Beruflich Dokumente
Kultur Dokumente
Olav Østerbø
978-0-9836283-0-9
c 2011 ITC 63
This paper was peer reviewed by subject matter experts for publication in the Proceedings of ITC 2011
procedures are difficult to incorporate into the analysis due to also the sending frequency). We first consider variations that
time lags, i.e. the signaled CQI is based measurements taken in are slowly varying over time intervals that are relative long
earlier TTIs (Transmission Time Interval). To simplify the compared with the TTIs (Transmission Time Intervals). Then
analyses, we assume that this time lag is set to zero and that the path loss is usually given in [dB] on the form:
the CQI is given as a function of the momentary SINR, i.e. we
simply take CQI=CQI(SINR). This approximation is justified G = 10 L 10 with L = C − A log10 ( r ) + X t (2)
if the time variation in SINR is significantly slower than the
length of a TTI interval. By applying the CQI table found in
where C and A are constants, A typical in the range 20-40,
[3] we get the obtainable bitrate per bandwidth as function of
and X t a slowly variation normal stochastic process with zero
the SINR as the step function:
[ )
B = f c j for SINR ∈ g j , g j +1 ; j = 0,1,...,15 (1)
mean representing the shadowing effects (i.e. slow fading).
The other important component determining SINR is the noise
where f is the bandwidth of the channel, c j is the efficiency and interference. It is common to split the noise and
[
for CQI index j (as given by Table 1) and g j , g j +1 are the) interference power into two terms: N f = N int + N ext where
corresponding intervals of SINR values. (We also define N int is the internal (or own-cell) noise and interference power
c0 = 0 , g 0 = 0 and g16 = ∞ .) and N ext is the external (or other-cell) interference. In a
TABLE 1 CQI TABLE.
CQI index modulation code rate x 1024 efficiency
CDMA (Code Division Multiple Access) network, the lack of
0 out of range orthogonality induces own-cell interference. In OFDMA
1 QPSK 78 0.1523 (Orthogonal Frequency Division Multiple Access) networks,
2 QPSK 120 0.2344 however, there is a perfect orthogonality between frequencies
3 QPSK 193 0.3770 and therefore the only contribution to N int is the thermal noise
4 QPSK 308 0.6016
5 QPSK 449 0.8770 at the receiver. The interference from other cells depends on
6 QPSK 602 1.1758 the location of surrounding base stations and will typically be
7 16QAM 378 1.4766 largest at cell edges. To make the analysis mathematical
8 16QAM 490 1.9141 traceable we shall assume that the external noise and
9 16QAM 616 2.4063
10 64QAM 466 2.7305
interference is constant throughout the cell or negligible, i.e.
11 64QAM 567 3.3223 we assume the noise N f to be constant throughout the cell.
12 64QAM 666 3.9023 Hence, with the assumptions stated above, we may write
13 64QAM 772 4.5234
14 64QAM 873 5.1152 SINR on the form S t h(r , λ ) where S t represent the
15 64QAM 948 5.5547 stochastic variations which we assume to be distance
To fully describe the bitrate function above we also have to independent capturing the slowly varying fading, and h(r , λ )
[ )
also specify the intervals g j , g j +1 . Several simulation studies represent the distance dependant attenuation (which we also
e.g. [4] suggest that there is a linear relation between the CQI may to depend on the sending frequency). Most commonly
index and the actual SINR limits in [dB]. In the numerical used channel models as described above have attenuation that
examples we therefore take SINR j [dB ] = 10 log10 g j = aj + b follows a power law, i.e. we chose to take h(r , λ ) on the form
aj + b
h ( r , λ ) = h( λ ) r α (3)
or g j = 10 10
for some constants a and b . It is also argued
where α = A 10 is typical in the range 2-4 and
that the actual range of the SINR limits in [dB] is determined
h (λ ) =
N − C 10
10 = 10 Z 10 with Z = 10 log10 ( N ) − 10 log10 ( Pw ) − C given
by the following (end point) observations: SINR[dB]=-6 Pw
corresponds to CQI=1, while SINR[dB]=20 corresponds to [dB], where we also indicate that h(λ ) may depend of the
CQI=15. Hence, with this assumption we then have −6 = a + b
(sending) frequency. With the description above the stochastic
and 20 = 15a + b or a = 13 7 and b = − 55 7 . • ln 10
variable S t = 10 X t 10
= e S with S t• =
t
X t , and hence S t is a
B. Radio channel models 10
Generally SINR for a user will be the ratio of the received lognormal process with E[St• ] = 0 and σ = ln 10 σ ( X t ) where
10
signal strength divided by the corresponding noise. The
σ ( X t ) is the standard deviation (given in [dB]) for the normal
received signal strength is the product of the power Pw times
process X t . With these assumptions we have the Probability
path loss G and divided by the noise and interference
Density Function (CDF) and Complementary Distribution
component N f , i.e. SINR = Pw G . Now the path loss G will Function (PDF) of S t as:
Nf
(ln x ) 2
typical be a stochastic variable depending on physical 1 − ~ 1 ln x
s ln ( x) = e 2σ 2 and S ln ( x ) = erfc( ) (4)
characteristics such as rapid and slow fading, but will also 2π σx 2 σ 2
have a component that are dependent on distance (and possible
∫ e ts ln (t )dt = ∫e
− xt
dx s su ( x) = − S su ( x) = 2σ 2
dt (9)
π x= y t =0 2π σx t =0
function. and for the PDF we now we take the corresponding truncated
C. Including fast fading integral to be:
T (ln(t x )) 2
1 −t −
There are several models for fast fading in the literature like
Rician fading and Rayleigh fading [5]. In this paper we restrict
s su ( x, T ) =
2π σx t =0
∫e 2σ 2
dt (10)
It is possible to include fast fading into the description above. of the truncation error.
To do so we assume that the fast fading effects are on a much By expanding the integral (10) in terms of the exponential
more rapid time scale than the slow fading. We therefore function as above, we now obtain a similar (convergent) series:
assume that the slow fading is constant during the rapid fading ( k +1) 2 σ 2
1 ∞ (−1) k k (k + 1)σ ln( x T )
variations. Hence, condition on the slow fading to be y then s su ( x, T ) = ∑
2 k = 0 k!
x e 2
erfc(
2
+
σ 2
) (11)
for a Rayleigh faded channel the SINR will be exponentially
distributed with mean y h(r , λ ) . We may therefore take SINR D. Distribution of the obtainable bitrate a user located at a
as S t h(r , λ ) where S t = X ln X e is the product of a Log- given distance from the sender antenna
normal and a negative exponential distributed variables. The Below we express the distribution of the obtainable bitrate
corresponding distribution often called Suzuki distribution according to the distribution of the stochastic part of the SINR;
have PDF and CDF given by the integrals: namely S t . From (1) we get the bit-rate Bt (r ) for a channel
∞
1 −
x
~ ∞
−
x occupying a bandwidth f located at distance r as:
s su ( x) = ∫ te t
sln (t )dt and S su ( x) = ∫e t
s ln (t )dt (5)
Bt ( r ) = f c j when S t ∈ [h( r , λ ) g j , h( r , λ ) g j +1 ) ; j = 0,1,...,15
(12)
t =0 t =0
where s ln (t ) is the lognormal PDF above by (4). Since Hence, the DF (Distribution Function) of the bandwidth for a
1 user located at distance r ; B( y, r ) = P( Bt (r ) ≤ y ) may be
s ln ( ) = t 2 s ln (t ) it is possible to express the integrals above in written:
t
terms of the Laplace transform of the Log-normal distribution B ( y , r ) = S ( h ( r , λ ) g j +1 ) for y ∈ ( f c j , f c j +1 ] ; j = 0,1,...,15 (13)
and therefore the CDF (and PDF) of the Suzuki distribution where S (x) is the DF of the stochastic variable fading
may be written as: component. Also we obtain the k ’moment of the obtainable
~
S su ( x) = Sˆ ln ( x) and s su ( x) = − Sˆ ln′ ( x) where bitrate for a user located at a distance r from the antenna as
−t −
(ln(t x )) 2 the (finite) sum:
∞ ∞ 2σ 2
1 e
( )
15
k ~
∫e ∫
− xt
Sˆ ln ( x) = s ln (t )dt =
dt (6)
m k ( r ) = f k ∑ c j − c j −1 S ( h ( r , λ ) g j )
k
(14)
t =0 2π σ t = 0 t j =1
is the Laplace transform of the Log-normal distribution. If we ~
where S ( x) = 1 − S ( x) is the CDF of the stochastic variable
define the truncated transform:
(ln(t x )) 2
fading component.
−t −
T T 2σ 2
~ 1 1 e E. Distribution of the obtainable bitrate for a user that is
S su ( x, T ) = ∫ e −t sln (t x)dt = ∫ dt (7)
x t =0 2π σ t =0 t randomly placed in a circular cell with power-law attenuation
~ ~ Since the bitrate/capacity for a user strongly will depend of
then S su ( x) = lim S su ( x, T ) and further the corresponding
T →∞ the distance from the sender antenna, a better measure of the
error is exponentially small in T . An attempt to expand the capacity will be to find the distribution of bitrate for a user that
integral (6) in terms of the series of the exponential function is randomly located in the cell. This is done by averaging over
∞
( −1) k t k
e −t = ∑ yields a divergent series; however, this is the cell area and the distribution of the corresponding
k =0 k! 1
A ∫A
averaging bitrate Bt is given as B ( y ) = B( y, r )dA(r ) where
not the case for the truncated transform (7). We find the
following series expansion: A is the cell area. For circular cell shape with radius R , and
k σ 2 2 power law attenuation on the form h(r , λ ) = h(λ )r α the
~ 1 ∞ (−1) k k kσ ln( x T )
S su ( x, T ) = ∑ x e ) 2
(8) erfc( + corresponding integrals may be partly evaluated. By defining
2 k =0 k! 2 σ 2 an α -factor averaging random variable S α with DF
Similar the PDF of the Suzuki random variable may be
S α ( x) = P ( S α ≤ x) defined by
found from (6) by differentiation:
2 x 2 1 2
2 − −1 2 −1
S α ( x) =
α
x α
∫ t α S (t )dt =
t =0
α ∫ t α S (tx)dt
t =0
(15)
t =0
∫ t α s(t )dt = α t =∫0t α s(tx)dt (16)
T
∫t
−1 −t
s su α ( x, T ) = e s ln α ( x t )dt (23)
the bitrate distribution will have exact the same form as (13),
t =0
and with moments given by (14) by changing r → R and
and we find the following error bound:
S ( x) → Sα ( x) (and s ( x) → sα ( x) ) in the formulas.
σ2
−T +
1) Distribution of the stochastic variable S α for Log-normal 0 ≤ s su α ( x) − s su α ( x, T ) ≤ e 2 . By the similar approach as for
and Suzuki distribution the CDF we also find the following series expansion of the
Based on the definition we may derive the CDF and PDF of truncated PDF:
stochastic variable S α for the Log-normal and Suzuki
∞
(−1) k x k ( k +1 ) 2 σ 2
(k + 1)σ ln( x T )
distributed fading models. For the Log-normal distribution we s su α ( x, T ) = ∑ e 2
erfc( + )+
x k = 0 ( 2 + ( k + 1)α ) k! 2 σ 2
~ 1 2 −1 ln t (24)
have S ln α ( x) = 2 ∫t α
erfc(
σ 2
)dt . By changing
e
2σ 2
α2 2 − (1+ 2 ) 2σ 2 − α ln( x T )
α x α t =0 γ( + 1, T ) x α
erfc( )
α α ασ 2
variable according to y = ln t in the integral we find:
1⎛ 2σ 2σ 2 − α ln x ⎞
2
~ ln x −2 III. ESTIMATION OF CELL CAPACITY
S ln α ( x) = ⎜⎜ erfc( )+ x αe α2
erfc( ) ⎟⎟ (17)
2⎝ σ 2 ασ 2 ⎠ In the following we assume that the cell is loaded by two
and further the PDF is found by differentiation: traffic types:
1 −( 2 +1) 2σ 2σ 2 − α ln x
2
s ln α ( x ) = x α e α erfc( ) (18)
2
• High priority GBR traffic sources that each requires
α ασ 2 to have a fixed data-rate and
For the Suzuki distribution we have the CDF given by the
∞
• low priority (greedy) data sources that always
integral S~su ( x) = x ∫ t − 2e − t sln ( x t )dt and therefore we have: consumes the leftover capacity not used by the GBR
t =0 traffic.
1 2 ∞
~ 2 −1 ~
This is actual a very realistic traffic scenario for future LTE
∫ t α S su ( xt )dt = x ∫ t e sln α ( x t )dt
− 2 −t
S su α ( x ) = (19)
α t =0 t =0
networks where we actual will have a mixture of both real time
where sln α ( x) is given by (18) above for the Lognormal traffic like VoIP and elastic data traffic. Below, we first
estimate the Resource Block (RB) usage of the high priority
distribution. As for the Suzuki distribution approximation to GBR traffic, and then we may subtract the corresponding RBs
any accuracy is possible to obtain by truncating the integral to find the actual numbers of RBs available for the (greedy)
above: data traffic sources. Then finally we estimate the cell
T
~ throughput/capacity as the sum of the bitrates offered to the
S su α ( x, T ) = x ∫ t −2 e −t s ln α ( x t )dt (20)
t =0
GBR and (greedy) data sources.
and also for this case we find that the truncation error is A. Estimation of the capacity usage for GBR sources in LTE
∞
(−1) k t k
exponentially small in T . By expanding e − t = ∑ and The reservation strategy considered simply reserve recourses
k =0 k! on a per TTI bases and allocate RBs so that the aggregate rate
integrating term by term we find: equals the required GBR rate, i.e. using Non-Persistent
scheduling.
~ ∞
( −1) k x k k 2σ 2 kσ ln( x T )
S su α ( x, T ) = ∑ e 2
erfc( + )+ 1) Capacity usage for a single GBR source
k = 0 ( 2 + kα ) k! 2 σ 2 We first consider the case where we know the location of the
2σ 2 (21)
e α2
2 −2 2σ 2 − α ln( x T ) GBR user in the cell, i.e. is located at a distance r from the
γ ( ,T )x α
erfc( ) antenna. We take B as the bitrate obtainable for a single RB
α α ασ 2
x and consider a GBR source that requires a fixed bit-rate of
where γ (a, x) = ∫ t a −1 e −t dt is the incomplete gamma function. b CBR . We assumes that this is achieved by offering n RBs for
t =0
every k -TTI interval. A simple way of reserving resources to
(Observe the similarity with the corresponding expansion for
~ n
S su ( x) by (8).) GBR connections is to allocate RBs so that B will be close
k
The corresponding integral for the PDF is given by: to the required rate b CBR over a given period. We take
n
∞ N CBR = to be the number of RBs granted for a GBR
∫t
−1 − t
s su α ( x) = e s ln α ( x t )dt (22) k
t =0 connection in a TTI as (the stochastic variable):
E [N CBR B ] = b CBR and hence we also have: where M i = M i (r ) is the scheduling metric which also may
depend on the location of all users (through the location vector
[
E N CBR CQI > 0 = ] b CBR
p CQI
[
E B −1 CQI > 0 ] (26) r = ( r1 ,...., rK ) ). Hence, for the scheduler to choose a user i ,
the metric M i must be larger than all the other metrics (for the
The mean numbers of RBs is therefore:
other users), i.e. we must have M i > U i where
β = β (r , b CBR ) = b CBR m −CQI
1 (r ) (27)
U i = max M k
where the conditional moments m kCQI (r ) = E B k CQI > 0 is [ ] k =1,.., K
k ≠i
(33)
found as Since we assume that a user is granted all the RBs when
fk
(
⎛ k~
) ⎞
scheduled, this gives the cell throughput when user i is
15
~
CQI
m (r ) = ~ ⎜ c1 S (h(r , λ ) g1 ) + ∑ c j k − c j −1k S (h(r , λ ) g j ) ⎟
(28)
k ⎜
S (h(r , λ ) g1 ) ⎝ ⎟
scheduled (located at distance ri ) to be NB (ri ) , where B (ri )
j =2 ⎠
Note that by conditioning on having CQI > 0 we exclude the is the corresponding obtainable bit-rate per RB. Hence, cell
users that are unable to communicate due to bad radio bit-rate distribution may then be written as:
conditions, and avoid the problems due to division of zero in K
the calculation of the mean of 1 B . For circular cells and Bg ( y, r ) = ∑ Bi ( y, r ) where (34)
i =1
power law attenuation we obtain the corresponding result as Bi ( y, r ) = P( NB (ri ) ≤ y, M i (r ) > U i (r )) (35)
above by changing r → R and S ( x) → Sα ( x) .
2) Estimation of RBs usage for several GBR sources is bitrate distribution when user i is scheduled. Unfortunately,
In the following we first estimate the RB usage for a fixed in the general case, explicit expression of the probabilities
number of M GBR sources located at distances r j from the Bi ( y, r ) is difficult to obtain, mainly due to the involvement
antenna with bit-rate requirements b CBR
j ; j = 1,..., M . The of the scheduling metrics. However, for some cases of
particular interest closed form analytical expression is possible
total usage of RBs β CBR will be the sum the individual to obtain. For many scheduling algorithms the scheduling
contribution from each source as given by (27): metrics are only function of the SINR for that particular user
M
(and does not depend of the SINR for the other users) and for
β CBR = ∑ β (rj , bCBR
j ) (29)
j =1
this case extensive simplification is possible to obtain. In the
For the case with random location the expression gets even following we therefore assume that the metrics M i only are
simpler: functions of their own SINRi and the location ri of that
M particular user, i.e. we have M i = M ( Si , ri ) , where we (for
β CBR = β ( R, ∑ b CBR
j ) (30) simplicity) also assume that M ( x, ri ) is an increasing function
j =1
i.e. we may add the GBR rates from all the sources in the cell. of x with an unlikely defined inverse function M −1 ( x, ri ) .
The corresponding throughput for the GBR sources is taken as The distribution functions for M i and U i = max M k are then
k =1,.., K
the sum of the individual rates i.e. k ≠i
M
b CBR = ∑ b CBR
j (31) M i ( x, ri ) = P ( M i ≤ x) = S ( M −1 ( x, ri )) and (36)
j =1 K
U i ( x, r ) = P (U i ≤ x) = ∏ S (M −1
( x, rk )) (37)
B. Estimation of the capacity usage for a fixed number of k =1,k ≠i
where we now have defined the multiuser “scheduling” applying the cell capacity models described above.
function Fi ( x, r ) by:
a) Round Robin
K
For the Round Robin algorithm each user is given the same
Fi ( x, r ) = U i ( M ( x, ri ), r ) = ∏ S (M
k =1,k ≠i
−1
( M ( x, ri ), rk )) (40)
amount of bandwidth and hence this case corresponds to
Finally, by assuming that all users are randomly located taking K = 1 , i.e. the results in section II may be applied by to
throughout the cell the corresponding bit-rate distribution is find the cell capacity with f → Nf and S ( x) → S su ( x) and
found by performing a K -dimensional averaging over all also Sα ( x) → S su α ( x) .
possible distance vectors r over the cell;
1
Bg ( y ) = K ∫ K ∫ r1 K rK Bcell ( y, r ) dA1 L dAK , where A here b) Proportional Fair (in SINR)
A A A Normally, the shadowing is varying over a much longer time
is the cell area. Due to the special form of the function scale than the TTI intervals, and hence we may assume that the
K slow fading is constant during the updating of the scheduling
Fi ( x, r ) = ∏ S (M
k =1, k ≠ i
−1
( M ( x, ri ), rk )) the “cell averaging” over
metric M i and therefore should only account for the rapid
the K −1 dimension variables r1 ,.., ri−1 , ri +1 ,..., rK (not fading component. This means that the shadowing effect may
) be taken as constant that may be included in the non varying
including the variable ri ) yields the product S (M ( x, ri )
K −1
[ ] part of the SINR over several TTI intervals. Hence, we take
where
SINR as St h(r , λ ) where S t = zX e conditioned that the
) 1
S ( y ) = ∫ uS ( M −1 ( y, u ))dA(u ) (41) shadowing X ln = z . By assuming X ln = z is constant over the
AA
short TTI intervals, the scheduling metrics will be
Hence, for the case when user i is located at distance r and
zX e h( ri , λ ) Xe
all the K − 1 other users located at random, then we find Mi = = . In the final result we then
zE[ X e ] h( ri , λ ) E[ X e ]
Bi ( y, r ) = B( y, r ) is independent of i and:
h ( ri , λ ) g j +1 “integrate over the Log-normal slow fading component”. We
B( y, r ) = ∫ [S) (M ( x, r ))] K −1
(
s ( x) dx if y N ∈ f c j , f c j +1 ; ] find that the probability of being scheduled is p(r ) = 1 and
x=0 (42) K
j = 0,1,...,15 , that the conditional bandwidth distribution for a user at located
) at distance r (and the K − 1 users random located) is given
∫ [S (M ( x, r ))]
∞
K −1
and moreover p( r ) = lim Bi ( y , r ) = i s ( x) dx is by the results in section II.D with f → Nf and
y →∞
x=0
S ( x) → S K ( x) with:
the probability that a particular user is scheduled. ∞ ∞
x and sK ( x) = K x x
For circular cell size the cell bit-rate distribution is therefore S K ( x) = ∫ S (t ) ∫ Se ( ) K −1 se ( ) sln (t )dt
K
e sln (t )dt (47)
given as: t =0 t =0
t t t
h ( r , λ ) g j +1
) where S e ( x) = 1 − e − x and s e ( x) = e − x .
[ ] ];
R
Bg ( y) =
2
∫r ∫ K S ( M ( x, r ))
K −1
(
s ( x ) dxdr if y N ∈ f c j , f c j +1
R2 r =0 x =0 (43)
Further the distribution of the cell capacity is given by the
j = 0,1,...,15
results in section II.E with f → Nf and further the
where we now have
corresponding α -averaging is given by the integrals:
) 2
R
~ ∞
~
∫ uS (M
−1
S ( y) = 2 ∫ KS (t )
K −1
( y, u ))du (44) S K α ( x) = se (t ) Slnα ( x ) dt and (48)
R
e t
r =0 t =0
R2
∑ c j ∫ r ⎨ ∫ K S ( M ( x, r ))
k
s ( x ) dx ⎬ dr (46) ) 2 R
j =1 r =0 ⎪⎩ x = h (r ,λ ) g j ⎪⎭ S ( M ( x, r )) = 2
R ∫ uS ( x (u
r =0
r )α )du = Sα ( x ( R r )α ) (50)
2) Examples
Below we consider and compare three of the most We find that the probability of being scheduled
0.6
50 50
GBR=1 Mbit/s
80 40 -- Non-Persistent,
40 cell edge
30 -- Non-Persistent,
30 random
70
20 GBR=3 Mbit/s -- mean PF 10 users
20
-- PF 10 10
60 -- Max-SINR 0.5 1
Distance
1.5
@Km D
2 2.5 0.5 1
Distance
1.5
@Km D
2 2.5
-- RR 80 80
Cell capacity @MbitêsD
70 70
50
30 30
30 20 20
10 10
20
0.5 1 1.5 2 2.5 0.5 1 1.5 2 2.5
Distance @Km D Distance @Km D
10
Figure 3: Mean cell throughput for PF, 10 users and a GBR user of 3.0, 1.0,
0.3, 0.1 Mbit/s using non-persistent scheduling, for 2 GHz and 100 RB and
1 2
Distance @Km D
3 4 5 Suzuki distributed fading with std. σ=8dB. Red curves corresponds to
random location and blue for user located at cell edge.
Figure 2: Cell capacity as function of cell radius for Max-SINR (red), PF
(blue) and RR (black) scheduling, 2GMHz frequency with 100 RB and with
Suzuki distributed fading with std. σ=8 dB. The number of users is 1, 2, 3, 5,
V. CONCLUSIONS
10, 25, 100 from below. By extensive analytical modeling where both fading and
As seen from Table 3 below, for the case with 10 active attenuation due distance is included we obtain performance
users in a cell, the PF fairly give each user 10% chance of models for:
accessing radio resource while the Max-SINR only give 1.2% • Spectrum efficiency through the bitrate distribution
chance of accessing the radio resources if a user is located at per RB for users that are either randomly or located at
cell edge. a particular distance in a cell.
TABLE 3: PROBABILITY THAT A USER IS SCHEDULED AS FUNCTION OF
NUMBERS OF USERS AND LOCATION FOR PF AND MAX-SINR SCHEDULING • Cell throughput/capacity and fairness by taking the
ALGORITHMS, AND SUZUKI DISTRIBUTED FADING WITH STD. OF 8DB. scheduling into account.
Number PF MAX-SINR
of users • Cell throughput/capacity for a mix of GBR and Non-
r/R=1 r/R=0.5 r/R=0.25 r/R=0.1 GBR (greedy) users.
2 0.50 0.308708 0.594756 0.82579 0.96119 The usage of GBR with high rates may cause problems in
LTE due to the high demand for radio resources if users have
3 0.33 0.147869 0.414839 0.71126 0.92784 low SINR i.e. at cell edge. For GBR allocation the allowed
5 0.20 0.055113 0.245871 0.56102 0.87130
guaranteed rate should be limited. It seems that a limit close to
1 Mbit/s will be a good choice.
10 0.10 0.012690 0.104912 0.36531 0.76418
REFERENCES
25 0.04 0.001356 0.025222 0.16326 0.56989
[1] H. Holma and A. Toskala, Eds.: “LTE for UMTS, OFDMA
100 0.01 0.000019 0.001293 0.02453 0.24325 and SC-FDMA Based Radio Access”, Wiley, 2009.
[2] H. Kushner and P. Whiting: “Asymptotic Properties of
In Figure 3 we consider the cases where 10 greedy users are Proportional-Fair Sharing Algorithms,” Proc. of 2002
Allerton Conference on Communication, Control and
scheduled by the PF algorithm together with a GBR user with
Computing, Oct. 2002.
guaranteed rate of 3, 1, 0.3 or 0.1 Mbit/s. We consider the
cases where either the GBR user is located at cell edge or have [3] 3GPP TS 36.213 V9.2.0 (2010-06), Physical layer
random location throughout the cell. We observe that thin procedures, Table 7.2.3-1: 4-bit CQI Table.
GBR connections do not have big impact on the cell
[4] C, Mehlfuhrer, M. Wrulich, J. C. Ikuno, D. Bosanska, M.
throughput, and it seems that GBR bearers up to 1 Mbit/s Rupp: “Simulating the Long Term Evolution Physical
should be manageable without influencing the cell Layer”,17th European Signal Processing Conference
performance very much. Higher GBR rates, however, (i.e. 3 (EUSIPCO 2009); Glasgow, Scotland, August 24-28, 2009.
Mbit/s) will reduce the cell throughput by a quite large factor
[5] B. Sklar, “Rayleigh Fading Channels in Mobile Digital
especially if the user is located near the cell edge.
Communication Systems Part I: Characterization and Part II:
Mitigation”, IEEE Communications Magazine, July 1997.