
S
TX
i
i c ( )
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 1 =
S
TX
i
i c ( )
C
Preambl e
TX
i
i c ( )
10 Log 10
C
Preambl e
TX
j
j c ( )
M
Qual i t y
f
ACS FB
TX
i
i c ( )
+ +
10
------------------------------------------------------------------------------------------------------
10
n
Preambl e
TX
i
i c ( )
10
--------------------------------
+
\ .
|
|
|
|
|
| |
T
Preambl e
TX
i
i c ( )
<
S
TX
i
i c ( )
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) i
IM
TX
i
i c ( ) TX
j
j c ( )
0 =
S
TX
i
i c ( )
CNR
Preambl e
TX
i
i c ( )
T
Preambl e
TX
i
i c ( )
> S
TX
i
i c ( )
Condi ti on
C
Preambl e
TX
i
i c ( )
C
Preambl e
TX
j
j c ( )
n
Preambl e
TX
i
i c ( )
M
Qual i ty
f
ACS FB
TX
i
i c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
1 if D
TX
i
i c ( ) TX
j
j c ( )
1 <
Log
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
--------------------------------------
\ .
|
| |
2
\ .
|
| |
Log D
Reuse
2
( )
--------------------------------------------------------------- Otherwi se

=
Forsk 2010 AT283_TRG_E2 575
Chapter 9: WiMAX BWA Networks
Where is the minimum reuse distance, either defined for each TBA cell individually or set for all the TBA cells in
the automatic allocation dialogue, and is the weighted distance between the TBA cell TX
i
(ic) and its related
cell TX
j
(jc) calculated as follows:
is weighted according to the orientations of the TBA and its related cell with respect to the straight line
joining them. is the distance between the two cells considering any offsets with respect to the site locations.
x is set to 15 % so that the maximum variation in due to the azimuths does not exceed 60 %. and
are calculated from the azimuths of the two cells as shown in Figure 9.18 on page 575.
The above formula implies that two cells facing each other will have a shorter effective distance between them than the
real distance, and two cells pointing in opposite directions will have a greater effective distance.
The importance of the distance relation is explained in Figure 9.19 on page 575. This figure shows that cells that are
located near (based on the effective distance which is weighted by the orientations of the cells) have high importance,
which is interpreted as a high cost, and cells that are located far have low importance. Cells that are further than the reuse
distance do not have any cost related to the distance relation.
From the constraint violation level and the total importance of the relation between the TBA and its related cell, Atoll
calculates the quality reduction factor for the pair as follows:
The quality reduction factor is a measure of the cost of an individual relation.
The total cost of the current preamble index allocation for any TBA cell is given as follows, considering all the cells with
which the TBA cell has relations:
And, the total cost of the current preamble index allocation for the entire network is simply the sum of the total TBA cell
costs calculated above, i.e.,
9.4.4.3 Automatic Allocation Algorithm
The automatic preamble index allocation algorithm is an iterative algorithm which:
Calculates the cost (as described above) of the current preamble index allocation,
Allocates new preamble indexes to cells in order to reduce the costs, and calculates the cost again,
Figure 9.18Weighted Distance Between Cells
Figure 9.19Importance Based on Distance Relation
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
1 x | ( ) cos o ( ) cos 2 ( ) + ( ) =
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
D
TX
i
i c ( ) TX
j
j c ( )
o |
QRF
TX
i
i c ( ) TX
j
j c ( )
1 VL
TX
i
i c ( ) TX
j
j c ( )
i
Total
TX
i
i c ( ) TX
j
j c ( )
=
$
Total
TX
i
i c ( )
1 QRF
TX
i
i c ( ) TX
j
j c ( )
TX
j
j c ( )
[
=
$
Total
$
Total
TX
i
i c ( )
TX
i
i c ( )

=
576 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Memorises the different allocation plans in order to determine the best allocation, i.e., which provides the lowest
total cost.
Chapter 10
LTE Networks
Forsk 2010 AT283_TRG_E2 579
Chapter 10: LTE Networks
10 LTE Networks
This chapter describes all the calculations performed in Atoll LTE documents. The first part of this chapter lists all the input
parameters in the LTE documents, their significance, location in the Atoll GUI, and their usage. It also contains the lists
of the formulas used for the calculations.
The second part describes all the calculation processes, i.e., signal level coverage predictions, point analysis calculations,
signal quality coverage predictions, calculations on subscriber lists, and Monte Carlo simulations. The calculation
algorithms used by these calculation processes are available in the next part.
The third part describes all the calculation algorithms used in all the calculations. These algorithms include the calculation
of signal levels, noise, and interference for downlink and uplink considering power control and MIMO, and the radio
resource management algorithms used by the different available schedulers.
If you are new to LTE, you can also see the Glossary of LTE Terms in the User Manual for information on LTE terms and
concepts, especially in the context of their user in Atoll.
10.1 Definitions and Formulas
The tables in the following subsections list the input and output parameters, and formulas used in simulations and other
computations.
10.1.1 Input
This table lists the input to computations, coverage predictions, and simulations.
Important:
All the calculations are performed on TBC (to be calculated) transmitters. For the definition
of TBC transmitters please refer to "Path Loss Matrices" on page 74.
A cell refers to a transmitter-carrier (TX-c) pair. The cell being studied during a calculation
is referred to as TX
i
(ic) in this chapter.
All the calculation algorithms in this section are described for two types of cells:
- A studied cell (represented by the subscript "i") comprising the studied transmitter TX
i
and
its carrier ic. It is the cell which is currently the focus of the calculation. For example, a victim
cell when calculating the interference it is receiving from other cells.
- Other cells (represented by the subscript "j") comprising the other transmitter TX
j
and its
carrier jc. The other cells in the network can be interfering cells (downlink) or the serving
cells of interfering mobiles (uplink).
All the calculation algorithms in this section are described for two types of receivers:
- M
i
: A pixel (coverage predictions), subscriber (calculations on subscriber lists), or mobile
(Monte Carlo simulations) covered/served by the studied cell TX
i
(ic).
- M
j
: A mobile (Monte Carlo simulations) covered/served by any other cell TX
j
(jc).
Logarithms used in this chapter (Log function) are base-10 unless stated otherwise.
Name Value Unit Description
3GPP parameter (Fixed to 10 ms in Atoll) ms Frame duration
3GPP parameter (Fixed to 180 kHz in Atoll) kHz Width of a resource/frequency block
3GPP parameter (Fixed to 15 kHz in Atoll) kHz Subcarrier width
3GPP parameter (Fixed to 6 in Atoll) None
Number of frequency blocks for SS
and PBCH transmission
3GPP parameter (Fixed to 10 in Atoll) None Number of subframes per frame
3GPP parameter (Fixed to 2 in Atoll) None Number of slots per subframe
K
1.38 x 10
-23
J/K Boltzmanns constant
T 290 K Ambient temperature
Calculation result ( ) dBm/Hz
Power spectral density of thermal
noise
Global parameter None Default cyclic prefix duration
Global parameter SD
Number of PDCCH symbol durations
per subframe
D
Frame
W
FB
AF
N
FB SS PBCH ,
N
SF Frame
N
Sl ots SF
n
0
10 Log K T 1000 ( ) 174 dBm/Hz =
D
CP
N
SD PDCCH
580 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Global parameter RB
Average number of PUCCH frequency
blocks per frame
Global parameter None
Switching point periodicity for TDD
frames
Global parameter dB
Uplink power control adjustment
margin
Global parameter
a
dB
Minimum signal to thermal noise
threshold (interferer cutoff)
Frequency band parameter MHz Channel bandwidth
Frequency band parameter None
First channel number of the frequency
band
Frequency band parameter None
Last channel number of the frequency
band
Frequency band parameter MHz
Start frequency of the TDD frequency
band
Frequency band parameter MHz
DL start frequency of the FDD
frequency band
Frequency band parameter MHz
UL start frequency of the FDD
frequency band
Frequency band parameter MHz Sampling frequency
Frequency band parameter dB Adjacent channel suppression factor
Frequency band parameter None
Number of frequency blocks per
channel bandwidth
Calculation result ( ) None Total number of subcarriers
Calculation result ( ) None Number of used subcarriers
Hard-coded parameter ( ) None Number of DC subcarriers
Calculation result
( )
None Number of guard subcarriers
Bearer parameter None Bearer index
Bearer parameter None Modulation used by the bearer
Bearer parameter None Coding rate of the bearer
Bearer parameter
bits/
symbol
Bearer efficiency
Bearer parameter dB Bearer selection threshold
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
dB Transmitter noise figure
Transmitter parameter None
Number of antenna ports used for
transmission
Transmitter parameter None
Number of antenna ports used for
reception
Transmitter antenna parameter dB Antenna gain
Transmitter parameter (user-defined or calculated from transmitter
equipment characteristics)
dB Transmitter loss
Cell parameter None Cells channel number
Cell parameter None Cells physical ID
Cell parameter None
Cells SSS ID (one of 168 pseudo-
random sequences)
Cell parameter None
Cells PSS ID (one of 3 orthogonal
sequences)
Cell parameter dBm Maximum cell transmission power
N
FB PUCCH
t
TDD
M
PC
CNR
Mi n
W
Channel
N
Channel
Fi rst
N
Channel
Last
F
Start TDD
F
Start FDD DL
F
Start FDD UL
F
Sampl i ng
f
ACS
N
FB
N
SCa Total
N
SCa Total
F
Sampl i ng
AF
------------------------- =
N
SCa Used
N
SCa Used
N
FB
W
FB

AF
---------------------------- =
N
SCa DC
N
SCa DC
1 =
N
SCa Guard
N
SCa Guard
N
SCa Total
N
SCa Used
N
SCa DC
=
B
Mod
B
CR
B
q
B
T
B
nf
TX
N
Ant TX
N
Ant RX
G
TX
L
TX
N
Channel
ID

ID
SSS
ID
PSS
P
Max
Forsk 2010 AT283_TRG_E2 581
Chapter 10: LTE Networks
Cell parameter dBm
Energy per resource element for the
downlink reference signals
(User-defined or calculated)
Cell parameter dB
Energy per resource element offset for
the SS with respect to the downlink
reference signal EPRE
Cell parameter dB
Energy per resource element offset for
the PBCH with respect to the downlink
reference signal EPRE
Cell parameter dB
Energy per resource element offset for
the PDCCH with respect to the
downlink reference signal EPRE
Cell parameter dB
Energy per resource element offset for
the PDSCH with respect to the
downlink reference signal EPRE
Cell parameter dB Minimum Required RSRP
Cell parameter % Downlink traffic load
Cell parameter % Downlink ICIC ratio
Cell parameter % Uplink traffic load
Cell parameter % Maximum downlink traffic load
Cell parameter % Maximum uplink traffic load
Cell parameter dB Uplink noise rise
Cell parameter dB ICIC uplink noise rise
Cell parameter dB Maximum uplink noise rise
Cell parameter None Maximum number of users per cell
Cell parameter dB Adaptive MIMO switch threshold
Cell parameter dB Multi-user MIMO threshold
Cell parameter dB Delta path loss threshold
Cell parameter None
Number of downlink subframes per
frame
Cell parameter None Number of uplink subframes per frame
Cell parameter m
Channel and physical cell ID reuse
distance
Cell parameter None Uplink MU-MIMO gain
Cell parameter None Fractional power control factor
Cell parameter dB Maximum PUSCH C/(I+N)
Cell parameter dB Inter-technology downlink noise rise
Cell parameter dB Inter-technology uplink noise rise
Proportional Fair scheduler parameter None
Downlink multi-user diversity gain
(MUG)
Proportional Fair scheduler parameter None Uplink multi-user diversity gain (MUG)
Proportional Fair scheduler parameter dB
Maximum C/(I+N) above which no
MUG gain is applied
Cell LTE equipment parameter None Maximum uplink SU-MIMO gain
Cell LTE equipment parameter dB Uplink diversity gain
Service parameter None Service priority
Service parameter None
Highest bearer used by a service in
the downlink
EPRE
DLRS
AEPRE
SS
AEPRE
PBCH
AEPRE
PDCCH
AEPRE
PDSCH
T
RSRP
TL
DL
r
DL ICIC
TL
UL
TL
DL Max
TL
UL Max
NR
UL
NR
ICIC UL
NR
UL Max
N
Users Max
T
AMS
T
MU MIMO
AL
Path
N
SF DL
N
SF UL
D
Reuse
G
MU MIMO
o
FPC
CINR
PUSCH Max
NR
DL
Inter Tech
NR
UL
Inter Tech
G
MUG DL
TX
i
i c ( )
G
MUG UL
TX
i
i c ( )
CINR
MUG
Max
G
SU MIMO
Max
G
Di v
UL
p
B
DL Hi ghest
582 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.1.2 Downlink Transmission Powers Calculation
Service parameter None
Highest bearer used by a service in
the uplink
Service parameter % Uplink activity factor for voice services
Service parameter %
Downlink activity factor for voice
services
Service parameter kbps
Minimum throughput demand in the
uplink (Guaranteed Bit Rate, GBR)
Service parameter kbps
Minimum throughput demand in the
downlink (Guaranteed Bit Rate, GBR)
Service parameter kbps
Maximum throughput demand in the
uplink (Maximum Bit Rate, MBR)
Service parameter kbps
Maximum throughput demand in the
downlink (Maximum Bit Rate, MBR)
Service parameter kbps
Average requested throughput in the
uplink
Service parameter kbps
Average requested throughput in the
downlink
Service parameter kbps Throughput offset
Service parameter % Scaling factor
Service parameter dB Body loss
Terminal parameter dBm Minimum terminal power
Terminal parameter dBm Maximum terminal power
Terminal parameter dB Terminal noise figure
Terminal parameter dB Terminal antenna gain
Terminal parameter dB Terminal loss
Terminal parameter None
Number of antenna ports for
transmission
Terminal parameter None Number of antenna ports for reception
Terminal LTE equipment parameter None Maximum downlink SU-MIMO gain
Terminal LTE equipment parameter dB Downlink diversity gain
Clutter parameter dB Additional uplink diversity gain
Clutter parameter dB Additional downlink diversity gain
Clutter parameter None SU-MIMO gain factor
Clutter parameter dB Indoor loss
Propagation model result dB Path loss
Monte Carlo simulations: Random result calculated from model
standard deviation
Coverage Predictions: Result calculated from cell edge coverage
probability and model standard deviation
dB Model Shadowing margin
Coverage Predictions: Result calculated from cell edge coverage
probability and C/I standard deviation
dB C/I Shadowing margin
a. Any interfering cell whose signal to thermal noise ratio is less than will be discarded.
B
UL Hi ghest
f
Act
UL
f
Act
DL
TPD
Mi n UL
TPD
Mi n DL
TPD
Max UL
TPD
Max DL
TP
Average
UL
TP
Average
DL
TP
Offset
f
TP Scal i ng
L
Body
P
Mi n
P
Max
nf
G
L
N
Ant TX
N
Ant RX
G
SU MIMO
Max
G
Di v
DL
AG
Di v
UL
AG
Di v
DL
f
SU MIMO
L
Indoor
L
Path
M
Shadowi ng Model
M
Shadowi ng C I
CNR
Mi n
Name Value Unit Description
None
Number of symbols per scheduler
resource block
None
Number of subcarriers per frequency
block
N
Sym SRB
N
SCa FB
N
SD Sl ot
N
Sl ot SF

N
SCa FB
W
FB
AF
------------
Forsk 2010 AT283_TRG_E2 583
Chapter 10: LTE Networks
None Total number of symbols in downlink
None
Number of symbols reserved for
downlink reference signals in one
scheduler resource block
None
Number of symbols reserved for
downlink reference signals in one
frame
None
Number of symbols for downlink
reference signals in one scheduler
resource block
None
Number of symbols for downlink
reference signals in one frame
Where None
Number of symbols for the PSS and
the SSS
Extended CP:
Normal CP:
None Number of symbols for the PBCH
If :
If :
Otherwise:
None Number of symbols for the PDCCH
None Number of symbols for the PDSCH
dBm/Sym
Energy per resource element for 1
modulation symbol (dBm/Sym) of the
downlink reference signals
dBm/Sym
Energy per resource element for 1
modulation symbol (dBm/Sym) of the
SS
dBm/Sym
Energy per resource element for 1
modulation symbol (dBm/Sym) of the
PBCH
dBm/Sym
Energy per resource element for 1
modulation symbol (dBm/Sym) of the
PDCCH
dBm/Sym
Energy per resource element for 1
modulation symbol (dBm/Sym) of the
PDSCH
N
Sym DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
Sym SRB
N
SF DL
TX
i
i c ( )

N
Res SRB
TX
i
i c ( )
8 if N
Ant TX
TX
i
i c ( )
1 = ( )
16 if N
Ant TX
TX
i
i c ( )
2 = ( )
24 if N
Ant TX
TX
i
i c ( )
4 or 8 = ( )

N
Sym Res
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
Res SRB
TX
i
i c ( )

N
DLRS SRB
TX
i
i c ( )
8 if N
Ant TX
TX
i
i c ( )
1 = ( )
8 if N
Ant TX
TX
i
i c ( )
2 = ( )
6 if N
Ant TX
TX
i
i c ( )
4 or 8 = ( )

N
Sym DLRS
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
DLRS SRB
TX
i
i c ( )

N
Sym SS
N
Sym PSS
N
Sym SSS
+ 288 =
N
Sym PSS
2 N
FB SS PBCH ,
N
SCa FB
144 = =
N
Sym SSS
2 N
FB SS PBCH ,
N
SCa FB
144 = =
N
Sym PBCH
TX
i
i c ( )
4 N
SCa FB

N
Res SRB
TX
i
i c ( )
2
--------------------------
\ .
|
| |
N
FB SS PBCH ,

4 N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( ) N
FB SS PBCH ,

N
Sym PDCCH
TX
i
i c ( )
N
SD PDCCH
0 = 0
N
SD PDCCH
1 = ( ) AND N
Ant TX
TX
i
i c ( )
4 or 8 = ( )
N
SD PDCCH
N
SCa FB
N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )

N
SD PDCCH
N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
----------------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )

N
Sym PDSCH
TX
i
i c ( )
N
Sym DL
TX
i
i c ( )
N
Sym Res
TX
i
i c ( )
N
Sym SS
N
Sym PBCH
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )

EPRE
DLRS
TX
i
i c ( )
10 Log 10
P
Max
TX
i
i c ( )
10
--------------------
N
SD Sl ot
N
Sl ot SF
N
SF DL
TX
i
i c ( )

\ .
|
|
|
| |

10 L og N
Sym DLRS
TX
i
i c ( )
N
Sym SS
10
AEPRE
SS
TX
i
i c ( )
10
--------------------------------------
N
Sym PBCH
10
AEPRE
PBCH
TX
i
i c ( )
10
--------------------------------------
+ +
\

|
N +
Sym PDCCH
10
AEPRE
PDCCH
TX
i
i c ( )
10
-----------------------------------------
N
Sym PDSCH
10
AEPRE
PDSCH
TX
i
i c ( )
10
-----------------------------------------
+
.
|
|
|
|
EPRE
SS
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
SS
TX
i
i c ( )
+
EPRE
PBCH
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
PBCH
TX
i
i c ( )
+
EPRE
PDCCH
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
PDCCH
TX
i
i c ( )
+
EPRE
PDSCH
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
PDSCH
TX
i
i c ( )
+
584 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.1.3 Co- and Adjacent Channel Overlaps Calculation
dBm
Instantaneous transmission power of
the downlink reference signals
dBm
Instantaneous transmission power of
the SS
dBm
Instantaneous transmission power of
the PBCH
dBm
Average transmission power of the
PDCCH
dBm
Average transmission power of the
PDSCH
P
DLRS
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
10 Log 2 N
FB
TX
i
i c ( )
( ) +
P
SS
TX
i
i c ( )
EPRE
SS
TX
i
i c ( )
10 Log N
SCa FB
N
FB SS PBCH ,
( ) +
P
PBCH
TX
i
i c ( )
EPRE
PBCH
TX
i
i c ( )
10 Log N
SCa FB
N
FB SS PBCH ,
( ) +
P
PDCCH
TX
i
i c ( )
EPRE
PDCCH
TX
i
i c ( )
10 Log
N
Sym PDCCH
TX
i
i c ( )
N
SD PDCCH
N
SF DL
TX
i
i c ( )

------------------------------------------------------------
\ .
|
|
| |
+
P
PDSCH
TX
i
i c ( )
EPRE
PDSCH
TX
i
i c ( )
10 Log
N
Sym PDSCH
TX
i
i c ( )
N
SD Sl ot
N
Sl ot SF
N
SD PDCCH
( ) N
SF DL
TX
i
i c ( )

--------------------------------------------------------------------------------------------------------------------
\ .
|
|
| |
+
Name Value Unit Description
MHz
Start frequency for the channel
number assigned to a cell
MHz
End frequency for the channel number
assigned to a cell
MHz Co-channel overlap bandwidth
None Co-channel overlap ratio
MHz
Bandwidth of the lower-frequency
adjacent channel overlap
None
Lower-frequency adjacent channel
overlap ratio
MHz
Bandwidth of the higher-frequency
adjacent channel overlap
None
Higher-frequency adjacent channel
overlap ratio
None Adjacent channel overlap ratio

None Total overlap ratio
F
Start
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst
( ) +
F
End
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst
1 + ( ) +
W
CCO
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( )
r
CCO
TX
i
i c ( ) TX
j
j c ( )
W
CCO
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
---------------------------------------
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
W
Channel
TX
i
i c ( )
, ( )
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
---------------------------------------
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
W
Channel
TX
i
i c ( )
+ , ( ) Max F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( )
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
---------------------------------------
r
ACO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
+
r
O
TX
i
i c ( ) TX
j
j c ( )
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS
TX
i
i c ( )

10
---------------------
+
\ .
|
|
|
| |
if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
>
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS
TX
i
i c ( )

10
---------------------
+
\ .
|
|
|
| |
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------
if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
<
Forsk 2010 AT283_TRG_E2 585
Chapter 10: LTE Networks
10.1.4 Signal Level and Signal Quality Calculations
10.1.4.1 Signal Level Calculation (DL)
Name Value Unit Description
dBm
Received downlink reference signal
level
dBm Downlink reference signals EIRP
dBm Received SS signal level
dBm SS EIRP
dBm Received PBCH signal level
dBm PBCH EIRP
dBm Received PDCCH signal level
dBm PDCCH EIRP
dBm Received PDSCH signal level
dBm PDSCH EIRP
dBm/Sym
Received downlink reference signal
energy per resource element
dBm/Sym
Received SS energy per resource
element
dBm/Sym
Received PBCH energy per resource
element
dBm/Sym
Received PDCCH energy per
resource element
dBm/Sym
Received PDSCH energy per
resource element
dB Path loss
dB Total losses
dB
Cyclic prefix factor, i.e., the ratio of the
useful symbol energy to the total
symbol energy
C
DLRS
TX
i
i c ( ) EIRP
DLRS
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+
EIRP
DLRS
TX
i
i c ( )
P
DLRS
TX
i
i c ( )
G
TX
i
L
TX
i
+
C
SS
TX
i
i c ( ) EIRP
SS
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+
EIRP
SS
TX
i
i c ( )
P
SS
TX
i
i c ( )
G
TX
i
L
TX
i
+
C
PBCH
TX
i
i c ( ) EIRP
PBCH
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+
EIRP
PBCH
TX
i
i c ( )
P
PBCH
TX
i
i c ( )
G
TX
i
L
TX
i
+
C
PDCCH
TX
i
i c ( ) EIRP
PDCCH
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+
EIRP
PDCCH
TX
i
i c ( )
P
PDCCH
TX
i
i c ( )
G
TX
i
L
TX
i
+
C
PDSCH
TX
i
i c ( ) EIRP
PDSCH
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+
EIRP
PDSCH
TX
i
i c ( )
P
PDSCH
TX
i
i c ( )
G
TX
i
L
TX
i
+
E
DLRS
TX
i
i c ( ) EPRE
DLRS
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model

L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+ +
E
SS
TX
i
i c ( ) EPRE
SS
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model

L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+ +
E
PBCH
TX
i
i c ( ) EPRE
PBCH
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model

L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+ +
E
PDCCH
TX
i
i c ( ) EPRE
PDCCH
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model

L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+ +
E
PDSCH
TX
i
i c ( ) EPRE
PDSCH
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model

L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+ +
L
Path L
Model
L
Ant
TX
i
+
L
Total
L
Path
L
TX
i
L
Indoor
M
Shadowi ng Model
+ + + G
TX
i

L
M
i
G
M
i
L
Ant
M
i
+ + L
Body
M
i
+
f
CP
10 Log 7 7.5 ( ) If D
CP
Normal =
10 Log 6 7.5 ( ) If D
CP
Extended =
0 If TX
i
i c ( ) is an interferer
586 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.1.4.2 Noise Calculation (DL)
10.1.4.3 Interference Calculation (DL)
Name Value Unit Description
dBm
Thermal noise for one resource
element
dBm
Downlink noise for one resource
element
Without static downlink ICIC using FFR:
With static downlink ICIC using FFR:
dBm
Downlink reference signals thermal
noise
dBm Downlink reference signals noise
dBm SS thermal noise
dBm SS noise
dBm PBCH thermal noise
dBm PBCH noise
Without static downlink ICIC using FFR:
With static downlink ICIC using FFR:
dBm PDCCH thermal noise
dBm PDCCH noise
Without static downlink ICIC using FFR:
With static downlink ICIC using FFR:
dBm PDSCH thermal noise
dBm PDSCH noise
n
0 Sym
TX
i
i c ( )
n
0
10 Log AF ( ) +
n
Sym
TX
i
i c ( )
n
0 Sym
TX
i
i c ( )
nf
M
i
+
n
0 DLRS
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) +
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000
1
3
---
\ .
| |
+
n
DLRS
TX
i
i c ( )
n
0 DLRS
TX
i
i c ( )
nf
M
i
+
n
0 SS
TX
i
i c ( )
n
0
10 Log N
FB SS PBCH ,
W
FB
1000 ( ) +
n
SS
TX
i
i c ( )
n
0 SS
TX
i
i c ( )
nf
M
i
+
n
0 PBCH
TX
i
i c ( )
n
0
10 Log N
FB SS PBCH ,
W
FB
1000 ( ) +
n
PBCH
TX
i
i c ( )
n
0 PBCH
TX
i
i c ( )
nf
M
i
+
n
0 PDCCH
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) +
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000
1
3
---
\ .
| |
+
n
PDCCH
TX
i
i c ( )
n
0 PDCCH
TX
i
i c ( )
nf
M
i
+
n
0 PDSCH
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) +
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000
1
3
---
\ .
| |
+
n
PDSCH
TX
i
i c ( )
n
0 PDSCH
TX
i
i c ( )
nf
M
i
+
Name Value Unit Description
dBm/Sym
Interfering energy per resource
element (dBm/Sym) received over
downlink reference signals
dBm/Sym
Interfering energy per resource
element (dBm/Sym) received over the
SS and the PBCH
c
DLRS
TX
j
j c ( )
10 Log 10
E
DLRS
TX
j
j c ( )
10
--------------------
N
Sym DLRS
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------- 10
E
PDSCH
TX
j
j c ( )
f
I CI C DL
TX
i
i c ( ) TX
j
j c ( )
+
10
---------------------------------------------------------------------
TL
DL
TX
j
j c ( )
+
\


N
Sym PDSCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
----------------------------------- 10
E
PDCCH
TX
j
j c ( )
10
-----------------------
N
Sym PDCCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------------
.
|
|
|
|
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ + +
c
SS PBCH ,
TX
j
j c ( )
10 Log
10
E
SS
TX
j
j c ( )
10
--------------------
N
Sym SS
10
E
PBCH
TX
j
j c ( )
10
--------------------
N
Sym PBCH
TX
j
j c ( )
+
N
Sym SS
N
Sym PBCH
TX
j
j c ( )
+
-------------------------------------------------------------------------------------------------------------------------
\

1 f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
( ) 10
E
PDSCH
TX
j
j c ( )
10
-----------------------
f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
TL
DL
TX
j
j c ( )

.
|
|
|
|
+
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ +
Forsk 2010 AT283_TRG_E2 587
Chapter 10: LTE Networks
10.1.4.4 C/N Calculation (DL)
10.1.4.5 C/(I+N) Calculation (DL)
dBm/Sym
Interfering energy per resource
element (dBm/Sym) received over the
PDSCH and the PDCCH
dBm/RB
Interfering energy per frequency block
(dBm/RB) received over 1 frequency
block during an OFDM symbol
carrying reference signals
None DC subcarrier shift factor
MHz
Centre frequency of the channel used
by TX
i
(ic)
dB
Interference reduction factor due to
channel overlap
dB
Interference reduction factor due to
static downlink ICIC using fractional
frequency reuse
dB
Interference increment due to more
than one transmission antenna port
c
PDSCH PDCCH ,
TX
j
j c ( )
10 Log 10
E
DLRS
TX
j
j c ( )
10
--------------------
N
Sym DLRS
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------- 10
E
PDSCH
TX
j
j c ( )
f
I CI C DL
TX
i
i c ( ) TX
j
j c ( )
+
10
---------------------------------------------------------------------
TL
DL
TX
j
j c ( )
+
\


N
Sym PDSCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
----------------------------------- 10
E
PDCCH
TX
j
j c ( )
10
-----------------------
N
Sym PDCCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------------
.
|
|
|
|
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ + +
c
RSSI
TX
j
j c ( )
10 Log 10
E
DLRS
TX
j
j c ( )
10
--------------------
2
\


10
E
PDSCH
TX
j
j c ( )
f
I CI C DL
TX
i
i c ( ) TX
j
j c ( )
+
10
---------------------------------------------------------------------
N
Sym PDSCH
TX
j
j c ( )
TL
DL
TX
j
j c ( )
10
E
PDCCH
TX
j
j c ( )
10
-----------------------
N
Sym PDCCH
TX
j
j c ( )
+
N
Sym PDSCH
TX
j
j c ( )
N
Sym PDSCH
TX
j
j c ( )
+
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 10 +
.
|
|
|
|
|
|
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ +
f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
Mi n 1
F
Centre
TX
i
i c ( )
F
Centre
TX
j
j c ( )

N
FB SS PBCH ,
W
FB

-------------------------------------------------------
,
\ .
|
| |
F
Centre
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst TX
i
i c ( )

1
2
--- +
\ .
| |
+
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( )
f
ICIC DL
TX
i
i c ( ) TX
j
j c ( )
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( )
f
MIMO
TX
j
j c ( )
10 Log N
Ant TX
TX
j
j c ( )
( )
Name Value Unit Description
dB Downlink reference signals C/N
dB SS C/N
dB PBCH C/N
dB PDCCH C/N
With Transmit Diversity:
With AMS or :
dB PDSCH C/N
CNR
DLRS
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
n
Sym
TX
i
i c ( )

CNR
SS
TX
i
i c ( )
E
SS
TX
i
i c ( )
n
Sym
TX
i
i c ( )

CNR
PBCH
TX
i
i c ( )
E
PBCH
TX
i
i c ( )
n
Sym
TX
i
i c ( )

CNR
PDCCH
TX
i
i c ( )
E
PDCCH
TX
i
i c ( )
n
Sym
TX
i
i c ( )

CNR
PDSCH
TX
i
i c ( )
E
PDSCH
TX
i
i c ( )
n
Sym
TX
i
i c ( )

CNR
PDSCH
TX
i
i c ( )
CNR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + =
if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CNR
PDSCH
TX
i
i c ( )
CNR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + =
Name Value Unit Description
dB Downlink reference signals C/(I+N)
CINR
DLRS
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
10 Log 10
c
DLRS
TX
j
j c ( )
10
-------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

588 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
dB SS C/(I+N)
dB PBCH C/(I+N)
dB PDCCH C/(I+N)
With Transmit Diversity:
With AMS or :
dB PDSCH C/(I+N)
dB
Reference signal received quality
(RSRQ)
dBm Received signal strength indicator
(RSSI)
dBm
Downlink reference signals total noise
(I+N)
dBm SS and PBCH total noise (I+N)
dBm PDSCH and PDCCH total noise (I+N)
CINR
SS
TX
i
i c ( )
E
SS
TX
i
i c ( )
10 Log 10
c
SS PBCH ,
TX
j
j c ( )
10
---------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

CINR
PBCH
TX
i
i c ( )
E
PBCH
TX
i
i c ( )
10 Log 10
c
SS PBCH ,
TX
j
j c ( )
10
---------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

CINR
PDCCH
TX
i
i c ( )
E
PDCCH
TX
i
i c ( )
10 Log 10
c
PDSCH PDCCH ,
TX
j
j c ( )
10
-------------------------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

CINR
PDSCH
TX
i
i c ( )
E
PDSCH
TX
i
i c ( )
10 Log 10
c
PDSCH PDCCH ,
TX
j
j c ( )
10
-------------------------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |

CINR
PDSCH
TX
i
i c ( )
CINR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + =
if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
PDSCH
TX
i
i c ( )
CINR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + =
RSRQ
TX
i
i c ( )
10 Log N
FB
TX
i
i c ( )
( ) E
DLRS
TX
i
i c ( )
RSSI
TX
i
i c ( )
+
RSSI
TX
i
i c ( )
10 Log 10
E
DLRS
TX
i
i c ( )
10
--------------------
2
10
E
PDSCH
TX
i
i c ( )
10
-----------------------
N
Sym PDSCH
TX
i
i c ( )
TL
DL
TX
i
i c ( )
10
E
PDCCH
TX
i
i c ( )
10
-----------------------
N
Sym PDCCH
TX
i
i c ( )
+
N
Sym PDSCH
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )
+
------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 10 +
\ .
|
|
|
|
|
| |
N
Ant TX
TX
i
i c ( )

10
c
RSSI
TX
j
j c ( )
10
-------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
12 + +
.
|
|
|
|
NR
DL
Inter Tech
10 Log N
FB
TX
i
i c ( )
( ) + +
I N + ( )
DLRS
TX
i
i c ( )
10 Log 10
c
DLRS
TX
j
j c ( )
10
-------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |

NR
DL
Inter Tech
10 Log 2 N
FB
TX
i
i c ( )
( ) + +
I N + ( )
SS PBCH ,
TX
i
i c ( )
10 Log 10
c
SS PBCH ,
TX
j
j c ( )
10
---------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |

NR
DL
Inter Tech
10 Log N
SCa FB
N
FB SS PBCH ,
( ) + +
I N + ( )
PDSCH PDCCH ,
TX
i
i c ( )
10 Log 10
c
PDSCH PDCCH ,
TX
j
j c ( )
10
-------------------------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |

NR
DL
Inter Tech
10 Log
N
Sym PDSCH
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )
+
N
SD Sl ot
N
Sl ot SF
N
SF DL
TX
i
i c ( )

-------------------------------------------------------------------------------
\ .
|
|
| |
+ +
Forsk 2010 AT283_TRG_E2 589
Chapter 10: LTE Networks
10.1.4.6 Signal Level Calculation (UL)
10.1.4.7 Noise Calculation (UL)
10.1.4.8 Interference Calculation (UL)
10.1.4.9 Noise Rise Calculation (UL)
Name Value Unit Description
dBm Nominal PUSCH power
dBm
Maximum allowed transmission power
of a user equipment

dBm
Received PUSCH and PUCCH signal
level
With without power control adjustment and
after power control adjustment
dBm
PUSCH and PUCCH EIRP of a user
equipment
dB
Cyclic prefix factor, i.e., the ratio of the
useful symbol energy to the total
symbol energy
P
O_PUSCH
TX
i
i c ( )
CINR
PUSCH Max
TX
i
i c ( )
NR
UL
TX
i
i c ( )
n
PUSCH PUCCH ,
TX
i
i c ( )
10 Log N
FB
TX
i
i c ( )
( ) + +
P
Al l owed
M
i
Mi n P
Max
M
i
10 Log N
FB
TX
i
i c ( )
( ) P
O_PUSCH
TX
i
i c ( )
o
FPC
TX
i
i c ( )
L
Total
+ + ,
)
`

C
PUSCH PUCCH ,
M
i
EIRP
PUSCH PUCCH ,
M
i
L
Path
M
Shadowi ng Model
L
Indoor
G
TX
i
L
TX
i
L
Ant
M
i
L
Body
M
i
f
CP
+
+
EIRP
PUSCH PUCCH ,
M
i
P
M
i
G
M
i
L
M
i
+
P
M
i
P
Al l owed
M
i
=
P
M
i
P
Eff
M
i
=
f
CP
10 Log 7 7.5 ( ) If D
CP
Normal =
10 Log 6 7.5 ( ) If D
CP
Extended =
0 If M
i
is an interferer
Name Value Unit Description
dBm PUSCH and PUCCH thermal noise
dBm PUSCH and PUCCH noise
n
0 PUSCH PUCCH ,
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) +
n
PUSCH PUCCH ,
TX
i
i c ( )
n
0 PUSCH PUCCH ,
TX
i
i c ( )
nf
TX
i
i c ( )
+
Name Value Unit Description

dBm
Received PUSCH and PUCCH
interference
dB
Interference reduction factor due to
the co- and adjacent channel overlap
dB
Interference reduction factor due to
the interfering mobiles uplink traffic
load
dB
Interference reduction factor due to
static uplink ICIC using fractional
frequency reuse
I
PUSCH PUCCH ,
M
j
C
PUSCH PUCCH ,
M
j
f
O
TX
i
i c ( ) TX
j
j c ( )
f
TL UL
M
j
f
ICIC UL
TX
i
i c ( ) TX
j
j c ( )
+ + +
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( )
f
TL UL
M
j
10 Log TL
UL
M
j
( )
f
ICIC UL
TX
i
i c ( ) TX
j
j c ( )
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( )
Name Value Unit Description

dB
Uplink noise rise for any mobile M
i

covered by the non-ICIC zone in the
interfered cell TX
i
(ic)
NR
UL
TX
i
i c ( )
10 Log 10
I
PUSCH PUCCH ,
M
j
non-ICIC M
i

10
----------------------------------------------------------------------------
\ .
|
|
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
PUSCH PUCCH ,
TX
i
i c ( )
10
--------------------------------------------
+
\ .
|
|
|
|
|
|
| |
NR
UL
Inter Tech
+

n
PUSCH PUCCH ,
TX
i
i c ( )

590 AT283_TRG_E2 Forsk 2010


Technical Reference Guide
10.1.4.10 C/N Calculation (UL)
10.1.4.11 C/(I+N) Calculation (UL)
10.1.5 Throughput Calculation
10.1.5.1 Calculation of Downlink Cell Resources
dB
Uplink noise rise for any mobile M
i

covered by the ICIC zone in the
interfered cell TX
i
(ic)
For any mobile M
i
covered by the non-ICIC zone in the interfered cell
TX
i
(ic):
For any mobile M
i
covered by the ICIC zone in the interfered cell
TX
i
(ic):
dBm PUSCH and PUCCH total noise (I+N)
NR
ICIC UL
TX
i
i c ( )
10 Log 10
I
PUSCH PUCCH ,
M
j
ICIC M
i

10
------------------------------------------------------------------
\ .
|
|
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
PUSCH PUCCH ,
TX
i
i c ( )
10
--------------------------------------------
+
\ .
|
|
|
|
|
|
| |
NR
UL
Inter Tech
+

n
PUSCH PUCCH ,
TX
i
i c ( )

I N + ( )
PUSCH PUCCH ,
TX
i
i c ( )
NR
UL
TX
i
i c ( )
n
PUSCH PUCCH ,
TX
i
i c ( )
+
NR
ICIC UL
TX
i
i c ( )
n
PUSCH PUCCH ,
TX
i
i c ( )
+
Name Value Unit Description
With Receive Diversity:
With AMS or :
dB PUSCH and PUCCH C/N
CNR
PUSCH PUCCH ,
M
i
C
PUSCH PUCCH ,
M
i
n
PUSCH PUCCH ,
TX
i
i c ( )

CNR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + =
if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CNR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + =
Name Value Unit Description
For any mobile M
i
covered by the non-ICIC zone in the interfered cell
TX
i
(ic):
For any mobile M
i
covered by the ICIC zone in the interfered cell
TX
i
(ic):
With Receive Diversity:
With AMS or :
dB PUSCH and PUCCH C/(I+N)
dBm
Effective transmission power of a user
equipment after power control
adjustment
CINR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
NR
UL
TX
i
i c ( )

CNR
PUSCH PUCCH ,
M
i
NR
ICIC UL
TX
i
i c ( )

CINR
PUSCH PUCCH ,
M
i
CINR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + =
if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
PUSCH PUCCH ,
M
i
CINR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + =
P
Eff
M
i
Max P
Al l owed
M
i
CINR
PUSCH PUCCH ,
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+
\ .
| |

\ .
| |
P
Mi n
M
i
,
\ .
| |
Name Value Unit Description
None
Number of modulation symbols per
scheduler resource block
None
Number of subcarriers per frequency
block

None
Total number of modulation symbols
in downlink
N
Sym SRB
N
SCa FB
N
SD Sl ot
N
Sl ot SF

N
SCa FB
W
FB
AF
------------
N
Sym DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
Sym SRB
N
SF DL
TX
i
i c ( )

Forsk 2010 AT283_TRG_E2 591


Chapter 10: LTE Networks
10.1.5.2 Calculation of Uplink Cell Resources
None
Number of PDSCH modulation
symbols
Where
None Downlink reference signals overhead
None PSS overhead
None SSS overhead
Extended CP:
Normal CP:
None PBCH overhead
If : 0
If :
Otherwise:
None PDCCH overhead
R
DL
TX
i
i c ( )
N
Sym DL
TX
i
i c ( )
O
DLRS
TX
i
i c ( )
O
PSS
O
SSS
O
PBCH
TX
i
i c ( )
O
PDCCH
TX
i
i c ( )

O
DLRS
TX
i
i c ( )
N
DLRS SRB
TX
i
i c ( )
N
Sym SRB
------------------------------
\ .
|
| |
N
Sym DL
TX
i
i c ( )

N
DLRS SRB
TX
i
i c ( )
8 if N
Ant TX
TX
i
i c ( )
1 = ( )
16 if N
Ant TX
TX
i
i c ( )
2 = ( )
24 if N
Ant TX
TX
i
i c ( )
4 or 8 = ( )

=
O
PSS
2 N
FB SS PBCH ,
N
SCa FB
144 =
O
SSS
2 N
FB SS PBCH ,
N
SCa FB
144 =
O
PBCH
TX
i
i c ( )
4 N
SCa FB

N
Res SRB
TX
i
i c ( )
2
--------------------------
\ .
|
| |
N
FB SS PBCH ,

4 N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( ) N
FB SS PBCH ,

O
PDCCH
TX
i
i c ( )
N
SD PDCCH
0 =
N
SD PDCCH
1 = ( ) AND N
Ant TX
TX
i
i c ( )
4 or 8 = ( )
N
SD PDCCH
N
SCa FB
N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )

N
SD PDCCH
N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
----------------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )

Name Value Unit Description


None
Number of modulation symbols per
scheduler resource block
None
Number of subcarriers per frequency
block
None
Total number of modulation symbols
in uplink
None
Nnumber of PUSCH modulation
symbols
None
Uplink sounding reference signal
overhead
None
Uplink demodulation reference signal
overhead
N
Sym SRB
N
SCa FB
N
SD Sl ot
N
Sl ot SF

N
SCa FB
W
FB
AF
------------
N
Sym UL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
FB PUCCH
( ) N
Sym SRB
N
SF UL
TX
i
i c ( )

R
UL
TX
i
i c ( )
N
Sym UL
TX
i
i c ( )
O
ULSRS
TX
i
i c ( )
O
ULDRS
TX
i
i c ( )

O
ULSRS
TX
i
i c ( )
N
SCa FB
N
Sym SRB
--------------------------- N
Sym UL
TX
i
i c ( )

O
ULDRS
TX
i
i c ( )
2
N
SCa FB
N
Sym SRB
--------------------------- N
Sym UL
TX
i
i c ( )

592 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.1.5.3 Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation
Name Value Unit Description
Without static downlink ICIC using FFR:
With static downlink ICIC using FFR:
With MIMO (SU-MIMO):
With MIMO (AMS):
if or
kbps
Downlink peak RLC channel
throughput
kbps
Downlink effective RLC channel
throughput
kbps
Downlink application channel
throughput
kbps Downlink peak RLC cell capacity
kbps Downlink effective RLC cell capacity
kbps Downlink application cell capacity
With MIMO (SU-MIMO):
With MIMO (AMS):
if or
With MIMO (MU-MIMO) in uplink throughput coverage predictions:
kbps Uplink peak RLC channel throughput
kbps
Uplink effective RLC channel
throughput
kbps Uplink application channel throughput
kbps Uplink peak RLC cell capacity
kbps Uplink effective RLC cell capacity
kbps Uplink application cell capacity
kbps
Uplink peak RLC allocated bandwidth
throughput
CTP
P DL
M
i
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
-------------------------------------
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
-------------------------------------
1
3
---
q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
> CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CTP
E DL
M
i
CTP
P DL
M
i
1 BLER B
DL
M
i
( ) ( )
CTP
A DL
M
i
CTP
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

Cap
P DL
M
i
CTP
P DL
M
i
TL
DL Max
TX
i
i c ( )

Cap
E DL
M
i
Cap
P DL
M
i
1 BLER B
DL
M
i
( ) ( )
Cap
A DL
M
i
Cap
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

CTP
P UL
M
i
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
-------------------------------------
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
> CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
------------------------------------- G
MU MIMO
TX
i
i c ( )

CTP
E UL
M
i
CTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( )
CTP
A UL
M
i
CTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

Cap
P UL
M
i
CTP
P UL
M
i
TL
UL Max
TX
i
i c ( )

Cap
E UL
M
i
Cap
P UL
M
i
1 BLER B
UL
M
i
( ) ( )
Cap
A UL
M
i
Cap
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

ABTP
P UL
M
i
CTP
P UL
M
i
N
FB UL
M
i
N
FB
TX
i
i c ( )
---------------------
Forsk 2010 AT283_TRG_E2 593
Chapter 10: LTE Networks
10.1.6 Scheduling and Radio Resource Management
kbps
Uplink effective RLC allocated
bandwidth throughput
kbps
Uplink application allocated bandwidth
throughput
ABTP
E UL
M
i
ABTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( )
ABTP
A UL
M
i
ABTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i

Name Value Unit Description


None
Resources allocated to a mobile to
satisfy its minimum throughput
demand in downlink
None
Resources allocated to a mobile to
satisfy its minimum throughput
demand in uplink
None
Remaining downlink cell resources
after allocation for minimum
throughput demands
None
Remaining uplink cell resources after
allocation for minimum throughput
demands
kbps
Remaining throughput demand for a
mobile in downlink
kbps
Remaining throughput demand for a
mobile in uplink
kbps
Downlink peak channel throughput
with multi-user diversity gain
(Proportional Fair)
kbps
Uplink peak channel throughput with
multi-user diversity gain
(Proportional Fair)
None
Remaining resource demand for a
mobile in downlink
None
Remaining resource demand for a
mobile in uplink
Proportional Fair:
Round Robin:
Proportional Demand:
Max C/I:
None
Resources allocated to a mobile to
satisfy its maximum throughput
demand in downlink
R
Mi n DL
M
i
Sel TPD
Mi n DL
M
i
Sel
CTP
P DL
M
i
Sel
-------------------------------
R
Mi n UL
M
i
Sel TPD
Mi n UL
M
i
Sel
CTP
P UL
M
i
Sel
-------------------------------
R
Rem DL
TX
i
i c ( ) TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

R
Rem UL
TX
i
i c ( ) TL
UL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

TPD
Rem DL
M
i
Sel
TPD
Max DL
M
i
Sel
TPD
Mi n DL
M
i
Sel

TPD
Rem UL
M
i
Sel
TPD
Max UL
M
i
Sel
TPD
Mi n UL
M
i
Sel

CTP
P DL
M
i
Sel
CTP
P DL
M
i
Sel
Without MUG
G
MUG DL
TX
i
i c ( )

CTP
P UL
M
i
Sel
CTP
P UL
M
i
Sel
Without MUG
G
MUG UL
TX
i
i c ( )

RD
Rem DL
M
i
Sel TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
---------------------------------
RD
Rem UL
M
i
Sel TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
---------------------------------
R
Max DL
M
i
Sel
Mi n RD
Rem DL
M
i
Sel
R
Rem DL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
Mi n RD
Rem DL
M
i
Sel
R
Rem DL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
R
Eff Rem DL
TX
i
i c ( ) RD
Rem DL
M
i
Sel
RD
Rem DL
M
i
Sel
M
i
Sel

----------------------------------------
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
---------------------------------
594 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.1.6.1 User Throughput Calculation
10.2 Calculation Processes
The following sections describe the processes of different calculations performed in Atoll and their results.
10.2.1 Point Analysis: Profile Tab
The point analysis profile tab displays the following calculation results for the selected transmitter based on the calculation
algorithm described in "Signal Level Calculation (DL)" on page 620.
Downlink reference signal level
Path loss
Total losses
, , , , and are not used in the calculations performed for the profile tab.
Proportional Fair:
Round Robin:
Proportional Demand:
Max C/I:
None
Resources allocated to a mobile to
satisfy its maximum throughput
demand in uplink
None
Effective remaining downlink
resources in a cell
(Proportional Demand)
None
Effective remaining uplink resources
in a cell
(Proportional Demand)
None
Total resources assigned to a mobile
in downlink
(Downlink traffic load of the mobile)
None
Total resources assigned to a mobile
in uplink
(Uplink traffic load of the mobile)
R
Max UL
M
i
Sel
Mi n RD
Rem UL
M
i
Sel
R
Rem UL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
Mi n RD
Rem DL
M
i
Sel
R
Rem DL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
R
Eff Rem UL
TX
i
i c ( ) RD
Rem UL
M
i
Sel
RD
Rem UL
M
i
Sel
M
i
Sel

----------------------------------------
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
---------------------------------
R
Eff Rem DL
TX
i
i c ( )
Mi n R
Rem DL
TX
i
i c ( )
RD
Rem DL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
R
Eff Rem UL
TX
i
i c ( )
Mi n R
Rem UL
TX
i
i c ( )
RD
Rem UL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
TL
DL
M
i
Sel
R
DL
M
i
Sel
= R
Mi n DL
M
i
Sel
R
Max DL
M
i
Sel
+
TL
UL
M
i
Sel
R
UL
M
i
Sel
= R
Mi n UL
M
i
Sel
R
Max UL
M
i
Sel
+
Name Value Unit Description
kbps Downlink peak RLC user throughput
kbps
Downlink effective RLC user
throughput
kbps Downlink application user throughput
kbps Uplink peak RLC user throughput
kbps Uplink effective RLC user throughput
kbps Uplink application user throughput
UTP
P DL
M
i
Sel
R
DL
M
i
Sel
CTP
P DL
M
i
Sel

UTP
E DL
M
i
Sel
UTP
P DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |

UTP
A DL
M
i
Sel
UTP
E DL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel

UTP
P UL
M
i
Sel
R
UL
M
i
Sel
CTP
P UL
M
i
Sel

UTP
E UL
M
i
Sel
UTP
P UL
M
i
Sel
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |

UTP
A UL
M
i
Sel
UTP
E UL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel

C
DLRS
TX
i
i c ( )
L
Path
L
Total
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
f
CP
Forsk 2010 AT283_TRG_E2 595
Chapter 10: LTE Networks
10.2.2 Point Analysis: Reception Tab
Analysis provided in the Reception tab is based on path loss matrices. So, you can display received downlink reference
signal levels from the cells for which calculated path loss matrices are available. For each cell, Atoll displays the received
RSRP or signal levels for the downlink reference signals, SS, or PDSCH.
Reception level bar graphs show the signal levels or RSRP in decreasing order. The maximum number of bars in the graph
depends on the downlink reference signal level of the best server. The bar graph displays cells whose received RSRP are
higher than their minimum RSRP thresholds and are within a 30 dB margin from the highest RSRP.
You can use a value other than 30 dB for the margin from the highest downlink reference signal level, for example a smaller
value for improving the calculation speed. For more information on defining a different value for this margin, see the
Administrator Manual.
The Reception tab calculates:
The RSRP and RS, SS, PBCH, PDCCH, and PDSCH signal levels from cells as explained in "Signal Level
Calculation (DL)" on page 620.
The RSSI, RSRQ, RS C/(I+N), SS C/(I+N), and PDSCH C/(I+N), and the RS, SS & PBCH, and PDCCH & PDSCH
total noise (I+N) as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630.
The best server as explained in "Best Server Determination" on page 644.
The service availability as explained in "Service Area Calculation" on page 645.
The PUSCH and PUCCH signal level as explained in "Signal Level Calculation (UL)" on page 634.
The PUSCH and PUCCH C/(I+N) and total noise (I+N) as explained in "C/(I+N) and Bearer Calculation (UL)" on
page 641.
The downlink and uplink bearers as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630 and "C/(I+N)
and Bearer Calculation (UL)" on page 641.
The different throughputs as explained in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
10.2.3 Point Analysis: Interference Tab
Analysis provided in the Interference tab is based on path loss matrices. So, you can display the received signal level from
the best server and interfering signal levels from other cells for which calculated path loss matrices are available. For each
cell, Atoll displays the best server RS, SS, or PDSCH signal level, and interference from other cells.
Ten interferer bar graphs are displayed by default. This number can be changed through the Atoll.ini file. For more
information on defining a different number of interferers, see the Administrator Manual.
The Interference tab calculates:
The RS, SS, PBCH, PDCCH, and PDSCH signal levels as explained in "Signal Level Calculation (DL)" on
page 620.
The RS, SS, PBCH, PDCCH, and PDSCH C/(I+N) as explained in "C/(I+N) and Bearer Calculation (DL)" on
page 630.
The RS, SS & PBCH, and PDCCH & PDSCH total noise (I+N) as explained in "C/(I+N) and Bearer Calculation
(DL)" on page 630.
The best server as explained in "Best Server Determination" on page 644.
The service availability as explained in "Service Area Calculation" on page 645.
The channel overlap as explained in "Co- and Adjacent Channel Overlaps Calculation" on page 584.
The collision probability due to ICIC as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630.
The interference reduction due to the downlink traffic load as explained in "C/(I+N) and Bearer Calculation (DL)"
on page 630.
10.2.4 Downlink Reference Signal Level Coverage Predictions
The following coverage predictions are based on the received downlink reference signal levels:
Coverage by Transmitter
Coverage by Signal Level
Overlapping Zones
These coverage predictions do not depend on the traffic input. Therefore, these calculations are of special interest before
and during the deployment stage of the network to study the coverage footprint of the system.
For these calculations, Atoll calculates the received downlink reference signal level ( ) as explained in "Signal
Level Calculation (DL)" on page 620. Then, Atoll determines the selected display criterion on each pixel inside the cells
calculation area. Each pixel within the calculation area of TX
i
(ic) is considered a non-interfering receiver.
, , , and are not considered in the calculations performed for the downlink signal level based coverage
predictions.
Coverage prediction parameters to be set are:
The coverage prediction conditions to determine the coverage area of each studied cell, and
The display settings to colour the coverage areas.
C
DLRS
TX
i
i c ( )
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
596 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The following sections describe the determination of coverage area of each cell ("Coverage Area Determination" on
page 596), and the display options ("Coverage Display" on page 596) of the coverage predictions.
10.2.4.1 Coverage Area Determination
Atoll uses parameters entered in the Condition tab of the coverage prediction properties dialogue to determine coverage
areas to display. There are three possibilities.
10.2.4.1.1 All Servers
The coverage area of each cell TX
i
(ic) corresponds to the pixels where.
10.2.4.1.2 Best Signal Level and a Margin
The coverage area of each cell TX
i
(ic) corresponds to the pixels where.
AND
Where M is the specified margin (dB). The Best function considers the highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received downlink reference signal level from TX
i
(ic) is the highest.
If M = 2 dB, Atoll considers pixels where the received downlink reference signal level from TX
i
(ic) is either the
highest or within a 2 dB margin from the highest
If M = -2 dB, Atoll considers pixels where the received downlink reference signal level from TX
i
(ic) is 2 dB higher
than the received downlink reference signal levels from the cells which are 2
nd
best servers
10.2.4.1.3 Second Best Signal Level and a Margin
The coverage area of each cell TX
i
(ic) corresponds to the pixels where.
AND
Where M is the specified margin (dB). The 2
nd
Best function considers the second highest value from a list of values.
If M = 0 dB, Atoll considers pixels where the received downlink reference signal level from TX
i
(ic) is the second
highest.
If M = 2 dB, Atoll considers pixels where the received downlink reference signal level from TX
i
(ic) is either the
second highest or within a 2 dB margin from the second highest.
If M = -2 dB, Atoll considers pixels where the received downlink reference signal level from TX
i
(ic) is 2 dB higher
than the received downlink reference signal levels from the cells which are 3
rd
best servers.
10.2.4.2 Coverage Display
10.2.4.2.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
10.2.4.2.2 Display Types
It is possible to display the coverage predictions with colours depending on any transmitter or cell attribute, and other
criteria such as:
Signal Level (dBm, dBV, dBV/m)
Atoll calculates downlink reference signal levels received from cells on each pixel of the cells coverage areas. A pixel of
a coverage area is coloured if the downlink reference signal level exceeds ( ) the defined minimum thresholds (pixel
colour depends on the downlink reference signal level). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as cell coverage areas. Each layer shows the different
downlink reference signal levels received in the cell coverage area.
Mi ni mumThreshol d C
DLRS
TX
i
i c ( )
or L
Total
TX
i
i c ( )
or L
Path
TX
i
i c ( )
( ) s Maxi mumThreshol d <
Mi ni mumThreshol d C
DLRS
TX
i
i c ( )
or L
Total
TX
i
i c ( )
or L
Path
TX
i
i c ( )
( ) s Maxi mumThreshol d <
C
DLRS
TX
i
i c ( )
Best
j i =
C
DLRS
TX
j
j c ( )
( ) M >
Mi ni mumThreshol d C
DLRS
TX
i
i c ( )
or L
Total
TX
i
i c ( )
or L
Path
TX
i
i c ( )
( ) s Maxi mumThreshol d <
C
DLRS
TX
i
i c ( )
2
nd
Best
j i =
C
DLRS
TX
j
j c ( )
( ) M >
>
Forsk 2010 AT283_TRG_E2 597
Chapter 10: LTE Networks
Best Signal Level (dBm, dBV, dBV/m)
Atoll calculates downlink reference signal levels received from cells on each pixel of the cells coverage areas. Where
other coverage areas overlap the studied one, Atoll chooses the highest value. A pixel of a coverage area is coloured if
the downlink reference signal level exceeds ( ) the defined thresholds (pixel colour depends on the downlink reference
signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There
are as many layers as defined thresholds. Each layer corresponds to an area where the downlink reference signal level
from the best server exceeds a defined threshold.
Path Loss (dB)
Atoll calculates path losses from cells on each pixel of the cells coverage areas. A pixel of a coverage area is coloured if
the path loss exceeds ( ) the defined minimum thresholds (pixel colour depends on the path loss). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as cell coverage
areas. Each layer shows different path loss levels in the cells coverage area.
Total Losses (dB)
Atoll calculates total losses from cells on each pixel of the cells coverage areas. A pixel of a coverage area is coloured if
total losses exceed ( ) the defined minimum thresholds (pixel colour depends on the total losses). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as cell coverage
areas. Each layer shows different total losses levels in the cells coverage areas.
Best Server Path Loss (dB)
Atoll calculates downlink reference signal levels received from cells on each pixel of the cells coverage areas. Where
other coverage areas overlap the studied one, Atoll determines the best cell (i.e., the cell with the highest downlink
reference signal level) and evaluates the path loss from this cell. A pixel of a coverage area is coloured if the path loss
exceeds ( ) the defined thresholds (pixel colour depends on the path loss). Coverage consists of several independent
layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the path loss from the best server exceeds a defined threshold.
Best Server Total Losses (dB)
Atoll calculates downlink reference signal levels received from cells on each pixel of the cells coverage areas. Where
other coverage areas overlap the studied one, Atoll determines the best cell (i.e., the cell with the highest downlink
reference signal level) and evaluates the total losses from this cell. A pixel of a coverage area is coloured if the total losses
exceed ( ) the defined thresholds (pixel colour depends on the total losses). Coverage consists of several independent
layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the total losses from the best server exceed a defined threshold.
Number of Servers
Atoll evaluates the number of cells that cover a pixel (i.e., the pixel falls within the coverage areas of these cells). The
pixel colour depends on the number of servers. Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where
the number of servers exceeds ( ) a defined threshold.
10.2.5 Effective Signal Analysis Coverage Predictions
The following coverage predictions are based on the received downlink reference signal, SS, PDSCH, and PUSCH and
PUCCH signal levels and noise, and take into account the receiver characteristics ( , , , and ) when
calculating the required parameter:
Effective Signal Analysis (DL)
Effective Signal Analysis (UL)
For these calculations, Atoll calculates the received signal level and noise at each pixel for the channel type being studied,
i.e., downlink reference signals, SS, PDSCH, or PUSCH and PUCCH. Each pixel within the calculation area of TX
i
(ic) is
considered a non-interfering receiver. The properties of the non-interfering probe receiver are set by selecting a terminal,
a mobility type, and a service.
These coverage predictions do not depend on the traffic input. Therefore, these calculations are of special interest before
and during the deployment stage of the network to study the coverage footprint of the system.
Coverage prediction parameters to be set are:
The coverage prediction conditions, and
The display settings to colour the coverage areas.
The following sections describe the determination of coverage area of each cell ("Coverage Area Determination" on
page 598), the calculation of the coverage parameter ("Coverage Parameter Calculation" on page 598), and the display
options ("Coverage Display" on page 598) of the coverage predictions.
>
>
>
>
>
>
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
598 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.2.5.1 Coverage Area Determination
These coverage predictions are best server coverage predictions, i.e., the coverage area of each cell comprises the pixels
where the cell is the best server. Best server for each pixel is calculated as explained in "Best Server Determination" on
page 644.
10.2.5.2 Coverage Parameter Calculation
The following parameters are calculated for the Effective Signal Analysis (DL) coverage prediction.
Best RSRP (RS EPRE) Level (DL) (dBm): as explained in "Signal Level Calculation (DL)" on page 620.
Best Reference Signal Level (DL) (dBm): as explained in "Signal Level Calculation (DL)" on page 620.
Best SS Signal Level (DL) (dBm): as explained in "Signal Level Calculation (DL)" on page 620.
Best PBCH Signal Level (DL) (dBm): as explained in "Signal Level Calculation (DL)" on page 620.
Best PDCCH Signal Level (DL) (dBm): as explained in "Signal Level Calculation (DL)" on page 620.
Best PDSCH Signal Level (DL) (dBm): as explained in "Signal Level Calculation (DL)" on page 620.
Reference Signal C/N Level (DL) (dB): as explained in "C/N Calculation (DL)" on page 628.
SS C/N Level (DL) (dB): as explained in "C/N Calculation (DL)" on page 628.
PBCH C/N Level (DL) (dB): as explained in "C/N Calculation (DL)" on page 628.
PDCCH C/N Level (DL) (dB): as explained in "C/N Calculation (DL)" on page 628.
PDSCH C/N Level (DL) (dB): as explained in "C/N Calculation (DL)" on page 628.
Delta Path Loss (dB): where is the total loss from the second best server TX
j
(jc) and
is the total loss from the best server TX
i
(ic) calculated as explained in "Signal Level Calculation (DL)" on
page 585.
The following parameters are calculated for the Effective Signal Analysis (UL) coverage prediction.
PUSCH & PUCCH Signal Level (UL) (dBm): as explained in "Signal Level Calculation (UL)" on
page 634.
PUSCH & PUCCH C/N Level (UL) (dB): as explained in "C/N Calculation (UL)" on page 639.
10.2.5.3 Coverage Display
10.2.5.3.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
10.2.5.3.2 Effective Signal Analysis (DL) Display Types
It is possible to display the Effective Signal Analysis (DL) coverage prediction with colours depending on the following
display options.
Best RSRP (RS EPRE) Level (DL) (dBm)
Atoll calculates downlink RSRP (RS EPRE) received from the best serving cells on each pixel of their coverage areas. A
pixel of a coverage area is coloured if the downlink RSRP (RS EPRE) exceeds ( ) the defined thresholds (the pixel colour
depends on the downlinkRSRP (RS EPRE)). Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where
the downlink RSRP (RS EPRE) from the best server exceeds a defined threshold.
Best Reference Signal Level (DL) (dBm)
Atoll calculates downlink reference signal levels received from the best serving cells on each pixel of their coverage areas.
A pixel of a coverage area is coloured if the downlink reference signal level exceeds ( ) the defined thresholds (the pixel
colour depends on the downlink reference signal level). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the downlink reference signal level from the best server exceeds a defined threshold.
E
DLRS
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
C
SS
TX
i
i c ( )
C
PBCH
TX
i
i c ( )
C
PDCCH
TX
i
i c ( )
C
PDSCH
TX
i
i c ( )
CNR
DLRS
TX
i
i c ( )
CNR
SS
TX
i
i c ( )
CNR
PBCH
TX
i
i c ( )
CNR
PDCCH
TX
i
i c ( )
CNR
PDSCH
TX
i
i c ( )
L
Total
TX
j
j c ( )
L
Total
TX
i
i c ( )
L
Total
TX
j
j c ( )
L
Total
TX
i
i c ( )
C
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
>
>
Forsk 2010 AT283_TRG_E2 599
Chapter 10: LTE Networks
Best SS Signal Level (DL) (dBm)
Atoll calculates SS signal levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the SS signal level exceeds ( ) the defined thresholds (the pixel colour depends on the SS
signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There
are as many layers as defined thresholds. Each layer corresponds to an area where the SS signal level from the best
server exceeds a defined threshold.
Best PBCH Signal Level (DL) (dBm)
Atoll calculates PBCH signal levels received from the best serving cells on each pixel of their coverage areas. A pixel of
a coverage area is coloured if the PBCH signal level exceeds ( ) the defined thresholds (the pixel colour depends on the
PBCH signal level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the PBCH signal level from the
best server exceeds a defined threshold.
Best PDCCH Signal Level (DL) (dBm)
Atoll calculates PDCCH signal levels received from the best serving cells on each pixel of their coverage areas. A pixel
of a coverage area is coloured if the PDCCH signal level exceeds ( ) the defined thresholds (the pixel colour depends on
the PDCCH signal level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the PDCCH signal
level from the best server exceeds a defined threshold.
Best PDSCH Signal Level (DL) (dBm)
Atoll calculates PDSCH signal levels received from the best serving cells on each pixel of their coverage areas. A pixel
of a coverage area is coloured if the PDSCH signal level exceeds ( ) the defined thresholds (the pixel colour depends on
the PDSCH signal level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the PDSCH signal
level from the best server exceeds a defined threshold.
Reference Signal C/N Level (DL) (dB)
Atoll calculates downlink reference signal C/N levels received from the best serving cells on each pixel of their coverage
areas. A pixel of a coverage area is coloured if the downlink reference signal C/N level exceeds ( ) the defined thresholds
(the pixel colour depends on the downlink reference signal C/N level). Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the downlink reference signal C/N level from the best server exceeds a defined threshold.
SS C/N Level (DL) (dB)
Atoll calculates SS C/N levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the SS C/N level exceeds ( ) the defined thresholds (the pixel colour depends on the SS C/
N level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There are
as many layers as defined thresholds. Each layer corresponds to an area where the SS C/N level from the best server
exceeds a defined threshold.
PBCH C/N Level (DL) (dB)
Atoll calculates PBCH C/N levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the PBCH C/N level exceeds ( ) the defined thresholds (the pixel colour depends on the
PBCH C/N level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the PBCH C/N level from the
best server exceeds a defined threshold.
PDCCH C/N Level (DL) (dB)
Atoll calculates PDCCH C/N levels received from the best serving cells on each pixel of their coverage areas. A pixel of
a coverage area is coloured if the PDCCH C/N level exceeds ( ) the defined thresholds (the pixel colour depends on the
PDCCH C/N level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the PDCCH C/N level from the
best server exceeds a defined threshold.
PDSCH C/N Level (DL) (dB)
Atoll calculates PDSCH C/N levels received from the best serving cells on each pixel of their coverage areas. A pixel of
a coverage area is coloured if the PDSCH C/N level exceeds ( ) the defined thresholds (the pixel colour depends on the
PDSCH C/N level). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the PDSCH C/N level from the
best server exceeds a defined threshold.
>
>
>
>
>
>
>
>
>
600 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Delta Path Loss (dB)
Atoll calculates the difference of the path loss from the second best serving cells and the path loss from the best serving
cells on each pixel of their coverage areas. A pixel of a coverage area is coloured if the path loss difference is less than
( ) the defined thresholds (the pixel colour depends on the path loss difference). Coverage consists of several
independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds.
Each layer corresponds to an area where the delta path loss is less than a defined threshold.
10.2.5.3.3 Effective Signal Analysis (UL) Display Types
It is possible to display the Effective Signal Analysis (UL) coverage prediction with colours depending on the following
display options.
PUSCH & PUCCH Signal Level (UL) (dBm)
Atoll calculates PUSCH and PUCCH signal levels received from each pixel, of the coverage areas of the best serving
cells, at the cells. A pixel of a coverage area is coloured if the PUSCH and PUCCH signal level exceeds ( ) the defined
thresholds (the pixel colour depends on the PUSCH and PUCCH signal level). Coverage consists of several independent
layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the PUSCH and PUCCH signal level at the best server exceeds a defined threshold.
PUSCH & PUCCH C/N Level (UL) (dB)
Atoll calculates PUSCH and PUCCH C/N levels received from each pixel, of the coverage areas of the best serving cells,
at the cells. A pixel of a coverage area is coloured if the PUSCH and PUCCH C/N level exceeds ( ) the defined thresholds
(the pixel colour depends on the PUSCH and PUCCH C/N level). Coverage consists of several independent layers whose
visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to
an area where the PUSCH and PUCCH C/N level at the best server exceeds a defined threshold.
10.2.6 Calculations on Subscriber Lists
When calculations are performed on a list of subscribers by running the Automatic Server Allocation, Atoll calculates the
path loss again for the subscriber locations and heights because the subscriber heights can be different from the defaut
receiver height used for calculating the path loss matrices.
Atoll calculates the following parameters for each subscriber in the list whose Lock Status is set to None.
Serving Base Station and Reference Cell as described in "Best Server Determination" on page 644.
Atoll calculates the following parameters for each subscriber in the list that has a serving base station assigned and whose
Lock Status is set to None or Server.
Azimuth ( ): Angle with respect to the north for pointing the subscriber terminal antenna towards its serving base
station.
Mechanical Downtilt ( ): Angle with respect to the horizontal for pointing the subscriber terminal antenna
towards its serving base station.
Atoll calculates the following parameters for each subscriber in the list that has a serving base station assigned, using the
properties of the default terminal and service.
Received Reference Signal Power (DL) (dBm) as described in "Signal Level Calculation (DL)" on page 620.
Received SS Power (DL) (dBm) as described in "Signal Level Calculation (DL)" on page 620.
Received PDSCH Power (DL) (dBm) as described in "Signal Level Calculation (DL)" on page 620.
SS & PBCH Total Noise (I+N) (DL) (dBm) as described in "C/(I+N) and Bearer Calculation (DL)" on page 630.
PDSCH & PDCCH Total Noise (I+N) (DL) (dBm) as described in "C/(I+N) and Bearer Calculation (DL)" on
page 630.
Reference Signal C/(I+N) (DL) (dB) as described in "C/(I+N) and Bearer Calculation (DL)" on page 630.
SS C/(I+N) (DL) (dB) as described in "C/(I+N) and Bearer Calculation (DL)" on page 630.
PDSCH C/(I+N) (DL) (dB) as described in "C/(I+N) and Bearer Calculation (DL)" on page 630.
Bearer (DL) as described in "C/(I+N) and Bearer Calculation (DL)" on page 630.
BLER (DL): Downlink block error rate read from the BLER vs. graph available in the LTE equipment
assigned to the terminal used by the subscriber.
Diversity Mode (DL): Antenna diversity mode used for the subscriber in downlink.
Peak RLC Channel Throughput (DL) (kbps) as described in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 649.
Effective RLC Channel Throughput (DL) (kbps) as described in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
Received PUSCH & PUCCH Power (UL) (dBm) as described in "Signal Level Calculation (UL)" on page 634.
PUSCH & PUCCH Total Noise (I+N) (UL) (dBm) as described in "C/(I+N) and Bearer Calculation (UL)" on
page 641.
PUSCH & PUCCH C/(I+N) (UL) (dB) as described in "C/(I+N) and Bearer Calculation (UL)" on page 641.
Bearer (UL) as described in "C/(I+N) and Bearer Calculation (UL)" on page 641.
BLER (UL): Uplink block error rate read from the BLER vs. graph available in the LTE
equipment assigned to the serving cell of the subscriber.
<
>
>

CINR
PDSCH
TX
i
i c ( )
CINR
PUSCH PUCCH ,
M
i
Forsk 2010 AT283_TRG_E2 601
Chapter 10: LTE Networks
Diversity Mode (UL): Antenna diversity mode used for the subscriber in uplink.
Transmission Power (UL) as described in "C/(I+N) and Bearer Calculation (UL)" on page 641.
Allocated Bandwidth (UL) (No. of Frequency Blocks) as described in "C/(I+N) and Bearer Calculation (UL)" on
page 641.
Peak RLC Channel Throughput (UL) (kbps) as described in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 649.
Effective RLC Channel Throughput (UL) (kbps) as described in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
10.2.7 Monte Carlo Simulations
The simulation process is divided into two steps.
Generating a realistic user distribution as explained in "Generating a Realistic User Distribution" on page 601.
Atoll generates user distributions as part of the Monte Carlo algorithm based on traffic data. The resulting user
distribution complies with the traffic database and maps selected when creating simulations.
Scheduling and Radio Resource Management as explained under "Simulation Process" on page 604.
10.2.7.1 Generating a Realistic User Distribution
During each simulation, Atoll performs two random trials. The first random trial generates the number of users and their
activity status as explained in the following sections depending on the type of traffic input.
"Simulations Based on User Profile Traffic Maps and Subscriber Lists" on page 601.
"Simulations Based on Sector Traffic Maps" on page 603.
Once all the user characteristics have been determined, a second random trial is performed to obtain their geographical
locations weighted according to the clutter classes, and whether they are indoor or outdoor according to the percentage
of indoor users per clutter class.
10.2.7.1.1 Simulations Based on User Profile Traffic Maps and Subscriber Lists
User profile environment based traffic maps: Each pixel of the map is assigned an environment class which contains a list
of user profiles with an associated mobility type and a given density, i.e., number of users of a user profile per km.
User profile traffic maps: Each polygon or line of the map is assigned a density of users with a given user profile and
mobility type. If the map is composed of points, each point is assigned a number of users with given user profile and
mobility type.
Fixed subscribers listed in subscriber lists have a user profile assigned to each of them.
User profiles model the behaviour of the different user categories. Each user profile contains a list of services and
parameters describing how these services are accessed by the user.
The number of users of each user profile is calculated from the surface area (S
Env
) of each environment class map (or
each polygon) and the user profile density (D
UP
).
Atoll calculates the probability for a user being active at a given instant in the uplink and in the downlink according to the
service usage characteristics described in the user profiles, i.e., the number of voice calls or data sessions, the average
duration of each voice call, or the volume of the data transfer in the uplink and the downlink in each data session.
Voice Service (v)
User profile parameters for voice type services are:
- The user terminal equipment used for the service (from the Terminals table).
- The average number of calls per hour .
- The average duration of a call (seconds) .
Note:
Atoll follows a Poisson distribution to determine the total number of users attempting a
connection in each simulation. In order for Atoll to use a constant total number of users
attempting a connection, the following lines must be added to the Atoll.ini file:
[CDMA]
RandomTotalUsers=0
Notes:
In case of user profile traffic maps composed of lines, the number of users of each user
profile is calculated from the line length (L) and the user profile density (D
UP
) (users per
km):
The number of users is a direct input when a user profile traffic map is composed of points.
N
Users
S
Env
D
UP
=
N
Users
L D
UP
=
N
Cal l
D
Cal l
602 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Calculation of the service usage duration per hour ( : probability of an active call):
Calculation of the number of users trying to access the service v ( ):
The activity status of each user depends on the activity periods during the call, i.e., the uplink and downlink activity
factors defined for the voice type service v, and .
Calculation of activity probabilities:
Probability of being inactive:
Probability of being active in the uplink:
Probability of being active in the downlink:
Probability of being active in the uplink and downlink both:
Calculation of number of users per activity status:
Number of inactive users:
Number of users active in the uplink:
Number of users active in the downlink:
Number of users active in the uplink and downlink both:
Therefore, a connected user can be either active on both links, inactive on both links, active on UL only, or active
on DL only.
Data Service (d)
User profile parameters for data type services are:
- The user terminal equipment used for the service (from the Terminals table).
- The average number of data sessions per hour .
- The average data volume (in kBytes) transferred in the downlink and the uplink during a session.
- The average throughputs in the downlink and the uplink for the service d.
Calculation of activity probabilities: and
Probability of being inactive:
Probability of being active in the uplink:
Probability of being active in the downlink:
Probability of being active in the uplink and downlink both:
Calculation of number of users:
Number of inactive users:
Number of users active in the uplink:
Number of users active in the downlink:
Number of users active in the uplink and downlink both:
Calculation of the number of active users trying to access the service d (n
d
):
Inactive users are not taken into account.
Note:
p
0
p
0
N
Cal l
D
Cal l

3600
--------------------------------- =
n
v
n
v
N
Users
p
0
=
f
Act
UL
f
Act
DL
p
Inacti ve
1 f
Act
UL
( ) 1 f
Act
DL
( ) =
p
Acti ve
UL
f
Act
UL
1 f
Act
DL
( ) =
p
Acti ve
DL
f
Act
DL
1 f
Act
UL
( ) =
p
Acti ve
UL DL +
f
Act
UL
f
Act
DL
=
n
v Inacti ve
n
v
p
Inacti ve
=
n
v Acti ve
UL
n
v
p
Acti ve
UL
=
n
v Acti ve
DL
n
v
p
Acti ve
DL
=
n
v Acti ve
UL DL +
n
v
p
Acti ve
UL DL +
=
N
Sessi on
V
DL
V
UL
TP
Average
DL
TP
Average
UL
f
UL
N
Sessi on
V
UL
8
TP
Average
UL
3600
------------------------------------------------ = f
DL
N
Sessi on
V
DL
8
TP
Average
DL
3600
------------------------------------------------ =
p
Inacti ve
1 f
UL
( ) 1 f
DL
( ) =
p
Acti ve
UL
f
UL
1 f
DL
( ) =
p
Acti ve
DL
f
DL
1 f
UL
( ) =
p
Acti ve
UL DL +
f
UL
f
DL
=
n
d Inacti ve
N
Users
p
Inacti ve
=
n
d Acti ve
UL
N
Users
p
Acti ve
UL
=
n
d Acti ve
DL
N
Users
p
Acti ve
DL
=
n
d Acti ve
UL DL +
N
Users
p
Acti ve
UL DL +
=
n
d
n
d Acti ve
UL
n
d Acti ve
DL
n
d Acti ve
UL DL +
+ + =
Forsk 2010 AT283_TRG_E2 603
Chapter 10: LTE Networks
10.2.7.1.2 Simulations Based on Sector Traffic Maps
Sector traffic maps are also referred to as live traffic maps. Live traffic data from the O&M is spread over the best server
coverage areas of the transmitters included in the traffic map. Either throughput demands per service or the number of
active users per service are assigned to the coverage areas of each transmitter.
For each transmitter TX
i
and each service s,
Sector Traffic Maps (Throughputs)
Atoll calculates the number of active users of each service s on UL and DL in the coverage area of TX
i
as follows:
and
Where is the total uplink throughput demand defined in the map for any service s for the coverage area of
the transmitter, is the total downlink throughput demand defined in the map for any service s for the
coverage area of the transmitter, is the average uplink requested throughput of the service s, and
is the average downlink requested throughput of the service s.
Sector Traffic Maps (# Active Users)
Atoll directly uses the defined and values, i.e., the number of active users on UL and DL in the
transmitter coverage area using the service s.
At any given instant, Atoll calculates the probability for a user being active in the uplink and in the downlink as follows:
Voice Service (v)
Users active in the uplink and downlink both are included in the and values. Therefore, it is necessary
to accurately determine the number of active users in the uplink ( ), in the downlink ( ), and both
( ). As for the other types of traffic maps, Atoll considers both active and inactive users for voice services.
The activity status of each user depends on the activity periods during the call, i.e., the uplink and downlink activity
factors defined for the voice type service v, and .
Calculation of activity probabilities:
Probability of being inactive:
Probability of being active in the uplink:
Probability of being active in the downlink:
Probability of being active in the uplink and downlink both:
Calculation of the number of active users trying to access the voice service v:
We have: and
Where, n
v
is the total number of active users in the transmitter coverage area using the service v.
Calculation of number of users per activity status:
Number of users active in the uplink and downlink both: or
simply,
Number of users active in the uplink:
The user distribution per service and the activity status distribution between the users are
average distributions. The service and the activity status of each user are randomly drawn
in each simulation. Therefore, if you calculate several simulations at once, the average
number of users per service and average numbers of inactive, active on UL, active on DL
and active on UL and DL users, respectively, will correspond to calculated distributions. But
if you check each simulation, the user distribution between services as well as the activity
status distribution between users can be different in each of them.
N
UL
TP
Cel l
UL
TP
Average
UL
--------------------------- = N
DL
TP
Cel l
DL
TP
Average
DL
--------------------------- =
TP
Cel l
UL
TP
Cel l
DL
TP
Average
UL
TP
Average
DL
N
UL
N
DL
N
UL
N
DL
n
v Acti ve
UL
n
v Acti ve
DL
n
v Acti ve
UL DL +
f
Act
UL
f
Act
DL
p
Inacti ve
1 f
Act
UL
( ) 1 f
Act
DL
( ) =
p
Acti ve
UL
f
Act
UL
1 f
Act
DL
( ) =
p
Acti ve
DL
f
Act
DL
1 f
Act
UL
( ) =
p
Acti ve
UL DL +
f
Act
UL
f
Act
DL
=
N
UL
p
Acti ve
UL
p
Acti ve
UL DL +
+ ( ) n
v
= N
DL
p
Acti ve
DL
p
Acti ve
UL DL +
+ ( ) n
v
=
n
v Acti ve
UL DL +
Mi n
N
UL
p
Acti ve
UL DL +

p
Acti ve
UL
p
Acti ve
UL DL +
+
--------------------------------------------
N
DL
p
Acti ve
UL DL +

p
Acti ve
DL
p
Acti ve
UL DL +
+
-------------------------------------------- ,
\ .
|
| |
=
n
v Acti ve
UL DL +
Mi n N
UL
f
Act
DL
N
DL
f
Act
UL
, ( ) =
n
v Acti ve
UL
N
UL
n
v Acti ve
UL DL +
=
604 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Number of users active in the downlink:
And,
Calculation of the number of inactive users attempting to access the service v:
Number of inactive users:
Data Service (d)
Here, Atoll considers all the connected users as active. Activity probabilities are not calculated.
Calculation of the number of users attempting to access the service d:
If
If
n
d
is the total number of active users in the TX
i
coverage area using the service d:
10.2.7.2 Simulation Process
LTE cells include intelligent schedulers and radio resource management features for regulating network traffic loads,
optimising spectral efficiency, and satisfying the QoS demands of the users. Each Monte Carlo simulation in the Atoll LTE
module is a snap-shot of the network with resource allocation carried out over a duration of 1 second (10 frames). The
steps of this algorithm are listed below.
The simulation process can be summed up into the following iterative steps.
For each simulation, the simulation process,
1. Generates mobiles according to the input traffic data as explained in "Generating a Realistic User Distribution" on
page 601.
2. Sets initial values for the following parameters:
- Cell transmission powers and EPREs are calculated from the maximum power and EPRE offset values
defined by the user as explained in "Downlink Transmission Powers Calculation" on page 613.
- Mobile transmission power is set to the maximum mobile power ( ).
- Cell loads ( , , , ) are set to their current values in the Cells table.
3. Determines the best servers for all the mobiles generated for the simulation, and determines whether they are
covered by the ICIC or the non-ICIC parts of the frame in downlink, as explained in "Best Server Determination"
on page 644.
4. Determines the mobiles which are within the service areas of their best serving cells as explained in "Service Area
Calculation" on page 645.
For each iteration k, the simulation process,
5. Determines the downlink and uplink C/(I+N) and bearers for each of these mobiles as explained in "C/(I+N) and
Bearer Calculation (DL)" on page 630 and "C/(I+N) and Bearer Calculation (UL)" on page 641 respectively.
Note:
The activity status distribution between users is an average distribution. In fact, in each
simulation, the activity status of each user is randomly drawn. Therefore, if you calculate
several simulations at once, average numbers of inactive, active on UL, active on DL and
active on UL and DL users correspond to the calculated distribution. But if you check each
simulation, the activity status distribution between users can be different in each of them.
n
v Acti ve
DL
N
DL
n
v Acti ve
UL DL +
=
n
v
n
v Acti ve
UL
n
v Acti ve
DL
n
v Acti ve
UL DL +
+ + =
n
v Inacti ve
n
v
1 p
Inacti ve

------------------------------ p
Inacti ve
=
N
UL
N
DL
<
n
d Acti ve
UL DL +
N
UL
=
n
d Acti ve
UL
0 =
n
d Acti ve
DL
N
DL
N
UL
=
N
UL
N
DL
>
n
d Acti ve
UL DL +
N
DL
=
n
d Acti ve
DL
0 =
n
d Acti ve
UL
N
UL
N
DL
=
n
d
n
d Acti ve
UL
n
d Acti ve
DL
n
d Acti ve
UL DL +
+ + =
P
Max
M
i
TL
DL
TX
i
i c ( )
TL
UL
TX
i
i c ( )
NR
UL
TX
i
i c ( )
r
DL ICIC
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 605
Chapter 10: LTE Networks
6. Determines the channel throughputs at the mobile as explained in "Throughput Calculation" on page 646.
7. Performs radio resource management and scheduling to determine the amount of resources to allocate to each
mobile according to the service priorities and throughput demands of each mobile using the selected scheduler
as explained in "Scheduling and Radio Resource Management" on page 652.
8. Calculates the user throughputs after allocating resources to each mobile as explained in "User Throughput
Calculation" on page 658.
9. Updates the traffic loads, and noise rise values of all the cells according to the resources in use and the total
resources as follows:
Calculation of Traffic Loads:
Atoll calculates the traffic loads for all the cells TX
i
(ic).
and
For uplink MU-MIMO,
Calculation of Uplink Noise Rise:
For each victim cell TX
i
(ic), the uplink noise rise is calculated and updated by considering each interfering mobile
M
j
as explained in "C/(I+N) and Bearer Calculation (UL)" on page 641.
Calculation of Downlink ICIC Ratio:
Atoll calculates the downlink ICIC ratio for all the cells as follows:
Figure 10.1LTE Simulation Algorithm
TL
DL
TX
i
i c ( )
R
DL
M
i
M
i

= TL
UL
TX
i
i c ( )
R
UL
M
i
M
i

=
TL
UL
TX
i
i c ( )
RC
UL
M
i
MU MIMO
M
i
MU MI MO

=
r
DL ICIC
TX
i
i c ( )
R
DL
M
i
ICIC
M
i
I CI C

TL
DL
TX
i
i c ( )
----------------------------- =
606 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where is the sum of the percentages of the downlink cell resources allocated to mobiles in the ICIC
part of the frame.
Calculation of Uplink MU-MIMO Gain:
Atoll calculates the uplink MU-MIMO gain for all the cells as follows:
Where is the sum of the percentages of the uplink cell resources allocated to MU-MIMO
mobiles and is the sum of the real resource consumption of MU-MIMO mobiles.
10. Performs the convergence test to see whether the differences between the current and the new loads are within
the convergence thresholds.
The convergence criteria are evaluated at the end of each iteration k, and can be written as follows:
If , , and are the simulation convergence thresholds defined when
creating the simulation, Atoll stops the simulation in the following cases.
Convergence: Simulation has converged between iteration k - 1 and k if:
AND AND
No convergence: Simulation has not converged even after the last iteration, i.e., k = Max Number of Iterations
defined when creating the simulation, if:
OR OR
11. Repeats the above steps (from step 3.) for the iteration k+1 using the new calculated loads as the current loads.
Simulation Results
At the end of the simulation process, the main results obtained are:
Downlink traffic loads
Uplink traffic loads
Uplink noise rise
Downlink ICIC ratio
Uplink ICIC noise rise
Uplink MU-MIMO capacity gain
Number of connected users in downlink
Number of connected users in uplink
These results can be used as input for C/(I+N)-based coverage predictions.
In addition to the above parameters, the simulations also list the connection status of each mobile. Mobiles can be rejected
due to:
No Coverage: If the mobile does not have any best serving cell (step 3.) or if the mobile is not within the service
area of its best server (step 4.).
No Service: If the mobile is not able to access a bearer in the direction of its activity (step 5.), i.e., UL, DL, or
UL+DL.
Scheduler Saturation: If the mobile is not in the list of mobiles selected for scheduling (step 7.)
R
DL
M
i
ICIC
M
i
I CI C

G
MU MIMO
TX
i
i c ( )
R
UL
M
i
MU MI MO
M
i
MU MI MO

RC
UL
M
i
MU MIMO
M
i
MU MI MO

----------------------------------------------------------- =
R
UL
M
i
MU MI MO
M
i
MU MIMO

RC
UL
M
i
MU MIMO
M
i
MU MIMO

ATL
DL
TX
i
i c ( )
k
Max
All TX
i
i c ( )
TL
DL
TX
i
i c ( )
k
TL
DL
TX
i
i c ( )
k 1

\ .
| |
=
ATL
UL
TX
i
i c ( )
k
Max
All TX
i
i c ( )
TL
UL
TX
i
i c ( )
k
TL
UL
TX
i
i c ( )
k 1

\ .
| |
=
ANR
UL
TX
i
i c ( )
k
Max
All TX
i
i c ( )
NR
UL
TX
i
i c ( )
k
NR
UL
TX
i
i c ( )
k 1

\ .
| |
=
ATL
DL
TX
i
i c ( )
Req
ATL
UL
TX
i
i c ( )
Req
ANR
UL
TX
i
i c ( )
Req
ATL
DL
TX
i
i c ( )
k
ATL
DL
TX
i
i c ( )
Req
s ATL
UL
TX
i
i c ( )
k
ATL
UL
TX
i
i c ( )
Req
s ANR
UL
TX
i
i c ( )
k
ANR
UL
TX
i
i c ( )
Req
s
ATL
DL
TX
i
i c ( )
k
ATL
DL
TX
i
i c ( )
Req
> ATL
UL
TX
i
i c ( )
k
ATL
UL
TX
i
i c ( )
Req
> ANR
UL
TX
i
i c ( )
k
ANR
UL
TX
i
i c ( )
Req
>
Forsk 2010 AT283_TRG_E2 607
Chapter 10: LTE Networks
Resource Saturation: If all the cell resources are used up before allocation to the mobile or if, for a user active
in uplink, the minimum uplink throughput demand is higher than the uplink allocated bandwidth throughput
(step 7.)
Connected mobiles (step 7.) can be:
Connected UL: If a mobile active in UL is allocated resources in UL.
Connected DL: If a mobile active in DL is allocated resources in DL.
Connected UL+DL: If a mobile active in UL+DL is allocated resources in UL+DL.
10.2.8 C/(I+N)-Based Coverage Predictions
The following coverage predictions are based on the received signal levels, total noise, and interference.
Coverage by C/(I+N) Level (DL)
Coverage by Best Bearer (DL)
Coverage by Throughput (DL)
Coverage by Quality Indicator (DL)
Coverage by C/(I+N) Level (UL)
Coverage by Best Bearer (UL)
Coverage by Throughput (UL)
Coverage by Quality Indicator (UL)
These coverage predictions take into account the receiver characteristics ( , , , and ) when calculating
the required parameter. For these calculations, Atoll calculates the received signal level, noise, and interference at each
pixel. Each pixel within the calculation area of TX
i
(ic) is considered a non-interfering receiver. The properties of the non-
interfering probe receiver are set by selecting a terminal, a mobility type, and a service.
The downlink coverage predictions are based on the downlink traffic loads of the cells, and the uplink coverage predictions
are based on the uplink noise rise values. These parameters can either be calculated by Atoll during the Monte Carlo
simulations, or set manually by the user for all the cells.
Coverage prediction parameters to be set are:
The coverage prediction conditions, and
The display settings to colour the coverage areas.
The minimum thresholds at the receiver are defined in the Display parameters.
The following sections describe the determination of coverage area of each cell ("Coverage Area Determination" on
page 607), the calculation of the coverage parameter ("Coverage Parameter Calculation" on page 607), and the display
options ("Coverage Display" on page 609) of the coverage predictions.
10.2.8.1 Coverage Area Determination
These coverage predictions are all best server coverage predictions, i.e., the coverage area of each cell comprises the
pixels where the cell is the best server. Best server for each pixel is calculated as explained in "Best Server Determination"
on page 644.
10.2.8.2 Coverage Parameter Calculation
The following parameters are calculated for the Coverage by C/(I+N) Level (DL) coverage prediction.
RSRQ Level (DL) (dB): as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630.
RSSI Level (DL) (dBm): as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630.
Reference Signal C/(I+N) Level (DL) (dB): as explained in "C/(I+N) and Bearer Calculation (DL)"
on page 630.
SS C/(I+N) Level (DL) (dB): as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630.
PBCH C/(I+N) Level (DL) (dB): as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630.
PDCCH C/(I+N) Level (DL) (dB): as explained in "C/(I+N) and Bearer Calculation (DL)" on
page 630.
SS & PBCH Total Noise (I+N) (DL) (dBm): as explained in "C/(I+N) and Bearer Calculation (DL)"
on page 630.
PDSCH C/(I+N) Level (DL) (dB): as explained in "C/(I+N) and Bearer Calculation (DL)" on
page 630.
PDSCH & PDCCH Total Noise (I+N) (DL) (dBm): as explained in "C/(I+N) and Bearer
Calculation (DL)" on page 630.
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
RSRQ
TX
i
i c ( )
RSSI
TX
i
i c ( )
CINR
DLRS
TX
i
i c ( )
CINR
SS
TX
i
i c ( )
CINR
PBCH
TX
i
i c ( )
CINR
PDCCH
TX
i
i c ( )
I N + ( )
SS PBCH ,
TX
i
i c ( )
CINR
PDSCH
TX
i
i c ( )
I N + ( )
PDSCH PDCCH ,
TX
i
i c ( )
608 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The following parameters are calculated for the Coverage by Best Bearer (DL) coverage prediction.
Best Bearer (DL): as explained in "C/(I+N) and Bearer Calculation (DL)" on page 630.
Modulation (DL): Modulation used by the bearer calculated as explained in "C/(I+N) and Bearer Calculation
(DL)" on page 630.
The following parameters are calculated for the Coverage by Throughput (DL) coverage prediction.
Peak RLC Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 649.
Effective RLC Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell
Capacity, and Allocated Bandwidth Throughput Calculation" on page 649.
Application Channel Throughput (DL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 649.
Peak RLC Cell Capacity (DL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
Effective RLC Cell Capacity (DL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
Application Cell Capacity (DL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
The following parameters are calculated for the Coverage by C/(I+N) Level (UL) coverage prediction.
PUSCH & PUCCH C/(I+N) Level (UL) (dB): as explained in "C/(I+N) and Bearer Calculation
(UL)" on page 641.
PUSCH & PUCCH Total Noise (I+N) (UL) (dBm): as explained in "C/(I+N) and Bearer
Calculation (UL)" on page 641.
Allocated Bandwidth (UL) (No. of Frequency Blocks): as explained in "C/(I+N) and Bearer
Calculation (UL)" on page 641.
PUSCH & PUCCH C/(I+N) Level for 1 Frequency Block (UL) (dB): as explained in "C/
(I+N) and Bearer Calculation (UL)" on page 641 but by fixing
Transmission Power (UL) (dBm): as explained in "C/(I+N) and Bearer Calculation (UL)" on page 641.
The following parameters are calculated for the Coverage by Best Bearer (UL) coverage prediction.
Best Bearer (UL): as explained in "C/(I+N) and Bearer Calculation (UL)" on page 641.
Modulation (UL): Modulation used by the bearer calculated as explained in "C/(I+N) and Bearer Calculation
(UL)" on page 641.
The following parameters are calculated for the Coverage by Throughput (UL) coverage prediction.
Peak RLC Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 649.
Effective RLC Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell
Capacity, and Allocated Bandwidth Throughput Calculation" on page 649.
Application Channel Throughput (UL) (kbps): as explained in "Channel Throughput, Cell Capacity,
and Allocated Bandwidth Throughput Calculation" on page 649.
Peak RLC Cell Capacity (UL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
Effective RLC Cell Capacity (UL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
Application Cell Capacity (UL) (kbps): as explained in "Channel Throughput, Cell Capacity, and
Allocated Bandwidth Throughput Calculation" on page 649.
Peak RLC Allocated Bandwidth Throughput (UL) (kbps): as explained in "Channel Throughput,
Cell Capacity, and Allocated Bandwidth Throughput Calculation" on page 649.
B
DL
M
i
B
DL
M
i
CTP
P DL
M
i
CTP
E DL
M
i
CTP
A DL
M
i
Cap
P DL
M
i
Cap
E DL
M
i
Cap
A DL
M
i
CINR
PUSCH PUCCH ,
M
i
I N + ( )
PUSCH PUCCH ,
TX
i
i c ( )
N
FB UL
M
i
CINR
PUSCH PUCCH
M
i
N
FB UL
M
i
1 =
P
Eff
M
i
B
UL
M
i
B
UL
M
i
CTP
P UL
M
i
CTP
E UL
M
i
CTP
A UL
M
i
Cap
P UL
M
i
Cap
E UL
M
i
Cap
A UL
M
i
ABTP
P UL
M
i
Forsk 2010 AT283_TRG_E2 609
Chapter 10: LTE Networks
Effective RLC Allocated Bandwidth Throughput (UL) (kbps): as explained in "Channel
Throughput, Cell Capacity, and Allocated Bandwidth Throughput Calculation" on page 649.
Application Allocated Bandwidth Throughput (UL) (kbps): as explained in "Channel Throughput,
Cell Capacity, and Allocated Bandwidth Throughput Calculation" on page 649.
10.2.8.3 Coverage Display
10.2.8.3.1 Coverage Resolution
The resolution of the coverage prediction does not depend on the resolutions of the path loss matrices or the geographic
data and can be defined separately for each coverage prediction. Coverage predictions are generated using a bilinear
interpolation method from multi-resolution path loss matrices (similar to the one used to calculate site altitudes, see "Path
Loss Calculations" on page 77 for more information).
10.2.8.3.2 Coverage by C/(I+N) Level (DL) Display Types
It is possible to display the Coverage by C/(I+N) Level (DL) coverage prediction with colours depending on the following
display options.
RSRQ Level (DL) (dB)
Atoll calculates downlink RSRQ levels received from the best serving cells on each pixel of their coverage areas. A pixel
of a coverage area is coloured if the downlink RSRQ level exceeds ( ) the defined thresholds (the pixel colour depends
on the downlink RSRQ level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the downlink RSRQ
level from the best server exceeds a defined threshold.
RSSI Level (DL) (dBm)
Atoll calculates downlink RSSI levels received from the best serving cells on each pixel of their coverage areas. A pixel
of a coverage area is coloured if the downlink RSSI level exceeds ( ) the defined thresholds (the pixel colour depends on
the downlink RSSI level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the downlink RSSI
level from the best server exceeds a defined threshold.
Reference Signal C/(I+N) Level (DL) (dB)
Atoll calculates downlink reference signal C/(I+N) levels received from the best serving cells on each pixel of their
coverage areas. A pixel of a coverage area is coloured if the downlink reference signal C/(I+N) level exceeds ( ) the
defined thresholds (the pixel colour depends on the downlink reference signal C/(I+N) level). Coverage consists of several
independent layers whose visibility in the workspace can be managed. There are as many layers as defined thresholds.
Each layer corresponds to an area where the downlink reference signal C/(I+N) level from the best server exceeds a
defined threshold.
SS C/(I+N) Level (DL) (dB)
Atoll calculates SS C/(I+N) levels received from the best serving cells on each pixel of their coverage areas. A pixel of a
coverage area is coloured if the SS C/(I+N) level exceeds ( ) the defined thresholds (the pixel colour depends on the SS
C/(I+N) level). Coverage consists of several independent layers whose visibility in the workspace can be managed. There
are as many layers as defined thresholds. Each layer corresponds to an area where the SS C/(I+N) level from the best
server exceeds a defined threshold.
SS & PBCH Total Noise (I+N) Level (DL) (dBm)
Atoll calculates SS and PBCH total noise (I+N) levels received from the interfering cells on each pixel of the coverage
areas of the best serving cells. A pixel of a coverage area is coloured if the SS and PBCH total noise (I+N) level exceeds
( ) the defined thresholds (the pixel colour depends on the SS and PBCH total noise (I+N) level). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the SS and PBCH total noise (I+N) level from the interfering cells
exceeds a defined threshold.
PDSCH C/(I+N) Level (DL) (dB)
Atoll calculates PDSCH C/(I+N) levels received from the best serving cells on each pixel of their coverage areas. A pixel
of a coverage area is coloured if the PDSCH C/(I+N) level exceeds ( ) the defined thresholds (the pixel colour depends
on the PDSCH C/(I+N) level). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the PDSCH C/(I+N)
level from the best server exceeds a defined threshold.
ABTP
E UL
M
i
ABTP
A UL
M
i
>
>
>
>
>
>
610 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
PDSCH & PDCCH Total Noise (I+N) Level (DL) (dBm)
Atoll calculates PDSCH and PDCCH total noise (I+N) levels received from the interfering cells on each pixel of the
coverage areas of the best serving cells. A pixel of a coverage area is coloured if the PDSCH and PDCCH total noise (I+N)
level exceeds ( ) the defined thresholds (the pixel colour depends on the PDSCH and PDCCH total noise (I+N) level).
Coverage consists of several independent layers whose visibility in the workspace can be managed. There are as many
layers as defined thresholds. Each layer corresponds to an area where the PDSCH and PDCCH total noise (I+N) level
from the interfering cells exceeds a defined threshold.
10.2.8.3.3 Coverage by Best Bearer (DL) Display Types
It is possible to display the Coverage by Best Bearer (DL) coverage prediction with colours depending on the following
display options.
Best Bearer (DL)
Atoll determines the best bearer available on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if a bearer is available (the pixel colour depends on the available bearer). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as available
bearers. Each layer corresponds to an area covered by an available bearer.
Modulation (DL)
Atoll determines the modulation used by the best bearer available on each pixel of the coverage areas of the best serving
cells. A pixel of a coverage area is coloured if a bearer is available (the pixel colour depends on the modulation used by
the available bearer). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as modulation used by bearers. Each layer corresponds to an area covered the modulation used
by available bearers.
10.2.8.3.4 Coverage by Throughput (DL) Display Types
It is possible to display the Coverage by Throughput (DL) coverage prediction with colours depending on the following
display options.
Peak RLC Channel Throughput (DL) (kbps)
Atoll calculates peak RLC channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the peak RLC channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the peak RLC channel throughput). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the peak RLC channel throughput exceeds a defined threshold.
Effective RLC Channel Throughput (DL) (kbps)
Atoll calculates effective RLC channel throughputs available on each pixel of the coverage areas of the best serving cells.
A pixel of a coverage area is coloured if the effective RLC channel throughput exceeds ( ) the defined thresholds (the
pixel colour depends on the effective RLC channel throughput). Coverage consists of several independent layers whose
visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to
an area where the effective RLC channel throughput exceeds a defined threshold.
Application Channel Throughput (DL) (kbps)
Atoll calculates application channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the application channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the application channel throughput). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the application channel throughput exceeds a defined threshold.
Peak RLC Cell Capacity (DL) (kbps)
Atoll calculates peak RLC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the peak RLC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the peak
RLC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the peak RLC cell capacity
exceeds a defined threshold.
Effective RLC Cell Capacity (DL) (kbps)
Atoll calculates effective RLC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if the effective RLC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends
on the effective RLC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the effective RLC
cell capacity exceeds a defined threshold.
>
>
>
>
>
>
Forsk 2010 AT283_TRG_E2 611
Chapter 10: LTE Networks
Application Cell Capacity (DL) (kbps)
Atoll calculates application cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the application cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the
application cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the application cell
capacity exceeds a defined threshold.
10.2.8.3.5 Coverage by Quality Indicator (DL) Display Types
It is possible to display the Coverage by Quality Indicator (DL) coverage prediction with colours depending on quality
indicators available in the document (Quality Indicators table).
Atoll calculates the PDSCH C/(I+N) levels received from the best serving cells at each pixel of their coverage areas. From
the C/(I+N), Atoll determines the best bearer available on each pixel. Then, for the calculated C/(I+N) and bearer, it
determines the value of the selected quality indicator from the quality graphs defined in the LTE equipment of the selected
terminal. A pixel of a coverage area is coloured if the quality indicator value exceeds ( ) the defined thresholds (the pixel
colour depends on the quality indicator value). Coverage consists of several independent layers whose visibility in the
workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where
the quality indicator value exceeds a defined threshold.
10.2.8.3.6 Coverage by C/(I+N) Level (UL) Display Types
It is possible to display the Coverage by C/(I+N) Level (UL) coverage prediction with colours depending on the following
display options.
PUSCH & PUCCH C/(I+N) Level (UL) (dB)
Atoll calculates PUSCH and PUCCH C/(I+N) levels received at the best serving cells from each pixel of their coverage
areas. A pixel of a coverage area is coloured if the PUSCH and PUCCH C/(I+N) level exceeds ( ) the defined thresholds
(the pixel colour depends on the PUSCH and PUCCH C/(I+N) level). Coverage consists of several independent layers
whose visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer
corresponds to an area where the PUSCH and PUCCH C/(I+N) level from the pixels at the best serving cells exceeds a
defined threshold.
PUSCH & PUCCH Total Noise (I+N) (UL) (dBm)
Atoll calculates PUSCH and PUCCH total noise (I+N) levels received at the best serving cells from each pixel of their
coverage areas. A pixel of a coverage area is coloured if the PUSCH and PUCCH total noise (I+N) level exceeds ( ) the
defined thresholds (the pixel colour depends on the PUSCH and PUCCH total noise (I+N) level). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the PUSCH and PUCCH total noise (I+N) level from the pixels at the
best serving cells exceeds a defined threshold.
Allocated Bandwidth (UL) (No. of Frequency Blocks)
Atoll calculates the number of frequency blocks at each pixel of each best serving cells coverage area. A pixel of a
coverage area is coloured if the number of frequency blocks exceeds ( ) the defined thresholds (the pixel colour depends
on the number of frequency blocks). Coverage consists of several independent layers whose visibility in the workspace
can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the number
of frequency blocks at the pixels of the best serving cells exceeds a defined threshold.
PUSCH & PUCCH C/(I+N) Level for 1 Frequency Block (UL) (dB)
Atoll calculates PUSCH and PUCCH C/(I+N) levels for 1 frequency block received at the best serving cells from each pixel
of their coverage areas. A pixel of a coverage area is coloured if the PUSCH and PUCCH C/(I+N) level for 1 frequency
block exceeds ( ) the defined thresholds (the pixel colour depends on the PUSCH and PUCCH C/(I+N) level for 1
frequency block). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the PUSCH and PUCCH C/
(I+N) level for 1 frequency block from the pixels at the best serving cells exceeds a defined threshold.
Transmission Power (UL) (dBm)
Atoll calculates the uplink transmission powers corresponding to the PUSCH & PUCCH C/(I+N) received at the best
serving cells from each pixel of their coverage areas. A pixel of a coverage area is coloured if the uplink transmission power
exceeds ( ) the defined thresholds (the pixel colour depends on the uplink transmission power level). Coverage consists
of several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the uplink transmission power from the pixels at the best serving
cells exceeds a defined threshold.
10.2.8.3.7 Coverage by Best Bearer (UL) Display Types
It is possible to display the Coverage by Best Bearer (UL) coverage prediction with colours depending on the following
display options.
>
>
>
>
>
>
>
612 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Best Bearer (UL)
Atoll determines the best bearer available on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if a bearer is available (the pixel colour depends on the available bearer). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as available
bearers. Each layer corresponds to an area covered by an available bearer.
Modulation (UL)
Atoll determines the modulation used by the best bearer available on each pixel of the coverage areas of the best serving
cells. A pixel of a coverage area is coloured if a bearer is available (the pixel colour depends on the modulation used by
the available bearer). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as modulation used by bearers. Each layer corresponds to an area covered the modulation used
by available bearers.
10.2.8.3.8 Coverage by Throughput (UL) Display Types
It is possible to display the Coverage by Throughput (UL) coverage prediction with colours depending on the following
display options.
Peak RLC Channel Throughput (UL) (kbps)
Atoll calculates peak RLC channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the peak RLC channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the peak RLC channel throughput). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the peak RLC channel throughput exceeds a defined threshold.
Effective RLC Channel Throughput (UL) (kbps)
Atoll calculates effective RLC channel throughputs available on each pixel of the coverage areas of the best serving cells.
A pixel of a coverage area is coloured if the effective RLC channel throughput exceeds ( ) the defined thresholds (the
pixel colour depends on the effective RLC channel throughput). Coverage consists of several independent layers whose
visibility in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to
an area where the effective RLC channel throughput exceeds a defined threshold.
Application Channel Throughput (UL) (kbps)
Atoll calculates application channel throughputs available on each pixel of the coverage areas of the best serving cells. A
pixel of a coverage area is coloured if the application channel throughput exceeds ( ) the defined thresholds (the pixel
colour depends on the application channel throughput). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the application channel throughput exceeds a defined threshold.
Peak RLC Cell Capacity (UL) (kbps)
Atoll calculates peak RLC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the peak RLC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the peak
RLC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be managed.
There are as many layers as defined thresholds. Each layer corresponds to an area where the peak RLC cell capacity
exceeds a defined threshold.
Effective RLC Cell Capacity (UL) (kbps)
Atoll calculates effective RLC cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a
coverage area is coloured if the effective RLC cell capacity exceeds ( ) the defined thresholds (the pixel colour depends
on the effective RLC cell capacity). Coverage consists of several independent layers whose visibility in the workspace can
be managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the effective RLC
cell capacity exceeds a defined threshold.
Application Cell Capacity (UL) (kbps)
Atoll calculates application cell capacity on each pixel of the coverage areas of the best serving cells. A pixel of a coverage
area is coloured if the application cell capacity exceeds ( ) the defined thresholds (the pixel colour depends on the
application cell capacity). Coverage consists of several independent layers whose visibility in the workspace can be
managed. There are as many layers as defined thresholds. Each layer corresponds to an area where the application cell
capacity exceeds a defined threshold.
Peak RLC Allocated Bandwidth Throughput (UL) (kbps)
Atoll calculates peak RLC allocated bandwidth throughputs available on each pixel of the coverage areas of the best
serving cells. A pixel of a coverage area is coloured if the peak RLC allocated bandwidth throughput exceeds ( ) the
defined thresholds (the pixel colour depends on the peak RLC allocated bandwidth throughput). Coverage consists of
>
>
>
>
>
>
>
Forsk 2010 AT283_TRG_E2 613
Chapter 10: LTE Networks
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the peak RLC allocated bandwidth throughput exceeds a defined
threshold.
Effective RLC Allocated Bandwidth Throughput (UL) (kbps)
Atoll calculates effective RLC allocated bandwidth throughputs available on each pixel of the coverage areas of the best
serving cells. A pixel of a coverage area is coloured if the effective RLC allocated bandwidth throughput exceeds ( ) the
defined thresholds (the pixel colour depends on the effective RLC allocated bandwidth throughput). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the effective RLC allocated bandwidth throughput exceeds a defined
threshold.
Application Allocated Bandwidth Throughput (UL) (kbps)
Atoll calculates application allocated bandwidth throughputs available on each pixel of the coverage areas of the best
serving cells. A pixel of a coverage area is coloured if the application allocated bandwidth throughput exceeds ( ) the
defined thresholds (the pixel colour depends on the application allocated bandwidth throughput). Coverage consists of
several independent layers whose visibility in the workspace can be managed. There are as many layers as defined
thresholds. Each layer corresponds to an area where the application allocated bandwidth throughput exceeds a defined
threshold.
10.2.8.3.9 Coverage by Quality Indicator (UL) Display Types
It is possible to display the Coverage by Quality Indicator (UL) coverage prediction with colours depending on quality
indicators available in the document (Quality Indicators table).
Atoll calculates the PUSCH and PUCCH C/(I+N) levels received at the best serving cells from each pixel of their coverage
areas. From the C/(I+N), Atoll determines the best bearer available on each pixel. Then, for the calculated C/(I+N) and
bearer, it determines the value of the selected quality indicator from the quality graphs defined in the LTE equipment of
the best serving cell. A pixel of a coverage area is coloured if the quality indicator value exceeds ( ) the defined thresholds
(the pixel colour depends on the quality indicator value). Coverage consists of several independent layers whose visibility
in the workspace can be managed. There are as many layers as defined thresholds. Each layer corresponds to an area
where the quality indicator value exceeds a defined threshold.
10.3 Calculation Algorithms
The following sections describe all the calculation algorithms used in point analysis, calculation of coverage predictions,
calculations on subscriber lists, and Monte Carlo simulations.
10.3.1 Downlink Transmission Powers Calculation
LTE eNode-Bs have a maximum transmission power which is shared by downlink channels. These channels include the
downlink reference signals, SSS, PSS, PBCH, PDCCH (which is considered to include the PHICH and PCFICH), and
PDSCH. The transmission powers of various channels are determined from the distribution of the total energy over a frame
among the resource elements corresponding to these channels. The energy per resource element (EPRE) of the downlink
reference signals is considered to be the reference with respect to which the EPRE of other channels is determined. You
can either define the reference signal EPRE for each cell, or let Atoll calculate it from the cells maximum power and the
EPRE offsets of other channels. The EPRE offsets of channels other than the downlink reference signals can be positive
values meaning a relative boost with respect to the downlink reference signals EPRE, or negative values meaning a
reduction with respect to the downlink reference signals EPRE.
Atoll first determines the EPRE for each channel in the downlink and then the transmission power corresponding to each
channel from the EPRE values.
Input
: Subcarrier width (15 kHz).
: Width of a frequency block (180 kHz).
: Number of frequency blocks that carry the SS and the PBCH (6).
: Number of slots per subframe (2).
: Cyclic prefix duration defined for the network in the Global Parameters.
: Number of symbol durations per slot (7 is is Normal, 6 if is Extended).
: Number of PDCCH symbol durations per subframe defined in the Global Parameters.
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
>
>
>
AF
W
FB
N
FB SS PBCH ,
N
Sl ot SF
D
CP
N
SD Sl ot
D
CP
D
CP
N
SD PDCCH
N
FB
TX
i
i c ( )
614 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Number of downlink subframes in the frame for the cell TX
i
(ic). It is equal to 10 for FDD frequency bands,
and is determined from the cells TDD frame configuration for TDD frequency bands as follows:
: Number of transmission (downlink) antenna ports defined for the cell TX
i
(ic).
: Maximum transmission power of the cell TX
i
(ic).
: Downlink reference signal EPRE of the cell TX
i
(ic).
You can either set the or for a cell.
: Energy per resource element offset for the SS with respect to the downlink reference signals
EPRE.
: Energy per resource element offset for the PBCH with respect to the downlink reference signals
EPRE.
: Energy per resource element offset for the PDCCH with respect to the downlink reference signals
EPRE.
: Energy per resource element offset for the PDSCH with respect to the downlink reference signals
EPRE.
Calculations
If you have directly entered the downlink reference signal EPRE for the cell, you can skip the section "Calculation of
Downlink Reference Signal EPRE" on page 614 and go directly to the section "Calculation of Other EPREs and Per-
channel Powers" on page 616.
Calculation of Downlink Reference Signal EPRE
In LTE, a resource block (RB) is defined as 1 frequency block by 1 slot. However, schedulers are able to perform resource
allocation every subframe (2 slots). 1 frequency block by 1 subframe (2 slots) is called a scheduler resource block (SRB)
in the calculations below.
The number of modulation symbols (resource elements) per scheduler resource block is calculated as follows:
Where is the number of subcarriers per frequency block calculated as follows:
The total number of modulation symbols (resource elements) in downlink is calculated as follows:
Out of the total number of modulation symbols, Atoll then determines the numbers of modulation symbols corresponding
to each control channel as follows:
The number of modulation symbols for the downlink reference signals
The number of modulation symbols reserved for downlink reference signal transmission in one scheduler resource
block depends on the number of transmission antenna ports:
Configuration
FDD 10
DSUUU-DSUUU 2
DSUUD-DSUUD 4
DSUDD-DSUDD 6
DSUUU-DSUUD 3
DSUUU-DDDDD 6
DSUUD-DDDDD 7
DSUDD-DDDDD 8
N
SF DL
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
Ant TX
TX
i
i c ( )
P
Max
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
P
Max
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
SS
TX
i
i c ( )
AEPRE
PBCH
TX
i
i c ( )
AEPRE
PDCCH
TX
i
i c ( )
AEPRE
PDSCH
TX
i
i c ( )
N
Sym SRB
N
SCa FB
N
SD Sl ot
N
Sl ot SF
=
N
SCa FB
N
SCa FB
W
FB
AF
------------ =
N
Sym DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
Sym SRB
N
SF DL
TX
i
i c ( )
=
Forsk 2010 AT283_TRG_E2 615
Chapter 10: LTE Networks
This gives a number of reserved modulation symbols per frame:
The number of modulation symbols used for downlink reference signal transmission in one scheduler resource
block is:
This gives a number of downlink reference signal modulation symbols per frame:
The number of modulation symbols for the SS
The primary and secondary synchonisation signals are transmitted on 1 symbol duration each in the 1st and the
6th downlink subframes, over the center 6 frequency blocks. Therefore,
And,
The number of modulation symbols for the PBCH
The physical broadcast channel is transmitted on four symbol durations in the 1st downlink subframe over the
center 6 frequency blocks. The physical broadcast channel overlaps with the downlink reference signals,
therefore, some modulation symbols reserved for downlink reference signals are subtracted:
for extended cyclic prefix
for normal cyclic prefix
The number of modulation symbols for the PDCCH
The physical downlink control channel can be transmitted over up to 3 symbol durations in each subframe. The
number of symbol durations for the PDCCH is defined in the global parameters. The physical downlink control
channel overlaps with the downlink reference signals, therefore, some modulation symbols reserved for downlink
reference signals are subtracted:
The number of modulation symbols for the PDSCH
The total number of modulation symbols in the frame excluding all the control channel modulation symbols gives
the number of modulation symbols available for user data, i.e., for the PDSCH:
The energy per resource element for 1 modulation symbol (dBm/Sym) of the downlink reference signals is calculated as
follows:
N
Res SRB
TX
i
i c ( )
8 if N
Ant TX
TX
i
i c ( )
1 = ( )
16 if N
Ant TX
TX
i
i c ( )
2 = ( )
24 if N
Ant TX
TX
i
i c ( )
4 or 8 = ( )

=
N
Sym Res
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
Res SRB
TX
i
i c ( )
=
N
DLRS SRB
TX
i
i c ( )
8 if N
Ant TX
TX
i
i c ( )
1 = ( )
8 if N
Ant TX
TX
i
i c ( )
2 = ( )
6 if N
Ant TX
TX
i
i c ( )
4 or 8 = ( )

=
N
Sym DLRS
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
DLRS SRB
TX
i
i c ( )
=
N
Sym PSS
2 N
FB SS PBCH ,
N
SCa FB
144 = =
N
Sym SSS
2 N
FB SS PBCH ,
N
SCa FB
144 = =
N
Sym SS
N
Sym PSS
N
Sym SSS
+ 288 = =
N
Sym PBCH
TX
i
i c ( )
4 N
SCa FB

N
Res SRB
TX
i
i c ( )
2
--------------------------
\ .
|
| |
N
FB SS PBCH ,
=
N
Sym PBCH
TX
i
i c ( )
4 N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( ) N
FB SS PBCH ,
=
N
Sym PDCCH
TX
i
i c ( )
0 if N
SD PDCCH
0 = ( )
N
SD PDCCH
N
SCa FB
N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )
if N
SD PDCCH
1 = ( ) AND N
Ant TX
TX
i
i c ( )
4 or 8 = ( )
N
SD PDCCH
N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
----------------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )
Otherwi se

=
N
Sym PDSCH
TX
i
i c ( )
N
Sym DL
TX
i
i c ( )
N
Sym Res
TX
i
i c ( )
N
Sym SS
N
Sym PBCH
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )
=
616 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Calculation of Other EPREs and Per-channel Powers
The energy per resource element for 1 modulation symbol (dBm/Sym) of the SS is calculated as follows:
The energy per resource element for 1 modulation symbol (dBm/Sym) of the PBCH is calculated as follows:
The energy per resource element for 1 modulation symbol (dBm/Sym) of the PDCCH is calculated as follows:
The energy per resource element for 1 modulation symbol (dBm/Sym) of the PDSCH is calculated as follows:
The instantaneous downlink reference signal transmission power is calculated as follows:
Where implies that at the instant when downlink reference signals are transmitted, they are transmitted using
2 subcarriers in each frequency block.
The instantaneous SS transmission power is calculated as follows:
The instantaneous PBCH transmission power is calculated as follows:
Where implies that at the instant when the SS and the PBCH are transmitted, they are
transmitted using all the subcarriers in the centre 6 consecutive frequency blocks.
The average PDCCH transmission power is calculated as follows:
The average PDSCH transmission power is calculated as follows:
Note:
For more than one transmission antenna port, antenna ports 0 and 1 transmit reference
signals using different subcarriers during the same OFDM symbol. An Atoll.ini option lets
you include the subcarriers transmitted simultaneously on both antenna ports when
calculating the instantaneous reference signal power. This means that, with this option set,
Atoll will use instead of in the above equation.
The same Atoll.ini option lets you make Atoll apply the transmit diversity gains (the same
used for PDSCH) instead of doubling the number of subcarriers used for transmitting
reference signals when using more than one antenna port.
For more information, see the Administrator Manual.
EPRE
DLRS
TX
i
i c ( )
10 Log 10
P
Max
TX
i
i c ( )
10
--------------------
N
SD Sl ot
N
Sl ot SF
N
SF DL
TX
i
i c ( )

\ .
|
|
|
| |
=
10 L og N
Sym DLRS
TX
i
i c ( )
N
Sym SS
10
AEPRE
SS
TX
i
i c ( )
10
--------------------------------------
N
Sym PBCH
10
AEPRE
PBCH
TX
i
i c ( )
10
--------------------------------------
+ +
\

|
N +
Sym PDCCH
10
AEPRE
PDCCH
TX
i
i c ( )
10
-----------------------------------------
N
Sym PDSCH
10
AEPRE
PDSCH
TX
i
i c ( )
10
-----------------------------------------
+
.
|
|
|
|
EPRE
SS
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
SS
TX
i
i c ( )
+ =
EPRE
PBCH
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
PBCH
TX
i
i c ( )
+ =
EPRE
PDCCH
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
PDCCH
TX
i
i c ( )
+ =
EPRE
PDSCH
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
AEPRE
PDSCH
TX
i
i c ( )
+ =
P
DLRS
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
10 Log 2 N
FB
TX
i
i c ( )
( ) + =
2 N
FB
TX
i
i c ( )

4 N
FB
TX
i
i c ( )
2 N
FB
TX
i
i c ( )

P
SS
TX
i
i c ( )
EPRE
SS
TX
i
i c ( )
10 Log N
SCa FB
N
FB SS PBCH ,
( ) + =
P
PBCH
TX
i
i c ( )
EPRE
PBCH
TX
i
i c ( )
10 Log N
SCa FB
N
FB SS PBCH ,
( ) + =
N
SCa FB
N
FB SS PBCH ,

P
PDCCH
TX
i
i c ( )
EPRE
PDCCH
TX
i
i c ( )
10 Log
N
Sym PDCCH
TX
i
i c ( )
N
SD PDCCH
N
SF DL
TX
i
i c ( )

------------------------------------------------------------
\ .
|
|
| |
+ =
P
PDSCH
TX
i
i c ( )
EPRE
PDSCH
TX
i
i c ( )
10 Log
N
Sym PDSCH
TX
i
i c ( )
N
SD Sl ot
N
Sl ot SF
N
SD PDCCH
( ) N
SF DL
TX
i
i c ( )

---------------------------------------------------------------------------------------------------------------------------
\ .
|
|
| |
+ =
Forsk 2010 AT283_TRG_E2 617
Chapter 10: LTE Networks
As the number of subcarriers used for the PDCCH and PDSCH transmission varies over time, i.e., from one symbol
duration to the next, the instantaneous powers of the PDCCH and the PDSCH also vary over time. This is why average
transmission powers are calculated and used in Atoll.
Output
: Energy per resource element of the downlink reference signals for cell TX
i
(ic).
: Energy per resource element of the SS for cell TX
i
(ic).
: Energy per resource element of the PBCH for cell TX
i
(ic).
: Energy per resource element of the PDCCH for cell TX
i
(ic).
: Energy per resource element of the PDSCH for cell TX
i
(ic).
: Instantaneous transmission power of the downlink reference signals for cell TX
i
(ic).
: Instantaneous transmission power of the SS for cell TX
i
(ic).
: Instantaneous transmission power of the PBCH for cell TX
i
(ic).
: Average transmission power of the PDCCH for cell TX
i
(ic).
: Average transmission power of the PDSCH for cell TX
i
(ic).
10.3.2 Co- and Adjacent Channel Overlaps Calculation
An LTE network can consist of cells that use different channel bandwidths. Therefore, the start and end frequencies of all
the channels may not exactly coincide. Channel bandwidths of cells can overlap each other with different ratios.
The following sections describe how the co- and adjacent channel overlaps are calculated between the channels used by
any studied cell TX
i
(ic) and any other cell TX
j
(jc) of the network. In terms of interference calculation, the studied cell can
be considered a victim of interference received from the other cells that might be interfering the studied cell.
If the studied cell is assigned a channel number , it receives co-channel interference on the channel bandwidth
of , and adjacent channel interference on the adjacent channel bandwidths, i.e., corresponding to
and .
In order to calculate the co- and adjacent channel overlaps between two channels, it is necessary to calculate the start
and end frequencies of both channels (explained in "Conversion From Channel Numbers to Start and End Frequencies"
on page 618). Once the start and end frequencies are known for the studied and other cells, the co- and adjacent overlaps
and the total overlap ratio are calculated as respectively explained in:
"Co-Channel Overlap Calculation" on page 618.
"Adjacent Channel Overlap Calculation" on page 619.
"Total Overlap Ratio Calculation" on page 620.
EPRE
DLRS
TX
i
i c ( )
EPRE
SS
TX
i
i c ( )
EPRE
PBCH
TX
i
i c ( )
EPRE
PDCCH
TX
i
i c ( )
EPRE
PDSCH
TX
i
i c ( )
P
DLRS
TX
i
i c ( )
P
SS
TX
i
i c ( )
P
PBCH
TX
i
i c ( )
P
PDCCH
TX
i
i c ( )
P
PDSCH
TX
i
i c ( )
Figure 10.2Co-Channel and Adjacent Channel Overlaps
N
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
1
N
Channel
TX
i
i c ( )
1 +
618 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.3.2.1 Conversion From Channel Numbers to Start and End Frequencies
Input
and : Start frequencies of the frequency bands assigned to the cells TX
i
(ic) and TX
j
(jc).
can be the start frequency of a TDD frequency band ( ), or the uplink or the downlink start
frequency of an FDD frequency band ( or ).
and : First channel numbers the frequency band assigned to the cells TX
i
(ic) and
TX
j
(jc).
and : Channel numbers assigned to cells TX
i
(ic) and TX
j
(jc).
For FDD networks, Atoll considers that the same channel number is assigned to a cell in the downlink and uplink,
i.e., the channel number you assign to a cell is considered for uplink and downlink both.
and : Bandwidths of the channels assigned to cells TX
i
(ic) and TX
j
(jc).
Calculations
Channel numbers are converted into start and end frequencies as follows:
For cell TX
i
(ic):
For cell TX
j
(jc):
Output
and : Start frequencies for the cells TX
i
(ic) and TX
j
(jc).
and : End frequencies for the cells TX
i
(ic) and TX
j
(jc).
10.3.2.2 Co-Channel Overlap Calculation
Input
and : Start frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 618.
and : End frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 618.
: Bandwidth of the channel assigned to the studied cell TX
i
(ic).
Calculations
Atoll first verifies that co-channel overlap exists between the cells TX
i
(ic) and TX
j
(jc).
Co-channel overlap exists if:
AND
Otherwise there is no co-channel overlap.
Atoll calculates the bandwidth of the co-channel overlap as follows:
The co-channel overlap ratio is given by:
F
Start Band
TX
i
i c ( )
F
Start Band
TX
j
j c ( )
F
Start Band
F
Start TDD
F
Start FDD UL
F
Start FDD DL
N
Channel
Fi rst TX
i
i c ( )
N
Channel
Fi rst TX
j
j c ( )
N
Channel
TX
i
i c ( )
N
Channel
TX
j
j c ( )
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
F
Start
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst TX
i
i c ( )
( ) + =
F
End
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst TX
i
i c ( )
1 + ( ) + =
F
Start
TX
j
j c ( )
F
Start Band
TX
j
j c ( )
W
Channel
TX
j
j c ( )
N
Channel
TX
j
j c ( )
N
Channel
Fi rst TX
j
j c ( )
( ) + =
F
End
TX
j
j c ( )
F
Start Band
TX
j
j c ( )
W
Channel
TX
j
j c ( )
N
Channel
TX
j
j c ( )
N
Channel
Fi rst TX
j
j c ( )
1 + ( ) + =
F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
W
Channel
TX
i
i c ( )
F
Start
TX
i
i c ( )
F
End
TX
j
j c ( )
< F
End
TX
i
i c ( )
F
Start
TX
j
j c ( )
>
W
CCO
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( ) =
Forsk 2010 AT283_TRG_E2 619
Chapter 10: LTE Networks
Output
: Co-channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc).
10.3.2.3 Adjacent Channel Overlap Calculation
Input
and : Start frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 618.
and : End frequencies for the cells TX
i
(ic) and TX
j
(jc) as calculated in "Conversion From Channel
Numbers to Start and End Frequencies" on page 618.
: Bandwidth of the channel assigned to the studied cell TX
i
(ic).
Calculations
Atoll first verifies that adjacent channel overlaps exist between (the lower-frequency and the higher-frequency adjacent
channels of) the cells TX
i
(ic) and TX
j
(jc).
Adjacent channel overlap exists on the lower-frequency adjacent channel if:
AND
Adjacent channel overlap exists on the higher-frequency adjacent channel if:
AND
Otherwise there is no adjacent channel overlap.
Atoll determines the adjacent channel overlap ratio as follows:
Bandwidth of the lower-frequency adjacent channel overlap:
The lower-frequency adjacent channel overlap ratio is given by:
Bandwidth of the higher-frequency adjacent channel overlap:
The higher-frequency adjacent channel overlap ratio is given by:
The adjacent channel overlap ratio is given by:
Output
: Adjacent channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc).
r
CCO
TX
i
i c ( ) TX
j
j c ( ) W
CCO
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
--------------------------------------- =
r
CCO
TX
i
i c ( ) TX
j
j c ( )
F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
W
Channel
TX
i
i c ( )
F
Start
TX
i
i c ( )
W
Channel
TX
i
i c ( )
F
End
TX
j
j c ( )
< F
Start
TX
i
i c ( )
F
Start
TX
j
j c ( )
>
F
End
TX
i
i c ( )
F
End
TX
j
j c ( )
< F
End
TX
i
i c ( )
W
Channel
TX
i
i c ( )
+ F
Start
TX
j
j c ( )
>
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
Start
TX
i
i c ( )
, ( ) Max F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )
W
Channel
TX
i
i c ( )
, ( ) =
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
ACO
L
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
--------------------------------------- =
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
Mi n F
End
TX
j
j c ( )
F
End
TX
i
i c ( )
W
Channel
TX
i
i c ( )
+ , ( ) Max F
Start
TX
j
j c ( )
F
End
TX
i
i c ( )
, ( ) =
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
ACO
H
TX
i
i c ( ) TX
j
j c ( )
W
Channel
TX
i
i c ( )
--------------------------------------- =
r
ACO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
L
TX
i
i c ( ) TX
j
j c ( )
r
ACO
H
TX
i
i c ( ) TX
j
j c ( )
+ =
r
ACO
TX
i
i c ( ) TX
j
j c ( )
620 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.3.2.4 Total Overlap Ratio Calculation
Input
: Co-channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Co-Channel
Overlap Calculation" on page 618.
: Adjacent channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Adjacent
Channel Overlap Calculation" on page 619.
: Adjacent channel suppression factor defined for the frequency band of the cell TX
i
(ic).
and : Bandwidths of the channels assigned to the cells TX
i
(ic) and TX
j
(jc).
Calculations
The total overlap ratio is:
The multiplicative factor is used to normalise the transmission power of the interfering cell TX
j
(jc). This means
that if the interfering cell transmits at X dBm over a bandwidth of , and it interferes over a bandwidth less than
, the interference from this cell should not be considered at X dBm but less than that. The factor
converts X dBm over to Y dBm (which is less than X dBm) over less than .
Output
: Total co- and adjacent channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc).
10.3.3 Signal Level and Signal Quality Calculations
These calculations include the calculation of the received signal levels, and noise and interference. The following sections
describe how the received signal levels, the noise and interference, C/N, and C/(I+N) ratios are calculated in Atoll:
"Signal Level Calculation (DL)" on page 585.
"Noise Calculation (DL)" on page 623.
"Interference Calculation (DL)" on page 624.
"C/N Calculation (DL)" on page 628.
"C/(I+N) and Bearer Calculation (DL)" on page 630.
"Signal Level Calculation (UL)" on page 634.
"Noise Calculation (UL)" on page 636.
"Interference Calculation (UL)" on page 636.
"Noise Rise Calculation (UL)" on page 638.
"C/N Calculation (UL)" on page 639.
"C/(I+N) and Bearer Calculation (UL)" on page 641.
10.3.3.1 Signal Level Calculation (DL)
Input
: Transmission power of the downlink reference signals for cell TX
i
(ic) as calculated in "Downlink
Transmission Powers Calculation" on page 613.
: Transmission power of the SS for cell TX
i
(ic) as calculated in "Downlink Transmission Powers
Calculation" on page 613.
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
f
ACS
TX
i
i c ( )
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS
TX
i
i c ( )

10
---------------------
+
\ .
|
|
|
| |
if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
>
r
CCO
TX
i
i c ( ) TX
j
j c ( )
r
ACO
TX
i
i c ( ) TX
j
j c ( )
10
f
ACS
TX
i
i c ( )

10
---------------------
+
\ .
|
|
|
| |
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------ if W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
<

=
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------
W
Channel
TX
j
j c ( )
W
Channel
TX
j
j c ( ) W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
------------------------
W
Channel
TX
j
j c ( )
W
Channel
TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
P
DLRS
TX
i
i c ( )
P
SS
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 621
Chapter 10: LTE Networks
: Transmission power of the PBCH for cell TX
i
(ic) as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Transmission power of the PDCCH for cell TX
i
(ic) as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Transmission power of the PDSCH for cell TX
i
(ic) as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Energy per resource element of the downlink reference signals for cell TX
i
(ic) as calculated in
"Downlink Transmission Powers Calculation" on page 613.
: Energy per resource element of the SS for cell TX
i
(ic) as calculated in "Downlink Transmission
Powers Calculation" on page 613.
: Energy per resource element of the PBCH for cell TX
i
(ic) as calculated in "Downlink Transmission
Powers Calculation" on page 613.
: Energy per resource element of the PDCCH for cell TX
i
(ic) as calculated in "Downlink
Transmission Powers Calculation" on page 613.
: Energy per resource element of the PDSCH for cell TX
i
(ic) as calculated in "Downlink Transmission
Powers Calculation" on page 613.
: Transmitter antenna gain for the antenna used by the transmitter TX
i
( ).
: Total transmitter losses for the transmitter TX
i
( ).
: Loss on the transmitter-receiver path (path loss) calculated using a propagation model.
: Antenna attenuation (from antenna patterns) calculated for the antenna used by the transmitter TX
i.
: Shadowing margin based on the Model standard deviation.
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Indoor losses taken into account when the option "Indoor coverage" is selected.
: Receiver terminal losses for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna gain for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna attenuation calculated for the pixel, subscriber, or mobile M
i
.
For calculating the useful signal level from the best serving cell, is determined in the direction (H,V) = (0,0)
from the antenna patterns of the antenna used by M
i
. For calculating the interfering signal level from any interferer,
is determined in the direction of the interfering cell from the antenna patterns of the antenna used by M
i
, while
the antenna is pointed towards M
i
s best serving cell.
: Body loss defined for the service used by the pixel, subscriber, or mobile M
i
.
: Cyclic prefix duration defined for the network in the Global Parameters.
Calculations
The received signal levels (dBm) from any cell TX
i
(ic) are calculated for a pixel, subscriber, or mobile M
i
as follows:
,
,
,
, and
Note:
, , , and are not used in the calculations performed for the point
analysis tools profile tab, delta path loss calculation, and the downlink reference signal
level based coverage predictions.
P
PBCH
TX
i
i c ( )
P
PDCCH
TX
i
i c ( )
P
PDSCH
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
EPRE
SS
TX
i
i c ( )
EPRE
PBCH
TX
i
i c ( )
EPRE
PDCCH
TX
i
i c ( )
EPRE
PDSCH
TX
i
i c ( )
G
TX
i
G
TX
i
G
Ant
TX
i
=
L
TX
i
L
TX
i
L
Total DL
=
L
Model
L
Ant
TX
i
M
Shadowi ng Model
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Ant
M
i
L
Ant
M
i
L
Body
M
i
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
D
CP
C
DLRS
TX
i
i c ( )
EIRP
DLRS
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + =
C
SS
TX
i
i c ( )
EIRP
SS
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + =
C
PBCH
TX
i
i c ( )
EIRP
PBCH
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + =
C
PDCCH
TX
i
i c ( )
EIRP
PDCCH
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + =
622 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
.
The energy per resource element (dBm/Sym) received from any cell TX
i
(ic) are calculated for a pixel, subscriber, or mobile
M
i
as follows:
,
,
,
, and
.
Where EIRP is the effective isotropic radiated power of the cell calculated as follows:
,
,
,
, and
.
is the path loss (dB) calculated as follows:
Furthermore, the total losses between the cell and the pixel, subscriber, or mobile M
i
can be calculated as follows:
is the cyclic prefix factor, i.e., the ratio of the useful symbol energy to the total symbol energy.
The total symbol duration of a modulation symbol comprises the useful symbol duration, carrying the actual data bits, and
a cyclic prefix, added to the useful data bits as padding against multi-path to avoid inter-symbol interference. Hence, the
total energy within a modulation symbol belongs in part to the useful data bits and in part to the cyclic prefix. Once a
modulation symbol is received, only the energy of the useful data bits can be used for extracting the data. The energy
belonging to the cyclic prefix is lost once it has served its purpose of combatting inter-symbol interference. Therefore,
implies that the energy belonging to the cyclic prefix is excluded from the useful signal level.
The cyclic prefix energy and the useful data bits energy are both taken into account when calculating interfering signal
levels.
Output
: Received downlink reference signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Received SS signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Received PBCH signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Received PDCCH signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Received PDSCH signal level from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Received downlink reference signal energy per resource element from the cell TX
i
(ic) at the pixel,
subscriber, or mobile M
i
.
: Received SS energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
C
PDSCH
TX
i
i c ( )
EIRP
PDSCH
TX
i
i c ( )
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + =
E
DLRS
TX
i
i c ( )
EPRE
DLRS
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + + =
E
SS
TX
i
i c ( )
EPRE
SS
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + + =
E
PBCH
TX
i
i c ( )
EPRE
PBCH
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + + =
E
PDCCH
TX
i
i c ( )
EPRE
PDCCH
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + + =
E
PDSCH
TX
i
i c ( )
EPRE
PDSCH
TX
i
i c ( )
G
TX
i
L
TX
i
L
Path
M
Shadowi ng Model
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + + =
EIRP
DLRS
TX
i
i c ( )
P
DLRS
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
EIRP
SS
TX
i
i c ( )
P
SS
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
EIRP
PBCH
TX
i
i c ( )
P
PBCH
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
EIRP
PDCCH
TX
i
i c ( )
P
PDCCH
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
EIRP
PDSCH
TX
i
i c ( )
P
PDSCH
TX
i
i c ( )
G
TX
i
L
TX
i
+ =
L
Path
L
Path
L
Model
L
Ant
TX
i
+ =
L
Total
L
Path
L
TX
i
L
Indoor
M
Shadowi ng Model
+ + + G
TX
i
L
M
i
G
M
i
L
Ant
M
i
+ + = L
Body
M
i
+
f
CP
f
CP
f
CP
10 Log 7 7.5 ( ) If D
CP
Normal =
10 Log 6 7.5 ( ) If D
CP
Extended =
0 If TX
i
i c ( ) is an interferer

=
C
DLRS
TX
i
i c ( )
C
SS
TX
i
i c ( )
C
PBCH
TX
i
i c ( )
C
PDCCH
TX
i
i c ( )
C
PDSCH
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
E
SS
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 623
Chapter 10: LTE Networks
: Received PBCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
.
: Received PDCCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile
M
i
.
: Received PDSCH eneregy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile
M
i
.
: Path loss between the cell TX
i
(ic) and the pixel, subscriber, or mobile M
i
.
: Total losses between the cell TX
i
(ic) and the pixel, subscriber, or mobile M
i
.
10.3.3.2 Noise Calculation (DL)
For determining the C/N and C/(I+N), Atoll calculates the downlink noise over the bandwidth used by the cell for
transmitting different channels. The used bandwidth depends on the number of subcarriers used for transmission.
The downlink noise comprises thermal noise and the noise figure of the equipment. The thermal noise density depends
on the temperature, i.e., it remains constant for a given temperature. However, the value of the thermal noise varies with
the used bandwidth.
Input
K: Boltzmanns constant.
T: Temperature in Kelvin.
: Subcarrier width (15 kHz).
: Width of a frequency block in the frequency domain (180 kHz).
: Number of frequency blocks that carry the SS and the PBCH (6).
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Noise figure of the terminal used for calculations by the pixel, subscriber, or mobile M
i
.
Calculations
The power spectral density of thermal noise is calculated as follows:
The thermal noise for one resource element, i.e., over one subcarrier, is calculated as follows:
The thermal noise for different downlink channels is calculated as follows:
The downlink noise is the sum of the thermal noise and the noise figure of the terminal used for the calculations by the
pixel, subscriber, or mobile M
i
. The downlink noise for one resource element, i.e., over one subcarrier, is calculated as
follows:
The downlink noise for different channels is calculated as follows:
E
PBCH
TX
i
i c ( )
E
PDCCH
TX
i
i c ( )
E
PDSCH
TX
i
i c ( )
L
Path
L
Total
AF
W
FB
N
FB SS PBCH ,
N
FB
TX
i
i c ( )
nf
M
i
n
0
10 Log K T 1000 ( ) 174 dBm/Hz = =
n
0 Sym
TX
i
i c ( )
n
0
10 Log AF ( ) + =
n
0 DLRS
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) + =
n
0 SS
TX
i
i c ( )
n
0
10 Log N
FB SS PBCH ,
W
FB
1000 ( ) + =
n
0 PBCH
TX
i
i c ( )
n
0
10 Log N
FB SS PBCH ,
W
FB
1000 ( ) + =
n
0 PDCCH
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) + =
n
0 PDSCH
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) + =
n
Sym
TX
i
i c ( )
n
0 Sym
TX
i
i c ( )
nf
M
i
+ =
n
DLRS
TX
i
i c ( )
n
0 DLRS
TX
i
i c ( )
nf
M
i
+ =
n
SS
TX
i
i c ( )
n
0 SS
TX
i
i c ( )
nf
M
i
+ =
n
PBCH
TX
i
i c ( )
n
0 PBCH
TX
i
i c ( )
nf
M
i
+ =
n
PDCCH
TX
i
i c ( )
n
0 PDCCH
TX
i
i c ( )
nf
M
i
+ =
624 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Effect of Static Downlink ICIC Using Fractional Frequency Reuse:
If the cell supports Static DL ICIC, it means that a part of the LTE frame may use a fraction of the channel
bandwidth. Currently, the size of the fraction is fixed to be 1/3rd of the channel bandwidth.
The power transmitted over a fraction has thrice the spectral density of the power transmitted over the entire
channel bandwidth. When calculating the downlink C/N and C/(I+N) ratios, the three times increase in power due
to this power concentration is equivalent to a reduction in the noise level by three. Hence, in case of static downlink
ICIC using FFR, the thermal noise power at the pixel, subscriber, or mobile M
i
that is allocated to the ICIC part of
the LTE frame is reduced by a factor of 3:
The SS and PBCH always use the centre six frequency blocks. Hence, there is no change in their noise levels.
Whether a pixel, subscriber, or mobile M
i
is covered by the ICIC part of the frame is determined as explained in
"Best Server Determination" on page 644.
Output
: Downlink noise for one subcarrier.
: Downlink noise for the downlink reference signals for the cell TX
i
(ic).
: Downlink noise for the SS for the cell TX
i
(ic).
: Downlink noise for the PBCH for the cell TX
i
(ic).
: Downlink noise for the PDCCH for the cell TX
i
(ic).
: Downlink noise for the PDSCH for the cell TX
i
(ic).
10.3.3.3 Interference Calculation (DL)
The interference received by any pixel, subscriber, or mobile, served by a cell TX
i
(ic) from other cells TX
j
(jc) can be defined
as the signal levels received from interfering cells TX
j
(jc) depending on the overlap that exists between the channels used
by the cells TX
i
(ic) and TX
j
(jc), on the traffic loads of the interfering cells TX
j
(jc), and whether the cells support ICIC or not.
Input
: Received downlink reference energy per resource element received from any interfering cell TX
j
(jc) as
calculated in "Signal Level Calculation (DL)" on page 620 at the pixel, subscriber, or mobile M
i
covered by the cell
TX
i
(ic).
: Received SS energy per resource element received from any interfering cell TX
j
(jc) as calculated in
"Signal Level Calculation (DL)" on page 620 at the pixel, subscriber, or mobile M
i
covered by the cell TX
i
(ic).
: Received PBCH energy per resource element received from any interfering cell TX
j
(jc) as calculated in
"Signal Level Calculation (DL)" on page 620 at the pixel, subscriber, or mobile M
i
covered by the cell TX
i
(ic).
: Received PDCCH energy per resource element received from any interfering cell TX
j
(jc) as calculated
in "Signal Level Calculation (DL)" on page 620 at the pixel, subscriber, or mobile M
i
covered by the cell TX
i
(ic).
: Received PDSCH energy per resource element received from any interfering cell TX
j
(jc) as calculated
in "Signal Level Calculation (DL)" on page 620 at the pixel, subscriber, or mobile M
i
covered by the cell TX
i
(ic).
: Shadowing margin based on the Model standard deviation.
: Shadowing margin based on the C/I standard deviation.
In Monte Carlo simulations, the received energies per resource element from interferers already include
, as explained in "Signal Level Calculation (DL)" on page 620.
n
PDSCH
TX
i
i c ( )
n
0 PDSCH
TX
i
i c ( )
nf
M
i
+ =
n
0 DLRS
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000
1
3
---
\ .
| |
+ =
n
0 PDCCH
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000
1
3
---
\ .
| |
+ =
n
0 PDSCH
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000
1
3
---
\ .
| |
+ =
n
Sym
TX
i
i c ( )
n
DLRS
TX
i
i c ( )
n
SS
TX
i
i c ( )
n
PBCH
TX
i
i c ( )
n
PDCCH
TX
i
i c ( )
n
PDSCH
TX
i
i c ( )
E
DLRS
TX
j
j c ( )
E
SS
TX
j
j c ( )
E
PBCH
TX
j
j c ( )
E
PDCCH
TX
j
j c ( )
E
PDSCH
TX
j
j c ( )
M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
Forsk 2010 AT283_TRG_E2 625
Chapter 10: LTE Networks
In coverage predictions, the ratio is applied to the interfering signals (for
more information, see "Shadowing Model" on page 115). As the received energies per resource element from
interferers already include , is added to the received energies per resource
element from interferers in order to achieve the ratio :
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Number of downlink reference signal resource elements as calculated in "Downlink Transmission
Powers Calculation" on page 613.
: Number of SS resource elements as calculated in "Downlink Transmission Powers Calculation" on
page 613.
: Number of PBCH resource elements as calculated in "Downlink Transmission Powers Calculation"
on page 613.
: Number of PDCCH resource elements as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Number of PDSCH resource elements as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Total number of downlink resource elements as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Total channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Co- and Adjacent
Channel Overlaps Calculation" on page 617.
: Downlink traffic load of the interfering cell TX
j
(jc).
Traffic loads can either be calculated using Monte Carlo simulations, or entered manually for each cell. Calculation
of traffic loads is explained in "Simulation Process" on page 604.
: Width of a frequency block in the frequency domain (180 kHz).
: Number of frequency blocks that carry the SS and the PBCH (6).
and : Start frequencies of the frequency bands assigned to the cells TX
i
(ic) and TX
j
(jc).
can be the start frequency of a TDD frequency band ( ), or the uplink or the downlink start
frequency of an FDD frequency band ( or ).
and : First channel numbers the frequency band assigned to the cells TX
i
(ic) and
TX
j
(jc).
and : Channel numbers assigned to cells TX
i
(ic) and TX
j
(jc).
For FDD networks, Atoll considers that the same channel number is assigned to a cell in the downlink and uplink,
i.e., the channel number you assign to a cell is considered for uplink and downlink both.
and : Bandwidths of the channels assigned to cells TX
i
(ic) and TX
j
(jc).
and : Physical cell IDs of the cells TX
i
(ic) and TX
j
(jc).
and : ICIC ratios of the cells TX
i
(ic) and TX
j
(jc).
: Number of transmission (downlink) antenna ports defined for the cell TX
j
(jc).
Calculations
The interfering energy per resource element (dBm/Sym) received over downlink reference signals from any cell TX
j
(jc) at
a pixel, subscriber, or mobile M
i
is calculated as follows:
M
Shadowi ng Model
M
Shadowi ng C I

M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
M
Shadowi ng C I

E
TX
j
j c ( )
E
TX
j
j c ( )
M
Shadowi ng C I
+ =
N
Sym DLRS
TX
j
j c ( )
N
Sym SS
N
Sym PBCH
TX
j
j c ( )
N
Sym PDCCH
TX
j
j c ( )
N
Sym PDSCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
TL
DL
TX
j
j c ( )
W
FB
N
FB SS PBCH ,
F
Start Band
TX
i
i c ( )
F
Start Band
TX
j
j c ( )
F
Start Band
F
Start TDD
F
Start FDD UL
F
Start FDD DL
N
Channel
Fi rst TX
i
i c ( )
N
Channel
Fi rst TX
j
j c ( )
N
Channel
TX
i
i c ( )
N
Channel
TX
j
j c ( )
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
ID

TX
i
i c ( )
ID

TX
j
j c ( )
r
DL ICIC
TX
i
i c ( )
r
DL ICIC
TX
j
j c ( )
N
Ant TX
TX
j
j c ( )
626 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The interfering energy per resource element (dBm/Sym) received over the SS and the PBCH from any cell TX
j
(jc) at a
pixel, subscriber, or mobile M
i
is calculated as follows:
The interfering energy per resource element (dBm/Sym) received over the PDSCH and the PDCCH from any cell TX
j
(jc)
at a pixel, subscriber, or mobile M
i
is calculated as follows:
E-UTRA carrier RSSI is measured on the OFDM symbols that contain reference signals. Therefore, the interfering energy
per frequency block (dBm/RB) received from any cell TX
j
(jc) at a pixel, subscriber, or mobile M
i
over 1 frequency block
during an OFDM symbol carrying reference signals, is given as follows:
In OFDM symbols that contain reference signals, 2 subcarriers are used to transmit reference signals and 10 are used to
transmit either PDCCH or PDSCH.
Where is the DC subcarrier shift factor. This factor represents the difference in the DC subcarrier
frequencies of the interfered and interfering cells with respect to the SS and the PBCH bandwidth. The DC subcarrier shift
factor is calculated as follows:
Where and are the centre frequencies of the channels used by TX
i
(ic) and TX
j
(jc) respectively. These
are the frequencies where the DC subcarrier is located. The centre frequencies are calculated as follows:
For cell TX
i
(ic):
For cell TX
j
(jc):
is the interference increment due to more than one transmission antenna port:
If you do not wish to apply , add the following lines in the Atoll.ini file:
[LTE]
c
DLRS
TX
j
j c ( )
10 Log 10
E
DLRS
TX
j
j c ( )
10
--------------------
N
Sym DLRS
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------- 10
E
PDSCH
TX
j
j c ( )
f
ICIC DL
TX
i
i c ( ) TX
j
j c ( )
+
10
---------------------------------------------------------------------
N
Sym PDSCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
----------------------------------- TL
DL
TX
j
j c ( )
+
\

|
=
10
E
PDCCH
TX
j
j c ( )
10
-----------------------
N
Sym PDCCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------------
.
|
|
|
|
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ + +
c
SS PBCH ,
TX
j
j c ( )
10 Log
10
E
SS
TX
j
j c ( )
10
--------------------
N
Sym SS
10
E
PBCH
TX
j
j c ( )
10
--------------------
N
Sym PBCH
TX
j
j c ( )
+
N
Sym SS
N
Sym PBCH
TX
j
j c ( )
+
------------------------------------------------------------------------------------------------------------------------- 1 f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
( )
\

|
=
10
E
PDSCH
TX
j
j c ( )
10
-----------------------
f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
TL
DL
TX
j
j c ( )

.
|
|
|
|
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ + +
c
PDSCH PDCCH ,
TX
j
j c ( )
10 Log 10
E
DLRS
TX
j
j c ( )
10
--------------------
N
Sym DLRS
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------- 10
E
PDSCH
TX
j
j c ( )
f
ICIC DL
TX
i
i c ( ) TX
j
j c ( )
+
10
---------------------------------------------------------------------
N
Sym PDSCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
----------------------------------- TL
DL
TX
j
j c ( )
+
\

|
=
10
E
PDCCH
TX
j
j c ( )
10
-----------------------
N
Sym PDCCH
TX
j
j c ( )
N
Sym DL
TX
j
j c ( )
------------------------------------
.
|
|
|
|
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ + +
c
RSSI
TX
j
j c ( )
10 Log 10
E
DLRS
TX
j
j c ( )
10
--------------------
2
10
E
PDSCH
TX
j
j c ( )
f
I CI C DL
TX
i
i c ( ) TX
j
j c ( )
+
10
---------------------------------------------------------------------
N
Sym PDSCH
TX
j
j c ( )
TL
DL
TX
j
j c ( )
10
E
PDCCH
TX
j
j c ( )
10
-----------------------
N
Sym PDCCH
TX
j
j c ( )
+
N
Sym PDSCH
TX
j
j c ( )
N
Sym PDSCH
TX
j
j c ( )
+
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 10 +
\ .
|
|
|
|
|
| |
=
f
O
TX
i
i c ( ) TX
j
j c ( )
f
MIMO
TX
j
j c ( )
+ +
f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
Mi n 1
F
Centre
TX
i
i c ( )
F
Centre
TX
j
j c ( )

N
FB SS PBCH ,
W
FB

-------------------------------------------------------
,
\ .
|
| |
=
F
Centre
TX
i
i c ( )
F
Centre
TX
j
j c ( )
F
Centre
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
N
Channel
Fi rst TX
i
i c ( )

1
2
--- +
\ .
| |
+ =
F
Centre
TX
j
j c ( )
F
Start Band
TX
j
j c ( )
W
Channel
TX
j
j c ( )
N
Channel
TX
j
j c ( )
N
Channel
Fi rst TX
j
j c ( )

1
2
--- +
\ .
| |
+ =
f
MIMO
TX
j
j c ( )
f
MIMO
TX
j
j c ( )
10 Log N
Ant TX
TX
j
j c ( )
( ) =
f
MIMO
TX
j
j c ( )
Forsk 2010 AT283_TRG_E2 627
Chapter 10: LTE Networks
MultiAntennaInterference is set to 1 by default.
Calculations for the interference reduction factors due to channel overlapping ( ) and static downlink ICIC
using fractional frequency reuse ( ) are explained below:
Interference reduction due to the co- and adjacent channel overlap between the studied and the interfering
cells:
Interference reduction due to the co- and adjacent channel overlap between the cells TX
i
(ic) and TX
j
(jc) is
calculated as follows:
Interference reduction due to static downlink ICIC using fractional frequency reuse:
If the cell supports Static DL ICIC, it means that a part of the LTE frame may use a fraction of the channel
bandwidth. Currently, the size of the fraction is fixed to be 1/3rd of the channel bandwidth. There are two effects:
1. Power concentration, which means that the spectral density of the power transmitted over a fraction of the channel
is higher than the spectral density of the same power transmitted over the entire channel bandwidth. The effect of
power concentration is visible when calculating the C/N and C/(I+N). The power transmitted over a fraction has
thrice the spectral density of the power transmitted over the entire channel bandwidth. When calculating the
downlink C/N and C/(I+N) ratios, the three times increase in power due to this power concentration is equivalent
to a reduction in noise and interference by three. Hence, in case of static downlink ICIC using FFR, the interference
at the pixel, subscriber, or mobile M
i
that is allocated to the ICIC part of the LTE frame is reduced by a factor of 3.
2. Collision probability between the subcarriers used by the fractions of the channels being used by the interfered
and interfering cells. The following paragraphs explain how the collision probability is calculated.
The ICIC Ratio ratio is the percentage of the total downlink traffic load present in the ICIC part of the frame. For
example, if the downlink traffic load is 80 %, and the ICIC ratio is 50 %, then this means that the downlink traffic
load of the ICIC part of the frame is 40 % (i.e., 50 % of 80 %), and the downlink traffic load of the non-ICIC part of
the frame is 40 %.
In coverage predictions, Atoll uses the ICIC ratios stored in the cell properties for determining the interference. In
simulations, Atoll resets the ICIC ratios for all the cells to 0, and then calculates them according to the traffic loads
of the mobiles allocated to the ICIC and non-ICIC parts of the frame.
Atoll determines the switching point between the ICIC and the non-ICIC parts of the frame using the ICIC ratio.
The switching points between the ICIC and non-ICIC parts of the frame of the victim and interfering cells, TX
i
(ic)
and TX
j
(jc) respectively, are calculated as follows:
and
Where, SP is the switching point between the ICIC and the non-ICIC parts of the frame, and is the
downlink ICIC ratios of the cells.
If the downlink ICIC ratio is set to 0, it means that the ICIC part of the frame does not exist. Setting it to 0 gives SP
= 0, and setting it to 1 gives SP = 1 (or 100%), which shows how the switching point varies with the ICIC ratio.
With cells using static downlink ICIC, there can be four different interference scenarios.
a. Between the ICIC part of the victim and the ICIC part of the interferer.
b. Between the ICIC part of the victim and the non-ICIC part of the interferer.
c. Between the non-ICIC part of the victim and the ICIC part of the interferer.
d. Between the non-ICIC part of the victim and the non-ICIC part of the interferer.
Therefore, Atoll calculates the probabilities of collision for each scenario and weights the total interference
according to the total collision probability. The probability of collision for each scenario is:
MultiAntennaInterference = 0
Derivation of the switching point formula:
The ICIC ratio is used to partition the total downlink traffic load into ICIC and non-ICIC parts
of the frame. Therefore, the switching point formula is derived from the equation:
f
O
TX
i
i c ( ) TX
j
j c ( )
f
ICIC DL
TX
i
i c ( ) TX
j
j c ( )
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( ) =
SP
TX
i
i c ( ) r
DL ICIC
TX
i
i c ( )
r
DL ICIC
TX
i
i c ( ) 1 r
DL ICIC
TX
i
i c ( )
( )
3
------------------------------------- +
------------------------------------------------------------------ = SP
TX
j
j c ( ) r
DL ICIC
TX
j
j c ( )
r
DL ICIC
TX
j
j c ( ) 1 r
DL ICIC
TX
j
j c ( )
( )
3
------------------------------------- +
------------------------------------------------------------------ =
r
DL ICIC
r
DL ICIC
TL
DL

SP
W
Channel
3
------------------------
------------------------------------------
1 r
DL ICIC
( ) TL
DL

1 SP ( ) W
Channel

--------------------------------------------------------- =
p
Col l
628 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The PSS ID and SSS ID are determined from the physical cell ID of a cell as follows:
There can be 2 cases for calculating the total probability of collision.
- Case 1: If the pixel, subscriber, or mobile M
i
is covered by the ICIC part of TX
i
(ic), the total collision probability
for the pixel, subscriber, or mobile M
i
is calculated as follows:
- Case 2: If the pixel, subscriber, or mobile M
i
is covered by the non-segmented zone of TX
i
(ic), the total
collision probability for the pixel, subscriber, or mobile M
i
is calculated as follows:
The interference reduction factor due to static downlink ICIC using fractional frequency reuse for the pixel,
subscriber, or mobile M
i
is calculated as follows:
Whether a pixel, subscriber, or mobile M
i
is covered by the ICIC part of the frame is determined as explained in
"Best Server Determination" on page 644.
Output
: Interfering energy per resource element (dBm/Sym) received over downlink reference signals from any
cell TX
j
(jc) at a pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic).
: Interfering energy per resource element (dBm/Sym) received over the SS and the PBCH from any cell
TX
j
(jc) at a pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic).
: Interfering energy per resource element (dBm/Sym) received over the PDSCH and the PDCCH
from any cell TX
j
(jc) at a pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic).
and are the same.
: Interfering energy per frequency block (dBm/RB) received from any cell TX
j
(jc) at a pixel, subscriber, or
mobile M
i
over 1 frequency block during an OFDM symbol carrying reference signals.
10.3.3.4 C/N Calculation (DL)
Input
: Received downlink reference signal energy per resource element from the cell TX
i
(ic) at the pixel,
subscriber, or mobile M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
Case
Interfered cell Interfering cell
a ICIC ICIC
0 if
1 if
b ICIC Non ICIC 1
c Non ICIC ICIC 1/3
d Non ICIC Non ICIC 1
TX
i
i c ( ) TX
j
j c ( )
p
Col l
ID
PSS
TX
i
i c ( )
ID
PSS
TX
j
j c ( )
=
ID
PSS
TX
i
i c ( )
ID
PSS
TX
j
j c ( )
=
ID
PSS
ID

Modulo 3 =
ID
SSS
Fl oor ID

3 ( ) =
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
p
Col l
a
If SP
TX
j
j c ( )
SP
TX
i
i c ( )
>
p
Col l
a
SP
TX
j
j c ( )
p
Col l
b
SP
TX
i
i c ( )
SP
TX
j
j c ( )
( ) +
SP
TX
i
i c ( )
---------------------------------------------------------------------------------------------------------------------------- If SP
TX
j
j c ( )
SP
TX
i
i c ( )
<

=
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
p
Col l
d
If SP
TX
j
j c ( )
SP
TX
i
i c ( )
s
p
Col l
d
1 SP
TX
j
j c ( )
( ) p
Col l
c
SP
TX
j
j c ( )
SP
TX
i
i c ( )
( ) +
1 SP
TX
i
i c ( )
( )
------------------------------------------------------------------------------------------------------------------------------------------ If SP
TX
j
j c ( )
SP
TX
i
i c ( )
>

=
f
ICIC DL
TX
i
i c ( ) TX
j
j c ( )
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( ) =
c
DLRS
TX
j
j c ( )
c
SS PBCH ,
TX
j
j c ( )
c
PDSCH PDCCH ,
TX
j
j c ( )
c
DLRS
TX
j
j c ( )
c
PDSCH PDCCH ,
TX
j
j c ( )
c
RSSI
TX
j
j c ( )
E
DLRS
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 629
Chapter 10: LTE Networks
: Received SS energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as
calculated in "Signal Level Calculation (DL)" on page 620.
: Received PBCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Received PDCCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile
M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Received PDSCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile
M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Downlink noise for one subcarrier for the cell TX
i
(ic) as calculated in "Noise Calculation (DL)" on
page 623.
: Downlink reference signal C/(I+N) from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
as calculated in
"C/(I+N) and Bearer Calculation (DL)" on page 630.
: AMS threshold defined for the cell TX
i
(ic).
: Bearer selection thresholds of the bearers defined in the LTE equipment used by M
i
s terminal.
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of transmission (downlink) antenna ports defined for the cell TX
i
(ic).
: Number of reception (downlink) antenna ports defined for the terminal used by the pixel, subscriber, or
mobile M
i
.
: Mobility used for the calculations.
: Downlink block error rate read from the graphs available in the LTE equipment assigned to the
terminal used by the pixel, subscriber, or mobile M
i
.
Calculations
The C/N for cell TX
i
(ic) are calculated as follows for any pixel, subscriber, or mobile M
i
:
Bearer Determination:
The bearers available for selection in the pixel, subscriber, or mobile M
i
s LTE equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the PDSCH C/N at M
i
:
If the cell supports Transmit Diversity or AMS, the transmit diversity gain, , corresponding to the bearer
is applied to its selection threshold. The gain is read from the properties of the LTE equipment assigned to the
pixel, subscriber, or mobile M
i
for , , , .
The additional downlink diversity gain defined for the clutter class of the pixel, subscriber, or mobile M
i

is also applied. Therefore, the bearers available for selection are all the bearers defined in the LTE equipment
for which the following is true:
In case of Transmit Diversity:
E
SS
TX
i
i c ( )
E
PBCH
TX
i
i c ( )
E
PDCCH
TX
i
i c ( )
E
PDSCH
TX
i
i c ( )
n
Sym
TX
i
i c ( )
CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
T
B
M
i
B
DL Hi ghest
M
i
Servi ce ( )
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Mobi l i ty M
i
( )
BLER B
DL
M
i
( )
CNR
DLRS
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
n
Sym
TX
i
i c ( )
=
CNR
SS
TX
i
i c ( )
E
SS
TX
i
i c ( )
n
Sym
TX
i
i c ( )
=
CNR
PBCH
TX
i
i c ( )
E
PBCH
TX
i
i c ( )
n
Sym
TX
i
i c ( )
=
CNR
PDCCH
TX
i
i c ( )
E
PDCCH
TX
i
i c ( )
n
Sym
TX
i
i c ( )
=
CNR
PDSCH
TX
i
i c ( )
E
PDSCH
TX
i
i c ( )
n
Sym
TX
i
i c ( )
=
T
B
M
i
CNR
PDSCH
TX
i
i c ( )
<
G
Di v
DL
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Mobi l i ty M
i
( ) BLER B
DL
M
i
( )
AG
Di v
DL
630 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
In case of AMS:
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak RLC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest downlink peak
RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
- Effective RLC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest downlink
effective RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 649.
MIMO Transmit Diversity Gain:
Once the bearer is known, the PDSCH C/N calculated above become:
In case of Transmit Diversity:
In case of AMS:
Where is the transmit diversity gain corresponding to the selected bearer.
Output
: Downlink reference signal C/N from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: SS C/N from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: PBCH C/N from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: PDCCH C/N from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: PDSCH C/N from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
10.3.3.5 C/(I+N) and Bearer Calculation (DL)
The carrier signal to interference and noise ratio is calculated in three steps. First Atoll calculates the received signal level
from the studied cell (as explained in "Signal Level Calculation (DL)" on page 620) at the pixel, subscriber, or mobile under
study. Next, Atoll calculates the interference received at the same studied pixel, subscriber, or mobile from all the
interfering cells (as explained in "Interference Calculation (DL)" on page 624). Interference from each cell is weighted
according to the co- and adjacent channel overlap between the studied and the interfering cells, the traffic loads of the
interfering cells, and the probability of collision in case ICIC is used by the cells. Finally, Atoll takes the ratio of the signal
level and the sum of the total interference from other cells and the downlink noise (as calculated in "Noise Calculation (DL)"
on page 623).
The receiver terminal is always considered to be oriented towards its best server, except when the "Lock Status" is set to
"Server+Orientation" for a subscriber in a subscriber list and its azimuth and tilt manually edited. In the case of NLOS
between the receiver and the best server, Atoll does not try to find the direction of the strongest signal, the receiver is
oriented towards the best server just as in the case of LOS.
Input
: Subcarrier width (15 kHz).
: Width of a frequency block (180 kHz).
: Number of frequency blocks that carry the SS and the PBCH (6).
: Number of slots per subframe (2).
: Cyclic prefix duration defined for the network in the Global Parameters.
T
B
M
i
G
Di v
DL
AG
Di v
DL
CNR
PDSCH
TX
i
i c ( )
<
T
B
M
i
G
Di v
DL
AG
Di v
DL
CNR
PDSCH
TX
i
i c ( )
< if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CNR
PDSCH
TX
i
i c ( )
CNR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + =
CNR
PDSCH
TX
i
i c ( )
CNR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + = if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
Di v
DL
CNR
DLRS
TX
i
i c ( )
CNR
SS
TX
i
i c ( )
CNR
PBCH
TX
i
i c ( )
CNR
PDCCH
TX
i
i c ( )
CNR
PDSCH
TX
i
i c ( )
AF
W
FB
N
FB SS PBCH ,
N
Sl ot SF
D
CP
Forsk 2010 AT283_TRG_E2 631
Chapter 10: LTE Networks
: Number of symbol durations per slot (7 is is Normal, 6 if is Extended).
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Number of downlink subframes in the frame for the cell TX
i
(ic). It is equal to 10 for FDD frequency bands,
and is determined from the cells TDD frame configuration for TDD frequency bands as follows:
: Received downlink reference signal energy per resource element from the cell TX
i
(ic) at the pixel,
subscriber, or mobile M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Received SS energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as
calculated in "Signal Level Calculation (DL)" on page 620.
: Received PBCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Received PDCCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile
M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Received PDSCH energy per resource element from the cell TX
i
(ic) at the pixel, subscriber, or mobile
M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Number of downlink reference signal resource elements as calculated in "Downlink Transmission
Powers Calculation" on page 613.
: Number of PDCCH resource elements as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Number of PDSCH resource elements as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Total number of downlink resource elements as calculated in "Downlink Transmission Powers
Calculation" on page 613.
: Downlink traffic load of the interfering cell TX
i
(ic).
Traffic loads can either be calculated using Monte Carlo simulations, or entered manually for each cell. Calculation
of traffic loads is explained in "Simulation Process" on page 604.
: Downlink noise for one subcarrier for the cell TX
i
(ic) as calculated in "Noise Calculation (DL)" on
page 623.
: Interfering energy per resource element (dBm/Sym) received over downlink reference signals from any
cell TX
j
(jc) at a pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic) as calculated in "Interference Calculation
(DL)" on page 624.
: Interfering energy per resource element (dBm/Sym) received over the SS and the PBCH from any cell
TX
j
(jc) at a pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic) as calculated in "Interference Calculation (DL)"
on page 624.
: Interfering energy per resource element (dBm/Sym) received over the PDSCH and the PDCCH
from any cell TX
j
(jc) at a pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic) as calculated in "Interference
Calculation (DL)" on page 624.
and are the same.
Configuration
FDD 10
DSUUU-DSUUU 2
DSUUD-DSUUD 4
DSUDD-DSUDD 6
DSUUU-DSUUD 3
DSUUU-DDDDD 6
DSUUD-DDDDD 7
DSUDD-DDDDD 8
N
SD Sl ot
D
CP
D
CP
N
FB
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
E
SS
TX
i
i c ( )
E
PBCH
TX
i
i c ( )
E
PDCCH
TX
i
i c ( )
E
PDSCH
TX
i
i c ( )
N
Sym DLRS
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )
N
Sym PDSCH
TX
i
i c ( )
N
Sym DL
TX
i
i c ( )
TL
DL
TX
i
i c ( )
n
Sym
TX
i
i c ( )
c
DLRS
TX
j
j c ( )
c
SS PBCH ,
TX
j
j c ( )
c
PDSCH PDCCH ,
TX
j
j c ( )
c
DLRS
TX
j
j c ( )
c
PDSCH PDCCH ,
TX
j
j c ( )
632 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Interfering energy per frequency block (dBm/RB) received over 1 frequency block during an OFDM
symbol carrying reference signals from any cell TX
j
(jc) at a pixel, subscriber, or mobile M
i
as calculated in
"Interference Calculation (DL)" on page 624.
: Inter-technology downlink noise rise.
: Downlink reference signal C/N from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
as calculated in "C/
N Calculation (DL)" on page 628.
: AMS threshold defined for the cell TX
i
(ic).
: Bearer selection thresholds of the bearers defined in the LTE equipment used by M
i
s terminal.
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of transmission (downlink) antenna ports defined for the cell TX
i
(ic).
: Number of reception (downlink) antenna ports defined for the terminal used by the pixel, subscriber, or
mobile M
i
.
: Mobility used for the calculations.
: Downlink block error rate read from the graphs available in the LTE equipment assigned to the
terminal used by the pixel, subscriber, or mobile M
i
.
Calculations
The downlink reference signal C/(I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
The SS C/(I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
The PBCH C/(I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
The PDCCH C/(I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
The PDSCH C/(I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
The downlink reference signal received quality (RSRQ) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or
mobile M
i
:
Where is the received signal strength indicator, i.e., the received signals from the server (TX
i
(ic)), and all the
interfering cells (TX
j
(jc)), calculated as follows:
c
RSSI
TX
j
j c ( )
NR
DL
Inter Tech
CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
T
B
M
i
B
DL Hi ghest
M
i
Servi ce ( )
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Mobi l i ty M
i
( )
BLER B
DL
M
i
( )
CINR
DLRS
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
10 Log 10
c
DLRS
TX
j
j c ( )
10
-------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
CINR
SS
TX
i
i c ( )
E
SS
TX
i
i c ( )
10 Log 10
c
SS PBCH ,
TX
j
j c ( )
10
---------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
CINR
PBCH
TX
i
i c ( )
E
PBCH
TX
i
i c ( )
10 Log 10
c
SS PBCH ,
TX
j
j c ( )
10
---------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
CINR
PDCCH
TX
i
i c ( )
E
PDCCH
TX
i
i c ( )
10 Log 10
c
PDSCH PDCCH ,
TX
j
j c ( )
10
-------------------------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
CINR
PDSCH
TX
i
i c ( )
E
PDSCH
TX
i
i c ( )
10 Log 10
c
PDSCH PDCCH ,
TX
j
j c ( )
10
-------------------------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+
\ .
|
|
|
| |
=
RSRQ
TX
i
i c ( )
10 Log N
FB
TX
i
i c ( )
( ) E
DLRS
TX
i
i c ( )
RSSI
TX
i
i c ( )
+ =
RSSI
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 633
Chapter 10: LTE Networks
The downlink reference signal total noise (I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
The SS and PBCH total noise (I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
The PDSCH and PDCCH total noise (I+N) for cell TX
i
(ic) is calculated as follows for any pixel, subscriber, or mobile M
i
:
With , , and calculated as explained in "Downlink Transmission Powers Calculation"
on page 613.
Bearer Determination:
The bearers available for selection in the pixel, subscriber, or mobile M
i
s LTE equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the PDSCH C/(I+N) at M
i
:
If the cell supports Transmit Diversity or AMS, the transmit diversity gain, , corresponding to the bearer
is applied to its selection threshold. The gain is read from the properties of the LTE equipment assigned to the
pixel, subscriber, or mobile M
i
for , , , .
The additional downlink diversity gain defined for the clutter class of the pixel, subscriber, or mobile M
i

is also applied. Therefore, the bearers available for selection are all the bearers defined in the LTE equipment
for which the following is true:
In case of Transmit Diversity:
In case of AMS:
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak RLC Throughput
RSSI
TX
i
i c ( )
10 Log 10
E
DLRS
TX
i
i c ( )
10
--------------------
2
10
E
PDSCH
TX
i
i c ( )
10
-----------------------
N
Sym PDSCH
TX
i
i c ( )
TL
DL
TX
i
i c ( )
10
E
PDCCH
TX
i
i c ( )
10
-----------------------
N
Sym PDCCH
TX
i
i c ( )
+
N
Sym PDSCH
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )
+
------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 10 +
\ .
|
|
|
|
|
| |
N
Ant TX
TX
i
i c ( )

|
=
10
c
RSSI
TX
j
j c ( )
10
-------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
12 + +
.
|
|
|
|
NR
DL
Inter Tech
10 Log N
FB
TX
i
i c ( )
( ) + +
I N + ( )
DLRS
TX
i
i c ( )
10 Log 10
c
DLRS
TX
j
j c ( )
10
-------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
10 Log 2 N
FB
TX
i
i c ( )
( ) + + =
I N + ( )
SS PBCH ,
TX
i
i c ( )
10 Log 10
c
SS PBCH ,
TX
j
j c ( )
10
---------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
10 Log N
SCa FB
N
FB SS PBCH ,
( ) + + =
I N + ( )
PDSCH PDCCH ,
TX
i
i c ( )
10 Log 10
c
PDSCH PDCCH ,
TX
j
j c ( )
10
-------------------------------------------
\ .
|
|
|
| |
All TX
j
j c ( )

10
n
Sym
TX
i
i c ( )
10
--------------------
+
\ .
|
|
|
| |
NR
DL
Inter Tech
+ =
10 Log
N
Sym PDSCH
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )
+
N
SD Sl ot
N
Sl ot SF
N
SF DL
TX
i
i c ( )

-------------------------------------------------------------------------------
\ .
|
|
| |
+
N
SCa FB
N
Sym PDSCH
TX
i
i c ( )
N
Sym PDCCH
TX
i
i c ( )
T
B
M
i
CINR
PDSCH
TX
i
i c ( )
<
G
Di v
DL
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Mobi l i ty M
i
( ) BLER B
DL
M
i
( )
AG
Di v
DL
T
B
M
i
G
Di v
DL
AG
Di v
DL
CINR
PDSCH
TX
i
i c ( )
<
T
B
M
i
G
Di v
DL
AG
Di v
DL
CINR
PDSCH
TX
i
i c ( )
< if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
634 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
From among the bearers available for selection, the selected bearer is the one with the highest downlink peak
RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
- Effective RLC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest downlink
effective RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated
Bandwidth Throughput Calculation" on page 649.
MIMO Transmit Diversity Gain:
Once the bearer is known, the PDSCH C/(I+N) calculated above become:
In case of Transmit Diversity:
In case of AMS:
Where is the transmit diversity gain corresponding to the selected bearer.
Output
: Downlink reference signal C/(I+N) from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: SS C/(I+N) from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: PBCH C/(I+N) from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: PDCCH C/(I+N) from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: PDSCH C/(I+N) from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: Downlink reference signal received quality from cell TX
i
(ic) at pixel, subscriber, or mobile M
i
.
: Received signal strength indicator, i.e., the received signals from the server (TX
i
(ic)), and all the
interfering cells (TX
j
(jc)), at pixel, subscriber, or mobile M
i
.
: Downlink reference signals total noise from the interfering cells TX
j
(jc) at the pixel, subscriber, or
mobile M
i
covered by a cell TX
i
(ic).
: SS and PBCH total noise from the interfering cells TX
j
(jc) at the pixel, subscriber, or mobile M
i
covered by a cell TX
i
(ic).
: PDSCH and PDCCH total noise from the interfering cells TX
j
(jc) at the pixel, subscriber, or
mobile M
i
covered by a cell TX
i
(ic).
: Bearer assigned to the pixel, subscriber, or mobile M
i
in the downlink.
10.3.3.6 Signal Level Calculation (UL)
Input
: Maximum PUSCH C/(I+N) defined for the cell TX
i
(ic).
: Uplink noise rise of the cell TX
i
(ic). This value can be user-defined or calculated as explained in
"Interference Calculation (UL)" on page 636.
: Uplink noise for the PUSCH and the PUCCH for the cell TX
i
(ic).
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Fractional uplink power control factor defined for the cell TX
i
(ic).
: Maximum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Effective transmission power of the terminal used by the pixel, subscriber, or mobile M
i
after power control
adjustment as calculated in "C/(I+N) and Bearer Calculation (UL)" on page 641.
CINR
PDSCH
TX
i
i c ( )
CINR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + =
CINR
PDSCH
TX
i
i c ( )
CINR
PDSCH
TX
i
i c ( )
G
Di v
DL
AG
Di v
DL
+ + = if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
Di v
DL
CINR
DLRS
TX
i
i c ( )
CINR
SS
TX
i
i c ( )
CINR
PBCH
TX
i
i c ( )
CINR
PDCCH
TX
i
i c ( )
CINR
PDSCH
TX
i
i c ( )
RSRQ
TX
i
i c ( )
RSSI
TX
i
i c ( )
I N + ( )
DLRS
TX
i
i c ( )
I N + ( )
SS PBCH ,
TX
i
i c ( )
I N + ( )
PDSCH PDCCH ,
TX
i
i c ( )
B
DL
M
i
CINR
PUSCH Max
TX
i
i c ( )
NR
UL
TX
i
i c ( )
n
PUSCH PUCCH ,
TX
i
i c ( )
N
FB
TX
i
i c ( )
o
FPC
TX
i
i c ( )
P
Max
M
i
P
Eff
M
i
Forsk 2010 AT283_TRG_E2 635
Chapter 10: LTE Networks
: Transmitter antenna gain for the antenna used by the transmitter TX
i
( ).
: Total transmitter losses for the transmitter TX
i
( ).
: Path loss ( ).
: Total loss calculated as explained in "Signal Level Calculation (DL)" on page 620.
: Loss on the transmitter-receiver path (path loss) calculated using a propagation model.
: Antenna attenuation (from antenna patterns) calculated for the antenna used by the transmitter TX
i.
: Shadowing margin based on the Model standard deviation.
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Indoor losses taken into account when the option "Indoor coverage" is selected.
: Receiver terminal losses for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna gain for the pixel, subscriber, or mobile M
i
.
: Receiver terminals antenna attenuation calculated for the pixel, subscriber, or mobile M
i
.
For calculating the useful signal level from the best serving cell, is determined in the direction (H,V) = (0,0)
from the antenna patterns of the antenna used by M
i
. For calculating the interfering signal level from any interferer,
is determined in the direction of the interfering cell from the antenna patterns of the antenna used by M
i
, while
the antenna is pointed towards M
i
s best serving cell.
: Body loss defined for the service used by the pixel, subscriber, or mobile M
i
.
: Cyclic prefix duration defined for the network in the Global Parameters.
Calculations
Atoll first calculates the allowed maximum transmission power for the terminal used by the pixel, subscriber, or mobile M
i
.
This power is calculated by performing fractional power control.
Fractional Power Control:
Fractional power control imposes a limitation on the maximum transmission power of the terminal. A nominal
PUSCH power is indicated by the cell to all the pixels, subscribers, or mobiles. This nominal PUSCH power is
calculated as follows:
Where corresponds to the uplink noise over 1 frequency block.
Next, the maximum allowed transmission power for the terminal used by the pixel, subscriber, or mobile M
i
is
calculated as follows:
Once the maximum allowed power has been calculated, it is used as an upper limit for transmission power in all the
remaining calculations.
The received PUSCH and PUCCH signal level (dBm) from a pixel, subscriber, or mobile M
i
at its serving cell TX
i
(ic) is
calculated as follows:
Where EIRP is the effective isotropic radiated power of the terminal calculated as follows:
With without power control adjustment at the start of the calculations, and is after power
control adjustment.
is the cyclic prefix factor, i.e., the ratio of the useful symbol energy to the total symbol energy.
G
TX
i
G
TX
i
G
Ant
TX
i
=
L
TX
i
L
TX
i
L
Total UL
=
L
Path
L
Path
L
Model
L
Ant
TX
i
+ =
L
Total
L
Model
L
Ant
TX
i
M
Shadowi ng Model
L
Indoor
L
M
i
G
M
i
L
Ant
M
i
L
Ant
M
i
L
Ant
M
i
L
Body
M
i
D
CP
P
O_PUSCH
TX
i
i c ( )
CINR
PUSCH Max
TX
i
i c ( )
NR
UL
TX
i
i c ( )
n
PUSCH PUCCH ,
TX
i
i c ( )
10 Log N
FB
TX
i
i c ( )
( ) + + =
n
PUSCH PUCCH ,
TX
i
i c ( )
10 Log N
FB
TX
i
i c ( )
( )
P
Al l owed
M
i
Mi n P
Max
M
i
10 Log N
FB
TX
i
i c ( )
( ) P
O_PUSCH
TX
i
i c ( )
o
FPC
TX
i
i c ( )
L
Total
+ + ,
)
`

=
C
PUSCH PUCCH ,
M
i
EIRP
PUSCH PUCCH ,
M
i
L
Path
M
Shadowi ng Model
L
Indoor
G
TX
i
L
TX
i
L
Ant
M
i
L
Body
M
i
f
CP
+ + =
EIRP
PUSCH PUCCH ,
M
i
P
M
i
G
M
i
L
M
i
+ =
P
M
i
P
Al l owed
M
i
= P
M
i
P
Eff
M
i
=
f
CP
636 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The total symbol duration of a modulation symbol comprises the useful symbol duration, carrying the actual data bits, and
a cyclic prefix, added to the useful data bits as padding against multi-path to avoid inter-symbol interference. Hence, the
total energy within a modulation symbol belongs in part to the useful data bits and in part to the cyclic prefix. Once a
modulation symbol is received, only the energy of the useful data bits can be used for extracting the data. The energy
belonging to the cyclic prefix is lost once it has served its purpose of combatting inter-symbol interference. Therefore,
implies that the energy belonging to the cyclic prefix is excluded from the useful signal level.
The cyclic prefix energy and the useful data bits energy are both taken into account when calculating interfering signal
levels.
Output
: Received PUSCH and PUCCH signal level from the pixel, subscriber, or mobile M
i
at a cell
TX
i
(ic).
: Maximum allowed transmission power for the terminal used by the pixel, subscriber, or mobile M
i
.
10.3.3.7 Noise Calculation (UL)
For determining the C/N and C/(I+N), Atoll calculates the uplink noise over the channel bandwidth used by the cell. The
used bandwidth depends on the number of used subcarriers.
The uplink noise comprises thermal noise and the noise figure of the equipment. The thermal noise density depends on
the temperature, i.e., it remains constant for a given temperature. However, the value of the thermal noise varies with the
used bandwidth.
Input
K: Boltzmanns constant.
T: Temperature in Kelvin.
: Width of a frequency block in the frequency domain (180 kHz).
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Noise figure of the cell TX
i
(ic).
Calculations
The power spectral density of thermal noise is calculated as follows:
The thermal noise for the PUSCH and the PUCCH is calculated as:
The uplink noise is the sum of the thermal noise and the noise figure of the cell TX
i
(ic).
Output
: Uplink noise for the PUSCH and the PUCCH for the cell TX
i
(ic).
10.3.3.8 Interference Calculation (UL)
The PUSCH and PUCCH interference is only calculated during Monte Carlo simulations. In coverage predictions, the
uplink noise rise values already available in simulation results or in the Cells table are used.
The interference received by a cell TX
i
(ic) from an interfering mobile covered by a cell TX
j
(jc) can be defined as the PUSCH
and PUCCH signal level received from the interfering mobile M
j
depending on the overlap that exists between the channels
used by the cells TX
i
(ic) and TX
j
(jc) and on the traffic load of the interfering mobile M
j
.
The calculation of uplink interference can be divided into two parts:
Calculation of the uplink interference from each individual interfering mobile as explained in "Interfering Signal
Level Calculation (UL)" on page 637.
f
CP
f
CP
10 Log 7 7.5 ( ) If D
CP
Normal =
10 Log 6 7.5 ( ) If D
CP
Extended =
0 If M
i
is an interferer

=
C
PUSCH PUCCH ,
M
i
P
Al l owed
M
i
W
FB
N
FB
TX
i
i c ( )
nf
TX
i
i c ( )
n
0
10 Log K T 1000 ( ) 174 dBm/Hz = =
n
0 PUSCH PUCCH ,
TX
i
i c ( )
n
0
10 Log N
FB
TX
i
i c ( )
W
FB
1000 ( ) + =
n
PUSCH PUCCH ,
TX
i
i c ( )
n
0 PUSCH PUCCH ,
TX
i
i c ( )
nf
TX
i
i c ( )
+ =
n
PUSCH PUCCH ,
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 637
Chapter 10: LTE Networks
Calculation of the uplink noise rise which represents the total uplink interference from all interfering mobiles as
explained in "Noise Rise Calculation (UL)" on page 638.
10.3.3.8.1 Interfering Signal Level Calculation (UL)
Input
: PUSCH and PUCCH signal level received at a cell TX
i
(ic) from an interfering mobile M
j
covered
by a cell TX
j
(jc) as calculated in "Signal Level Calculation (UL)" on page 634.
: Shadowing margin based on the Model standard deviation.
: Shadowing margin based on the C/I standard deviation.
In Monte Carlo simulations, interfering signal levels already include , as explained in "Signal
Level Calculation (UL)" on page 634.
In coverage predictions, the ratio is applied to the interfering signals (for
more information, see "Shadowing Model" on page 115). As the interfering signal levels already include
, is added to the received interfering signal levels in order to achieve the ratio
:
In coverage predictions, shadowing margins are taken into account when the option "Shadowing taken into
account" is selected.
: Total channel overlap ratio between the cells TX
i
(ic) and TX
j
(jc) as calculated in "Co- and Adjacent
Channel Overlaps Calculation" on page 617.
: Uplink traffic load of the interfering mobile M
j
.
Traffic loads are calculated during Monte Carlo simulations as explained in "Scheduling and Radio Resource
Allocation" on page 652.
Calculations
The uplink interference received at a cell TX
i
(ic) from an interfering mobile M
j
covered by a cell TX
j
(jc) is calculated as
follows:
Where is an interference reduction factor due to the uplink traffic load of the interfering mobile M
j
, calculated as
follows:
Calculations for the interference reduction factors due to channel overlapping ( ) and static uplink ICIC using
fractional frequency reuse ( ) are explained below:
Interference reduction due to the co- and adjacent channel overlap between the studied and the interfering
cells:
Interference reduction due to the co- and adjacent channel overlap between the cells TX
i
(ic) and TX
j
(jc) is
calculated as follows:
Interference reduction due to static uplink ICIC using fractional frequency reuse:
If the cell supports Static UL ICIC, it means that a part of the LTE frame may use a fraction of the channel
bandwidth. Currently, the size of the fraction is fixed to be 1/3rd of the channel bandwidth. The interference
reduction factor due to static uplink ICIC using fractional frequency reuse is calculated as follows:
Where is the collision probability between the subcarriers used by the fractions of the channels
being used by the interfered and interfering cells. It is determined during Monte Carlo simulations as follows:
C
PUSCH PUCCH ,
M
j
M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
M
Shadowi ng Model
M
Shadowi ng C I

M
Shadowi ng Model
M
Shadowi ng C I
M
Shadowi ng Model
M
Shadowi ng C I

C
PUSCH PUCCH ,
M
j
C
PUSCH PUCCH ,
M
j
M
Shadowi ng C I
+ =
r
O
TX
i
i c ( ) TX
j
j c ( )
TL
UL
M
j
I
PUSCH PUCCH ,
M
j
C
PUSCH PUCCH ,
M
j
f
O
TX
i
i c ( ) TX
j
j c ( )
f
TL UL
M
j
f
ICIC UL
TX
i
i c ( ) TX
j
j c ( )
+ + + =
f
TL UL
M
j
f
TL UL
M
j
10 Log TL
UL
M
j
( ) =
f
O
TX
i
i c ( ) TX
j
j c ( )
f
ICIC UL
TX
i
i c ( ) TX
j
j c ( )
f
O
TX
i
i c ( ) TX
j
j c ( )
10 Log r
O
TX
i
i c ( ) TX
j
j c ( )
( ) =
f
ICIC UL
TX
i
i c ( ) TX
j
j c ( )
10 Log p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
( ) =
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
638 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The PSS ID and SSS ID are determined from the physical cell ID of a cell as follows:
Whether a pixel, subscriber, or mobile is covered by the ICIC part of the frame is determined as explained in "Best
Server Determination" on page 644.
In Monte Carlo simulations, Atoll calculates two separate noise rise values; for the mobiles located in the ICIC
zone of the interfered cell Atoll calculates the ICIC UL Noise Rise, and for the mobiles located in the non-ICIC
zone of the interfered cell Atoll calculates the UL Noise Rise.
In coverage predictions, point analysis, and calculations on subscriber lists, according to the zone, ICIC or non-
ICIC, that covers the pixel, receiver, or subscriber, Atoll uses either the ICIC UL Noise Rise or the UL Noise Rise
to calculate the PUSCH and PUCCH C/(I+N). For more information on the calculation of the uplink noise rise, see
"Noise Rise Calculation (UL)" on page 638.
Output
: PUSCH and PUCCH interference signal level received at a cell TX
i
(ic) from an interfering mobile
M
j
covered by a cell TX
j
(jc).
10.3.3.8.2 Noise Rise Calculation (UL)
The uplink noise rise is defined as the ratio of the total uplink interference received by any cell TX
i
(ic) from all interfering
mobiles M
j
present in the coverage areas of all other cells TX
j
(jc) to the uplink noise of the cell TX
i
(ic). In other words, it is
the ratio (I+N)/N.
Input
: PUSCH and PUCCH interference signal levels received at a cell TX
i
(ic) from interfering mobiles
M
j
covered by other cells TX
j
(jc) as calculated in "Interfering Signal Level Calculation (UL)" on page 637.
: Uplink noise for the PUSCH and the PUCCH for the cell TX
i
(ic) as calculated in "Noise
Calculation (UL)" on page 636.
: Inter-technology uplink noise rise.
Calculations
For any mobile M
i
covered by the non-ICIC zone in the interfered cell TX
i
(ic), Atoll calculates the UL Noise Rise as follows:
For any pixel, subscriber, or mobile M
i
covered by the non-ICIC zone in the interfered cell TX
i
(ic), Atoll calculates the the
PUSCH and PUCCH total noise (I+N) as follows:
For any mobile M
i
covered by the ICIC zone in the interfered cell TX
i
(ic), Atoll calculates the ICIC UL Noise Rise as follows:
Case
Zone that covers the
mobile M
i
in the interfered
cell TX
i
(ic)
Zone that covers the
interfering mobile M
j
in the
cell TX
j
(jc)
a ICIC ICIC
0 if
1 if
b ICIC Non ICIC 1
c Non ICIC ICIC 1/3
d Non ICIC Non ICIC 1
p
Col l i si on
TX
i
i c ( ) TX
j
j c ( )
ID
PSS
TX
i
i c ( )
ID
PSS
TX
j
j c ( )
=
ID
PSS
TX
i
i c ( )
ID
PSS
TX
j
j c ( )
=
ID
PSS
ID

Modulo 3 =
ID
SSS
Fl oor ID

3 ( ) =
I
PUSCH PUCCH ,
M
j
I
PUSCH PUCCH ,
M
j
n
PUSCH PUCCH ,
TX
i
i c ( )
NR
UL
Inter Tech
NR
UL
TX
i
i c ( )
10 Log 10
I
PUSCH PUCCH ,
M
j
non-ICIC M
i

10
----------------------------------------------------------------------------
\ .
|
|
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
PUSCH PUCCH ,
TX
i
i c ( )
10
--------------------------------------------
+
\ .
|
|
|
|
|
|
| |
NR
UL
Inter Tech
+ n
PUSCH PUCCH ,
TX
i
i c ( )
=
I N + ( )
PUSCH PUCCH ,
TX
i
i c ( )
NR
UL
TX
i
i c ( )
n
PUSCH PUCCH ,
TX
i
i c ( )
+ =
Forsk 2010 AT283_TRG_E2 639
Chapter 10: LTE Networks
For any pixel, subscriber, or mobile M
i
covered by the ICIC zone in the interfered cell TX
i
(ic), Atoll calculates the the
PUSCH and PUCCH total noise (I+N) as follows:
Output
: Uplink noise rise for the cell TX
i
(ic).
: ICIC uplink noise rise for the cell TX
i
(ic).
: PUSCH and PUCCH total noise for a cell TX
i
(ic) calculated for any pixel, subscriber, or
mobile M
i
.
10.3.3.9 C/N Calculation (UL)
Input
: Received PUSCH and PUCCH signal level from the pixel, subscriber, or mobile M
i
at its serving
cell TX
i
(ic) as calculated in "Signal Level Calculation (UL)" on page 634.
: PUSCH and PUCCH noise for the cell TX
i
(ic) as calculated in "Noise Calculation (UL)" on
page 636.
: Downlink reference signal C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated
in "C/N Calculation (DL)" on page 628.
: Downlink reference signal C/(I+N) from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as
calculated in "C/(I+N) and Bearer Calculation (DL)" on page 630.
: AMS threshold defined for the cell TX
i
(ic).
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Bearer selection threshold of the lowest bearer in the LTE equipment assigned to the cell TX
i
(ic).
: Maximum allowed transmission power of the terminal used by the pixel, subscriber, or mobile M
i
as
calculated in "Signal Level Calculation (UL)" on page 634.
: Minimum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Power control adjustment margin defined in the Global Parameters.
: Bearer selection thresholds of the bearers defined in the LTE equipment used bythe cell TX
i
(ic).
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of transmission (uplink) antenna ports defined for the terminal used by the pixel, subscriber, or
mobile M
i
.
: Number of reception (uplink) antenna ports defined for the cell TX
i
(ic).
: Mobility used for the calculations.
: Uplink block error rate read from the graphs available in the LTE equipment assigned to the cell
TX
i
(ic).
Calculations
The PUSCH and PUCCH C/N from a pixel, subscriber, or mobile M
i
at its serving cell TX
i
(ic) is calculated as follows:
NR
ICIC UL
TX
i
i c ( )
10 Log 10
I
PUSCH PUCCH ,
M
j
ICIC M
i

10
------------------------------------------------------------------
\ .
|
|
|
|
|
| |
All M
j
All TX
j
j c ( )

10
n
PUSCH PUCCH ,
TX
i
i c ( )
10
--------------------------------------------
+
\ .
|
|
|
|
|
|
| |
NR
UL
Inter Tech
+ n
PUSCH PUCCH ,
TX
i
i c ( )
=
I N + ( )
PUSCH PUCCH ,
TX
i
i c ( )
NR
ICIC UL
TX
i
i c ( )
n
PUSCH PUCCH ,
TX
i
i c ( )
+ =
NR
UL
TX
i
i c ( )
NR
ICIC UL
TX
i
i c ( )
I N + ( )
PUSCH PUCCH ,
TX
i
i c ( )
C
PUSCH PUCCH ,
M
i
n
PUSCH PUCCH ,
TX
i
i c ( )
CNR
DLRS
TX
i
i c ( )
CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
N
FB
TX
i
i c ( )
T
B Lowest
TX
i
i c ( )
P
Al l owed
M
i
P
Mi n
M
i
M
PC
T
B
M
i
B
UL Hi ghest
M
i
Servi ce ( )
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( )
BLER B
UL
M
i
( )
CNR
PUSCH PUCCH ,
M
i
C
PUSCH PUCCH ,
M
i
n
PUSCH PUCCH ,
TX
i
i c ( )
=
640 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Bearer Determination:
The bearers available for selection in the cell TX
i
(ic)s LTE equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the PUSCH and PUCCH C/N at M
i
:
If the cell supports Receive Diversity or AMS, the Receive Diversity gain, , corresponding to the bearer
is applied to its selection threshold. The gain is read from the properties of the LTE equipment assigned to the
cell TX
i
(ic) for , , , .
The additional uplink diversity gain defined for the clutter class of the pixel, subscriber, or mobile M
i
is
also applied. Therefore, the bearers available for selection are all the bearers defined in the LTE equipment
for which the following is true:
In case of Receive Diversity:
In case of AMS:
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak RLC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink peak
RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
- Effective RLC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink effective
RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
MIMO Receive Diversity Gain:
Once the bearer is known, the PUSCH and PUCCH C/N calculated above become:
In case of Receive Diversity:
In case of AMS:
Where is the receive diversity gain corresponding to the selected bearer.
Uplink Bandwidth Allocation (No. of Used Frequency Blocks):
The uplink bandwidth allocation depends on the target defined for the scheduler used by the cell TX
i
(ic). The
PUSCH and PUCCH C/N calculated above is given for the total number of frequency blocks associated with the
channel bandwidth of the cell, i.e., . Bandwidth allocation is performed for all the pixels, subscribers, or
mobiles in the uplink, and may reduce the number of used frequency blocks in order to satisfy the selected target.
- Full Bandwidth
Full channel width is used by each mobile in the uplink. As there is no reduction in the bandwidth used for
transmission, there is no gain in the PUSCH and PUCCH C/N.
- Maintain Connection
The bandwidth used for transmission by a mobile is reduced only if the PUSCH and PUCCH C/N is not enough
to access the lowest bearer. For example, as a mobile moves from good to bad radio conditions, the number
of frequency blocks used by it for transmission in uplink are reduced one by one in order to improve the
T
B
M
i
CNR
PUSCH PUCCH ,
M
i
<
G
Di v
UL
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( ) BLER B
UL
M
i
( )
AG
Di v
UL
T
B
M
i
G
Di v
UL
AG
Di v
UL
CNR
PUSCH PUCCH ,
M
i
<
T
B
M
i
G
Di v
UL
AG
Di v
UL
CNR
PUSCH PUCCH ,
M
i
< if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CNR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + =
CNR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + = if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
Di v
UL
N
FB
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 641
Chapter 10: LTE Networks
PUSCH and PUCCH C/N. The calculation of the gain introduced by the bandwidth reduction is explained
below.
The definition of the lowest bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the lowest index, with the lowest peak RLC throughput, or with the lowest effective
RLC throughput.
- Best Bearer
The bandwidth used for transmission by a mobile is reduced in order to improve the PUSCH and PUCCH C/
N enough to access the best bearer. For example, if using 5 frequency blocks, a mobile is able to access the
best bearer, and using 6 it would only get access to the second best, it will be assigned 5 frequency blocks as
the used uplink bandwidth. Although using 4 frequency blocks, its PUSCH and PUCCH C/N will be better than
when using 5, the uplink bandwidth is not reduced to 4 because it does not provide any gain in terms of the
bearer, i.e., the mobile already has the best bearer using 5 frequency blocks. The calculation of the gain
introduced by the bandwidth reduction is explained below.
The definition of the best bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the highest index, with the highest peak RLC throughput, or with the highest effective
RLC throughput.
The uplink bandwidth allocation may result in the use of a number of frequency blocks which is less than the
number of frequency blocks associated with the channel bandwidth of the cell. The gain related to this bandwidth
reduction is applied to the PUSCH and PUCCH C/N:
Where for any pixel, subscriber, or mobile M
i
covered by the non-ICIC zone in the interfered
cell TX
i
(ic), and for any pixel, subscriber, or mobile M
i
covered by the ICIC zone in
the interfered cell TX
i
(ic).
Uplink Power Control Adjustment:
Once the bandwidth allocation is performed, Atoll continues to work with the C/N given by the bandwidth
allocation, i.e., .
The pixel, subscriber, or mobile M
i
reduces its transmission power so that the PUSCH and PUCCH C/N from it at
its cell is just enough to get the selected bearer.
If with AND , where is the bearer selection
threshold, from the LTE equipment assigned to the cell TX
i
(ic), for the bearer selected for the pixel, subscriber, or
mobile M
i
.
The transmission power of M
i
is reduced to determine the effective transmission power from the pixel, subscriber,
or mobile M
i
as follows:
is calculated again using .
Output
: PUSCH and PUCCH C/N from a pixel, subscriber, or mobile M
i
at it serving cell TX
i
(ic).
10.3.3.10 C/(I+N) and Bearer Calculation (UL)
The carrier signal to interference and noise ratio is calculated in three steps. First, Atoll calculates the received signal level
from each pixel, subscriber, or mobile at its serving cell using the effective power of the terminal used by the pixel,
subscriber, or mobile as explained in "Signal Level Calculation (UL)" on page 634. Next, Atoll calculates the uplink carrier
to noise ratio as explained in "C/N Calculation (UL)" on page 639. Finally, determines the uplink C/(I+N) by dividing the
previously calculated uplink C/N by the uplink noise rise value of the cell as calculated in "Noise Rise Calculation (UL)" on
page 638.
The uplink noise rise can be set by the user manually for each cell or calculated using Monte Carlo simulations.
The receiver terminal is always considered to be oriented towards its best server, except when the "Lock Status" is set to
"Server+Orientation" for a subscriber in a subscriber list and its azimuth and tilt manually edited. In the case of NLOS
CNR
PUSCH PUCCH ,
M
i
Final
CNR
PUSCH PUCCH ,
M
i
All FB
10 Log
N
FB
TX
i
i c ( )
N
FB UL
M
i
---------------------
\ .
|
|
| |
+ =
N
FB UL
M
i
N
FB
TX
i
i c ( )
<
N
FB UL
M
i
Ci el i ng
N
FB
TX
i
i c ( )
3
-------------------
\ .
|
| |
<
CNR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
Final
=
P
M
i
P
Al l owed
M
i
= CNR
PUSCH PUCCH ,
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+ > T
B
UL
M
i
TX
i
i c ( )
P
Eff
M
i
Max P
Al l owed
M
i
CNR
PUSCH PUCCH ,
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+
\ .
| |

\ .
| |
P
Mi n
M
i
,
\ .
| |
=
CNR
PUSCH PUCCH ,
M
i
P
Eff
M
i
CNR
PUSCH PUCCH ,
M
i
642 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
between the receiver and the best server, Atoll does not try to find the direction of the strongest signal, the receiver is
oriented towards the best server just as in the case of LOS.
Input
: PUSCH and PUCCH C/N from a pixel, subscriber, or mobile M
i
at it serving cell TX
i
(ic) as
calculated in "C/N Calculation (UL)" on page 639.
: Uplink noise rise for the cell TX
i
(ic) as calculated in "Noise Rise Calculation (UL)" on page 638.
: Downlink reference signal C/N from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as calculated
in "C/N Calculation (DL)" on page 628.
: Downlink reference signal C/(I+N) from the cell TX
i
(ic) at the pixel, subscriber, or mobile M
i
as
calculated in "C/N Calculation (DL)" on page 628.
: AMS threshold defined for the cell TX
i
(c).
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Bearer selection threshold of the lowest bearer in the LTE equipment assigned to the cell TX
i
(ic).
: Maximum allowed transmission power of the terminal used by the pixel, subscriber, or mobile M
i
as
calculated in "Signal Level Calculation (UL)" on page 634.
: Minimum transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Power control adjustment margin defined in the Global Parameters.
: Bearer selection thresholds of the bearers defined in the LTE equipment used bythe cell TX
i
(ic).
: Highest downlink bearer defined in the properties of the service used by the pixel,
subscriber, or mobile M
i
.
: Number of transmission (uplink) antenna ports defined for the terminal used by the pixel, subscriber, or
mobile M
i
.
: Number of reception (uplink) antenna ports defined for the cell TX
i
(ic).
: Mobility used for the calculations.
: Uplink block error rate read from the graphs available in the LTE equipment assigned to the cell
TX
i
(ic).
Calculations
For any pixel, subscriber, or mobile M
i
covered by the non-ICIC zone in the interfered cell TX
i
(ic), Atoll calculates the
PUSCH and PUCCH C/(I+N) as follows:
For any pixel, subscriber, or mobile M
i
covered by the ICIC zone in the interfered cell TX
i
(ic), Atoll calculates the PUSCH
and PUCCH C/(I+N) as follows:
Bearer Determination:
The bearers available for selection in the cell TX
i
(ic)s LTE equipment are the ones:
- Which are common between M
i
s and TX
i
(ic)s equipment (bearer indexes for which selection thresholds are
defined in both equipment), if the corresponding option has been set in the Atoll.ini file. For more information,
see the Administrator Manual.
- Whose indexes are less than or equal to the highest bearer index defined for the service being accessed by M
i
.
- Whose selection thresholds are less than the PUSCH and PUCCH C/(I+N) at M
i
:
If the cell supports Receive Diversity or AMS, the Receive Diversity gain, , corresponding to the bearer
is applied to its selection threshold. The gain is read from the properties of the LTE equipment assigned to the
cell TX
i
(ic) for , , , .
CNR
PUSCH PUCCH ,
M
i
NR
UL
TX
i
i c ( )
CNR
DLRS
TX
i
i c ( )
CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
N
FB
TX
i
i c ( )
T
B Lowest
TX
i
i c ( )
P
Al l owed
M
i
P
Mi n
M
i
M
PC
T
B
M
i
B
UL Hi ghest
M
i
Servi ce ( )
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( )
BLER B
UL
M
i
( )
CINR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
NR
UL
TX
i
i c ( )
=
CINR
PUSCH PUCCH ,
M
i
CNR
PUSCH PUCCH ,
M
i
NR
ICIC UL
TX
i
i c ( )
=
T
B
M
i
CINR
PUSCH PUCCH ,
M
i
<
G
Di v
UL
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( ) BLER B
UL
M
i
( )
Forsk 2010 AT283_TRG_E2 643
Chapter 10: LTE Networks
The additional uplink diversity gain defined for the clutter class of the pixel, subscriber, or mobile M
i
is
also applied. Therefore, the bearers available for selection are all the bearers defined in the LTE equipment
for which the following is true:
In case of Receive Diversity:
In case of AMS:
The bearer selected for data transfer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic).
- Bearer Index
From among the bearers available for selection, the selected bearer is the one with the highest index.
- Peak RLC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink peak
RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
- Effective RLC Throughput
From among the bearers available for selection, the selected bearer is the one with the highest uplink effective
RLC channel throughput as calculated in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
MIMO Receive Diversity Gain:
Once the bearer is known, the PUSCH and PUCCH C/(I+N) calculated above become:
In case of Receive Diversity:
In case of AMS:
Where is the receive diversity gain corresponding to the selected bearer.
Uplink Bandwidth Allocation (No. of Used Frequency Blocks):
The uplink bandwidth allocation depends on the target defined for the scheduler used by the cell TX
i
(ic). The
PUSCH and PUCCH C/(I+N) calculated above is given for the total number of frequency blocks associated with
the channel bandwidth of the cell, i.e., . Bandwidth allocation is performed for all the pixels, subscribers,
or mobiles in the uplink, and may reduce the number of used frequency blocks in order to satisfy the selected
target.
- Full Bandwidth
Full channel width is used by each mobile in the uplink. As there is no reduction in the bandwidth used for
transmission, there is no gain in the PUSCH and PUCCH C/(I+N).
- Maintain Connection
The bandwidth used for transmission by a mobile is reduced only if the PUSCH and PUCCH C/(I+N) is not
enough to access the lowest bearer. For example, as a mobile moves from good to bad radio conditions, the
number of frequency blocks used by it for transmission in uplink are reduced one by one in order to improve
the PUSCH and PUCCH C/(I+N). The calculation of the gain introduced by the bandwidth reduction is
explained below.
The definition of the lowest bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the lowest index, with the lowest peak RLC throughput, or with the lowest effective
RLC throughput.
- Best Bearer
The bandwidth used for transmission by a mobile is reduced in order to improve the PUSCH and PUCCH C/
(I+N) enough to access the best bearer. For example, if using 5 frequency blocks, a mobile is able to access
the best bearer, and using 6 it would only get access to the second best, it will be assigned 5 frequency blocks
as the used uplink bandwidth. Although using 4 frequency blocks, its PUSCH and PUCCH C/(I+N) will be
better than when using 5, the uplink bandwidth is not reduced to 4 because it does not provide any gain in
terms of the bearer, i.e., the mobile already has the best bearer using 5 frequency blocks. The calculation of
the gain introduced by the bandwidth reduction is explained below.
AG
Di v
UL
T
B
M
i
G
Di v
UL
AG
Di v
UL
CINR
PUSCH PUCCH ,
M
i
<
T
B
M
i
G
Di v
UL
AG
Di v
UL
CINR
PUSCH PUCCH ,
M
i
< if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
CINR
PUSCH PUCCH ,
M
i
CINR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + =
CINR
PUSCH PUCCH ,
M
i
CINR
PUSCH PUCCH ,
M
i
G
Di v
UL
AG
Di v
UL
+ + = if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
< or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
<
G
Di v
UL
N
FB
TX
i
i c ( )
644 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The definition of the best bearer depends on the bearer selection criterion of the scheduler used by the cell
TX
i
(ic), i.e., bearer with the highest index, with the highest peak RLC throughput, or with the highest effective
RLC throughput.
The uplink bandwidth allocation may result in the use of a number of frequency blocks which is less than the
number of frequency blocks associated with the channel bandwidth of the cell. The gain related to this bandwidth
reduction is applied to the PUSCH and PUCCH C/(I+N):
Where for any pixel, subscriber, or mobile M
i
covered by the non-ICIC zone in the interfered
cell TX
i
(ic), and for any pixel, subscriber, or mobile M
i
covered by the ICIC zone in
the interfered cell TX
i
(ic).
Uplink Power Control Adjustment:
Once the bandwidth allocation is performed, Atoll continues to work with the C/(I+N) given by the bandwidth
allocation, i.e., .
The pixel, subscriber, or mobile M
i
reduces its transmission power so that the PUSCH and PUCCH C/(I+N) from
it at its cell is just enough to get the selected bearer.
If with AND , where is the bearer selection
threshold, from the LTE equipment assigned to the cell TX
i
(ic), for the bearer selected for the pixel, subscriber, or
mobile M
i
.
The transmission power of M
i
is reduced to determine the effective transmission power from the pixel, subscriber,
or mobile M
i
as follows:
is calculated again using .
Output
: PUSCH and PUCCH C/(I+N) from a pixel, subscriber, or mobile M
i
at it serving cell TX
i
(ic).
: Number of frequency blocks used by the pixel, subscriber, or mobile M
i
after uplink bandwidth allocation.
: Effective transmission power of the terminal used by the pixel, subscriber, or mobile M
i
.
: Bearer assigned to the pixel, subscriber, or mobile M
i
in the uplink.
10.3.4 Best Server Determination
In LTE, best server refers to a cell ("serving transmitter"-"reference cell" pair) from which a pixel, subscriber, or mobile M
i
gets the highest downlink reference signal level ( ).
Input
: Downlink reference signal level received from any cell TX
i
(ic) at a pixel, subscriber, or mobile M
i
as
calculated in "Signal Level Calculation (DL)" on page 620 using the terminal and service parameters ( , ,
, and ) of M
i
.
Calculations
The best server of any pixel, subscriber, or mobile M
i
, , is the cell from which the received downlink reference signal
level is the highest among the downlink reference signal levels received from all the cells. The best server is determined
as follows:
CINR
PUSCH PUCCH ,
M
i
Final
CINR
PUSCH PUCCH ,
M
i
All FB
10 Log
N
FB
TX
i
i c ( )
N
FB UL
M
i
---------------------
\ .
|
|
| |
+ =
N
FB UL
M
i
N
FB
TX
i
i c ( )
<
N
FB UL
M
i
Ci el i ng
N
FB
TX
i
i c ( )
3
-------------------
\ .
|
| |
<
CINR
PUSCH PUCCH ,
M
i
CINR
PUSCH PUCCH ,
M
i
Final
=
P
M
i
P
Al l owed
M
i
= CINR
PUSCH PUCCH ,
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+ > T
B
UL
M
i
TX
i
i c ( )
P
Eff
M
i
Max P
Al l owed
M
i
CINR
PUSCH PUCCH ,
M
i
T
B
UL
M
i
TX
i
i c ( )
M
PC
+
\ .
| |

\ .
| |
P
Mi n
M
i
,
\ .
| |
=
CINR
PUSCH PUCCH ,
M
i
P
Eff
M
i
CINR
PUSCH PUCCH ,
M
i
N
FB UL
M
i
P
Eff
M
i
B
UL
M
i
C
DLRS
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
BS
M
i
Forsk 2010 AT283_TRG_E2 645
Chapter 10: LTE Networks
Here ic is the cell of the transmitter TX
i
with the highest downlink reference signal power. However, if more than one cell
of the same transmitter covers the pixel, subscriber, or mobile, the final reference cell ic might be different from the initial
cell ic (the one with the highest power) depending on the serving cell selection method:
Random: In coverage prediction calculations and in calculations on subsriber lists, the cell of the lowest layer is
selected as the serving (reference) cell. In Monte Carlo simulations, a random cell is selected as the serving
(reference) cell.
Distributive: In coverage prediction calculations and in calculations on subsriber lists, the cell of the lowest layer
is selected as the serving (reference) cell. In Monte Carlo simulations, mobiles are distributed among cell layers
one by one, i.e., if more than one cell layer covers a set of mobiles, the first mobile is assigned to the lowest cell
layer, the 2nd mobile to the second lowest cell layer, and so on.
When using either the Random or the Distributive cell selection method, the reference cell once assigned to a
mobile does not change during Monte Carlo simulations.
Min DL Traffic Load: (Not implemented yet) The cell with the lowest downlink traffic load is selected as the
serving (reference) cell. If more than one cell has the same lowest downlink traffic load, the first cell among all
such cells is selected. During Monte Carlo simulations, as the cell traffic loads may vary, the serving cell for
mobiles may also change from one iteration to the next.
Min UL Traffic Load: (Not implemented yet) The cell with the lowest uplink traffic load is selected as the serving
(reference) cell. If more than one cell has the same lowest uplink traffic load, the first cell among all such cells is
selected. During Monte Carlo simulations, as the cell traffic loads may vary, the serving cell for mobiles may also
change from one iteration to the next.
The Min DL Traffic Load and Min UL Traffic Load options model load balancing between cells. In coverage
predictions as the probe mobile selects the least loaded cell, i.e., tries to keep the traffic load balanced between
cells of the transmitter. Instead of loading already loaded cells even more, the base station chooses to load the
least loaded among them.
In case the cell supports static downlink ICIC using fractional frequency reuse, Atoll determines whether the pixel,
subscriber, or mobile M
i
is covered by the ICIC part of the frame or by the non-ICIC part of the frame. A pixel, subscriber,
or mobile is covered by the ICIC part of the frame if it is considered to be at the cell edge, and it is covered by the non-
ICIC part otherwise.
Whether a pixel, subscriber, or mobile M
i
is at cell edge is determined by calculating the difference between the path loss
from the second best server and the best server, and comparing it with the delta path loss threshold defined for the best
server of the pixel, subscriber, or mobile M
i
.
Therefore, a pixel, subscriber, or mobile M
i
is considered to be a cell edge if
, and it is considered to be not at cell edge otherwise. Here,
is the total loss from M
i
s best server and is the total loss from M
i
s second best server calculated as explained
in "Signal Level Calculation (DL)" on page 585. The second best server for a pixel, subscriber, or mobile M
i
is calculated
as follows:
is the total channel overlap ratio between the best server and the second best server as calculated in "Co-
and Adjacent Channel Overlaps Calculation" on page 617. is the delta path loss threshold defined for the best
server of the pixel, subscriber, or mobile M
i
.
Output
: Best serving cell of the pixel, subscriber, or mobile M
i
.
10.3.5 Service Area Calculation
In LTE, a pixel, subscriber, or mobile M
i
may be covered by a cell but still outside the effective service area of the cell. A
pixel, subscriber, or mobile M
i
is said to be within the service area of its best serving cell TX
i
(ic) if the downlink reference
signal energy per resource element from the cell at the pixel, subscriber, or mobile is greater than or equal to the Min RSRP
defined for the cell.
BS
M
i
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
Best
All TX
i
i c ( )
C
DLRS
TX
i
i c ( )
)
`

=
=
L
Total
2ndBS
M
i
10 Log r
O
BS
M
i
2ndBS
M
i

\ .
| |
L
Total
BS
M
i
+ AL
Path
BS
M
i
s L
Total
BS
M
i
L
Total
2ndBS
M
i
2ndBS
M
i
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
2ndBest
All TX
i
i c ( )
C
DLRS
TX
i
i c ( )
)
`

=
=
r
O
BS
M
i
2ndBS
M
i

AL
Path
BS
M
i
BS
M
i
646 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Input
: Downlink reference signal energy per resource element from the cell TX
i
(ic) at a pixel, subscriber, or
mobile M
i
as calculated in "Signal Level Calculation (DL)" on page 620.
: Minimum RSRP defined for the cell TX
i
(ic).
Calculations
A pixel, subscriber, or mobile M
i
is within the service area of its best serving cell TX
i
(ic) if:
Output
True: If the calculation criterion is satisfied.
False: Otherwise.
10.3.6 Throughput Calculation
Throughputs are calculated in two steps.
Calculation of uplink and downlink total resources in a cell as explained in "Calculation of Total Cell Resources"
on page 646.
Calculation of throughputs as explained in "Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation" on page 649.
10.3.6.1 Calculation of Total Cell Resources
The total amount of resources in a cell is the number of modulation symbols that can be used for data transfer in each
frame. The total cell resources can be calculated separately for the downlink and uplink as described in:
"Calculation of Downlink Cell Resources" on page 646.
"Calculation of Uplink Cell Resources" on page 648.
10.3.6.1.1 Calculation of Downlink Cell Resources
Input
: Subcarrier width (15 kHz).
: Width of a frequency block (180 kHz).
: Number of frequency blocks that carry the SS and the PBCH (6).
: Number of slots per subframe (2).
: Cyclic prefix duration defined for the network in the Global Parameters.
: Number of symbol durations per slot (7 is is Normal, 6 if is Extended).
: Number of PDCCH symbol durations per subframe defined in the Global Parameters.
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Number of downlink subframes in the frame for the cell TX
i
(ic). It is equal to 10 for FDD frequency bands,
and is determined from the cells TDD frame configuration for TDD frequency bands as follows:
: Number of transmission (downlink) antenna ports defined for the cell TX
i
(ic).
E
DLRS
TX
i
i c ( )
T
RSRP
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
T
RSRP
TX
i
i c ( )
>
Configuration
FDD 10
DSUUU-DSUUU 2
DSUUD-DSUUD 4
DSUDD-DSUDD 6
DSUUU-DSUUD 3
DSUUU-DDDDD 6
DSUUD-DDDDD 7
DSUDD-DDDDD 8
AF
W
FB
N
FB SS PBCH ,
N
Sl ot SF
D
CP
N
SD Sl ot
D
CP
D
CP
N
SD PDCCH
N
FB
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
SF DL
TX
i
i c ( )
N
Ant TX
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 647
Chapter 10: LTE Networks
Calculations
In LTE, a resource block (RB) is defined as 1 frequency block by 1 slot. However, schedulers are able to perform resource
allocation every subframe (2 slots). 1 frequency block by 1 subframe (2 slots) is called a scheduler resource block (SRB)
in the calculations below.
The number of modulation symbols (resource elements) per scheduler resource block is calculated as follows:
Where is the number of subcarriers per frequency block calculated as follows:
The total number of modulation symbols (resource elements) in downlink is calculated as follows:
The total downlink cell resources, i.e., , are calculated as follows:
Where is the overhead corresponding to the downlink reference signals, is the overhead corresponding to
the primary synchronisation signals, is the overhead corresponding to the secondary synchronisation signals,
is the overhead corresponding to the physical broadcast channel, and is the overhead corresponding
to the physical downlink control channel. These control channel overheads are calculated as follows:
Downlink reference signal overhead
The downlink reference signal overhead depends on the number of transmission antenna ports:
Where
PSS and SSS overhead
The primary and secondary synchonisation signals are transmitted on 1 symbol duration each in the 1st and the
6th downlink subframes, over the centre 6 frequency blocks. Therefore,
symbols
symbols
PBCH overhead
The physical broadcast channel is transmitted on four symbol durations in the 1st downlink subframe over the
center 6 frequency blocks. The physical broadcast channel overlaps with the downlink reference signals,
therefore, some downlink reference signal modulation symbols are subtracted:
for extended cyclic prefix
for normal cyclic prefix
PDCCH overhead
The physical downlink control channel can be transmitted over up to 3 symbol durations in each subframe. The
number of symbol durations for the PDCCH is defined in the global parameters. The PDCCH overlaps some
downlink reference signal symbols. These downlink reference signal symbols are subtracted from the PDCCH
overhead:
N
Sym SRB
N
SCa FB
N
SD Sl ot
N
Sl ot SF
=
N
SCa FB
N
SCa FB
W
FB
AF
------------ =
N
Sym DL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
Sym SRB
N
SF DL
TX
i
i c ( )
=
R
DL
TX
i
i c ( )
R
DL
TX
i
i c ( )
N
Sym DL
TX
i
i c ( )
O
DLRS
TX
i
i c ( )
O
PSS
O
SSS
O
PBCH
TX
i
i c ( )
O
PDCCH
TX
i
i c ( )
=
O
DLRS
TX
i
i c ( )
O
PSS
O
SSS
O
PBCH
TX
i
i c ( )
O
PDCCH
TX
i
i c ( )
O
DLRS
TX
i
i c ( ) N
DLRS SRB
TX
i
i c ( )
N
Sym SRB
------------------------------
\ .
|
| |
N
Sym DL
TX
i
i c ( )
=
N
DLRS SRB
TX
i
i c ( )
8 if N
Ant TX
TX
i
i c ( )
1 = ( )
16 if N
Ant TX
TX
i
i c ( )
2 = ( )
24 if N
Ant TX
TX
i
i c ( )
4 or 8 = ( )

=
O
PSS
2 N
FB SS PBCH ,
N
SCa FB
144 = =
O
SSS
2 N
FB SS PBCH ,
N
SCa FB
144 = =
O
PBCH
TX
i
i c ( )
4 N
SCa FB

N
DLRS SRB
TX
i
i c ( )
2
------------------------------
\ .
|
| |
N
FB SS PBCH ,
=
O
PBCH
TX
i
i c ( )
4 N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( ) N
FB SS PBCH ,
=
648 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Output
: Amount of downlink resources in the cell TX
i
(ic).
10.3.6.1.2 Calculation of Uplink Cell Resources
Input
: Subcarrier width (15 kHz).
: Width of a frequency block (180 kHz).
: Number of slots per subframe (2).
: Cyclic prefix duration defined for the network in the Global Parameters.
: Number of symbol durations per slot (7 is is Normal, 6 if is Extended).
: Average number of PUCCH frequency blocks per frame defined in the Global Parameters.
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
: Number of uplink subframes in the frame for the cell TX
i
(ic). It is equal to 10 for FDD frequency bands,
and is determined from the cells TDD frame configuration for TDD frequency bands as follows:
Calculations
In LTE, a resource block (RB) is defined as 1 frequency block by 1 slot. However, schedulers are able to perform resource
allocation every subframe (2 slots). 1 frequency block by 1 subframe (2 slots) is called a scheduler resource block (SRB)
in the calculations below.
The number of modulation symbols (resource elements) per resource block is calculated as follows:
Where is the number of subcarriers per frequency block calculated as follows:
The total number of modulation symbols (resource elements) in uplink is calculated as follows:
The total uplink cell resources, i.e., , are calculated as follows:
Where is the overhead corresponding to the uplink sounding reference signals, and is the overhead
corresponding to the uplink demodulation reference signals. These control channel overheads are calculated as follows:
O
PDCCH
TX
i
i c ( )
0 if N
SD PDCCH
0 = ( )
N
SD PDCCH
N
SCa FB
N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )
if N
SD PDCCH
1 = ( ) AND N
Ant TX
TX
i
i c ( )
4 or 8 = ( )
N
SD PDCCH
N
SCa FB
2 N
Ant TX
TX
i
i c ( )
( )
N
Sym SRB
----------------------------------------------------------------------------------------------------------- N
Sym DL
TX
i
i c ( )
Otherwi se

=
R
DL
TX
i
i c ( )
Configuration
FDD 10
DSUUU-DSUUU 6
DSUUD-DSUUD 4
DSUDD-DSUDD 2
DSUUU-DSUUD 5
DSUUU-DDDDD 3
DSUUD-DDDDD 2
DSUDD-DDDDD 1
AF
W
FB
N
Sl ot SF
D
CP
N
SD Sl ot
D
CP
D
CP
N
FB PUCCH
N
FB
TX
i
i c ( )
N
SF UL
TX
i
i c ( )
N
SF UL
TX
i
i c ( )
N
Sym SRB
N
SCa FB
N
SD Sl ot
N
Sl ot SF
=
N
SCa FB
N
SCa FB
W
FB
AF
------------ =
N
Sym UL
TX
i
i c ( )
N
FB
TX
i
i c ( )
N
FB PUCCH
( ) N
Sym SRB
N
SF UL
TX
i
i c ( )
=
R
UL
TX
i
i c ( )
R
UL
TX
i
i c ( )
N
Sym UL
TX
i
i c ( )
O
ULSRS
TX
i
i c ( )
O
ULDRS
TX
i
i c ( )
=
O
ULSRS
TX
i
i c ( )
O
ULDRS
TX
i
i c ( )
Forsk 2010 AT283_TRG_E2 649
Chapter 10: LTE Networks
Calculations of uplink control channel overheads
The uplink sounding reference signals are transmitted on 1 symbol duration in each uplink subframe. Therefore,
The uplink demodulation reference signals are transmitted on two symbol durations in each uplink subframe.
Therefore,
Output
: Amount of uplink resources in the cell TX
i
(ic).
10.3.6.2 Channel Throughput, Cell Capacity, and Allocated Bandwidth
Throughput Calculation
Channel throughputs are calculated for the entire channel resources allocated to the pixel, subscriber, or mobile M
i
. Cell
capacities are similar to channel throughputs but upper-bound by the maximum downlink and uplink traffic loads. Allocated
bandwidth throughputs are calculated for the number of used frequency blocks in uplink allocated to the pixel, subscriber,
or mobile M
i
.
Input
: Maximum downlink traffic load for the cell TX
i
(ic).
: Maximum uplink traffic load for the cell TX
i
(ic).
: Amount of downlink resources in the cell TX
i
(ic) as calculated in "Calculation of Total Cell Resources" on
page 646.
: Amount of uplink resources in the cell TX
i
(ic) as calculated in "Calculation of Total Cell Resources" on
page 646.
: Bearer efficiency (bits/symbol) of the bearer assigned to the pixel, subscriber, or mobile M
i
in the downlink
in "C/(I+N) and Bearer Calculation (DL)" on page 630.
: Bearer efficiency (bits/symbol) of the bearer assigned to the pixel, subscriber, or mobile M
i
in the uplink in
"C/(I+N) and Bearer Calculation (UL)" on page 641.
: Frame duration.
: Downlink reference signals C/N from the cell TX
i
(ic) as calculated in "C/N Calculation (DL)" on
page 628.
: Downlink reference signals C/(I+N) from the cell TX
i
(ic) as calculated in "C/N Calculation (DL)" on
page 628.
: Adaptive MIMO switch threshold defined for the cell TX
i
(ic).
: MU-MIMO threshold defined for the cell TX
i
(ic).
: MU-MIMO gain defined for the cell TX
i
(ic).
: Downlink block error rate read from the BLER vs. graph available in the LTE
equipment assigned to the terminal used by the pixel, subscriber, or mobile M
i
.
: Uplink block error rate read from the BLER vs. graph available in the LTE
equipment assigned to the cell TX
i
(ic).
: Throughput scaling factor defined in the properties of the service used by the pixel, subscriber, or
mobile M
i
.
: Throughput offset defined in the properties of the service used by the pixel, subscriber, or mobile M
i
.
: Number of frequency blocks, defined in the frequency bands table, for the channel bandwidth used by
the cell TX
i
(ic).
O
ULSRS
TX
i
i c ( ) N
SCa FB
N
Sym SRB
--------------------------- N
Sym UL
TX
i
i c ( )
=
O
ULDRS
TX
i
i c ( )
2
N
SCa FB
N
Sym SRB
--------------------------- N
Sym UL
TX
i
i c ( )
=
R
UL
TX
i
i c ( )
TL
DL Max
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
DL
TX
i
i c ( )
R
UL
TX
i
i c ( )
q
B
DL
M
i
q
B
UL
M
i
D
Frame
CNR
DLRS
TX
i
i c ( )
CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
T
MU MIMO
TX
i
i c ( )
G
MU MIMO
TX
i
i c ( )
BLER B
DL
M
i
( ) CINR
PDSCH
TX
i
i c ( )
BLER B
UL
M
i
( ) CINR
PUSCH PUCCH ,
M
i
f
TP Scal i ng
M
i
TP
Offset
M
i
N
FB
TX
i
i c ( )
650 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Number of frequency blocks used by the pixel, subscriber, or mobile M
i
after uplink bandwidth allocation
as calculated in "C/(I+N) and Bearer Calculation (UL)" on page 641.
Calculations
Downlink:
Peak RLC Channel Throughput:
In the above formula, the actual value of is used to calculate the channel throughput for coverage
predictions, while for Monte Carlo simulations.
Static Downlink ICIC using Fractional Frequency Reuse:
If the pixel, subscriber, or mobile M
i
is covered by the ICIC part of the frame (determined as explained in "Best
Server Determination" on page 644), the channel throughput is calculated as:
MIMO SU-MIMO Gain:
If the cell supports SU-MIMO or AMS, SU-MIMO gain is applied to the bearer efficiency. The gain is
read from the properties of the LTE equipment assigned to the pixel, subscriber, or mobile M
i
for:
- : Number of transmission (downlink) antenna ports defined for the cell TX
i
(ic).
- : Number of reception (downlink) antenna ports defined for the terminal used by the pixel, subscriber,
or mobile M
i
.
- : Mobility used for the calculations.
- : Bearer assigned to the pixel, subscriber, or mobile M
i
in the downlink as explained in "C/(I+N) and
Bearer Calculation (DL)" on page 630.
- : Downlink block error rate read from the graphs available in the LTE equipment assigned to the
terminal used by the pixel, subscriber, or mobile M
i
. BLER is determined for .
Atoll also takes into account the SU-MIMO Gain Factor defined for the clutter class where the pixel,
subscriber, or mobile M
i
is located.
In case of SU-MIMO:
In case of AMS:
If the Max SU-MIMO Gain for the exact value of the C/(I+N) is not availabe in the table, it is interpolated from the
gain values available for the C/(I+N) just less than and just greater than the actual C/(I+N).
Effective RLC Channel Throughput:
Application Channel Throughput:
Peak RLC Cell Capacity:
Effective RLC Cell Capacity:
Application RLC Capacity:
Uplink:
Peak RLC Channel Throughput:
N
FB UL
M
i
CTP
P DL
M
i
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
------------------------------------- =
D
Frame
D
Frame
1 sec =
CTP
P DL
M
i
R
DL
TX
i
i c ( )
q
B
DL
M
i

D
Frame
-------------------------------------
1
3
--- =
G
SU MIMO
Max
N
Ant TX
TX
i
i c ( )
N
Ant RX
M
i
Mobi l i ty M
i
( )
B
DL
M
i
BLER B
DL
M
i
( )
CINR
PDSCH
TX
i
i c ( )
f
SU MIMO
q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
DL
M
i
q
B
DL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) = if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
> or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CTP
E DL
M
i
CTP
P DL
M
i
1 BLER B
DL
M
i
( ) ( ) =
CTP
A DL
M
i
CTP
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
Cap
P DL
M
i
CTP
P DL
M
i
TL
DL Max
TX
i
i c ( )
=
Cap
E DL
M
i
Cap
P DL
M
i
1 BLER B
DL
M
i
( ) ( ) =
Cap
A DL
M
i
Cap
E DL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
CTP
P UL
M
i
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
------------------------------------- =
Forsk 2010 AT283_TRG_E2 651
Chapter 10: LTE Networks
In the above formula, the actual value of is used to calculate the channel throughput for coverage
predictions, while for Monte Carlo simulations.
MIMO SU-MIMO Gain:
If the cell supports SU-MIMO or AMS, SU-MIMO gain is applied to the bearer efficiency. The gain is
read from the properties of the LTE equipment assigned to the cell TX
i
(ic) for:
- : Number of transmission (uplink) antenna ports defined for the terminal used by the pixel,
subscriber, or mobile M
i
.
- : Number of reception (uplink) antenna ports defined for the cell TX
i
(ic).
- : Mobility used for the calculations.
- : Bearer assigned to the pixel, subscriber, or mobile M
i
in the uplink as explained in "C/(I+N) and Bearer
Calculation (UL)" on page 641.
- : Uplink block error rate read from the graphs available in the LTE equipment assigned to the cell
TX
i
(ic). BLER is determined for .
Atoll also takes into account the SU-MIMO Gain Factor defined for the clutter class where the pixel,
subscriber, or mobile M
i
is located.
In case of SU-MIMO:
In case of AMS:
If the Max SU-MIMO Gain for the exact value of the C/(I+N) is not availabe in the table, it is interpolated from the
gain values available for the C/(I+N) just less than and just greater than the actual C/(I+N).
MIMO MU-MIMO Gain (for uplink throughput coverage predictions only):
If the cell supports MU-MIMO and and , the MU-MIMO gain is
applied to the channel throughput. The MU-MIMO gain is read from the properties of the cell TX
i
(ic).
Effective RLC Channel Throughput:
Application Channel Throughput:
Peak RLC Cell Capacity:
Effective RLC Cell Capacity:
Application Cell Capacity:
Peak RLC Allocated Bandwidth Throughput:
Effective RLC Allocated Bandwidth Throughput:
Application Allocated Bandwidth Throughput:
Output
: Downlink peak RLC channel throughput at the pixel, subscriber, or mobile M
i
.
: Downlink effective RLC channel throughput at the pixel, subscriber, or mobile M
i
.
D
Frame
D
Frame
1 sec =
G
SU MIMO
Max
N
Ant TX
M
i
N
Ant RX
TX
i
i c ( )
Mobi l i ty M
i
( )
B
UL
M
i
BLER B
UL
M
i
( )
CINR
PUSCH PUCCH ,
M
i
f
SU MIMO
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) =
q
B
UL
M
i
q
B
UL
M
i
1 f
SU MIMO
G
SU MIMO
Max
1 ( ) + ( ) = if CNR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
> or CINR
DLRS
TX
i
i c ( )
T
AMS
TX
i
i c ( )
>
CNR
DLRS
TX
i
i c ( )
T
MU MIMO
TX
i
i c ( )
> N
Ant RX
TX
i
i c ( )
2 > G
MU MIMO
TX
i
i c ( )
CTP
P UL
M
i
R
UL
TX
i
i c ( )
q
B
UL
M
i

D
Frame
------------------------------------- G
MU MIMO
TX
i
i c ( )
=
CTP
E UL
M
i
CTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( ) =
CTP
A UL
M
i
CTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
Cap
P UL
M
i
CTP
P UL
M
i
TL
UL Max
TX
i
i c ( )
=
Cap
E UL
M
i
Cap
P UL
M
i
1 BLER B
UL
M
i
( ) ( ) =
Cap
A UL
M
i
Cap
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
ABTP
P UL
M
i
CTP
P UL
M
i
N
FB UL
M
i
N
FB
TX
i
i c ( )
--------------------- =
ABTP
E UL
M
i
ABTP
P UL
M
i
1 BLER B
UL
M
i
( ) ( ) =
ABTP
A UL
M
i
ABTP
E UL
M
i
f
TP Scal i ng
M
i
100
----------------------------- TP
Offset
M
i
=
CTP
P DL
M
i
CTP
E DL
M
i
652 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Downlink application channel throughput at the pixel, subscriber, or mobile M
i
.
: Downlink peak RLC cell capacity at the pixel, subscriber, or mobile M
i
.
: Downlink effective RLC cell capacity at the pixel, subscriber, or mobile M
i
.
: Downlink application cell capacity at the pixel, subscriber, or mobile M
i
.
: Uplink peak RLC channel throughput at the pixel, subscriber, or mobile M
i
.
: Uplink effective RLC channel throughput at the pixel, subscriber, or mobile M
i
.
: Uplink application channel throughput at the pixel, subscriber, or mobile M
i
.
: Uplink peak RLC cell capacity at the pixel, subscriber, or mobile M
i
.
: Uplink effective RLC cell capacity at the pixel, subscriber, or mobile M
i
.
: Uplink application cell capacity at the pixel, subscriber, or mobile M
i
.
: Uplink peak RLC allocated bandwidth throughput at the pixel, subscriber, or mobile M
i
.
: Uplink effective RLC allocated bandwidth throughput at the pixel, subscriber, or mobile M
i
.
: Uplink application allocated bandwidth throughput at the pixel, subscriber, or mobile M
i
.
10.3.7 Scheduling and Radio Resource Management
Atoll LTE module includes a number of scheduling methods which can be used for scheduling and radio resource
allocation during Monte Carlo simulations. These resource allocation algorithms are explained in "Scheduling and Radio
Resource Allocation" on page 652 and the calculation of user throughputs is explained in "User Throughput Calculation"
on page 658.
10.3.7.1 Scheduling and Radio Resource Allocation
Input
: Maximum downlink traffic load for the cell TX
i
(ic).
: Maximum uplink traffic load for the cell TX
i
(ic).
: Maximum number of users defined for the cell TX
i
(ic).
: Priority of the service accessed by a mobile M
i
.
: Downlink minimum throughput demand for the service accessed by a mobile M
i
.
: Uplink minimum throughput demand for the service accessed by a mobile M
i
.
: Downlink maximum throughput demand for the service accessed by a mobile M
i
.
: Uplink maximum throughput demand for the service accessed by a mobile M
i
.
: Downlink block error rate read from the BLER vs. graph available in the LTE
equipment assigned to the terminal used by the mobile M
i
.
: Uplink block error rate read from the BLER vs. graph available in the LTE
equipment assigned to the cell TX
i
(ic).
: Throughput scaling factor defined in the properties of the service used by the mobile M
i
.
: Throughput offset defined in the properties of the service used by the mobile M
i
.
: Downlink peak RLC channel throughput at the mobile M
i
as calculated in "Throughput Calculation" on
page 646.
: Uplink peak RLC channel throughput at the mobile M
i
as calculated in "Throughput Calculation" on
page 646.
: Uplink peak RLC allocated bandwidth throughput at the mobile M
i
as calculated in "Throughput
Calculation" on page 646.
CTP
A DL
M
i
Cap
P DL
M
i
Cap
E DL
M
i
Cap
A DL
M
i
CTP
P UL
M
i
CTP
E UL
M
i
CTP
A UL
M
i
Cap
P UL
M
i
Cap
E UL
M
i
Cap
A UL
M
i
ABTP
P UL
M
i
ABTP
E UL
M
i
ABTP
A UL
M
i
TL
DL Max
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
N
Users Max
TX
i
i c ( )
p
M
i
TPD
Mi n DL
M
i
TPD
Mi n UL
M
i
TPD
Max DL
M
i
TPD
Max UL
M
i
BLER B
DL
M
i
( ) CINR
PDSCH
TX
i
i c ( )
BLER B
UL
M
i
( ) CINR
PUSCH PUCCH ,
M
i
f
TP Scal i ng
M
i
TP
Offset
M
i
CTP
P DL
M
i
CTP
P UL
M
i
ABTP
P UL
M
i
Forsk 2010 AT283_TRG_E2 653
Chapter 10: LTE Networks
Calculations
The following calculations are described for any cell TX
i
(ic) containing the users M
i
for which it is the best server.
Mobile Selection:
The scheduler selects mobiles for the scheduling and RRM process. If the Monte Carlo user distribution has
generated a number of users which is less than , the scheduler keeps all the mobiles generated for the cell
TX
i
(ic).
For a cell, mobiles are selected for RRM by the scheduler.
Calculation of Actual Minimum and Maximum Throughput Demands:
Depending on the selected target throughput of the scheduler assigned to the cell TX
i
(ic), the actual minimum and
maximum throughput demands can be considered as the peak RLC, effective RLC, or application throughput. Therefore:
Target Throughput = Peak RLC Throughput
Downlink: ,
Uplink: ,
Target Throughput = Effective RLC Throughput
Downlink: ,
Uplink: ,
Target Throughput = Application Throughput
Downlink: ,
Uplink: ,
The Min() function selects the lower of the two values. This calculation is performed in order to limit the maximum uplink
throughput demand to the maximum throughput that a user can get in uplink using the allocated bandwidth (number of
frequency blocks) calculated for it in "C/(I+N) and Bearer Calculation (UL)" on page 641.
Resource Allocation for Minimum Throughput Demands:
1. Atoll sorts the in order of decreasing service priority, .
2. Starting with up to , Atoll allocates the downlink and uplink resources required to
satisfy each users minimum throughput demands in downlink and uplink as follows:
and
3. Atoll stops the resource allocation in downlink or uplink,
N
Users
TX
i
i c ( )
N
Users Max
TX
i
i c ( )
N
Users
TX
i
i c ( )
Mi n N
Users Max
TX
i
i c ( )
N
Users Generated
TX
i
i c ( )
, ( ) =
M
i
Sel
N
Users
TX
i
i c ( )
e
TPD
Mi n DL
M
i
Sel
TPD
Max DL
M
i
Sel
TPD
Mi n UL
M
i
Sel
Mi n TPD
Max UL
M
i
Sel
ABTP
P UL
M
i
,
\ .
| |
TPD
Mi n DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
--------------------------------------------------- = TPD
Max DL
M
i
Sel
TPD
Max DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
--------------------------------------------------- =
TPD
Mi n UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
--------------------------------------------------- = TPD
Max UL
M
i
Sel
Mi n TPD
Max UL
M
i
Sel
ABTP
P UL
M
i
,
\ .
| |
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
----------------------------------------------------------------------------------- =
TPD
Mi n DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
TP
Offset
M
i
+
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------- = TPD
Max DL
M
i
Sel
TPD
Max DL
M
i
Sel
TP
Offset
M
i
+
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------- =
TPD
Mi n UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
TP
Offset
M
i
+
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------- =
TPD
Max UL
M
i
Sel
Mi n TPD
Max UL
M
i
Sel
ABTP
P UL
M
i
,
\ .
| |
TP
Offset
M
i
+
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
f
TP Scal i ng
M
i

--------------------------------------------------------------------------------------------------------------- =
M
i
Sel
N
Users
TX
i
i c ( )
e p
M
i
Sel
M
i
Sel
1 = M
i
Sel
N
Users
TX
i
i c ( )
=
R
Mi n DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
CTP
P DL
M
i
Sel
------------------------------- = R
Mi n UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
CTP
P UL
M
i
Sel
------------------------------- =
654 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
- When/If in downlink , i.e., the resources available in downlink have been used up
for satisfying the minimum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink have been used up for
satisfying the minimum throughput demands of the mobiles.
4. Mobiles which are active UL+DL must be able to get their minimum throughput demands in both UL and DL in
order to be considered connected UL+DL. If an active UL+DL mobile is only able to get its minimum throughput
demand in one direction, it is rejected, and the resources that were allocated to it in the one direction in which it
was able to get a throughput are allocated to other mobiles.
5. Mobiles which are active UL and whose minimum throughput demand in UL is higher than the uplink allocated
bandwidth throughput ( ) are rejected due to Resource Saturation.
6. If or , and all the minimum throughput resources demanded
by the mobiles have been allocated, Atoll goes to the next step for allocating resources to satisfy the maximum
throughput demands.
The remaining cell resources available for the next step are:
Downlink:
Uplink:
Resource Allocation for Maximum Throughput Demands:
For each mobile, the throughput demands remaining once the minimum throughput demands have been satisfied are the
difference between the maximum and the minimum throughput demands:
Downlink:
Uplink:
For the remaining throughput demands of the mobiles, the following resource allocation methods are available:
1. Proportional Fair:
The goal of this scheduling method is to distribute resources among users fairly in such a way that, on the average,
each user gets the highest possible throughput that it can get under the radio conditions at its location.
Let the total number of users be .
a. Each users channel throughput is increased by the multi-user diversity gain or read
from the scheduler properties for the assigned to mobile and the number of connected
users, DL or UL, in the cell TX
i
(ic) in the iteration k-1.
and
if and if .
If the multi-user diversity gain for the exact value of the number of connected users is not availabe in the graph,
it is interpolated from the gain values available for the numbers of users just less than and just greater than
the actual number of users.
b. Atoll divides the remaining resources in the cell into equal parts for each user:
and
c. Atoll converts the remaining throughput demands of all the users to their respective remaining resource
demands:
R
Mi n DL
M
i
Sel
M
i
Sel

TL
DL Max
TX
i
i c ( )
=
R
Mi n UL
M
i
Sel
M
i
Sel

TL
UL Max
TX
i
i c ( )
=
TPD
Mi n UL
M
i
Sel
ABTP
P UL
M
i
Sel
>
R
Mi n DL
M
i
Sel
M
i
Sel

TL
DL Max
TX
i
i c ( )
< R
Mi n UL
M
i
Sel
M
i
Sel

TL
UL Max
TX
i
i c ( )
<
R
Rem DL
TX
i
i c ( )
TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

=
R
Rem UL
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

=
TPD
Rem DL
M
i
Sel
TPD
Max DL
M
i
Sel
TPD
Mi n DL
M
i
Sel
=
TPD
Rem UL
M
i
Sel
TPD
Max UL
M
i
Sel
TPD
Mi n UL
M
i
Sel
=
N M
i
Sel
e
G
MUG DL
TX
i
i c ( )
G
MUG UL
TX
i
i c ( )
Mobi l i ty M
i
( ) M
i
Sel
CTP
P DL
M
i
Sel
CTP
P DL
M
i
Sel
Without MUG
G
MUG DL
TX
i
i c ( )
= CTP
P UL
M
i
Sel
CTP
P UL
M
i
Sel
Without MUG
G
MUG UL
TX
i
i c ( )
=
G
MUG DL
TX
i
i c ( )
1 = CINR
PDSCH
M
i
Sel
CINR
MUG
Max
> G
MUG UL
TX
i
i c ( )
1 = CINR
PUSCH PUCCH ,
M
i
Sel
CINR
MUG
Max
>
R
Rem DL
TX
i
i c ( )
N
-------------------------
R
Rem UL
TX
i
i c ( )
N
-------------------------
Forsk 2010 AT283_TRG_E2 655
Chapter 10: LTE Networks
and
Remaining resource demands of a user are given by the ratio between its remaining throughput demands and
the peak channel throughputs at the users location.
d. The resources allocated to each user by the Proportional Fair scheduling method for satisfying its maximum
throughput demands are:
and
Each user gets either the resources it needs to achieve its maximum throughput demands or an equal share
from the remaining resources of the cell, whichever is smaller.
e. Atoll stops the resource allocation in downlink or uplink,
- When/If in downlink , i.e., the resources available in downlink have been used
up for satisfying the maximum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink have been used up for
satisfying the maximum throughput demands of the mobiles.
f. If the resources allocated to a user satisfy its maximum throughput demands, this user is removed from the
list of remaining users.
g. Atoll recalculates the remaining resources as follows:
and
h. Atoll repeats the all the above steps for the users whose maximum throughput demands have not been
satisfied until either and , or all the maximum throughput demands are
satisfied.
2. Round Robin:
The goal of this scheduling method is to allocate equal resources to users fairly.
Let the total number of users be .
a. Atoll divides the remaining resources in the cell into equal parts for each user:
and
b. Atoll converts the remaining throughput demands of all the users to their respective remaining resource
demands:
and
Remaining resource demands of a user are given by the ratio between its remaining throughput demands and
the peak channel throughputs at the users location.
c. The resources allocated to each user by the Round Robin scheduling method for satisfying its maximum
throughput demands are:
and
Each user gets either the resources it needs to achieve its maximum throughput demands or an equal share
from the remaining resources of the cell, whichever is smaller.
d. Atoll stops the resource allocation in downlink or uplink,
RD
Rem DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = RD
Rem UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
R
Max DL
M
i
Sel
Mi n RD
Rem DL
M
i
Sel
R
Rem DL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
= R
Max UL
M
i
Sel
Mi n RD
Rem UL
M
i
Sel
R
Rem UL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
=
R
Max DL
M
i
Sel
M
i
Sel

R
Rem DL
TX
i
i c ( )
=
R
Max UL
M
i
Sel
M
i
Sel

R
Rem UL
TX
i
i c ( )
=
R
Rem DL
TX
i
i c ( )
TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

R
Max DL
M
i
Sel
M
i
Sel

=
R
Rem UL
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

R
Max UL
M
i
Sel
M
i
Sel

=
R
Rem DL
TX
i
i c ( )
0 = R
Rem UL
TX
i
i c ( )
0 =
N M
i
Sel
e
R
Rem DL
TX
i
i c ( )
N
-------------------------
R
Rem UL
TX
i
i c ( )
N
-------------------------
RD
Rem DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = RD
Rem UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
R
Max DL
M
i
Sel
Mi n RD
Rem DL
M
i
Sel
R
Rem DL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
= R
Max UL
M
i
Sel
Mi n RD
Rem UL
M
i
Sel
R
Rem UL
TX
i
i c ( )
N
------------------------- ,
\ .
|
| |
=
656 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
- When/If in downlink , i.e., the resources available in downlink have been used
up for satisfying the maximum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink have been used up for
satisfying the maximum throughput demands of the mobiles.
e. If the resources allocated to a user satisfy its maximum throughput demands, this user is removed from the
list of remaining users.
f. Atoll recalculates the remaining resources as follows:
and
g. Atoll repeats the all the above steps for the users whose maximum throughput demands have not been
satisfied until either and , or all the maximum throughput demands are
satisfied.
3. Proportional Demand:
The goal of this scheduling method is to allocate resources to users weighted according to their remaining
throughput demands. Therefore, the user throughputs for users with high throughput demands will be higher than
those with low throughput demands. In other words, this scheduler distributes channel throughput between users
proportionally to their demands.
a. Atoll converts the remaining throughput demands of all the users to their respective remaining resource
demands:
and
Remaining resource demands of a user are given by the ratio between its remaining throughput demands and
the peak channel throughputs at the users location.
b. Atoll calculates the amount of effective remaining resources of the cell to distribute among the users as
follows:
and
c. The resources allocated to each user by the Proportional Demand scheduling method for satisfying its
maximum throughput demands are:
and
4. Max C/I:
The goal of this scheduling method is to achieve the maximum aggregate throughput for the cells. This is done by
allocating as much resources as needed to mobiles with high C/(I+N) conditions. As mobiles with high C/(I+N) can
get higher bearers, and therefore require less amount of resources, more mobiles can therefore be allocated
resources in the same frame, and the end-throughput for each cell will be the highest compared to other types of
schedulers.
a. Atoll sorts the in order of decreasing PDSCH, or PUSCH and PUCCH C/(I+N), depending on
whether the allocation is being performed for the downlink or for the uplink.
b. Starting with the mobile with the highest rank, Atoll allocates the downlink and uplink resources required to
satisfy each users remaining throughput demands in downlink and uplink as follows:
and
R
Max DL
M
i
Sel
M
i
Sel

R
Rem DL
TX
i
i c ( )
=
R
Max UL
M
i
Sel
M
i
Sel

R
Rem UL
TX
i
i c ( )
=
R
Rem DL
TX
i
i c ( )
TL
DL Max
TX
i
i c ( )
R
Mi n DL
M
i
Sel
M
i
Sel

R
Max DL
M
i
Sel
M
i
Sel

=
R
Rem UL
TX
i
i c ( )
TL
UL Max
TX
i
i c ( )
R
Mi n UL
M
i
Sel
M
i
Sel

R
Max UL
M
i
Sel
M
i
Sel

=
R
Rem DL
TX
i
i c ( )
0 = R
Rem UL
TX
i
i c ( )
0 =
RD
Rem DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = RD
Rem UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
R
Eff Rem DL
TX
i
i c ( )
Mi n R
Rem DL
TX
i
i c ( )
RD
Rem DL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
= R
Eff Rem UL
TX
i
i c ( )
Mi n R
Rem UL
TX
i
i c ( )
RD
Rem UL
M
i
Sel
M
i
Sel

,
\ .
|
|
| |
=
R
Max DL
M
i
Sel
R
Eff Rem DL
TX
i
i c ( ) RD
Rem DL
M
i
Sel
RD
Rem DL
M
i
Sel
M
i
Sel

---------------------------------------- = R
Max UL
M
i
Sel
R
Eff Rem UL
TX
i
i c ( ) RD
Rem UL
M
i
Sel
RD
Rem UL
M
i
Sel
M
i
Sel

---------------------------------------- =
M
i
Sel
N
Users
TX
i
i c ( )
e
R
Max DL
M
i
Sel
TPD
Rem DL
M
i
Sel
CTP
P DL
M
i
Sel
--------------------------------- = R
Max UL
M
i
Sel
TPD
Rem UL
M
i
Sel
CTP
P UL
M
i
Sel
--------------------------------- =
Forsk 2010 AT283_TRG_E2 657
Chapter 10: LTE Networks
c. Atoll stops the resource allocation in downlink or uplink,
- When/If in downlink , i.e., the resources available in downlink have been used
up for satisfying the maximum throughput demands of the mobiles.
- When/If in uplink , i.e., the resources available in uplink have been used up for
satisfying the maximum throughput demands of the mobiles.
Spatial Multiplexing with Uplink Multi-User MIMO:
MU-MIMO lets the system/scheduler work with two parallel LTE frames (1 for each antenna). Therefore, a mobile
connected to antenna 1 creates a corresponding resource availability on antenna 2. This resources made available on
antenna 2 can then be assigned to another mobile without any effect on the overall load of the cell. When the second
mobile is assigned to antenna 2, the resources allocated to it overlap with the resources made available by the first mobile
on antenna 1. If the second mobile is allocated more resources than the first one made available, the second mobile will
create resource availability on antenna 1. Each new mobile is either connected to antenna 1 or antenna 2. The part of the
mobiles resources which are not coupled with resources allocated to another mobile on the other antenna is called the
real resource consumption. The part of the mobiles resources which are coupled with the resources allocated to another
mobile on the other antenna is called the virtual resource consumption.
MU-MIMO can be used if the cell supports MU-MIMO, , and .
Let i be the index of connected MU-MIMO mobiles:
Each mobile has a corresponding traffic load . The scheduling starts with available real
resources and available virtual resources . means no MU-MIMO
mobile has yet been scheduled.
The virtual resource consumption of a mobile is given by:
The real resource consumption of a mobile is given by:
The virtual resources made available by the mobile are given by:
Saturation occurs when .
The following table gives an example:
Total Amount of Resources Assigned to Each Selected Mobile:
Atoll calculates the amounts of downlink and uplink resources allocated to each individual mobile (which can also
be referred to as the traffic loads of the mobiles) as follows:
Downlink:
Uplink:
Output
: Downlink traffic load or the amount of downlink resources allocated to the mobile .
Mobile
(%) (%) (%) (%)
M
1
10 0 10 10
M
2
5 5 0 5
M
3
20 5 15 15
M
4
40 15 25 25

R
Max DL
M
i
Sel
M
i
Sel

R
Rem DL
TX
i
i c ( )
=
R
Max UL
M
i
Sel
M
i
Sel

R
Rem UL
TX
i
i c ( )
=
CNR
DLRS
TX
i
i c ( )
T
MU MIMO
TX
i
i c ( )
> N
Ant RX
TX
i
i c ( )
2 >
i 1 to N =
M
i
MU MIMO
TL
UL
M
i
MU MIMO
RR
UL
M
i 0 =
MU MIMO
100 % = AV
UL
M
i 0 =
MU MIMO
0 % = i 0 =
M
i
MU MIMO
VC
UL
M
i
MU MI MO
Mi n TL
UL
M
i
MU MI MO
AV
UL
M
i 1
MU MI MO
,
\ .
| |
=
M
i
MU MIMO
RC
UL
M
i
MU MIMO
TL
UL
M
i
MU MIMO
VC
UL
M
i
MU MIMO
=
M
i
MU MIMO
AV
UL
M
i
MU MIMO
AV
UL
M
i 1
MU MIMO
VC
UL
M
i
MU MIMO
RC
UL
M
i
MU MIMO
+ =
RC
UL
M
i
MU MI MO

TL
UL Max
TX
i
i c ( )
=
TL
UL
M
i
MU MIMO
VC
UL
M
i
MU MI MO
RC
UL
M
i
MU MIMO
AV
UL
M
i
MU MIMO
M
i
Sel
TL
DL
M
i
Sel
R
DL
M
i
Sel
R
Mi n DL
M
i
Sel
R
Max DL
M
i
Sel
+ = =
TL
UL
M
i
Sel
R
UL
M
i
Sel
R
Mi n UL
M
i
Sel
R
Max UL
M
i
Sel
+ = =
TL
DL
M
i
Sel
R
DL
M
i
Sel
= M
i
Sel
658 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
: Uplink traffic load or the amount of uplink resources allocated to the mobile .
10.3.7.2 User Throughput Calculation
User throughputs are calculated for the percentage of resources allocated to each mobile selected by the scheduling for
RRM during the Monte Carlo simulations, .
Input
: Amount of downlink resources allocated to the mobile as calculated in "Scheduling and Radio
Resource Allocation" on page 652.
: Amount of uplink resources allocated to the mobile as calculated in "Scheduling and Radio Resource
Allocation" on page 652.
: Downlink peak RLC channel throughput at the mobile

as calculated in "Throughput Calculation"
on page 646.
: Uplink peak RLC channel throughput at the mobile

as calculated in "Throughput Calculation" on
page 646.
: Downlink block error rate read from the BLER vs. graph available in the LTE
equipment assigned to the terminal used by the mobile .
: Uplink block error rate read from the BLER vs. graph available in the LTE
equipment assigned to the cell TX
i
(ic).
: Throughput scaling factor defined in the properties of the service used by the mobile .
: Throughput offset defined in the properties of the service used by the mobile .
Calculations
Downlink:
Peak RLC User Throughput:
Effective RLC User Throughput:
Application User Throughput:
Uplink:
Peak RLC User Throughput:
Effective RLC User Throughput:
Application User Throughput:
Output
: Downlink peak RLC user throughput at the pixel, subscriber, or mobile .
: Downlink effective RLC user throughput at the pixel, subscriber, or mobile .
: Downlink application user throughput at the pixel, subscriber, or mobile .
: Uplink peak RLC user throughput at the pixel, subscriber, or mobile .
: Uplink effective RLC user throughput at the pixel, subscriber, or mobile .
TL
UL
M
i
Sel
R
UL
M
i
Sel
= M
i
Sel
M
i
Sel
R
DL
M
i
Sel
M
i
Sel
R
UL
M
i
Sel
M
i
Sel
CTP
P DL
M
i
Sel
M
i
Sel
CTP
P UL
M
i
Sel
M
i
Sel
BLER B
DL
M
i
Sel
\ .
| |
CINR
PDSCH
TX
i
i c ( )
M
i
Sel
BLER B
UL
M
i
Sel
\ .
| |
CINR
PUSCH PUCCH ,
M
i
f
TP Scal i ng
M
i
Sel
M
i
Sel
TP
Offset
M
i
Sel
M
i
Sel
UTP
P DL
M
i
Sel
R
DL
M
i
Sel
CTP
P DL
M
i
Sel
=
UTP
E DL
M
i
Sel
UTP
P DL
M
i
Sel
1 BLER B
DL
M
i
Sel
\ .
| |

\ .
| |
=
UTP
A DL
M
i
Sel
UTP
E DL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel
=
UTP
P UL
M
i
Sel
R
UL
M
i
Sel
CTP
P UL
M
i
Sel
=
UTP
E UL
M
i
Sel
UTP
P UL
M
i
Sel
1 BLER B
UL
M
i
Sel
\ .
| |

\ .
| |
=
UTP
A UL
M
i
Sel
UTP
E UL
M
i
Sel
f
TP Scal i ng
M
i
Sel
100
----------------------------- TP
Offset
M
i
Sel
=
UTP
P DL
M
i
Sel
M
i
Sel
UTP
E DL
M
i
Sel
M
i
Sel
UTP
A DL
M
i
Sel
M
i
Sel
UTP
P UL
M
i
Sel
M
i
Sel
UTP
E UL
M
i
Sel
M
i
Sel
Forsk 2010 AT283_TRG_E2 659
Chapter 10: LTE Networks
: Uplink application user throughput at the pixel, subscriber, or mobile .
10.4 Automatic Allocation Algorithms
The following sections describe the algorithms for:
"Automatic Neighbour Allocation" on page 659.
"Automatic Inter-Technology Neighbour Allocation" on page 661.
"Automatic Frequency Planning" on page 663.
"Automatic Physical Cell ID Allocation" on page 667.
10.4.1 Automatic Neighbour Allocation
The intra-technology neighbour allocation algorithm takes into account the cells of all the TBC transmitters. It means that
the cells of all the TBC transmitters of your .atl document are potential neighbours.
The cells to be allocated will be called TBA cells. They must fulfil the following conditions:
They are active,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone,
They belong to the folder on which allocation has been executed. This can be the Transmitters folder or a group
of transmitters (subfolder).
Only TBA cells are assigned neighbours.
We assume a reference cell TX
i
(ic) and a candidate neighbour cell TX
j
(jc). When automatic allocation starts, Atoll checks
the following conditions:
1. The distance between both cells must be less than the user-definable maximum inter-site distance. If the distance
between the reference cell and the candidate neighbour is greater than this value, then the candidate neighbour
is discarded.
2. The calculation options,
- Force Co-site Cells as Neighbours: If selected, Atoll adds all the cells located on the same site as the
reference cell to the candidate neighbour list. The weight of this constraint can be defined. It is used to
calculate the rank of each neighbour, and its importance.
- Force Adjacent Cells as Neighbours: If selected, Atoll adds all the cells geographically adjacent to the
reference cell to the candidate neighbour list. The weight of this constraint can be defined. It is used to
calculate the rank of each neighbour, and its importance.
Determination of Adjacent Cells: Geographically adjacent cells are determined on the basis of their best
server coverage areas. A candidate neighbour cell TX
i
(ic) is considered adjacent to the reference cell TX
i
(ic)
if there exists at least one pixel of TX
j
(jc)s best server coverage area where TX
i
(ic) is the second best server.
The ranking of adjacent neighbour cells increases with the number of such pixels. Adjacent cells are sorted in
the order of decreasing rank.
- Force Neighbour Symmetry: If selected, Atoll adds the reference cell to the candidate neighbour list of the
its candidate neighbour.
A symmetric neighbour relation is allowed only if the neighbour list of the reference cell is not already full. If
TX
j
(jc) is a neighbour of TX
i
(ic) but TX
i
(ic) is not a neighbour of TX
j
(jc), there can be two possibilities:
i. The neighbour list of TX
j
(jc) is not full, Atoll will add TX
i
(ic) to the end of the list.
UTP
A UL
M
i
Sel
M
i
Sel
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Figure 10.3Determination of Adjacent Cells
660 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
ii. The neighbour list of TX
j
(jc) is full, Atoll will not be able to add TX
i
(ic) to the list, so it will also remove
TX
j
(jc) from the neighbour list of TX
i
(ic).
- Force Exceptional Pairs: This option enables you to force/forbid some neighbour relations. Exceptional pairs
are pairs of cells which will always or never be neighbours of each other.
If you select "Force exceptional pairs" and "Force symmetry", Atoll considers the constraints between
exceptional pairs in both directions so as to respect symmetry condition. On the other hand, if neighbourhood
relationship is forced in one direction and forbidden in the other, symmetry cannot be respected. In this case,
Atoll displays a warning in the Event viewer.
- Delete Existing Neighbours: If selected, Atoll deletes all the current neighbours and carries out a new
neighbour allocation. If not selected, the existing neighbours are kept in the list.
3. The coverage areas of TX
i
(ic) and TX
j
(jc) must have an overlap ( ).
- Here is the surface area covered by the cell TX
i
(ic) that comprises all the pixels where:
- The received reference signal energy per resource element is greater than or equal to the minimum
RSRP:
- is the surface area covered by TX
i
(ic) within and . is the RSRP
margin with respect to the best downlink reference signal energy per resource element at which the
handover ends.
- is the coverage area where the candidate cell TX
j
(jc) is the best server.
When the above conditions are met, Atoll calculates the percentage of the coverage area overlap
( ), and compares this value with the % Min Covered Area. TX
j
(jc) is considered a neighbour of
TX
i
(ic) if .
Next, Atoll calculates the importance of the automatically allocated neighbours. Atoll sorts the neighbours by decreasing
importance in order to keep the ones with high importance. If the maximum number of neighbours to be allocated to each
cell is exceeded, Atoll keeps the ones with high importance.
The importance (%) of neighbours depends on the reason of allocation:
Note:
For calculating the overlapping coverage areas, Atoll uses the service with the lowest body
loss, the terminal that has the highest difference between gain and losses, and the
shadowing margin calculated using the defined cell edge coverage probability, if the option
is selected. The service and terminal are selected such that the selection gives the largest
possible coverage areas for the cells.
Figure 10.4Overlapping Zones
Neighbour Cause When
Importance
Value
Existing neighbour
Only if the Delete Existing Neighbours option is not selected
and in case of a new allocation
Existing
importance
Exceptional pair Only if the Force Exceptional Pairs option is selected 100 %
S
TX
i
i c ( )
S
TX
j
j c ( )

S
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
T
RSRP
TX
i
i c ( )
>
S
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
M
RSRP
+ M
RSRP
S
TX
j
j c ( )
S
TX
i
i c ( )
S
TX
j
j c ( )

S
TX
i
i c ( )
--------------------------------------------- 100
S
TX
i
i c ( )
S
TX
j
j c ( )

S
TX
i
i c ( )
--------------------------------------------- 100 % Min Coverage Area >
Forsk 2010 AT283_TRG_E2 661
Chapter 10: LTE Networks
The importance is evaluated using an Importance Function (IF), which takes into account the following factors:
Co-site factor (C): a Boolean,
Adjacency factor (A): the percentage of adjacency,
Overlapping factor (O): the percentage of overlapping.
The minimum and maximum importance assigned to each of the above factors can be defined.
The Importance Function is evaluated as follows:
Where Delta(x) = Max(x) - Min(x)
In the results, Atoll lists only the cells for which it finds new neighbours.
10.4.2 Automatic Inter-Technology Neighbour Allocation
The inter-technology neighbour allocation algorithm takes into account all the TBC transmitters (if the other technology is
GSM) or the cells of all the TBC transmitters (for any other technology than GSM). This means that all the TBC transmitters
(GSM) or the cells of all the TBC transmitters (all other technologies) of the linked document are potential neighbours.
The cells to be allocated in the main document will be called TBA cells. They must fulfil the following conditions:
They are active,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone,
They belong to the folder on which allocation has been executed. This can be the Transmitters folder or a group
of transmitters (subfolder).
Only TBA cells are assigned neighbours.
Co-site cell
Only if the Force Co-site Cells as Neighbours option is
selected
Importance
Function (IF)
Adjacent cell
Only if the Force Adjacent Cells as Neighbours option is
selected
Importance
Function (IF)
Neighbourhood relationship that fulfils
coverage conditions
Only if the % Min Covered Area is exceeded
Importance
Function (IF)
Symmetric neighbourhood
relationship
Only if the Force Neighbour Symmetry option is selected
Importance
Function (IF)
Factor
Min
Importance
Default Value
Max
Importance
Default Value
Overlapping factor (O) Min(O) 1 % Max(O) 30 %
Adjacency factor (A) Min(A) 30 % Max(A) 60 %
Co-site factor (C) Min(C) 60 % Max(C) 100 %
Neighbour Cause
Importance Function IF with Default Values
Co-site Adjacent
No No Min(O) + Delta(O)(O) 1 % + 29 %(O)
No Yes Min(A)+Delta(A){Max(O)(O)+(100 %-Max(O))(A)} 30 % + 30 %{30 %(O) + 70 %(A)}
Yes Yes Min(C)+Delta(C){Max(O)(O)+(100 %-Max(O))(A)} 60 % + 40 %{30 %(O )+ 70 %(A)}
Notes:
If the Min and Max value ranges of the importance function factors do not overlap, the
neighbours will be ranked by neighbour cause. With the default values for minimum and
maximum importance fields, neighbours will be ranked in this order: co-site neighbours,
adjacent neighbours, and neighbours allocated based on coverage overlapping.
If the Min and Max value ranges of the importance function factors overlap, the neighbours
may not be ranked by neighbour cause.
The ranking between neighbours from the same category depends on (A) and (O) factors.
The default value of Min(O) = 1 % ensures that neighbours selected for symmetry will have
an importance greater than 0 %. With a value of Min(O) = 0 %, neighbours selected for
symmetry, will have an importance greater than 0 % only if there is some overlapping.
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
662 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
We assume a reference cell A and a candidate neighbour B. When automatic allocation starts, Atoll checks following
conditions:
1. The distance between reference cell and the candidate neighbour must be less than the user-definable maximum
inter-site distance. If the distance is greater than this value, the candidate neighbour is discarded.
2. The calculation options:
- CDMA Carriers: This option is available when an LTE network is being co-planned with a UMTS, CDMA, or
TD-SCDMA network. This option enables you to select the CDMA carrier(s) that you want Atoll to consider
as potential neighbours of LTE cells. You may choose one or more carriers. Atoll will allocate only the cells
using the selected carriers as neighbours.
- Force co-site cells as neighbours: If selected, Atoll adds all the transmitters/cells located on the same site
as the reference cell in its candidate neighbour list. The weight of this constraint can be defined. It is used to
calculate the rank of each neighbour and its importance.
- Force exceptional pairs: This option enables you to force/forbid some neighbour relations. Exceptional pairs
are pairs of cells which will always or never be neighbours of each other.
- Delete existing neighbours: If selected, Atoll deletes all the current neighbours and carries out a new
neighbour allocation. If not selected, the existing neighbours are kept in the list.
3. Neighbour relation criterion:
- Allocation based on distance:
When allocation algorithm is based on distance, Atoll calculates the effective distance between the reference
cell and its candidate neighbour from the real distance between them and the azimuths of their antennas:
Where x = 0.5% so that the maximum variation in D does not to exceed 1%. D is stated in m.
The formula above implies that two cells facing each other have a smaller effective distance than the actual
distance. Candidate neighbours are ranked in the order of increasing effective distance from the reference
cell.
This formula is not used when allocation algorithm is based on coverage overlapping. In this case, the actual
inter-transmitter distance is considered.
- Algorithm based on coverage overlapping:
The coverage areas of the reference cell A and the candidate neighbour B must overlap ( ).
Two cases may exist for S
A
:
- 1
st
case: S
A
is the area where the cell A is the best serving cell, with a 0 dB margin.
This means that the reference signal energy per resource element received from A is greater than the
minimum required (Min RSRP), and is the highest one. .
- 2
nd
case: The margin is other than 0 dB. S
A
is the area where:
The reference signal energy per resource element received from A exceeds the minimum required (Min
RSRP) and is within a margin from the highest signal level.
Two cases may exist for S
B
:
- 1
st
case: S
B
is the area where the candidate neighbour is the best server. In this case, the margin must
be set to 0dB.
The signal level received from B exceeds the minimum required, and is the highest one.
- 2
nd
case: The margin is other than 0dB. S
B
is the area where:
The signal level received from B exceeds the minimum required and is within a margin from the best signal
level.
Figure 10.5Inter-Transmitter Distance Calculation
Di st Cel l A Cel l B , ( ) D 1 x | cos x o cos + ( ) =
S
A
S
B

Forsk 2010 AT283_TRG_E2 663


Chapter 10: LTE Networks
Atoll calculates the percentage of the coverage area overlap ( ) and compares this value with
the % Min Covered Area. B is considered a neighbour of A if .
Candidate neighbours are ranked in the order of decreasing coverage area overlap percentages.
Next, Atoll calculates the importance of the automatically allocated neighbours. Atoll sorts the neighbours by decreasing
importance in order to keep the ones with high importance. If the maximum number of neighbours to be allocated to each
cell is exceeded, Atoll keeps the ones with high importance.
The importance (%) of neighbours depends on the reason of allocation:
For allocation based on distance:
is the distance between the reference cell and the neighbour and is the maximum inter-site distance.
For allocation based on coverage overlapping:
The importance is evaluated using an Importance Function (IF), which takes into account the following factors:
- Co-site factor (C): a Boolean,
- Overlapping factor (O): the percentage of overlapping.
The minimum and maximum importance assigned to each of the above factors can be defined.
The IF evaluates importance as follows:
Where Delta(x) = Max(x) - Min(x)
In the results, Atoll displays only the cells for which it finds new neighbours.
Neighbour cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter/cell If the Force co-site cells as neighbours option is selected 100 %
Neighbour relation that fulfils
distance conditions
If the maximum distance is not exceeded
Neighbour cause When
Importance
value
Existing neighbour If the Delete existing neighbours option is not selected
Existing
importance
Exceptional pair If the Force exceptional pairs option is selected 100 %
Co-site transmitter/cell If the Force co-site cells as neighbours option is selected IF
Neighbourhood relationship
that fulfils coverage conditions
If the % minimum covered area is exceeded IF
Factor
Min
Importance
Default Value
Max
Importance
Default Value
Overlapping factor (O) Min(O) 1 % Max(O) 60 %
Co-site factor (C) Min(C) 60 % Max(C) 100 %
Co-site Importance Function IF with Default Values
No Min(O) + Delta(O)(O) 1 % + 59 %(O)
Yes Min(C) + Delta(C)(O) 60 % + 40 %(O)
Notes:
If the Min and Max value ranges of the importance function factors do not overlap, the
neighbours will be ranked by neighbour cause. With the default values for minimum and
maximum importance fields, neighbours will be ranked in this order: co-site neighbours and
neighbours allocated based on coverage overlapping.
If the Min and Max value ranges of the importance function factors overlap, the neighbours
may not be ranked by neighbour cause.
The ranking between neighbours from the same category depends on (A) and (O) factors.
S
A
S
B

S
A
---------------------- 100
S
A
S
B

S
A
---------------------- 100 % Min Covered Area >
1
d
d
max
------------
d d
max
664 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
10.4.3 Automatic Frequency Planning
The role of an Automatic Frequency Planning (AFP) tool is to assign frequencies (channels) to cells of a network such that
the overall network performance is optimised. In other words, the interference within the network is reduced as much as
possible. Co-channel interference is the main reason for overall network quality degradation in LTE. In order to improve
network performance, the LTE AFP tries to minimise co- and adjacent channel interference as much as possible while
respecting any constraints input to it. The main constraints are the resources available for allocation, i.e., the number of
frequencies with which the AFP can work, and the relationships to take into account, i.e., interference matrices,
neighbours, and distance between transmitters.
The AFP is based on a cost function which represents the interference level in the network. The aim of the AFP is to
minimise the cost. The best, or optimum, frequency plan is the one which corresponds to the lowest cost.
The following describes the automatic allocation method for carrier frequencies in LTE networks, which takes into account
interference matrices, neighbour relations, and distance between transmitters.
The frequency allocation algorithm takes into account the cells of all the TBC transmitters. The cells to be allocated will be
called TBA cells. They must fulfil the following conditions:
They are active,
Their channel allocation status is not set to locked,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone.
10.4.3.1 Separation Constraint and Relationship Weights
The AFP algorithm is based on a cost function which takes into account the following separation constraints:
Required channel separation
- For co-site cells: 2 channel bandwidths of the TBA cell.
- For neighbour cells: 1 channel bandwidth of the TBA cell.
The above separation constraints are studied between each TBA cell and its related cells. Atoll calculates the cost
between each individual TBA and related cell, and then the overall cost for the TBA cell.
Related cells of a TBA cell are:
Its neighbours, if the check box "Take Neighbours into Account" is selected,
Assigned weight
Cells that are listed in the interference matrix of the TBA cell,
Assigned weight
Cells within the cells (or the default) minimum reuse distance, if the check box "Take Min Reuse Distance into
Account" is selected,
Assigned weight
10.4.3.2 Calculation of Cost Between TBA and Related Cells
Atoll calculates the separation constraint violation level between the TBA cell TX
i
(ic) and its related cell TX
j
(jc) as follows:
Where is the required separation, and is the actual separation between channels used by
TX
i
(ic) and TX
j
(jc) calculated as follows:
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Notes:
The sum of the weights assigned to the above relations is 1.
These default weights can be modified through the Atoll.ini file. For more information, see
the Administrator Manual.
A
Req
e
Nei ghbour
0.5 =
e
IM
0.3 =
e
Di s ce tan
0.2 =
VL
Sep
TX
i
i c ( ) TX
j
j c ( )
A
Req
TX
i
i c ( ) TX
j
j c ( )
A
TX
i
i c ( ) TX
j
j c ( )

A
Req
TX
i
i c ( ) TX
j
j c ( )
----------------------------------------------------------------------------------
\ .
|
|
| |
2
if A
TX
i
i c ( ) TX
j
j c ( )
A
Req
TX
i
i c ( ) TX
j
j c ( )
<
0 Otherwi se

=
A
Req
TX
i
i c ( ) TX
j
j c ( )
A
TX
i
i c ( ) TX
j
j c ( )
A
TX
i
i c ( ) TX
j
j c ( )
F
Start
TX
j
j c ( )
F
Start
TX
i
i c ( )

W
Channel
TX
i
i c ( )
-------------------------------------------
=
Forsk 2010 AT283_TRG_E2 665
Chapter 10: LTE Networks
Where is the start frequency of the channel used by TX
j
(jc) calculated as follows:
is the start frequency of the channel used by TX
i
(ic) calculated as follows:
Where and are the start frequencies of the frequency bands assigned to the cells TX
i
(ic) and
TX
j
(jc) respectively. can be the start frequency of a TDD frequency band ( ), or the downlink start
frequency of an FDD frequency band ( ). and are the channel numbers assigned to
cells TX
i
(ic) and TX
j
(jc) respectively. For FDD networks, Atoll considers that the same channel number is assigned to a
cell in the downlink and uplink, i.e., the channel number you assign to a cell is considered for uplink and downlink both.
And, and are the bandwidths of the channels assigned to cells TX
i
(ic) and TX
j
(jc) respectively.
The cost of the relation between the TBA cell and its related cell is calculated next:
Where is the importance of the relationship between the TBA and its related neighbour cell,
is the importance of the relationship between the TBA cell and its related interfering cell, and is the
importance of the relationship between the TBA and its related cell with respect to the distance between them.
is calculated during automatic neighbour allocation by Atoll as explained in "Automatic Neighbour
Allocation" on page 659. For manual neighbour allocation, this value is equal to 1.
is calculated during the interference matrices calculation as follows:
Co-channel interference probability (i.e., for ):
Adjacent channel interference probability (i.e., for :
Otherwise, i.e., for other values of ,
Where is the best server coverage area of the cell TX
i
(ic), that comprises all the pixels where
as calculated in "Service Area Calculation" on page 645. is the best server coverage area of the cell
TX
i
(ic) where the given condition is true.
is the received downlink reference signal level from the cell TX
i
(ic). is the received maximum signal level
from the cell TX
j
(jc) calculated using the Max Power defined for this cell. is the downlink noise for the cell TX
i
(ic)
as calculated in "Noise Calculation (DL)" on page 623. is the quality margin used for the interference matrices
calculation. And, is the adjacent channel suppression factor defined for the frequency band of the cell TX
i
(ic).
F
Start
TX
j
j c ( )
F
Start
TX
j
j c ( )
F
Start Band
TX
j
j c ( )
W
Channel
TX
j
j c ( )
N
Channel
TX
j
j c ( )
+ =
F
Start
TX
i
i c ( )
F
Start
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
+ =
F
Start Band
TX
i
i c ( )
F
Start Band
TX
j
j c ( )
F
Start Band
F
Start TDD
F
Start FDD DL
N
Channel
TX
i
i c ( )
N
Channel
TX
j
j c ( )
W
Channel
TX
i
i c ( )
W
Channel
TX
j
j c ( )
$
TX
i
i c ( ) TX
j
j c ( )
VL
Sep
TX
i
i c ( ) TX
j
j c ( )
e
Nei ghbour
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
e
Di s ce tan
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
+ ( ) e
IM
i
IM
TX
i
i c ( ) TX
j
j c ( )
+ =
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
=
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 0 =
S
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
10 Log 10
C
Max
TX
j
j c ( )
M
Qual i ty
+
10
---------------------------------------------------------
10
n
DLRS
TX
i
i c ( )
10
-----------------------
+
\ .
|
|
|
|
|
| |
T
RSRP
TX
i
i c ( )
174 10 Log 15000 ( ) +
\ .
| |
<
S
TX
i
i c ( )
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 1 =
S
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
10 Log 10
C
Max
TX
j
j c ( )
M
Qual i ty
f
ACS
TX
i
i c ( )
+ +
10
-------------------------------------------------------------------------------------
10
n
DLRS
TX
i
i c ( )
10
-----------------------
+
\ .
|
|
|
|
|
| |
T
RSRP
TX
i
i c ( )
174 10 Log 15000 ( ) +
\ .
| |
<
S
TX
i
i c ( )
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) i
IM
TX
i
i c ( ) TX
j
j c ( )
0 =
S
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
T
RSRP
TX
i
i c ( )
>
S
TX
i
i c ( )
Condi ti on
C
DLRS
TX
i
i c ( )
C
Max
TX
j
j c ( )
n
DLRS
TX
i
i c ( )
M
Qual i ty
f
ACS
TX
i
i c ( )
666 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
In words, is equivalent to a probability of interference calculated by taking the ratio of the interfered surface
area to the total surface area of a cell. Two interference probabilities are calculated for each interfered-interfering cell pair,
i.e., for co-channel and adjacent channel interference.
is calculated by the AFP as follows:
Where is the minimum reuse distance, either defined for each TBA cell individually or set for all the TBA cells in
the AFP dialogue, and is the weighted distance between the TBA cell TX
i
(ic) and its related cell TX
j
(jc)
calculated as follows:
is weighted according to the orientations of the TBA cell and its related cell with respect to the straight line
joining them. is the distance between the two cells considering any offsets with respect to the site locations.
x is set to 15 % so that the maximum variation in due to the azimuths does not exceed 60 %. and
are calculated from the azimuths of the two cells as shown in Figure 10.6 on page 666.
The above formula implies that two cells facing each other will have a shorter effective distance between them than the
real distance, and two cells pointing in opposite directions will have a greater effective distance.
The importance of the distance relation is explained in Figure 10.7 on page 666. This figure shows that cells that are
located near (based on the effective distance which is weighted by the orientations of the cells) have high importance,
which is interpreted as a high cost, and cells that are located far have low importance. Cells that are further than the reuse
distance do not have any cost related to the distance relation.
Atoll calculates the quality reduction factor for the TBA cell and its related cell from the cost calculated above as follows:
The quality reduction factor is a measure of the cost of an individual relation.
The total cost of the current frequency allocation for any TBA cell is given as follows, considering all the cells with which
the TBA cell has relations:
Figure 10.6Weighted Distance Between Cells
Figure 10.7Importance Based on Distance Relation
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
1 if D
TX
i
i c ( ) TX
j
j c ( )
1 <
Log
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
--------------------------------------
\ .
|
| |
2
\ .
|
| |
Log D
Reuse
2
( )
--------------------------------------------------------------- Otherwi se

=
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
1 x | ( ) cos o ( ) cos 2 ( ) + ( ) =
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
D
TX
i
i c ( ) TX
j
j c ( )
o |
QRF
TX
i
i c ( ) TX
j
j c ( )
1 $
TX
i
i c ( ) TX
j
j c ( )
=
$
Total
TX
i
i c ( )
1 QRF
TX
i
i c ( ) TX
j
j c ( )
TX
j
j c ( )
[
=
Forsk 2010 AT283_TRG_E2 667
Chapter 10: LTE Networks
And, the total cost of the current frequency plan for the entire network is simply the sum of the total TBA cell costs
calculated above, i.e.,
10.4.3.3 AFP Algorithm
The AFP algorithm is an iterative algorithm which:
Calculates the cost (as described above) of the initial frequency plan,
Tries different frequency plans in order to reduce the cost,
Memorises the different frequency plans in order to determine the best one, i.e., the frequency plan which provides
the lowest total cost,
Stops when it is unable to improve the cost of the network, and proposes the last known best frequency plan as
the solution.
10.4.4 Automatic Physical Cell ID Allocation
In LTE, 504 physical cell IDs are available, numbered from 0 to 503. There are as many pseudo-random sequences
defined in the 3GPP specifications. Physical cell IDs are grouped into 168 unique cell ID groups (called SSS IDs in Atoll),
with each group containing 3 unique identities (called PSS IDs in Atoll). An SSS ID is thus uniquely defined by a number
in the range of 0 to 167, and a PSS ID is defined by a number in the range of 0 to 2.
Each cells downlink reference signals transmit a pseudo-random sequence corresponding to the physical cell ID of the
cell. The SSS and PSS are transmitted over the centre six frequency blocks independent of the channel bandwidths used
by cells. Mobiles synchronise there transmission and reception frequency and time by listening first to the PSS. Once they
know the PSS ID of the cell, they listen to the SSS of the cell in order to know the SSS ID. The combination of these two
IDs gives the physical cell ID and the associated pseudo-random sequence that is transmitted over the downlink reference
signals.
Once the physical cell ID and the associated pseudo-random sequence is known to the mobile, the cell is recognized by
the mobile based on the received downlink reference signals. Downlink channel quality measurements are also made on
the downlink reference signals.
As can be understood from the above description, if all the cells in the network transmit the same physical cell ID, it will be
impossible for a mobile to identify different cells. Cell search and selection will be impossible. Therefore, it is important to
intelligently allocate physical cell IDs to cells so as to allow easy recognition of cells by mobiles.
The following describes the automatic allocation method for physical cell IDs in an LTE network, which takes into account
the distance between transmitters, the frequency plan of the network (i.e., co- and adjacent channel interference
probabilities), and the neighbour relations.
The physical cell ID allocation algorithm takes into account the cells of all the TBC transmitters. The cells to be allocated
will be called TBA cells. They must fulfil the following conditions:
They are active,
Their status is not set to locked,
They satisfy the filter criteria applied to the Transmitters folder,
They are located inside the focus zone.
10.4.4.1 Constraint and Relationship Weights
The automatic physical cell ID allocation algorithm is based on a cost-based function which takes into account the following
constraints, in the order of priority:
1. Same physical cell ID,
Assigned weight
2. Same PSS ID,
Assigned weight
3. Same SSS ID,
Assigned weight
$
Total
$
Total
TX
i
i c ( )
TX
i
i c ( )

=
Note:
If no focus zone exists in the .atl document, Atoll takes into account the computation zone.
Notes:
The sum of the weights assigned to the above constraints is 1.
These default weights can be modified through the Atoll.ini file. For more information, see
the Administrator Manual.
e
ID
0.5 =
e
PSS
0.25 =
e
SSS
0.25 =
668 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
The above separation constraints are studied between each TBA cell and its related cells. Atoll calculates the cost
between each individual TBA and related cell, and then the overall cost for the TBA cell.
Related cells of a TBA cell are:
Its neighbours, if the check box "Take Neighbours into Account" is selected,
Assigned weight
Neighbours of a TBA cell are also related to each other through the TBA cell. This relation is also taken into
account,
Assigned weight
You can choose to not take into account the inter-neighbour physical cell ID collision by adding an option in the
Atoll.ini file (see the Administrator Manual). If inter-neighbour collision is not taken into account, the weight
assigned to the neighbour relation alone is and that of the inter-neighbour collision is of course
.
Cells that are listed in the interference matrix of the TBA cell (available with the AFP module only),
Assigned weight
Cells within the cells (or the default) minimum reuse distance, if the check box "Take Min Reuse Distance into
Account" is selected,
Assigned weight
10.4.4.2 Calculation of Cost Between TBA and Related Cells
Atoll calculates the constraint violation level between the TBA cell TX
i
(ic) and its related cell TX
j
(jc) as follows:
Where , , and are the weights assigned to the physical cell ID, PSS ID, and SSS ID constraints.
is the SS interference level between TX
i
(ic) and TX
j
(jc) calculated as follows:
Where is the total channel overlap ratio between the TX
i
(ic) and TX
j
(jc) as calculated in "Co- and Adjacent
Channel Overlaps Calculation" on page 617. is the DC subcarrier shift factor. This factor represents the
difference in the DC subcarrier frequencies of the interfered and interfering cells with respect to the SS bandwidth. The
DC subcarrier shift factor is calculated as follows:
Where and are the centre frequencies of the channels used by TX
i
(ic) and TX
j
(jc) respectively. These
are the frequencies where the DC subcarrier is located. The centre frequencies are calculated as follows:
For cell TX
i
(ic):
For cell TX
j
(jc):
is the physical cell ID collision probability given by .
is the PSS ID collision probability given by .
Notes:
The sum of the weights assigned to the above relations is 1.
These default weights can be modified through the Atoll.ini file. For more information, see
the Administrator Manual.
e
Nei ghbour
0.35 =
e
Inter Nei ghbour
0.15 =
e
Nei ghbour
0.5 =
e
Inter Nei ghbour
0 =
e
IM
0.3 =
e
Di s ce tan
0.2 =
VL
TX
i
i c ( ) TX
j
j c ( )
IL
SS
TX
i
i c ( ) TX
j
j c ( )
e
ID
p
Col l
ID
e
PSS
p
Col l
PSS
e
SSS
p
Penal ty
SSS
+ + ( ) =
e
ID
e
PSS
e
SSS
IL
SS
TX
i
i c ( ) TX
j
j c ( )
IL
SS
TX
i
i c ( ) TX
j
j c ( )
r
O
TX
i
i c ( ) TX
j
j c ( )
1 f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
1 TL
DL
TX
j
j c ( )
( )
)
`

=
r
O
TX
i
i c ( ) TX
j
j c ( )
f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
f
DC SCa Shi ft
TX
i
i c ( ) TX
j
j c ( )
Mi n 1
F
Centre
TX
i
i c ( )
F
Centre
TX
j
j c ( )

N
FB SS PBCH ,
W
FB

-------------------------------------------------------
,
\ .
|
| |
=
F
Centre
TX
i
i c ( )
F
Centre
TX
j
j c ( )
F
Centre
TX
i
i c ( )
F
Start Band
TX
i
i c ( )
W
Channel
TX
i
i c ( )
N
Channel
TX
i
i c ( )
1
2
--- +
\ .
| |
+ =
F
Centre
TX
j
j c ( )
F
Start Band
TX
j
j c ( )
W
Channel
TX
j
j c ( )
N
Channel
TX
j
j c ( )
1
2
--- +
\ .
| |
+ =
p
Col l
ID
p
Col l
ID
1 if ID

TX
i
i c ( )
ID

TX
j
j c ( )
=
0 if ID

TX
i
i c ( )
ID

TX
j
j c ( )
=

=
p
Col l
PSS
p
Col l
PSS
1 if ID
PSS
TX
i
i c ( )
ID
PSS
TX
j
j c ( )
=
0 if ID
PSS
TX
i
i c ( )
ID
PSS
TX
j
j c ( )
=

=
Forsk 2010 AT283_TRG_E2 669
Chapter 10: LTE Networks
is the SSS ID penalty given by if the
SSS ID allocation strategy is set to "Same per Site", and by if the SSS ID allocation strategy is set to "Free".
The SSS penalty models the SSS ID allocation constraint.
Next, Atoll calculates the importance of the relation between the TBA cell and its related cell.
Where is the importance of the relationship between the TBA cell and its related neighbour cell,
is the importance of the relationship between two neighbours of the TBA cell, is the
importance of the relationship between the TBA cell and its related interfering cell (available with the AFP module only),
and is the importance of the relationship between the TBA and its related cell with respect to the distance
between them.
is calculated during automatic neighbour allocation by Atoll as explained in "Automatic Neighbour
Allocation" on page 659. For manual neighbour allocation, this value is equal to 1.
is calculated from the neighbour relationship importance values calculated during automatic neighbour
allocation. If two neighbours of the TBA cell have the same physical cell ID assigned, the importance of the inter-neighbour
physical cell ID collision is the average of their neighbour importance values with the TBA cell. If more than one pair of
neighbours of the TBA cell has the same physical cell ID assigned, then the importance is the highest value among all the
averages:
Where and are two neighbours of the TBA cell that have the same physical cell ID
assigned.
is calculated during the interference matrices calculation as follows:
Co-channel interference probability (i.e., for ):
Adjacent channel interference probability (i.e., for :
Otherwise, i.e., for other values of ,
Where is the best server coverage area of the cell TX
i
(ic), that comprises all the pixels where
as calculated in "Service Area Calculation" on page 645. is the best server coverage area of the cell
TX
i
(ic) where the given condition is true.
p
Penal ty
SSS
p
Penal ty
SSS
1 if ID
SSS
TX
i
i c ( )
ID
SSS
TX
j
j c ( )
= AND Si te
TX
i
i c ( )
Si te
TX
j
j c ( )
=
0 Otherwi se

=
p
Penal ty
SSS
0 =
i
Total
TX
i
i c ( ) TX
j
j c ( )
e
Nei ghbour
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
e
Inter Nei ghbour
i
Inter Nei ghbour
+ +
e
IM
i
IM
TX
i
i c ( ) TX
j
j c ( )
e
Di s ce tan
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
+
=
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
Inter Nei ghbour
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
i
Nei ghbour
TX
i
i c ( ) TX
j
j c ( )
i
Inter Nei ghbour
i
Inter Nei ghbour
Max
All Neighbour Pairs
with ID Collisions
i
Nei ghbour
TX
i
i c ( ) TX
j 1
j 1c ( )
i
Nei ghbour
TX
i
i c ( ) TX
j 2
j 2c ( )
+
2
-----------------------------------------------------------------------------------------
\ .
|
| |
=
TX
j 1
j 1c ( ) TX
j 2
j 2c ( ) TX
i
i c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
=
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 0 =
S
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
10 Log 10
C
Max
TX
j
j c ( )
M
Qual i ty
+
10
---------------------------------------------------------
10
n
DLRS
TX
i
i c ( )
10
-----------------------
+
\ .
|
|
|
|
|
| |
T
RSRP
TX
i
i c ( )
174 10 Log 15000 ( ) +
\ .
| |
<
S
TX
i
i c ( )
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) 1 =
S
TX
i
i c ( )
C
DLRS
TX
i
i c ( )
10 Log 10
C
Max
TX
j
j c ( )
M
Qual i ty
f
ACS
TX
i
i c ( )
+ +
10
-------------------------------------------------------------------------------------
10
n
DLRS
TX
i
i c ( )
10
-----------------------
+
\ .
|
|
|
|
|
| |
T
RSRP
TX
i
i c ( )
174 10 Log 15000 ( ) +
\ .
| |
<
S
TX
i
i c ( )
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fl oor A
TX
i
i c ( ) TX
j
j c ( )
( ) i
IM
TX
i
i c ( ) TX
j
j c ( )
0 =
S
TX
i
i c ( )
E
DLRS
TX
i
i c ( )
T
RSRP
TX
i
i c ( )
>
S
TX
i
i c ( )
Condi ti on
670 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the received downlink reference signal level from the cell TX
i
(ic). is the received maximum signal level
from the cell TX
j
(jc) calculated using the Max Power defined for this cell. is the downlink noise for the cell TX
i
(ic)
as calculated in "Noise Calculation (DL)" on page 623. is the quality margin used for the interference matrices
calculation. And, is the adjacent channel suppression factor defined for the frequency band of the cell TX
i
(ic).
In words, is equivalent to a probability of interference calculated by taking the ratio of the interfered surface
area to the total surface area of a cell. Two interference probabilities are calculated for each interfered-interfering cell pair,
i.e., for co-channel and adjacent channel interference.
is calculated by the physical cell ID allocation algorithm as follows:
Where is the minimum reuse distance, either defined for each TBA cell individually or set for all the TBA cells in
the automatic allocation dialogue, and is the weighted distance between the TBA cell TX
i
(ic) and its related
cell TX
j
(jc) calculated as follows:
is weighted according to the orientations of the TBA and its related cell with respect to the straight line
joining them. is the distance between the two cells considering any offsets with respect to the site locations.
x is set to 15 % so that the maximum variation in due to the azimuths does not exceed 60 %. and
are calculated from the azimuths of the two cells as shown in Figure 10.8 on page 670.
The above formula implies that two cells facing each other will have a shorter effective distance between them than the
real distance, and two cells pointing in opposite directions will have a greater effective distance.
The importance of the distance relation is explained in Figure 10.9 on page 670. This figure shows that cells that are
located near (based on the effective distance which is weighted by the orientations of the cells) have high importance,
which is interpreted as a high cost, and cells that are located far have low importance. Cells that are further than the reuse
distance do not have any cost related to the distance relation.
Figure 10.8Weighted Distance Between Cells
Figure 10.9Importance Based on Distance Relation
C
DLRS
TX
i
i c ( )
C
Max
TX
j
j c ( )
n
DLRS
TX
i
i c ( )
M
Qual i ty
f
ACS
TX
i
i c ( )
i
IM
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
i
Di s ce tan
TX
i
i c ( ) TX
j
j c ( )
1 if D
TX
i
i c ( ) TX
j
j c ( )
1 <
Log
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
--------------------------------------
\ .
|
| |
2
\ .
|
| |
Log D
Reuse
2
( )
--------------------------------------------------------------- Otherwi se

=
D
Reuse
D
TX
i
i c ( ) TX
j
j c ( )
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
1 x | ( ) cos o ( ) cos 2 ( ) + ( ) =
D
TX
i
i c ( ) TX
j
j c ( )
d
TX
i
i c ( ) TX
j
j c ( )
D
TX
i
i c ( ) TX
j
j c ( )
o |
Forsk 2010 AT283_TRG_E2 671
Chapter 10: LTE Networks
From the constraint violation level and the total importance of the relation between the TBA and its related cell, Atoll
calculates the quality reduction factor for the pair as follows:
The quality reduction factor is a measure of the cost of an individual relation.
The total cost of the current physical cell ID allocation for any TBA cell is given as follows, considering all the cells with
which the TBA cell has relations:
And, the total cost of the current physical cell ID allocation for the entire network is simply the sum of the total TBA cell
costs calculated above, i.e.,
10.4.4.3 Automatic Allocation Algorithm
The automatic physical cell ID allocation algorithm is an iterative algorithm which:
Calculates the cost (as described above) of the current physical cell ID allocation,
Allocates new physical cell IDs to cells in order to reduce the costs, and calculates the cost again,
Memorises the different allocation plans in order to determine the best allocation, i.e., which provides the lowest
total cost.
QRF
TX
i
i c ( ) TX
j
j c ( )
1 VL
TX
i
i c ( ) TX
j
j c ( )
i
Total
TX
i
i c ( ) TX
j
j c ( )
=
$
Total
TX
i
i c ( )
1 QRF
TX
i
i c ( ) TX
j
j c ( )
TX
j
j c ( )
[
=
$
Total
$
Total
TX
i
i c ( )
TX
i
i c ( )

=
672 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Chapter 11
Repeaters and Remote Antennas
Forsk 2010 AT283_TRG_E2 675
Chapter 11: Repeaters and Remote Antennas
11 Repeaters and Remote Antennas
A repeater receives, amplifies, and re-transmits the radiated or conducted RF carrier both in downlink and uplink. It has a
donor side and a server side. The donor side receives the signal from a donor (transmitter, repeater, or remote antenna),
and the server side amplifies and re-transmits the received signal. Repeaters increase the coverage area of their donors
by re-transmitting all the frequencies (TRXs in GSM, carriers in UMTS, CDMA2000 and TD-SCDMA, and channels in
WiMAX and LTE documents).
Donors and repeaters may be linked through:
Air: User-defined or calculated propagation losses
Microwave Links: User-defined link losses
Optical Fibre Links: User-defined link losses
Remote antennas are antennas located far from the transmitters, at locations that would normally require long runs of
feeder cable. A remote antenna is connected to the base station with an optic fibre. Remote antennas allow you to ensure
radio coverage in an area without a new base station. In Atoll, remote antennas should be connected to base stations that
do not have any antennas. A remote antenna, as opposed to a repeater, does not have any equipment and therefore
generates neither amplification gain nor noise.
In UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE documents, Atoll calculates the signal level received from a repeater
or a remote antenna by determining the total downlink and uplink gains (described in "UMTS, CDMA2000, TD-SCDMA,
WiMAX, and LTE Documents" on page 675). In GSM documents, the received signal level from a repeater or a remote
antenna is calculated by determining the EIRP transmitted by the repeater or remote antenna (described in "GSM
Documents" on page 683).
The following sections describe how received signal levels, and the related downlink and uplink gains and EIRP, are
calculated from a repeater or remote antenna R with a donor D.
11.1 UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE
Documents
11.1.1 Signal Level Calculation
The received signal level (dBm) on a carrier ic from a donor D at a pixel/mobile M
i
via a repeater or remote antenna R (see
Figure 11.1 on page 676) is calculated as follows:
The received signal level (dBm) from a pixel/mobile M
i
at a donor D via a repeater or remote antenna R (see Figure 11.1
on page 676) is calculated as follows:
Here:
is the downlink transmission power of a donor D on carrier ic.
is the uplink transmission power of a pixel/mobile M
i
.
is the total downlink gain, user-defined or calculated as explained in "Downlink Total Gain Calculation"
on page 677.
is the total uplink gain, user-defined or calculated as explained in "Uplink Total Gain Calculation" on
page 678.
is the path loss (dB) calculated as follows:
, with:
- is the path loss calculated using a propagation model.
- : Antenna attenuation (from antenna patterns) calculated for the antenna used by the repeater or remote
antenna R.
is the shadowing margin.
Note:
If a pixel/mobile M
i
receives signals from the donor D and its repeater R, the total signal strength
is the sum of the two signals:
C
DL
R
i c ( ) P
DL
D
i c ( ) G
Total DL
R
L
Path
R M
i

M
Shadowi ng
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ + =
C
DL
D
i c ( ) C
DL
R
i c ( ) +
C
UL
M
i
P
UL
M
i
G
Total UL
R
L
Path
R M
i

M
Shadowi ng
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Body
M
i
+ + =
P
DL
D
i c ( )
P
UL
M
i
G
Total DL
R
G
Total UL
R
L
Path
R M
i

L
Path
R M
i

L
Model
L
Ant
R
+ =
L
Model
L
Ant
R
M
Shadowi ng
676 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
is the indoor loss.
is the terminal antenna gain for the pixel/mobile M
i
.
is the terminal loss for the pixel/mobile M
i
.
is the terminal antenna attenuation (from antenna patterns) calculated for the pixel/mobile M
i
(available in
WiMAX and LTE only).
is the body loss defined for the service used by the pixel/mobile M
i
.
Note:
For calculating the useful signal level from the best serving cell, is determined in the
direction (H,V) = (0,0) from the antenna patterns of the antenna used by M
i
. For calculating
the interfering signal level from any interferer, is determined in the direction of the
interfering cell from the antenna patterns of the antenna used by M
i
, while the antenna is
pointed towards M
i
s best serving cell.
Note:
, , , and are not used in all the calculations. For more information, see
the technology-specific chapters.
Figure 11.1: UMTS, CDMA2000, TD-SCDMA, WiMAX, and LTE: Signal Level Calculation
L
Indoor
G
M
i
L
M
i
L
Ant
M
i
L
Ant
M
i
L
Ant
M
i
L
Body
M
i
L
M
i
G
M
i
L
Ant
M
i
L
Body
M
i
Forsk 2010 AT283_TRG_E2 677
Chapter 11: Repeaters and Remote Antennas
11.1.2 Downlink Total Gain Calculation
The downlink total gain is calculated from the donor transmitter reference point ( ) to the repeater or remote antenna
reference point ( ) as follows:
Over-the-Air Repeaters
Here:
are the total downlink losses of the donor D.
is the gain of the antenna used at the donor D.
is the path loss between the donor D and the repeater or remote antenna R. This can be user-defined or
calculated using the selected propagation model. If you do not select a propagation model, the propagation losses
between the donor and the repeater or remote antenna are calculated using the ITU 526-5 propagation model.
is the gain of the donor-side antenna used at the repeater or remote antenna R.
are the donor-side reception feeder losses for the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Microwave Link Repeaters
Figure 11.2: Downlink Total Gain: Over-the-Air Repeaters
Note:
Secondary antennas are fully supported in the evaluation of the repeater gains.
Figure 11.3: Downlink Total Gain: Microwave Link Repeaters
G
Total DL
R
L
Total DL
D
G
Ant
D
L
Model
D R
G
Donor Ant
R
L
Donor
RX Feeder
R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
+ + + +
=
L
Total DL
D
G
Ant
D
L
Model
D R
G
Donor Ant
R
L
Donor
RX Feeder
R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
G
Total DL
R
L
MW
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
+ +
=
678 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Here:
are the user-defined microwave link losses between the donor D and the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Optical Fibre Link Repeaters and Remote Antennas
Here:
are the user-defined optical fibre link losses between the donor D and the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Repeater Downlink Power Limitation
Atoll verifies that the downlink power after amplification is consistent with the repeater equipment limitation.
Here:
is the downlink transmission power of a donor D on carrier ic. When the donor has more than one cell,
Atoll considers the highest power.
is the total downlink gain, user-defined or calculated as explained in "Downlink Total Gain Calculation"
on page 677.
is the maximum downlink power allowed by the equipment.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
11.1.3 Uplink Total Gain Calculation
The uplink total gain is calculated from the repeater or remote antenna reference point ( ) to the donor transmitter
reference point ( ) as follows:
Over-the-Air Repeaters
Figure 11.4: Downlink Total Gain: Optical Fibre Link Repeaters or Remote Antennas
L
MW
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
G
Total DL
R
L
Fi bre
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
+ +
=
L
Fi bre
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
P
DL
D
i c ( ) G
Total DL
R
+ P
Max
R
G
Cov Ant
R
L
Cov
TX Feeder
R
+ s
P
DL
D
i c ( )
G
Total DL
R
P
Max
R
L
Cov
TX Feeder
R
G
Cov Ant
R
G
Total UL
R
L
Total UL
D
G
Ant
D
L
Model
D R
G
Donor Ant
R
L
Donor
TX Feeder
R
G
Amp
R
L
Cov
RX Feeder
R
G
Cov Ant
R
+ + + +
=
Forsk 2010 AT283_TRG_E2 679
Chapter 11: Repeaters and Remote Antennas
Here:
are the total uplink losses of the donor D.
is the gain of the antenna used at the donor D.
is the path loss between the donor D and the repeater or remote antenna R. This can be user-defined or
calculated using the selected propagation model. If you do not select a propagation model, the propagation losses
between the donor and the repeater or remote antenna are calculated using the ITU 526-5 propagation model.
is the gain of the donor-side antenna used at the repeater or remote antenna R.
are the donor-side transmission feeder losses for the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side reception feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Microwave Link Repeaters
Here:
are the user-defined microwave link losses between the donor D and the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side reception feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Figure 11.5: Uplink Total Gain: Over-the-Air Repeaters
Note:
Secondary antennas are fully supported in the evaluation of the repeater gains.
Figure 11.6: Uplink Total Gain: Microwave Link Repeaters
L
Total UL
D
G
Ant
D
L
Model
D R
G
Donor Ant
R
L
Donor
TX Feeder
R
G
Amp
R
L
Cov
RX Feeder
R
G
Cov Ant
R
G
Total UL
R
L
MW
D R
G
Amp
R
L
Cov
RX Feeder
R
G
Cov Ant
R
+ +
=
L
MW
D R
G
Amp
R
L
Cov
RX Feeder
R
G
Cov Ant
R
680 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Optical Fibre Link Repeaters and Remote Antennas
Here:
are the user-defined optical fibre link losses between the donor D and the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side reception feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
11.1.4 Repeater Noise Figure
You can define and assign a repeater equipment to each repeater. In addition to the allowed ranges of gains and powers
allowed to each repeater, these equipment contain a noise figure which is applied to the repeater they are assigned to.
This noise figure has an impact on the donor total reception losses. For information, see "Transmitter Radio Equipment"
on page 127.
11.1.5 Appendix: Carrier Power and Interference Calculation
This section explains how Atoll calculates the received carrier power and interference when a transmitter has a connected
repeater.
A mobile receiver receives signal from the donor transmitter as well as its repeater. Similarly, the signal from the mobile
is received at the donor transmitter as well as its repeater. In practice, when a mobile receiver is in the vicinity of the donor
transmitter, the signal to/from the repeater would be very weak due to high pathloss between the repeater and the mobile
receiver. Similarly, when the mobile receiver is located in the vicinity of the repeater, the signal to/from the donor
transmitter would be very weak due to the same reason.
Atoll does not differentiate between the mobile receiver being in the transmitter coverage area or being in its repeater
coverage area. Atoll adds the signals received from the donor transmitter and its repeater to generate a combined
pathloss matrix that is associated with the donor transmitter and includes the effect of its repeater.
Calculation of Total Path Loss
The total pathloss, , is calculated by computing a downlink budget. If we take the case of a CDMA project, without
considering any shadowing margin or indoor loss, the power received from the donor transmitter, Txd on a carrier ic, at
the mobile receiver can be stated as (for a link over the air):
Where,
is the carrier power received at the receiver from the donor transmitter on a carrier ic (in W)
is the pilot power of the donor transmitter on the carrier ic (in W)
is the donor transmitter antenna gain.
is the transmission feeder loss of the donor transmitter.
Figure 11.7: Uplink Total Gain: Optical Fibre Link Repeaters and Remote Antennas
G
Total UL
R
L
Fi bre
D R
G
Amp
R
L
Cov
RX Feeder
R
G
Cov Ant
R
+ +
=
L
Fi bre
D R
G
Amp
R
L
Cov
RX Feeder
R
G
Cov Ant
R
L
Total
P
Rec
D
i c ( )
P
Pi l ot
D
i c ( ) G
Ant
D
( )
L
Total DL
D
L
Path
D Mi
( )
------------------------------------------------- =
P
Rec
D
i c ( )
P
Pi l ot
D
i c ( )
G
Ant
D
L
Total DL
D
Forsk 2010 AT283_TRG_E2 681
Chapter 11: Repeaters and Remote Antennas
is the path loss between the donor transmitter and the mobile receiver.
Similarly, the power received at the mobile receiver from the repeater R is:
Where,
is the carrier power received at the mobile receiver from the repeater on a carrier ic (in W)
is the pilot power of the donor transmitter on the carrier ic (in W)
is the output downlink total gain of repeater linked to a donor transmitter with an air link.
is the path loss between the repeater and the mobile receiver
So, the total carrier power received at the mobile receiver is:
Since,
Therefore,
Hence,
This total path loss depends on the location of the mobile receiver in realistic network scenarios. As a mobile in the donor
transmitter/repeater coverage area is likely to be far from the repeater/donor transmitter coverage area, the respective
pathloss value will be very large. This implies that we can study the two cases separately without influencing the results
much.
Case 1: Receiver in Donor Transmitter Coverage Area
is likely to be very high, so the term can be ignored. This implies that:
Considering this total pathloss value, the total received power in the uplink and in the downlink can be stated as:
Where,
is the transmitted power from the mobile terminal on the carrier ic (in W)
is the reception feeder loss of the transmitter
Case 2: Receiver in Repeater Coverage Area
is likely to be very high, so the term can be ignored. This implies that:
L
Path
D Mi
P
Rec
R
i c ( )
P
Pi l ot
D
i c ( ) G
Total DL
R
( )
L
Path
R Mi
------------------------------------------------------------ =
P
Rec
R
i c ( )
P
Pi l ot
D
i c ( )
G
Total DL
R
L
Path
R Mi
P
Rec
D R
i c ( ) P
Rec
R
i c ( ) P
Rec
R
i c ( ) + P
Pi l ot
D
i c ( )
G
Ant
D
L
Total DL
D
L
Path
D Mi
( )
---------------------------------------------------
G
Total DL
R
L
Path
R Mi
-------------------------- +
\ .
|
| |
= =
L
Total
P
Pi l ot
D
i c ( ) G
Ant
D

L
Total DL
D
P
Rec
D R
i c ( )
------------------------------------------------------- =
L
Total
P
Pi l ot
D
i c ( ) G
Ant
D

L
Total DL
D
P
Pi l ot
D
i c ( )
G
Ant
D
L
Total DL
D
L
Path
D Mi
( )
---------------------------------------------------
G
Total DL
R
L
Path
R Mi
-------------------------- +
\ .
|
| |

----------------------------------------------------------------------------------------------------------------------------------------------------- =
L
total
G
ant
Txd
L
total DL
Txd
G
ant
Txd
L
total DL
Txd
L
path
Txd Rx
( )
-------------------------------------------------------
G
total Ai r DL
Rpk
L
path
Rpk Rx
------------------------------------ +
\ .
|
| |

------------------------------------------------------------------------------------------------------------------------------------ =
L
Path
R Mi
G
Total DL
R
L
Path
R Mi
--------------------------
L
Total
L
Path
D Mi
=
P
Rec DL
D
i c ( )
P
Pi l ot
D
i c ( ) G
Ant
D
( )
L
Total DL
D
L
Total
( )
-------------------------------------------------
P
Pi l ot
D
i c ( ) G
Ant
D
( )
L
Total DL
D
L
Path
D Mi
( )
--------------------------------------------------- = =
P
Rec UL
D
i c ( )
P
Output
Mi
i c ( ) G
Ant
D
( )
L
Total UL
D
L
Total
( )
---------------------------------------------------
P
Output
Mi
i c ( ) G
Ant
D
( )
L
Total UL
D
L
Path
D Mi
( )
--------------------------------------------------- = =
P
Output
Mi
i c ( )
L
Total UL
D
L
Path
D Mi
G
Ant
D
L
Total DL
D
L
Path
D Mi
( )
---------------------------------------------------
682 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Where,
is the transmitted power from the mobile terminal (in W)
is the reception feeder loss of the transmitter
Calculation of Eb/Nt Uplink
In the uplink, the quality level at the transmitter on a traffic channel is:
Where,
C is the carrier power received from the mobile terminal (in W)
I is the total interference (in W)
W is the spreading bandwidth (Hz)
R is the effective service data rate in the uplink (bits/s)
(W/R is the service processing gain in the uplink)
C and I are both evaluated at the same reference point, which is the entry of BTS using the following formulas.
Where,
is the sum of the signals received from mobile terminals inside the same cell and those outside (in W)
is the transmitter equipment thermal noise (in W)
Therefore, for each mobile terminal Mi,
And,
Where,
is the noise figure of the transmitter equipment at the reference point, i.e. the entry of the BTS
K is Boltzman constant
T is the ambient temperature (in K)
Hence
11.2 GSM Documents
11.2.1 Signal Level Calculation
The received signal level (dBm) on a TRX type tt from a donor D at a pixel/mobile M
i
via a repeater or remote antenna R
(see Figure 11.8 on page 684) is calculated as follows:
L
Total
G
Ant
D
L
Total DL
D
G
Total DL
R
L
Path
R Mi
--------------------------
\ .
|
| |

\ .
|
| |
--------------------------------------------------------------------
G
Ant
D
G
Total DL
R
L
Total DL
R

L
Path
R Mi
--------------------------------------------------------
--------------------------------------------------------- = =
P
Rec DL
D
i c ( )
P
Pi l ot
D
i c ( ) G
Ant
D
( )
L
Total DL
D
L
Total
( )
-------------------------------------------------
P
Pi l ot
D
i c ( ) G
Total
R
( )
L
Path
R Mi
( )
-------------------------------------------------- = =
P
Rec UL
D
P
Output
Mi
i c ( ) G
Ant
D
( )
L
Total UL
D
L
Total
( )
---------------------------------------------------
P
Output
Mi
i c ( ) G
Total
R
( )
L
Path
R Mi
( )
-------------------------------------------------------
L
Total DL
D
L
Total UL
D
------------------------- = =
P
Output
Mi
i c ( )
L
Total UL
D
E
b
N
t
------
\ .
| |
UL
C
I
----
W
R
----- =
C P
Total UL
P
Output
Mi
G
Ant
D

L
Total UL
D
L
Total

--------------------------------------------- = =
I I
Total
N
0
+ =
I
Total
N
0
I
Total
P
Output
Mi
G
Ant
D

L
Total UL
D
L
Total
Mi

---------------------------------------------
\ .
|
| |
Mi

=
N
0
NF
D
K T W =
NF
D
N
0
NF
BTS
K T W =
Forsk 2010 AT283_TRG_E2 683
Chapter 11: Repeaters and Remote Antennas
Here:
is the effective isotropic radiated power of the repeater or remote antenna R on the TRX type tt. It
can be user-defined or calculated as explained in "EIRP Calculation" on page 684.
the downlink transmission power of a donor D on carrier ic.
is the power offset defined for the TRX type tt.
is the path loss (dB) calculated as follows:
, with:
- is the path loss calculated using a propagation model.
- : Antenna attenuation (from antenna patterns) calculated for the antenna used by the repeater or remote
antenna R.
is the shadowing margin.
is the indoor loss.
is the terminal antenna gain for the pixel/mobile M
i
.
is the terminal loss for the pixel/mobile M
i
.
Note:
If a pixel/mobile M
i
receives signals from the donor D and its repeater R, the total signal strength
is the sum of the two signals:
s
Figure 11.8: GSM: Signal Level Calculation
C
DL
R
tt ( ) EIRP
DL
R
tt ( ) AP tt ( ) L
Path
R M
i

M
Shadowi ng
L
Indoor
G
M
i
L
M
i
+ =
C
DL
D
tt ( ) C
DL
R
tt ( ) +
EIRP
DL
R
tt ( )
AP tt ( )
L
Path
R M
i

L
Path
R M
i

L
Model
L
Ant
R
+ =
L
Model
L
Ant
R
M
Shadowi ng
L
Indoor
G
M
i
L
M
i
684 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
11.2.2 EIRP Calculation
The EIRP of a repeater or remote antenna R is calculated at the repeater or remote antenna reference point ( ) w. r. t.
at the donor reference point ( ) as follows:
Over-the-Air Repeaters
Here:
is the downlink transmission power of the donor D.
are the total downlink losses of the donor D.
is the gain of the antenna used at the donor D.
is the path loss between the donor D and the repeater or remote antenna R. This can be user-defined or
calculated using the selected propagation model. If you do not select a propagation model, the propagation losses
between the donor and the repeater or remote antenna are calculated using the ITU 526-5 propagation model.
is the gain of the donor-side antenna used at the repeater or remote antenna R.
are the donor-side reception feeder losses for the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Microwave Link Repeaters
Figure 11.9: EIRP: Over-the-Air Repeaters
Note:
Secondary antennas are fully supported in the evaluation of the repeater gains.
Figure 11.10: Downlink Total Gain: Microwave Link Repeaters
P
DL
D
EIRP
DL
R
tt ( ) P
DL
D
L
Total DL
D
G
Ant
D
L
Model
D R
G
Donor Ant
R
L
Donor
RX Feeder
R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
+ + + + =
P
DL
D
L
Total DL
D
G
Ant
D
L
Model
D R
G
Donor Ant
R
L
Donor
RX Feeder
R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
EIRP
DL
R
tt ( )
P
DL
D
L
MW
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
+ +
=
Forsk 2010 AT283_TRG_E2 685
Chapter 11: Repeaters and Remote Antennas
Here:
is the downlink transmission power of the donor D.
are the user-defined microwave link losses between the donor D and the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Optical Fibre Link Repeaters and Remote Antennas
Here:
is the downlink transmission power of the donor D.
are the user-defined optical fibre link losses between the donor D and the repeater or remote antenna R.
is the amplifier gain of the repeater R. For remote antennas, this is 0.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
Repeater Downlink Power Limitation
Atoll verifies that the EIRP after amplification is consistent with the repeater equipment limitation.
Here:
is the effective isotropic radiated power of the repeater R on the TRX type tt.
is the maximum downlink power allowed by the equipment.
are the coverage-side transmission feeder losses for the repeater or remote antenna R.
is the gain of the coverage-side antenna used at the repeater or remote antenna R.
11.3 Donor-side Parameter Calculations
11.3.1 Azimuth
This is the angle at which the donor antenna is situated with respect to the North at the repeater or remote antenna. This
angle is measured clock-wise as shown in the figure below. It is the absolute horizontal angle at which the donor-side
antenna of the repeater should be pointed in order to be aligned with the donor antenna.
Figure 11.11: Downlink Total Gain: Optical Fibre Link Repeaters or Remote Antennas
P
DL
D
L
MW
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
EIRP
DL
R
tt ( )
P
DL
D
L
Fi bre
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
+ +
=
P
DL
D
L
Fi bre
D R
G
Amp
R
L
Cov
TX Feeder
R
G
Cov Ant
R
EIRP
DL
R
tt ( ) P
Max
R
G
Cov Ant
R
L
Cov
TX Feeder
R
+ s
EIRP
DL
R
tt ( )
P
Max
R
L
Cov
TX Feeder
R
G
Cov Ant
R
686 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
11.3.2 Mechanical Downtilt
This is the tilt angle for the repeaters donor-side antenna, which ensures that it points towards the donor antenna in the
vertical plane. As a general rule, downtilt angles are considered positive and uptilt angles negative.
Since this parameter depends on the difference of heights/altitudes between the donor transmitter and the repeater, it can
be automatically calculated in the repeaters Donor side properties. If the height/altitude of the antenna is modified, the
corresponding tilt angle can be found out and applied using the Calculate button.
Example
The tilt angle repeaters donor-side antenna in the above figure would be:
As obvious, this angle will be negative for uptilts and positive for downtilts of the antenna.
Here:
is the height of the donor-side antenna of the repeater or remote antenna R.
is the height of the antenna of the donor D.
is the distance between the antenna of the donor D and the antenna of the repeater or remote antenna R.
Figure 11.12: Angle from North (Azimuth)
Figure 11.13: Positive/Negative Mechanical Downtilt
Figure 11.14Tilt Angle Computation
T
Donor Ant
R
H
Donor Ant
R
H
Ant
D

D
D R
------------------------------------------------
\ .
|
| |
atan =
H
Donor Ant
R
H
Ant
D
D
D R
Forsk 2010 AT283_TRG_E2 687
Chapter 11: Repeaters and Remote Antennas
688 AT283_TRG_E2 Forsk 2010
Technical Reference Guide
Forsk 2010 AT283_TRG_E2 689
Technical Reference Guide
Head Office
7, rue des Briquetiers
31700 Blagnac - France
Tel: +33 562 747 210
Fax: +33 562 747 211
US Office
200 South Wacker Drive - Suite 3100
Chicago, IL 60606 - USA
Tel: +1 312 674 4846
Fax: +1 312 674 4847
China Office
Suite 302, 3/F, West Tower,
Jiadu Commercial Building,
No. 66 Jianzhong Road,
Tianhe Hi-Tech Industrial Zone,
Guangzhou, 510665, P. R. of China
Tel: +86 20 8553 8938
Fax: +86 20 8553 8285
www.forsk.com
Technical
Reference
Guide
version 2.8.3
AT283_TRG_E2
6 December 2010

You might also like