Automatic UMTS System Resource Dimensioning Based On Service Traffic Analysis
Automatic UMTS System Resource Dimensioning Based On Service Traffic Analysis
Automatic UMTS System Resource Dimensioning Based On Service Traffic Analysis
RESEARCH
Open Access
Abstract
Mobile network operators base their TDM network capacity dimensioning on Erlang B models. This approach was
valid in legacy GSM networks. However, current Universal Mobile Telecommunications System networks deal with
different resource consumption services such as voice, video call or data, and different limiting resources such as
baseband processing capacity, transmission link capacity to the RNC, or spreading code tree. Operators need
models to decide which resource must be upgraded, according to the demand of the services, in order to achieve
expected overall service accessibility (i.e., the complementary of blocking probability). Network operation requires
detecting when degradation is due to a lack of resources or to a hardware malfunction. Also, when operators need
to prevent blockage in a high-capacity demanding event (for which they only have traffic predictions for each
service) it is far from trivial to dimension resources. We have implemented a Kaufman Roberts approach to
characterize the multiservice resource demand. Using real reported traffic Key Performance Indicators to calibrate
the model, an estimated accessibility is obtained at a per-resource level and combined to find global estimated
accessibility. The proposed model is intended to assist network operation, estimating individual resource shortage,
differentiating congestion from hardware failures, and predicting the necessary resources to be deployed to tackle a
high-capacity demanding event.
Keywords: Component, UMTS, Lub, Channel elements, Spreading codes, KaufmanRoberts, Modeling, Grade of
service
1. Introduction
Capacity management in mobile networks implies two
main tasks: solving present blockage issues (detecting
limiting resources, in order to upgrade them or differentiating congested from malfunctioning resources), and
adequate resource provisioning to avoid blockage in a
future event from which service demand is estimated
(massively populated sports events, concerts, etc.).
Mobile network vendors do not provide operators with
the tools to tackle these issues. Universal Mobile Telecommunications System (UMTS) network equipment
reports key performance indicators (KPIs) related to
capacity shortage, such as failed connection attempts,
but no clue is provided in order to detect the limiting
resource or a subsystem malfunction, nor is any advice
given on how many resources to provision in order to
* Correspondence: alvarezgalberto@uniovi.es
1
University of Oviedo, Oviedo, Spain
Full list of author information is available at the end of the article
2012 Garca et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons
Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction
in any medium, provided the original work is properly cited.
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
Page 2 of 10
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
2. Related work
Most models found in the literature study theoretically
the capacity of a UMTS system but do not deal with the
set of hardware subsystems suitable to upgrade or repair
by network operation for a specific traffic demand.
Conversely, results of those works are mostly validated
through simulations and do not rely on a real service
providing network, as the present study does.
Several articles have been dedicated to discuss radio
interface issues, such as interference or power budget
[4-7]. The common scope is to enhance network capacity associated to radio conditions, by reducing the soft
handover area, controlling overshooting, or providing
better power control algorithms. The Iub dimensioning
has explicitly been discussed in several articles [8-13].
Main studies related to multiservice environments use
KR approach, or variations of this algorithm. Staehle
and Mder [14] proposed a KR revised algorithm which
considers state-dependant blocking probabilities to obtain a good approximation of uplink blocking probabilities. They first determine the blocking probability
as a function of the own cell interference and the
other cell interference. With the KR model they combine their approach to a multiservice environment. Similarly, Iversen [15,16] considers uplink interference, using
a modified KR recursive algorithm. He discusses the
usage of state-dependant blocking probabilities and the
particularities considered to allow reversibility and reality
at the same time.
In this study, we have not considered limiting factors
such as uplink and inter-cell interference, as those are
not adjustable by network operation. They are aspects
Page 3 of 10
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
1
qj ki1 ai bi qj bi
j
Initial implementations of basic KR recursive algorithms are computationally inefficient and thus, timeconsuming [15,16]. While the traditional recursive algorithm is widely used to obtain the blocking probabilities
in multiservice scenarios [25,26], the authors have used
an improved version, based on the fast Fourier transformation (FFT) as proposed in [3], notably reducing the
computation consumption and producing faster results.
The authors have verified the accuracy of the FFT implementation, in comparison with the recursive implementation, enhancing the computational performance.
YK
G IFFT
FFT
3
i
i1
Finally, each probability distribution will be composed
as indicated in Equation (2). Namely,
C
G i
G i
K 1
PB;i
4
iCb
C
G
i0 Gi
At each constrained resource, the modeling algorithm
explained in Equation (1) calculates the blocking probability for each service i for the corresponding limited
resource n. The total blocking probability at this resource,
integrating all services, is calculated by the expression in
(5) where Pb,ni denotes the blocking probability for the
service i at the resource n cani stands for the connection
attempts for service i at the subsystem or constrained resource n. The blocking probability at resource n is used
a1b1
a2b2
a3b3
a4b4
Shared
Resource
C
pb1
pb2
pb3
pb4
Page 4 of 10
i cani Pb;ni
ni cani
8
< cani can1i 1 PBn1 ; n > 1
ca for n 1 are the call attempts attended
: ni
at the first subsystem
6
Thus, the proposed model requires each scenario to
be defined in the following terms: resources available at
each subsystem, traffic demand, and connection attempts
for each service. The unitary consumption for each service at each resource must also be known.
The resources at each subsystem, C, depend on the
hardware configuration of the particular scenario. Iub
CS and Iub PS are carried through different transmission
systems, with different capabilities for UL and DL.
At the CE subsystem, C is expressed as the amount of
CE available in UL and DL. A CE is the baseband processing capacity required in node B to provide one voice
channel, including the control plane signaling. The particular hardware configuration of a node determines the
number of cards and the amount of CE per card available (in the nodes under study, typically each card has
384 CEs). At SC, the factor C is defined as the number
of SCs available in the tree for each service. There can
also be more than one tree (adding a new 5-MHz carrier). A regular SC tree has codes ranging from SF 16 to
SF 256 and each service consumes one or more codes at
a certain SF level.
The services considered also depend on the particular
scenario. Common UMTS services include voice, PS384
service, HSPA (UL and DL), and Video Telephony.
Traffic and connection attempts for each service are
obtained from network KPI. In addition to user data
channels, signaling is also considered.
Once the resource consumption has been characterized
for the different services and the traffic demand for each
one is known, the modeling algorithm can be applied to
estimate the per-resource and the overall accessibility.
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
Traffic KPI
K-R
processing
Theoretical
Accessibility
Detection
Accessibility KPI
Operation &
Maintenance
Hardware/
Software failure
discrimination
Page 5 of 10
K-R processing
cai
cai (1-Pb_CE)(1-Pb_Iub_CS/PS)
Pb_IubCS_DL
Pb_IubPS_DL
Pb_IubCS_UL
Pb_IubPS_UL
Iub (K-R)
Iub (K-R)
cai (1-Pb_Iub_CS/PS)
CE (K-R)
cai (1-Pb_CE)
Pb_CE_DL
CE (K-R)
Pb_CE_UL
cai (1-Pb_Iub_CS/PS)(1-Pb_CE)
SC (K-R)
Pb_SC_DL
cai
cai (1-Pb_Iub_CS/PS)(1-Pb_CE)(1-Pb_SC)
Downlink
Uplink
Figure 4 Detailed models of KR processing for uplink (b) and downlink (a).
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
Page 6 of 10
CIub-PS (Mbps)
CIub-CS (Mbps)
CCE
DL
23
1.2
768
UL
2.8
1.2
768
5. Numerical example
In order to illustrate the basic operation of the developed
model, a simple numerical example will be outlined here.
First, we define the amount of resources available at
the node. Let us consider a simple scenario with different resources, SC, CE, and Iub (in the DL path) and CE
and Iub in the uplink. Iub PS DL uses IP, while Iub CS
and Iub PS UL use ATM. Thus, all services but HSDPA
use ATM. The number of carriers is one so we are considering one SC tree.
Iub_PS DL uses a DSL line with 23 Mbps capacity.
The node has two E1 lines with one VCC channel for
CS. The node has also two CE cards for UL and another
set of two for DL. The resources are defined as Table 1
indicates.
Each of the services demanded has a unitary consumption on the different resources. The unitary consumptions for the services are detailed in Table 2. Voice
consumes 1 CE both UL and downlink. 12.2 kbps codecs
are used for voice. Consumption of CE for HSPA services
are defined as 21 CE for each 16 users in the DL and
32 CE for each 16 users in the UL. The throughput for
HSPA services is variable. The voice uses one SC with SF
256. HSUPA does not consume SC in node B as it relies
on the user equipment uplink carrier SC tree.
Next, we define an arbitrary combination of traffic
intensities and connection attempts for each service at a
certain instant ti, as shown in Table 3. The developed
model will obtain the accessibility at that instant. The
actual implementation considers an array of traffic instants corresponding to the daily demand. The intensities
shown at the instant ti are inspired in the values registered
in the real scenarios for a 15min observation period. To
calculate the traffic demand in Erlangs for PS services,
Equation (9) is used. states for the bps consumption, as
reported in KPIs, whereas states for the data channel
capacity in bps. In this example, it is defined as 1 kbps.
bCE-UL
bIub-DL
bIub-UL
Voice
12.2 kbps
12.2 kbps
1SF256
PS384
16
384 kbps
64 kbps
1SF32
HSDPA
1.31
N/A
Variable
N/A
1SF16
HSUPA
N/A
N/A
Variable
N/A
SC
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
PS384
DL
800 connection attempts
1000 KB/15 min
8.8 Erlang
UL
800 connection attempts
400 KB/15 min
3.55 Erlang
HSDPA
HSUPA
Notes Signaling uses one additional Erlang for each CS Erlang. Traffic intensity
values consider a soft handover factor of 1.10.
DL (%)
AccIubCS
100
43
AccIubPS
100
100
AccCE
58
69
AccSC
N/A
40
AccCS
59
44
AccPS
59
28
Page 7 of 10
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
Page 8 of 10
CS Acc (after)
80
Acc
60
40
20
80
40
20
Acc
60
100
100
CS Acc (before)
12
18
24
Theoretical
Real
Time (hours)
12
18
24
Time (hours)
Scenario Resources
IubPS_DL
IubPS_UL
CE_UL
IubCS
CE_DL
Static Resources:
IubPS_UL = 2.824 Mbps
IubPS_DL = 30 Mbps
CE_UL = 768 CE
CE_DL = 768 CE
SC = 2 SC trees (2 carriers)
Upgraded Resource:
IubPS_UL = 1.272 Mbps > 2.544 Mbps
SC
80
Acc
60
40
20
80
40
20
Acc
60
100
100
PS Acc (before)
12
18
24
Theoretical
Real
Time (hours)
12
Time (hours)
Scenario Resources
IubPS_DL
IubPS_UL
CE_UL
CE_DL
IubCS
Static Resources:
IubCS = 1.272 Mbps
IubPS_UL = 2.048 Mbps
IubPS_DL = 30 Mbps
CE_DL = 768 CE
SC = 1 SC tree (1 carrier)
Upgraded Resource:
CE_UL = 768 CE > 1152
SC
Figure 6 Accessibility at upgraded resources for scenario 1 (left) and scenario 2 (right).
18
24
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
40
Acc
60
80
CS Acc
20
Theoretical
Real
12
18
24
Time (hours)
Scenario Resources
Resources:
IubCS = 1.272 Mbps
IubPS_UL = 4.096 Mbps
IubPS_DL = 30 Mbps
CE_UL = 384 CE
CE_DL = 768 CE
SC = 1 SC tree (1 carrier)
IubPS_DLIubPS_UL
CE_UL
CE_DL
IubCS
SC
Page 9 of 10
7. Extension to LTE
The approach developed and tested with 3G/UMTS can
be migrated to 4G/LTE-based systems, albeit with a few
modifications, due to technological differences. The
baseband processing in the network nodes is performed
by similar resources, conceptually equivalent to CE. On
the other hand, the radio carrier capacity is no longer
defined by SC tree, standard in CDMA. In LTE, the
radio channel will be divided into multiple radio carriers
and transmitted using frequency multiplexing techniques such as OFDMA. Full IP interface S1 replaces Iub,
and links the E-NodeB directly to the gateway, bypassing
the current RNC. Consequently, the model can be
extended by redefining the module of radio interface
resource occupation and modeling appropriately the
new IP interface, S1. In addition, CE per service consumption table needs to be updated. Future development roadmap includes developing the 4G/LTE version
of the model incorporating real system evaluations of
real operative 4G networks as soon as they become
available. At the time of publication, small demonstrative
clusters are deployed, but none is yet in production
service.
8. Conclusion
This study presents a model for the estimation of accessibility for UMTS services. It has proven to be very useful for network operation, serving as a tool to provision
network resources to manage a certain capacity demand
in a multiservice scenario. It also helps to detect poorly
dimensioned and malfunctioning resources.
A KR approach is implemented, but FFT version is
used instead of the recursive algorithm, in order to reduce
computation time. The model is validated through comparison between estimated and real network reported
accessibilities. The validation of the model includes real
scenarios with different blocking conditions.
20
20
40
40
Acc
60
Acc
60
80
80
100
100
12
18
Time (hours)
Acc PS CE (before)
Acc PS CE (after)
24
12
18
Time (hours)
24
Garca et al. EURASIP Journal on Wireless Communications and Networking 2012, 2012:323
http://jwcn.eurasipjournals.com/content/2012/1/323
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
Competing interests
The authors declare that they have no competing interests.
20.
Author details
1
University of Oviedo, Oviedo, Spain. 2University of Valladolid, Valladolid,
Spain.
21.
22.
References
1. P Alonso, A Alvarez, A Alonso, B Carro, JM Aguiar, A Snchez, A method for
the detection of QoS degradation in UMTS Networks, in 2nd International
Workshop on Context-aware QoS Provisioning and Management for Emerging
Networks, 2nd edn. (Applications and Services, Germany, 2012)
2. J Kaufman, Blocking in a shared resource environment. IEEE Trans Commun
29(10), 14741481 (1981)
3. JW Roberts, A service system with heterogeneous user requirements
application to multi-service telecommunications systems, in Proceedings of
Performance of Data Communications Systems and their Applications,
ed. by G Pujolle (1981), pp. 423431
4. M Stasiak, P Zwierzykowski, J Wiewira, Analytical model of the WCDMA
radio interface in UMTS network with user differentiation, in Fifth Advanced
International Conference on Telecommunications, 2009, 2009, pp. 8388
5. M Stasiak, P Zwierzykowski, D Parniewicz, Modelling of the WCDMA
interface in the UMTS network with soft handoff mechanism, in IEEE Global
Telecommunications Conference, 2009 (GLOBECOM 2009) (2009), pp. 16
6. M Stasiak, P Zwierzykowski, J Wiewira, WCDMA interface in UMTS network
carrying a mixture of multi-rate traffic with different priorities, in
International Conference on Telecommunications, 2009, ICT09, 2009,
pp. 254259
23.
24.
25.
26.
27.
Page 10 of 10
doi:10.1186/1687-1499-2012-323
Cite this article as: Garca et al.: Automatic UMTS system resource
dimensioning based on service traffic analysis. EURASIP Journal on
Wireless Communications and Networking 2012 2012:323.