You are on page 1of 86

WCDMA Capacity Dimensioning

WCDMA System Capacity


Characteristics
WCDMA is a self-interfering system
(Same carrier for all the users).
WCDMA system capacity is closely
related to coverage (Reverse Relation)
WCDMA network capacity has the soft
capacity feature
The capacity planning of the WCDMA
network is performed under a certain
traffic model
Course Objective
Grasp the parameters of 3G
traffic model
Understand the factors that
restrict the WCDMA network
capacity
Understand the methods and
procedures of estimating
multi-service capacity
Understand the key
technologies for enhancing
network capacity
After this session, you will:
Contents of Course
Training.huawei.com
Chapter 1 Traffic Model
Chapter 2 Uplink capacity analysis
Chapter 3 Downlink capacity analysis
Chapter 4 Multi-service capacity estimation
Chapter 5 Network estimation procedure
Chapter 6 Capacity enhancement
technologies
Chapter 1 Traffic Model
1 Overview of traffic model
2 CS traffic model
3 PS traffic model diagram
4 PS traffic model
parameters

Service Overview
The WCDMA system supports multiple
services
Variable-rate services
Combined services
High-speed data packet services
Asymmetrical services different Rates at the
UL&DL.
Large-capacity and flexible service bearing
Qos Type
R
e
a
l
-
t
i
m
e

c
a
t
e
g
o
r
y


conversatio
nal
It is necessary to maintain the time
relationship between the information
entities in the stream. Small delay
tolerance, requiring data rate symmetry .
Voice
service,
videophone
Streaming
Typically unidirectional services, high
requirements on error tolerance, high
requirements on rate
Streaming
multimedia
N
o
n

r
e
a
l
-
t
i
m
e

c
a
t
e
g
o
r
y


Interactive
Request-response mode, data
completeness must be maintained.
High requirements on error tolerance,
lower requirements on delay tolerance
Web page
browse,
network
game
Background
Data completeness should be
maintained. Small delay restriction,
requiring errorless transmission
Background
download of
Email.
Objectives of Setting Up Traffic
Model
In order to determine the system configuration, we need to
determine the call capacity of the air interface first.
In the data service, different transmission model will
generate different system capacities.
We need to set up an expected data transmission model
of the customer so that we can plan the network properly.
In order to set up a correct model, the operator should
provide some statistic parameters as a reference.
Traffic model is a means of researching
the capacity features of each service type
and the QoS expected by the users who
are using the service from perspective of
data transmission.
In the data application, the user
behaviour research mainly forecasts the
service types available from the 3G, the
number of users of each service type,
frequency of the users in using the
service, and the distribution of the users
in different regions.
Traffic Model
System Configuration
User behaviour
Service Pattern
Traffic
Model
Results
The Contents of Traffic Model
Typical Service Features
Description
Typical service features include the
following feature parameters:
User type (indoor, inside vehicle, outdoor)
Users average moving speed
Service Type
Uplink and downlink service rates
Spread factor
Signal delay requirements of the service
QoS requirements of the service
Chapter 1 Traffic Model
1 Overview of traffic model
2 CS traffic model
3 PS traffic model diagram
4 PS traffic model
parameters

CS Traffic Model
Voice service is representative of CS services.
Voice user arrival takes on the Poisson
distribution. Its time interval takes on the
exponent distribution.
Key parameters of the model:
Penetrating rate
BHCA Mean busy-hour call attempts
Mean call duration (s)
Activation factor
Mean rate of service (kbps)

CS Traffic Model Parameters
Mean busy-hour traffic (Erlang) per user =
BHCA * mean call duration /3600
Mean busy hour throughput per user (kbit)
(G) = BHCA * mean call duration * activation
factor * mean rate
Mean busy hour throughput per user (bps)
(H) = mean busy hour throughput per user *
1000/3600
Chapter 1 Traffic Model
1 Overview of traffic model
2 CS traffic model
3 PS traffic model diagram
4 PS traffic model
parameters

PS Traffic Model
The most frequently used model is the packet service
session process model described in ETSI UMTS30.03.
Chapter 1 Traffic Model
1 Overview of traffic model
2 CS traffic model
3 PS traffic model diagram
4 PS traffic model
parameters

PS Traffic Model
Data Burst Data Burst Data Burst
Packet Call
Session
Packet Call Packet Call
Downloading Downloading
Active Dormant Dormant Active
Traffic model
PS Traffic Model Parameters
Packet Call Num/Session
Packet Num/Packet Call
Packet Size(bytes)
Reading Time (sec)
Typical Bear Rate(kbps)
BLER
Parameter Determining
The basic parameters in the traffic model are determined in the
following ways:
Obtain numerous basic parameter sample data from the
actually operating network.
Obtain the probability distribution of the parameters
through processing of the sample data.
Take the distribution most proximate to the standard
probability as the corresponding parameter distribution
through comparison with the standard distribution function.
Typical Bear Rate(kbps)
Bear rate is variable in the actual transmission process.
BLER:
In the PS service, when calculating the data transmission
time, the retransmission caused by erroneous blocks should
be considered. Suppose the data quantity of service source
is N, the air interface block error rate is BLER, the total
required data quantity to be transmitted via the air interface
is:
PS Traffic Model Parameters
N
BLER
BLER N BLER N BLER N BLER N N
n
*
1
1
* * * *
3 2

= + + + + +
User behaviour
Penetrating Rate
BHSA
User Distribution (High,
Medium, Low end)
PS User Behaviour Parameters
PS User Behaviour Parameters
Penetrating Rate
The percentage of the users that activates this
service to all the users registered in the network.
BHSAThe times of single-user busy hour sessions of
this service
User Distribution (High, Medium, Low end)
The users are divided into high-end, mid-end and
low-end users. Different operators and different
application situations will have different user
distributions.
Session traffic volumeByte Average traffic of
single session of the service


Data transmission time (s) The time in a single
session of service for purpose of transmitting
data.


Holding Times Average duration of a single
session of service

PS Traffic Model Derivative Parameters
e TypicalRat
fficVolume SessionTra
BLER
s issionTime DataTransm
1000 / 8 *
*
1
1
) (

=
) (
Re * ) 1 (
s issionTime DataTransm
adingTime ion NumPerSess PacketCall
e HoldingTim
+

=
) / ( * ) / ( * ) ( Session Num PacketCall PacketCall PacketNum PacketSize fficVolume SessionTra =
Activation factor: The weight of the time of
service full-rate transmission among the
duration of a single session.


Busy hour throughput per user (Kbit):


e HoldingTim
issionTime DataTransm
or ActiveFact =
1000 / 8 * * / fficVolume SessionTra BHSA user roughput BusyHourTh =
PS Traffic Model Derivative Parameters
Traffic Model Example
VOD
mobile
video
streams
Penetrati
ng rate
BHSA
Busy Hour
Throughput/
user (kbit)
Typical
bear
rate
(kbps)
BLER
Activati
on
factor
Uplink 22.0% 0.100 2.304 8 10% 0.1798
Downlink 22.0% 0.100 102.528 64 10% 1.0000
VOD
mobile
video
streams
Packet
Call
Num/Ses
sion
Packet
Num/Pa
cket Call
Packet Size
(bytes)
Readin
g Time
(sec)
Sessio
n traffic
volume
Byte
Holding
Time
Uplink 2 3 480
14.600
0
2880 17.8000
Downlink 1 267 480 0.0000
12816
0
17.8000
)
3600
( _


=
or ActiveFact redRate TypicalBea
nEviroment Applicatio derTypical roughputUn BusyHourTh
gRate Penetratin User OfDiffrent Percentage Erlang Data
Questions
What are the two parts that make
up the traffic model?
What are the main parameters of
the CS traffic model?
What are the main parameters of
the PS traffic model?
What is the formula for calculating
the equivalent Erlang of data
service?
Summary of This Chapter
This chapter deals with the topic of
traffic model
Main parameters of traffic model for CS
service
Structure and main parameters of PS
traffic model, and the corresponding
derivative parameters
Method of calculating equivalent
Erlang of data service
Contents of Course
Training.huawei.com
Chapter 1 Traffic Model
Chapter 2 Uplink capacity analysis
Chapter 3 Downlink capacity analysis
Chapter 4 Multi-service capacity estimation
Chapter 5 Network estimation procedure
Chapter 6 Capacity enhancement
technologies
Basic Principles
The radio system capacity is decided by uplink and downlink.
When planning the capacity, we must analyze from both uplink
and downlink perspectives.
In the WCDMA system, all the cells share the same spectrum,
which is conducive to improving the WCDMA system capacity.
However, for reason of co-frequency multiplexing, the system
incurs interference between users. This multi-access interference
restricts the capacity in turn.
Basic PrinciplesInterference
Analysis
Interference restriction model
I
TOT
= I
own
+ I
other
+ P
N
+ T
I
own
Interference from the users of this cell
I
other
Interference from the users of adjacent cell
P
N
Noise floor of receiver
T Outside interference (can be neglected)
Power restriction model
P
TOT
= P
pil
+ P
sync
+ P
pag
+ P
traf
+ P
other

Ppil Pilot channel power
Psync Synchronization channel power
Ppag Paging channel power
Ptraf Traffic channel power
Pother Other channel power
N other own TOT
P I I I + + =
Uplink Interference AnalysisUplink
Interference Composition
I
own
Interference from the users of this
cell
I
other
Interference from users of
adjacent cell
P
N
Noise floor of the receiver
Receiver noise floor P
N

P
N
= 10lg(KTW) NF
KBoltzmann constant, = 1.3810-23 J/K
TKelvin temperature, normal temperature:
290 K
WSignal bandwidth, WCDMA signal
bandwidth 3.84MHz
10lg(KTW) = -108dBm/3.84MHz
NF = 3dB (typical value of macro cell BTS)
P
N
= 10lg(KTW) + NF = -105dBm/3.84MHz
Uplink Interference AnalysisUplink
Interference Composition
I
own
:Interference from users of this cell
Interference that every user must overcome: I
TOT
- P
j
Pj is the receiving power of the user j
Under the ideal power control :


Hence, Pj:

The interference from users of this cell is the sum of power of
all the users arriving at the receiver:

( )
j j TOT
j
j
v R
W
I
P
No Eb
1
/ =

=
N
j own
P I
1
Uplink Interference AnalysisUplink
Interference Composition
total
j j j
j
I
W
R V
P

=
I
other
:Interference from users of adjacent cell
The interference from users of adjacent cell is difficult to
analyze theoretically, because it is related to user
distribution, cell layout, and antenna direction diagram.
Adjacent cell interference factor

When the users are distributed evenly
For omnidirectional cells, the typical value of adjacent cell
interference factor is 0.55
For the 3-sector directional cell, the typical value of adjacent
cell interference factor is 0.65
own
other
I
I
i =
Uplink Interference AnalysisUplink
Interference Composition
Define
Then
( )
N
N
j TOT TOT
P L i I I + + =

1
1
Uplink Interference Analysis
( )
( )
N
N
TOT j j j b
N other own TOT
P
W
I R v N E
i
P I I I
+ + =
+ + =

1
0
/
1
( )
W
R v N E
L
j j j b
j
0
/
=
Obtain
( )

+
=
N
j
N TOT
L i
P I
1
1 1
1
Supposed that:
All the users are 12.2
kbps voice users, the
demodulation threshold
Eb/No = 5dB
Voice activation factor
vj = 0.67
Adjacent cell
interference factor
i = 0.55

Uplink Interference Analysis
Uplink Interference AnalysisUplink
Load Factor
Define the uplink load factor




When the load factor is 1, I
TOT
is infinite, and the
corresponding capacity is called threshold
capacity.
Under the above assumption, the threshold
capacity is approx. 96 users.

( ) ( )
( )

+ = + =
N
j j
j
b
N
j UL
W
R v N E
i L i
1
0
1
/
1 1 q
Uplink Interference AnalysisLoad
Factor and Interference
According to the abovementioned relationship, the
noise will rise:

( )
1
1 1
1
1 1
TOT
N
N UL
j
I
NoiseRise
P
i L
q
= = =

+

50% Load 3dB
60% Load 4dB
75% Load 6dB
The abovementioned theoretic analysis uses the
following simplifying explicitly or implicitly:
No consideration of the influence of soft handover
The users in the soft switch state generates the interference
which is slightly less than that generated by ordinary users.
No consideration of the influence of AMRC and hybrid
service
AMRC reduces the voice service rate of some users, and
makes them generate less interference, and increases the
number of users supportable by the system. (The cost is the
call quality of such users will be deteriorated)
Difference services have different data rates and demodulation
thresholds. In principle, we can use the foregoing method for
analysis, but it will complicate the calculation process.
Since the time-variable feature of the mobile transmission
environment, the demodulation threshold even for the same
service is time-variable.
Uplink Interference Analysis
Limitation of the Current Method
Ideal power control assumption
The power control commands of the actual
system have certain error codes so that the
power control process is not ideal, and reduces
the system capacity
Assume that the users are distributed evenly,
and the adjacent cell interference is constant
Considering the above factors, the system
emulation is a more precise method:
Static simulation: Monte_Carlo method
Dynamic simulation

Uplink Interference Analysis
Limitation of the Current Method
Contents of Course
Training.huawei.com
Chapter 1 Traffic Model
Chapter 2 Uplink capacity analysis
Chapter 3 Downlink capacity analysis
Chapter 4 Multi-service capacity estimation
Chapter 5 Network estimation procedure
Chapter 6 Capacity enhancement
technologies
Basic PrinciplesInterference
Analysis
Interference restriction model
I
TOT
= I
own
+ I
other
+ P
N
+ T
I
own
Interference from the users of this cell
I
other
Interference from the users of adjacent cell
P
N
Noise floor of receiver
T Outside interference
Power restriction model
P
TOT
= P
pil
+ P
sync
+ P
pag
+ P
traf
+ P
other

Ppil Pilot channel power
Psync Synchronization channel power
Ppag Paging channel power
Ptraf Traffic channel power
Pother Other channel power
N other own TOT
P I I I + + =
I
own
Interference from the users of
this cell
I
other
Interference from the users
of adjacent
cell
P
N
Noise floor of the receiver
Downlink Interference Analysis
Downlink Interference Composition
Receiver noise floor PN
P
N
= 10lg(KTW) NF
K Boltzmann constant, = 1.3810-23 J/K
T Kelvin temperature, normal temperature
290 K
W Signal bandwidth, WCDMA signal
bandwidth 3.84MHz
NF: Receiver noise figure
10lg(KTW) = -108dBm/3.84MHz
NF = 7dB UE typical value
P
N
= 10lg(KTW) + NF = -101dBm/3.84MHz
Downlink Interference Analysis
Downlink Interference Composition
I
own
:Interference from users of this cell
The downlink users are identified with the mutually
orthogonal OVSF codes. In the static propagation
conditions without multi-path, no mutual interference
exists.
In case of multi-path propagation, certain energy will
be detected by the RAKE receiver, and become
interference signals. Define the orthogonal factor to
describe this phenomenon.


In the formula, PT is a total transmitting power of
BTS, which includes the dedicated channel
transmitting power and the common channel
transmitting power


( ) ( )
1
T
own j
j
j
P
I
PL
o =

+ =
N
j CCH T
P P P
1
Downlink Interference Analysis
Downlink Interference Composition
I
other
: Interference from users of adjacent cell

The transmitting signal of the adjacent cell BTS will
cause interference to the users in the current cell.
Since the scrambles in use are different, such
interference is non orthogonal.
Assume the service is distributed evenly, the
transmitting power of all BTSs will be equal. k,j In
the system, there are K adjacent cell BTSs, where
path loss from the number k BTS to the user j is
PLk,j. Hence we obtain:
( )

=
K
j k
T
j
other
PL
P I
1
,
1
--

( )
N
K
j k
T
j
T
j
N other own TOT
P
PL
P
PL
P
P I I I
+ + =
+ + =

1
,
1
1 o
Suppose the power control is desired, we obtain
( )
( )
j j
j
TOT
j
j
j
v R
W
I
PL
P
EbvsNo
1
=
Then
( ) ( )
j
j
TOT j
j
j j
PL I v
W
R
EbvsNo P =
Because

+ =
N
j CCH T
P P P
1
Then
( ) ( )
( ) ( )
( ) ( )
(
(

+ +
(

+ =
(
(

+ +
(

+ =
(

+ =

j N
K
j k
j
T T j
N
j
j
j CCH
N
K
j k
T
j
T
j
N
j j
j
j CCH
N
j j TOT j
j
j CCH T
PL P
PL
PL
P P v
W
R
EbvsNo P
P
PL
P
PL
P
PL v
W
R
EbvsNo P
PL I v
W
R
EbvsNo P P
1
,
1
1
,
1
1
1
1
1
o
o

Resolve PT to obtain
( )
( ) ( )

+
(

+
=
N
j
j
j j j
N
j j
j
j N CCH
T
v
W
R
EbvsNo i
PL v
W
R
EbvsNo P P
P
1
1
1 1 o
where i
j
is the adjacent cell interference factor of the user,
defined as:

=
K
j k
j
j
PL
PL
i
1
,

According to the above analysis, we can
define the downlink load factor:


When the downlink load factor is 100%, the
transmitting power of the BTS is infinite, and
the corresponding capacity is called
threshold capacity.
As different from the theoretic calculation of
uplink capacity, j and ij in the downlink
capacity formula are variable related to user
position. Namely, the downlink capacity is
related to the spatial distribution of the users,
and can only be determined through system
emulation.


( ) ( )
(

+ =
N
j
j
j j j DL
v
W
R
EbvsNo i
1
1 o q
Downlink Interference Analysis
Parameter DL value
MCL macro (including antenna
again)
70 dB
Antenna gain (including losses) 11 dBi
Log Normal fade margin 10 dB
PC MODELLING
#PC steps per snapshot > 150
step size PC perfect PC
PC error 0%
HANDOVER MODELING
Handover threshold for candidate
set
active set
Choice of cells in the active step
Combining
Maximum ratio
combining
NOISE PARAMETERS
noise figure 9 dB
noise power -99 dBm proposed
TX POWER
Maximum BTS power 43 dBm
Common channel power 30 dBm
Maximum TX power speech 30 dBm
Parameter DL value
Power control range 25 dB
HANDLING of DOWNLINK
maximum TX power
USER DISTRIBUTION
Random and uniform
across the network
non orthogonality factor macrocell 0.4
COMMON CHANNEL
ORTHOGONALITY
Orthogonal
DEPLOYMENT SCENARIO
Macrocell
Hexagonal with BTS
in the middle of the
cell
BTS type omnidirectional
Cell radius macro 577 macro
# of macro cells
> 19 with wrap
around technique)
bit-rate speech 8 kbps
Activity factor speech 100%
Multipath environment macro Outdoor micro
Eb/N0 target 6.1 dB
Downlink Interference Analysis
Emulation Parameter Setting
Downlink Interference Analysis
Emulation Result
When the transmitting power of the BTS is
43dBm (20W), the supported maximum
number of users is approx. 114.


In order to ensure system stability, we do not
allow the mean transmitting power of the
BTS to be more than 80% of the maximum
transmitting power, namely, 42dBm. This way,
the supported number of users is 112.
Downlink Interference Analysis
Emulation Result Analysis
How to Control
Interference
Influence from interference in the network
Handover Succeeded
Access efficiency
Call Drop Ratio
Call quality
Interference control method
Improve the power control precision
Improve the receiving efficiency of Rake
Reasonable network planning


Contents of Course
Training.huawei.com
Chapter 1 Traffic Model
Chapter 2 Uplink capacity analysis
Chapter 3 Downlink capacity analysis
Chapter 4 Multi-service capacity estimation
Chapter 5 Network estimation procedure
Chapter 6 Capacity enhancement
technologies
Chapter 4 Multi-service capacity
estimation
1 Network capacity
restriction factors
2 Typical capacity design
methods
Capacity Restriction Factors
The WCDMA network capacity restriction factors in
the radio network part contain the following:
Uplink interference
Downlink power
Downlink channel code resources
Channel processing unit
Iub interface capacity
Downlink Transmitting Power

+ =
N
j CCH T
P P P
1
The downlink transmitting power comes in two parts: one
part is used for common channel, and the other part for
dedicated (traffic) channel.

The transmitting power allocated
by the cell to each user varies
with service demodulation
threshold, propagation path loss
and the interference received by
the user
The downlink transmitting power of the cell is shared by all
the users in the cell
We generally use the emulation method to analyze the
downlink interference.
Downlink Channel Code Resources
The WCDMA network use the code
words whose SF is 4~512. The
smaller the SF is, the higher the
supported data rate will be.
In the code tree, the allocable
codes should meet the following
conditions:
No codes on the path from this
code to the root node of code tree
are allocated
No codes in the sub-tree whose
root node is this code are allocated
Try to reserve the code words
whose SF is small, so as to
improve the utilization.
1
1 -1
1 1
1 1 1 1
1 1 -1 -1
1 -1 1 -1
1 -1 -1 1
C
1,0
C
2,0
C
2,1
C
4,0
C
4,1
C
4,2
C
4,3
SF = 1 SF = 2 SF = 4
1
1 -1
1 1
1 1 1 1
1 1 -1 -1
1 -1 1 -1
1 -1 -1 1
C
1,0
C
2,0
C
2,1
C
4,0
C
4,1
C
4,2
C
4,3
SF = 1 SF = 2 SF = 4
Downlink Channel Code Resources
Following is an example of code resources allocation
SF 4 8 16 32 64 128 256 512
C(256,0):PCPICH 2
0
C(256,1):PCCPCH 3
0
C(256,2): AICH 6
1
C(256,3): PICH 10
0
C(64,1):SCCPCH 8
0
C(64,2):SCCPCH 9
1
3
0
1
0
1

1
2

3
Channel Processing Unit (CE)
The channel processing unit is the quantitative data that
measures the resources logically occupied for service
processing.
The resource occupied by the service processing is mainly
related to the spreading factor of this service. The smaller the
SF is, the greater the data traffic will be, and more resources will
be occupied.
The SF of typical services are:
AMR12.2kbps SF=128
CS64kbps SF=32
PS64kbps SF=32
PS144kbps SF=16
PS384kbps SF=8
Channel Processing Unit (CE)
If we define the resources required for processing AMR
12.2kbps services as a channel processing unit, the number
of channel processing units occupied by other services is:
AMR12.2kbps 1
CS64kbps 4
CS144kbps 8
CS384kbps 16
PS64kbps 4
PS144kbps 8
PS384kbps 16
Iub Interface Capacity
The contents transmitted on the
Iub interface include:
The user data encapsulated in
the AAL2 format (common
channel and dedicated
channel)
Signaling data encapsulated
in the AAL5 format
BTS operation & maintenance
data
Factors to be considered when estimating the interface capacity:
Frame coding efficiency. Through segmentation and encapsulation of
the application data at each layer, the data quantity at the bottom
layer will be increased to different extents compared with the
application data at the upper layers.
Traffic. More users will generate more data traffic.
Maintenance efficiency. Certain bandwidth is required in the
background maintenance for BTS data transmission.
Chapter 4 Multi-service capacity
estimation
1 Network capacity
restriction factors
2 Typical capacity design
methods
The comparison of the different
capacity method
Post Erlang-B
Service 1 (1 unit resource/connection, 12Erl) and service
2 (3 unit resources / connection, 6Erl), requiring 55 unit
resources in total
Equivalent Erlangs
Calculated according to benchmark of service 1 (1 unit
resource/connection, 12Erl), a total of 39 unit resources
are required
Calculated according to benchmark of service 2 (3 unit
resources/connection, 6Erl), a total of 51 unit resources
are required
Campbells Theorem
In the same conditions, 47~49 unit resources are
required in total.
Summary of This Chapter
This chapter deals with the three methods of
estimating the multi-service capacity.
The detailed process of using the Campbell
theorem to calculate the capacity is described.
Contents of Course
Training.huawei.com
Chapter 1 Traffic Model
Chapter 2 Uplink capacity analysis
Chapter 3 Downlink capacity analysis
Chapter 4 Multi-service capacity estimation
Chapter 5 Network estimation procedure
Chapter 6 Capacity enhancement
technologies
Chapter 5 Network estimation
procedure

Mind trace of capacity
planning
Determine the traffic
model
Determine the QoS


Divide the zones for the region under planning according
to the traffic distribution and clutter features, e.g., dense
zone, ordinary urban zone, suburbs, rural areas
Perform traffic model analysis on the target zones
Determine the single-carrier planning capacity of each
target zone according to the traffic model of each specific
target zone.
Determine the number of BTSs and carriers for the target
zones for meeting the capacity requirements.
Determine the number of BTSs and carriers according to
the capacity and coverage requirements, and select more
BTSs and carriers to ensure meeting both capacity and
coverage requirements.

Mind trace of capacity planning
Determine the Traffic Model
Determine the Traffic Model
User distribution data sheet :user quantity /km
2

Application
environment
2005 2006 2007
Dense urban area
11128 12060 18683
urban area
462 499 676
Suburbs
246 266 341
Rural areas
15 16 18
Roads/trunk roads
23 35 48
Determine the Traffic Model
Distribution percentage of users of different grades
Distribution percentage of users of different grades: (subject
to consideration of each specific period)
Application
environment
High-end
user
Mid-end user Low-end user
Dense urban
area
40% 40% 20%
Ordinary
urban area
15% 25% 60%
Suburbs
5% 25% 70%
Rural areas
1% 10% 89%
Road/trunk
roads
1% 10% 89%
Determine the Traffic ModelCS Domain
Traffic Model
SS Type
Penetratin
g
rate
BHC
A
AHT (s)
Active
factor
Mean rate
(kbps)
AMR
voice
100 % 1 90 0.5 8
Videophone
100 % 0.1 54 1 64
Determine the Traffic ModelLow-end User PS
Traffic Model
SS Type

Penetrating
rate

BHSA
Packet
Call
Num/Sessio
n
Packet
Num/Pack
et
Call
Packe
t
Size
(bytes)
Inter-Arrival
Time
Between
Packet
Calls
(sec)
Email 10 % 0.10 2 32 480 320
WWW 30 % 0.18 5 25 480 412
Online game,
ICQ
25 % 0.10 2 3 480 8
Picture and
downloading,
FTP

25 % 0.10 2 62 480 5
Real-time
video

0 % 0.00 1 267 1500 0
SMS 50 % 0.50 1 1 160 0
EMS / MMS 50 % 0.50 2 32 480 320
Determine the Traffic ModelMid-end User
PS Traffic Model
SS Type

Penetrating
rate
BHSA
Packet
Call
Num/Se
ssion
Packet
Num/Pa
cket Call
Packet
Size
(bytes)
Inter-
Arrival
Time
Between
Packet
Calls
(sec)
Email 20 % 0.20 2 32 480 320
WWW 30 % 0.24 5 25 480 412
Online game,
ICQ
15 % 0.20 2 3 480 8
Picture and
downloading,
FTP

15 % 0.20 2 62 480 5
Real-time
video

10 % 0.10 1 267 1500 0
SMS 100 % 0.80 1 1 160 0
EMS / MMS 100 % 0.80 2 32 480 320
Determine the Traffic ModelHigh-end User
PS Traffic Model
SS Type

Penetrating
rate
BHSA
Packet
Call
Num/Se
ssion
Packet
Num/Pa
cket Call
Packet
Size
(bytes)
Inter-
Arrival
Time
Between
Packet
Calls
(sec)
Email 30 % 0.30 2 32 480 320
WWW 20 % 0.30 5 25 480 412
Online game,
ICQ
5 % 0.30 2 3 480 8
Picture and
downloading,
FTP

10 % 0.30 2 62 480 5
Real-time
video

20 % 0.20 1 267 1500 0
SMS 100 % 0.60 1 1 160 0
EMS / MMS 100 % 0.60 2 32 480 320
After we obtain the data traffic model of various
users, we can further obtain the general statistics
parameters for facilitating the calculation.
Mean single-user busy hour throughput (kbit) = low-
end user penetrating rate * low-end user Busy Hour
Throughput/user * low-end user percentage + mid-
end user penetrating rate * mid-end user Busy Hour
Throughput / user * mid-end user percentage + high-
end user penetrating rate * high-end user Busy Hour
Throughput / user * high-end user percentage
Theoretic length of session (bytes) = Packet Call
Num/Session*Packet Num/Packet Call*Packet Size
(bytes)
Mean time of reading (s)=(Packet Call Num/Session-
1)*Inter-Arrival Time Between Packet Calls (sec)

Determine the Traffic ModelPS Domain
Traffic Measurement Parameters
Determining the QoS
The capacity under planning is the capacity that meets
certain QoS. Generally, the CS service uses the call
loss/blocking probability as the index GoS. For the PS service,
we use the acceptable delay and acceptable minimum
throughput as the GoS index. Sometimes in the bidding
documents of the operator, the PS service uses the call loss
mode to describe its GoS.

Contents of Course
Training.huawei.com
Chapter 1 Traffic Model
Chapter 2 Uplink capacity analysis
Chapter 3 Downlink capacity analysis
Chapter 4 Multi-service capacity estimation
Chapter 5 Network estimation procedure
Chapter 6 Capacity enhancement
technologies
Transmitting Diversity
Transmitting diversity can enhance the
downlink capacity and coverage

Conclusion of capacity enhancement of
transmitting diversity
STTD mode: Capacity increase of 17 ~ 24%
TxAA(1) mode: Capacity increase of 16 ~
23%
TxAA(2) mode: Capacity increase of 31 ~
37%
Sectorizing
In the dense urban areas and the normal
urban areas with high traffic, increase of
the number of sectors of the BTS is a
method of increasing the capacity.
6 sectors, generally using the antenna
whose horizontal lobe is 33
The capacity of a 6-sector BTS is 1.67 times
that of a 3-sector BTS
HSDPA
HSDPA (High Speed Downlink Packet Access) is a downlink
high-speed data service solution of the WCDMA system. The
highest rate is up to 12Mbps or more.
In the subsequent Rel6, the relevant technologies such as
MIMO and OFDM of the HSDPA will be introduced to further
increase the downlink capacity.
Multi-User Detection (MUD)
Single cell:
Improve the capacity by 70 ~ 100%

Multi-cell:
Improve the capacity by 40 ~ 60%

Reduce the UE transmitting power:
Reduce the transmitting power by 2 ~ 3
dB
Increase the standby time
SA (Smart Antenna)
The SA can improve the uplink and downlink
capacity and coverage, and decrease the
transmitting power requirements.

SA gain test results
Area Uplink Downlink
1x4 2x2 2x4 1x4
Capacity gain 1.85 1.70 3.37 3.54
Coverage gain 1.42 1.35 2.02 2.07
UMTS Multi-Band Layered Network
With the development of the 3G users and
services, the capacity requirements are higher
and higher, and a single technology can hardly
meet the growing capacity requirement.
A mature 3G network can resolve the issue of
capacity fundamentally through UMTS multi-
band layered network.
Supplemental construction: UMTS900, UMTS1800, TD-
SCDMA
Thank
you

You might also like