• No results found

Analysis of Radio Access Network Buffer Filling Based on Real Network Data

N/A
N/A
Protected

Academic year: 2021

Share "Analysis of Radio Access Network Buffer Filling Based on Real Network Data"

Copied!
93
0
0

Loading.... (view fulltext now)

Full text

(1)

Master Thesis

Electrical Engineering

December 2012

Analysis of Radio Access Network Buffer Filling

Based on Real Network Data

Logabharathi Aruchamy

School of Computing

Blekinge Institute of Technology 37179 Karlskrona

(2)

This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering. The thesis is equivalent to 20 weeks of full time studies.

Contact Information Author: Logabharathi Aruchamy E-mail: logabharathi@gmail.com External Advisor(s) Tomas Lundborg, Systems Manager, Ericsson AB,

Development Unit Radio-System and Technology,

Torshamnsgatan 33,

164 80 Stockholm, Sweden.

Mathias Sintorn, Senior Specialist R&D, Ericsson AB,

Development Unit Radio-System and Technology,

Torshamnsgatan 33,

164 80 Stockholm, Sweden.

University advisor: Prof. Markus Fiedler,

School of Computing (COM)

School of Computing

Blekinge Institute of Technology 371 79 KARLSKRONA SWEDEN

Internet: www.bth.se/com Phone: +46 455 385000 SWEDEN

(3)

Abstract

The 3G and 4G networks have drastically improved availability and quality in data transmission for bandwidth hungry services such as video

streaming and location-based services. As 3G networks are very widely

deployed, there exists increased capacity requirement and transport

channel allocation to simultaneous users under a particular cell. Due to this reason, adequate resources are not available, which in turn degrades both service quality and user experienced quality. This research aims at understanding the characteristics of buffer filling during dedicated channel (DCH) transmission under fixed bit-rate assumptions on a per-user level

taking different services into consideration. Furthermore, the resource

utilisation in terms of empty buffer durations and user throughput achieved during dedicated channel transmission are also analysed for

different data services existing in the mobile networks. The traces are

collected from a real network and characteristics of the traffic are analysed prior to understanding its buffer filling in Radio Network Controller

(RNC) during downlink data transmission. Furthermore, the buffer is

modelled with some series of assumptions on channel bit-rates and simulations are performed taking single user scenario into consideration, for different services with the help of obtained traces as input to the buffer. This research is helpful in understanding the RNC buffer filling for different services, in turn yielding possible understanding on the existing transport channel switching scenario. With the help of analysing the buffer filling for different services and transport channel utilisation, we learn that most of the data services show low DCH utilisation of approximately around 20% and also found to have 80% of the total DCH session duration with empty buffer, causing sub-optimal radio resource utilisation.

Keywords: Traffic Characteristics, Radio Network Controller (RNC), Dedicated Channel (DCH) and Channel Switching.

(4)

Acknowledgement

It would not have been possible to complete my thesis work without the help and support of the kind people around me, to only some of whom it is possible to give particular mention here.

Foremost, I would like to express my deepest sense of Gratitude to

Jessica ¨Ostergaard, Manager, Radio Networks - Systems and Concepts,

Ericsson AB, for giving me such an wonderful opportunity to perform this thesis work at Ericsson AB.

At this moment of accomplishment, I gratefully acknowledge Tomas Lundborg, Systems Manager for his continuous advice and encouragement

throughout the course of this thesis. I thank him for his systematic

guidance and great effort he put into training me in the scientific field. My sincere thanks also goes to Mathias Sintorn, Senior R&D Specialist, for his insightful comments and absolute support to the thesis.

I am most grateful to Prof. Markus Fiedler for his technical support and encouragement whenever I was in need.

I would also like to thank my friends in Ronneby, Karlskrona and Stockholm for all the fun we have had during my stay in Sweden.

Last, but by no means least, I would like to express the profound gratitude from my deep heart to my parents: Aruchamy and Lakshmi and my brother: Gopienathan for their love and continuous support - both spiritually and materially.

(5)

Contents

Abstract i

Acknowledgement ii

Contents iii

List of Figures vi

List of Tables viii

List of Acronyms ix 1 Introduction 1 1.1 Scope . . . 1 1.2 Study Prerequisites . . . 2 1.3 Working Process . . . 2 1.4 Contribution . . . 3 1.5 Reader Guidance . . . 3 2 Background 5 2.1 3G Network Architecture . . . 5

2.1.1 WCDMA UMTS Components [27] . . . 5

2.1.2 Radio Network Controller (RNC) . . . 8

2.1.3 Radio Resource Management (RRM) . . . 9

2.2 Data Trace Analysis . . . 10

2.2.1 Trace Generation . . . 10

2.2.2 Trace Analysis . . . 12

(6)

3 Research Methodology 19

3.1 Aim and Objectives . . . 19

3.2 Research Questions . . . 19

3.3 Research Methodology . . . 20

4 Traffic Data Analysis 22 4.1 Service Distribution . . . 22

4.2 IP Packet Characteristics . . . 23

4.2.1 Packet Sizes [SP] . . . 23

4.2.2 Inter-arrival Times [IP] . . . 25

4.3 Burst Characteristics . . . 26

4.3.1 Burst Inter-arrival Times [IB] . . . 27

4.3.2 Burst Durations [DB] . . . 29

4.3.3 Burst Sizes [SB] . . . 31

4.4 Session Characteristics . . . 34

4.4.1 Duration of Sessions [DS] . . . 34

4.4.2 Data Volume Transmitted per Session [SS A] . . . 35

4.4.3 Clean Service Traffic Percentage [CS] . . . 37

4.5 Summary . . . 38

5 RNC Buffer Modelling 40 5.1 Trace-Based Simulation Buffer Model . . . 40

5.2 Design Assumptions . . . 43

5.3 Transport Channels and State Transitions . . . 44

5.4 Effects of Buffering Delays and QoS . . . 46

5.5 Attained Buffer Levels . . . 48

5.6 Summary . . . 50

6 Results and Discussion 52 6.1 Idle buffer Characteristics during Dedicated Channel Transmission . . . 52

6.1.1 Empty Buffer Duration [De] . . . 53

6.1.2 Percentage of Emptiness in Buffer per DCH Session [Pe] 55 6.2 Radio Resource Utilisation in terms of Dedicated Channel Performance . . . 57

6.2.1 Achieved User Throughput on DCH [Ta] . . . 58

6.2.2 Dedicated Channel Utilisation [UDCH] . . . 60

6.3 Discussion of the Results . . . 62

6.4 Validity of the Results . . . 63

7 Conclusion and Future Work 65 7.1 Conclusion . . . 65

(7)

Bibliography 68

Appendix 71

(8)

List of Figures

1.1 Working Process . . . 3

2.1 Simplified 3GPP UMTS network reference model . . . 6

2.2 UTRAN Components and Interfaces . . . 7

2.3 Overview of RNC in UTRAN connecting CN and UE . . . . 8

2.4 Modes of RRC and CELL States of UE . . . 9

2.5 Differentiation criteria for services from the traffic logs [1] . . 12

2.6 Essential terms and their definitions with respect to traffic [11] 15 3.1 Step-by-step flow of the research work . . . 21

4.1 Service Distribution . . . 23

4.2 Packet sizes for different services . . . 24

4.3 Inter-arrival times between packets for different services . . . 26

4.4 Inter-arrival time between bursts for different services . . . . 28

4.5 Mean Inter-Arrival Time between Bursts . . . 29

4.6 Duration of Bursts for different services . . . 30

4.7 Average Burst Durations . . . 31

4.8 Burst sizes for different services . . . 32

4.9 Mean burst sizes for different services . . . 33

4.10 Durations of Sessions for different services . . . 35

4.11 Data Volume per Session for different services . . . 36

4.12 Mean Clean Service Traffic Percentage for different services . 38 5.1 Calculation of different parameters of the buffer model . . . . 42

5.2 Flowchart of RNC buffer model in relation with queueing . . 43

5.3 Switching between transport channels and UE State Transitions 45 5.4 Average Buffering Delays for different services . . . 47

5.5 Buffer filling levels for different services . . . 49

5.6 Average buffer levels for different services . . . 50

6.1 Idle Durations of Buffer during DCH transmission . . . 54

6.2 Average Idle Durations of Buffer during DCH transmission . 55 6.3 Empty Buffer Percentage during DCH sessions . . . 56

(9)

6.5 Achieved Throughput on DCH transmission . . . 59

6.6 Average Achieved Throughput on DCH transmission . . . 60

6.7 Utilisation of Dedicated Channel for different services . . . . 61

(10)

List of Tables

2.1 UE states and Transport Channels with corresponding

achievable bit-rates [27] . . . 10

2.2 Sample tags captured from the traffic capturing tool . . . 14

(11)

List of Acronyms

CN Core Network

CS Circuit Switched DCH Dedicated Channel

DPCCH Dedicated Physical Control Channel DPDCH Dedicated Physical Data Channel DRX Discontinuous Reception

ETSI European Telecommunications Standard Institute FACH Forward Access Channel

FIFO First In First Out FTP File Transfer Protocol GBR Guaranteed Bit Rate

GSM Global System for Mobile Communication IMEI International Mobile Equipment Identity IMSI International Mobile Subscriber Identity ISDN Integrated Services Digital Network LTE Long Term Evolution

MS Mobile Station

MSC Mobile Station Controller NBAP Node-B Application Part PS Packet Switched

PSTN Public Switched Telephone Network QoS Quality of Service

QoE Quality of Experience RAB Radio Access Bearer RACH Random Access Channel

(12)

RAN Radio Access Network RLC Radio Link Control RNC Radio Network Controller

RNSAP Radio Network Application Subsystem Part RRC Radio Resource Control

RRM Radio Resource Management SF Spreading Factor

SGSN Serving General Packet Radio Service Support Node SLA Service Level Agreement

UE User Equipment

UMTS Universal Mobile Telecommunications System URA UTRAN Registration Area

UTRAN UMTS Terrestrial Radio Access Network VLR Visitors Location Register

(13)

Chapter 1

Introduction

Due to ever-increasing users and subsequent network capacity

requirements, resource optimization techniques to ensure optimal use of radio resources in the network to achieve good service quality are under research.

Moreover, the performance of different services in the radio network scenario in terms of network parameters such as user throughput, empty RNC buffer periods and transport channel utilisation are very important to understand the impact of poor resource usage on the system capacity. In addition, unwanted resource occupied by one user in a particular cell leads to poor experienced quality for another user in the same cell due to more delay, latency and jitter in the transmission, caused by inadequate channel capacity.

With the help of some suggestions from [10], related to fundamental limitations of the current state machine design with respect to state transitions and down-switch timer in terms of system overhead and performance, there is a need to emphasize further on performance variations observed during the existence of traffic for different data services in RAN. In this research, considering different services and their traffic from real network traces, the buffer filling is analysed and performance variations in terms of channel utilisation is studied.

1.1

Scope

The performance study conducted in this research will evaluate how different services fill the RNC buffer in live networks with fixed channel

bit-rate considerations. This will be determined by understanding the

(14)

modelled buffer in terms of Cumulative Distribution Function (CDF), mean values and confidence intervals (CI).

The report will demonstrate the obtained traffic characteristics, RNC buffer model and finally illustrate the results obtained from the buffer model with default channel bit-rate considerations, after supplying the epoch timestamps and corresponding packet sizes from real network traces as input. The discussions will be made regarding the bursty behaviour of

the traffic models, empty buffer behaviour and dedicated channel

utilisation.

1.2

Study Prerequisites

For the work conducted in this research, the prerequisites needed were: • Knowledge of the networking protocols used in today’s 3G and 4G

mobile networks.

• Understanding of queuing theory and its application on teletraffic engineering and packet data networks.

• Knowledge of statistical modelling and empirical data analysis with understanding related to cumulative distribution, mean, standard deviation and confidence interval.

An initial study was conducted for four weeks during which a selected number of books and articles were read, which provided knowledge on mobile communication in general, the basics of 3G and 4G networks, the transmission protocols, Radio Access Network (RAN) architecture and queuing theory in general.

1.3

Working Process

The RNC buffer model makes a series of assumptions and

approximations on the behaviour of the mobile networks it is designed to emulate. According to these assumptions and the input traffic data, the model estimates the empty buffer time and DCH utilisation for the users using different services. For achieving the outcomes, the working process as shown in Figure 1.1 is involved.

(15)

Service Name User 1 User 2 User N RNC Buffer Model

Estimation of Buffer and DCH Parameters Trace Files Collected through Traffic Capturing tool Parsed Trace File according to service tags Traffic Data Analysis

Figure 1.1: Working Process

Further explanations on the research methodology and process flow will be explained in detail in Chapter 3.

1.4

Contribution

The major contributions of this thesis work are as follows:

• A methodology for evaluation of RNC buffer filling with real network traces, taking different services into consideration.

• Analysis of traffic data in terms of packet sizes and inter-arrival times for different services and its performance variations during dedicated channel transmissions.

• Presentation of results in terms of empty buffer time, user throughput and transport channel utilisation obtained from modelled buffer to understand radio resource utilisation with respect to RNC buffer and dedicated channel for different services.

1.5

Reader Guidance

The remainder of the report is organised as follows. The background information, key concepts covering 3G network architecture, data trace analysis and related work are explained in Chapter 2. Chapter 3 describes the aim and objectives, followed by the research questions and research methodology.

In Chapter 4, the traffic data analysis from the obtained real network

traces for different services is covered. The RNC buffer modelling with

(16)

subsequent results are discussed in Chapter 6. Finally key conclusions with potential future directions of the research are explained in Chapter 7.

(17)

Chapter 2

Background

2.1

3G Network Architecture

The Universal Mobile Telecommunication Systems (UMTS) is designed to have flexible delivery of any type of service with no requirement of network optimisation for each service [27]. UMTS is evolving to cope with ever-increasing need of wireless data services such as multi-media messaging, video streaming, location based services, mobile commerce and on-line gaming.

This section is organised as follows, Section 2.1.1 explains essential components of WCDMA UMTS network briefly, followed by Section 2.1.2 about Radio Network Controller (RNC) and its modes of operation in terms of buffer behaviour and Section 2.1.3 covers Radio Resource Management (RRM) present in UTRAN for resource control mechanisms.

2.1.1 WCDMA UMTS Components [27]

According to the 3GPP reference network model, UMTS consists of four major network components as follows:

• User Equipment (UE)

• Radio Access Network (RAN) • Core Network (CN)

• External Network (e.g., IP networks, PSTN/ISDN)

The UE is the end-user electronic device such as Android/iPhone, iPad or PC dongle connected to the network through Mobile Station (MS). In addition, the data bandwidth of the UE is significantly limited by the battery capacity of UE due to MS power consumption during wireless data transmission [18].

(18)

In 3GPP and ETSI, the RAN is termed as UTRAN (UMTS Terrestrial

RAN) and this network part is of our research interest. Several

components making up this network will be explained to understand how bits are transmitted over the radio interface.

Circuit-Switched Domain RNC External Network Radio Access Network (RAN) User Equipment (UE) Node B Core Network (CN) Packet Switched Domain PSTN/ISDN IP Network WCDMA

Figure 2.1: Simplified 3GPP UMTS network reference model

The core network is similar to the GSM network having

packet-switched or circuit-switched domains according to external

networks such as PSTN/ISDN or IP networks respectively. In addition, the CN is responsible for switching/routing calls and data connections to external networks, whereas RAN handles all radio-related functionality.

As far as RAN is considered, it is essential to understand the functionalities of the following components,

• Radio Base Station (Node B) • Radio Network Controller (RNC) • Interfaces

Node B

This provides air interface L1 processing such as channel coding and

interleaving, rate adaptation, spreading and so on. Some of the radio

resource management functions like inner loop power control are also carried out by Node B.

Logical functionalities of RNC

Load and congestion control of its own cells and execution of admission control and code control for new radio links to be established are handled

(19)

by the Controlling RNC (CRNC). Whereas, Serving RNCs (SRNC) perform L2 processing of data to/from the radio interface, mapping of Radio Access Bearer (RAB) parameters into air interface transport channel parameters, hand-over decisions and outer-loop power control.

In the same way, the Drift RNCs (DRNC) control cells used by the mobile, macro diversity combining and splitting. A single RNC normally contains all the CRNC, SRNC and DRNC functionalities.

UTRAN Interfaces

Figure 2.2: UTRAN Components and Interfaces 1. UTRAN-CN (Iu)

As can be seen from Figure 2.2, Iu has two different instances, which

differ according to the type of external network. If the external

network is a circuit-switched (CS) network consisting of Mobile Switching Center (MSC)/Visitors Location Register (VLR), the interface is termed Iu-CS. On the other hand, Iu-PS is used in case of a packet-switched (PS) network with Serving General Packet Radio Services Support Node (SGSN). Another interface, Iu Broadcast (Iu-BC), is used for the Broadcast domain of CN, which is not shown in Figure 2.2.

2. RNC-RNC (Iur)

This interface is primarily to enable inter-RNC soft handover, but it has some additional functionalities such as

(20)

(b) Dedicated channel traffic handover; (c) Common channel traffic handover; (d) Global resource management.

The signalling protocol is Radio Network Subsystem Application Part (RNSAP) and it is possible to implement any one of the four Iur modules between two RNCs, according to operators’ requirements. 3. RNC-Node B (Iub)

In case of the Iub interface, traffic termination is one of the main functions and the signalling interface is Node B Application Part (NBAP), which is divided into common NBAP (C-NBAP) for signalling procedures across common signalling links and dedicated NBAP (D-NBAP) used in dedicated signalling links.

4. Node B-UE (Uu)

Finally, the Uu interface is between the RAN and UE, which with the help of MS, transmits data over the radio interface.

2.1.2 Radio Network Controller (RNC)

The RNC plays an important role in maintaining the proper flow of data according to available bit rates over the radio link. Moreover, there are several protocols, which make this process easier to control, as there is a large number of users sharing a particular RNC. It owns and controls the resources in the radio network in its domain and also manages the connections to UE [27]. UMTS Core Network Processor Buffer RNC Node B UE External Network

Figure 2.3: Overview of RNC in UTRAN connecting CN and UE As shown in the Figure 2.3, the RNC processes the packets received from CN by queuing the packets and transmitting with a defined bit-rate,

(21)

which is dependent on the radio link allocation for the user based on the service level agreement (SLA) agreed between the service provider and the

users. However, the attained bit-rates vary over time due to varying

network conditions, transport channel availability and number of users within a particular cell.

2.1.3 Radio Resource Management (RRM)

RRC messages in terms of handovers, cell updates and measurements between UE and UTRAN are performed by the RRM functionalities present in the RAN. There are two basic modes of operation: idle and connected mode. Idle Mode CELL_DCH CELL_FACH CELL_PCH URA_PCH Connected Mode

Figure 2.4: Modes of RRC and CELL States of UE Idle

During idle mode, the UE can receive system information and

broadcasting messages through RRC signaling, but UTRAN has no connection with UE at this point and does not have any information about

the idle mode UEs. However, the connection can be created through

paging (network initiated) or random access (UE initiated). Connected

On the other hand, during connected mode, there can be four possible states such as CELL DCH, CELL FACH, CELL PCH and URA PCH as

shown in Figure 2.4. In these states, CELL represents the current cell,

URA represents the UTRAN Registration Area, under which the RNC can locate the UE. Furthermore, the UE can transmit or receive data through any of the following transport channels as shown in Table 2.1.

During the CELL DCH state, DCH is allocated for the user, which can be mapped to physical channels such as Dedicated Physical Data Channel (DPDCH) or Dedicated Physical Control Channel (DPCCH). This has higher transmission rates to provision high bandwidth services.

(22)

Conversely, during low bit-rates, UE is forced to CELL FACH state. Thus data transmission is achieved through FACH having low bit rates as the channel is shared.

In the CELL PCH state, the user can be contacted through PCH and

the user is known on the cell level in this state. This same scenario is

applicable in URA PCH, except that the user can be known on URA level and paging is over the entire URA.

The channel-switching functions are carried out by Radio Resource Management (RRM) function through Radio Resource Control (RRC) protocol messages. In other words, the UE will be assigned appropriate transport channels, and the data rate is controlled, through RRM.

Table 2.1: UE states and Transport Channels with corresponding achievable bit-rates [27] UE State Transport Channel Practical Bit-Rates CELL DCH Dedicated Channel (DCH) High, up to 2 Mbps

CELL FACH Forward

Access Channel (FACH)

Low, up to 64 kbps

CELL PCH/URA PCH Paging

Channel (PCH)

Only Signalling/Paging

2.2

Data Trace Analysis

This part is organised as follows, Section 2.2.1 explains the way in

which the traces i.e. traffic data are collected and their properties we

determined and Section 2.2.2 covers the important terms used in the report to understand the analysis and how the traffic data analysis on per user basis is performed for different services.

2.2.1 Trace Generation

To address the characteristics of the buffer filling for different services in the RNC of UTRAN, traces are collected from an operating 3G network in a major American city. In addition, the data is collected at the interface between CN and RAN, i.e. Iu-PS using a traffic capturing tool, which is an

(23)

Ericsson tool set to measure and analyse IP traffic.

Furthermore, it processes and classifies traffic online and instead of full traces, only stores traffic statistics at various levels of detail. It should also be noted that the delay or jitter between CN and RAN (which is in the order of a few ms) is not expected to have relevant impact on the study.

This tool classifies the user plane traffic using a set of rules and associated decision logic defined in an XML file. So, during evaluation of the rules, payload of incoming packets is matched against each rule. In addition, the set of rules are freely modifiable and extensible and it also provides a way to filter or process the complete measurement data along pre-defined aspects. For this, each user data flow may have zero or more tags attached to it, as defined by the classification rules.

The traces are collected for every single minute interval for 2 days continuously, which resulted in 2880 trace files each having file size of around 5000 kB containing traces of the packet data traffic and it should be noted that there is no voice data collected, and that packet traffic information is collected from 3G network only.

In addition, each packet is identified using timestamps, TCP/UDP session, source IP address and port number, destination IP address and port number, uplink/downlink, encoded International Mobile Subscriber Identity (IMSI), International Mobile Equipment Identity (IMEI) and service tags.

It should be noted that the link bit-rates exhibited in the radio network

are not known. Furthermore, the information on the network policy

control framework of the network was not possible to obtain because of sensitivity of the information from the mobile operator’s point of view.

So assumptions on channel bit-rates are made and buffer fillings under this scenario for different services are studied.

(24)

2.2.2 Trace Analysis

QoS Classes

Services

Service Sub-Types

Gaming Web-browsing Email ...

Web-browsing-HTTP-Google Social-Networking-SSL-Facebook

... Interactive

Streaming

Conversational Background

Guaranteed Bit-Rate Non-Guaranteed Bit-Rate

Figure 2.5: Differentiation criteria for services from the traffic logs [1] 1. QoS Classes

The QoS class is the differentiation of services in terms of whether it has guaranteed bit-rate or not in the radio network. Each service has its own traffic parameters according to QoS differentiation in terms of priority, packet delay and packet error loss rate. In Section 5.4, the QoS packet delay parameter for each service will be explained in detail.

From the bit-rate considerations observed in the real network scenario, the Guaranteed Bit-Rate (GBR) bearer carries traffic that requires a minimum bit-rate guarantee from the network, while the non-Guaranteed Bit Rate (non-GBR) bearer carries variable bit-rate traffic and is offered as best-effort service by the network [11].

As shown in the Figure 2.6, the conversational and streaming services, which are real-time or GBR services need low packet delay

and loss ratio. On the other hand, non-GBR services such as

background services are considered to be delivered with best effort. Moreover, as the research is related only to the data services in the wireless networks, the conversational services such as voice or video calling are not considered.

2. Services

(25)

complexities, all the major services are only taken out from the trace

files. The service here is termed as functionality in the traffic

capturing tool, which will be an essential parameter to differentiate the packet when it is collected.

According to 3GPP 23.107, the services are differentiated according to their QoS in the following way to understand their characteristics related to this research separately. However, the extent of QoS based prioritization in the input traces is not known. Moreover, this is not relevant for the study, since the analysis is considered with a single user at a time. (a) GBR Streaming • video-playback • audio-playback • media-playback (b) Non-GBR Interactive • instant-messaging • gaming • web-browsing • social-networking • maps (c) Non-GBR Background • email • file-download • advertisement • software-update • file-sharing

It should be noted that media-playback is the real-time streaming with protocols such as RTP, RTSP, whereas video and audio-playback are buffered streaming with HTTP protocol.

3. Service Sub-Types

Furthermore, the tags that are attached to flows are grouped into facets, representing different aspects of the traffic. Facets include

• Functionality

The functionality or service tells the activity type for which the

flow is used and this comprises of social-networking,

web-browsing, instant-messaging, gaming, maps,

software-update, file-download, email, video-playback,

(26)

• Protocol

This tells the protocol carrying this flow such as HTTP, FTP, XMPP, SIP, SSH, RTSP and RTP.

• Service-provider

There are several service providers, who provide services on

different functionalities such as Google providing email,

web-browsing and maps services. So this tells which

service-provider is behind the flow, if there exists

service-provider information in the packet data. • Client-application

Similar to service providers, the same service can be accessed through different applications such as web-browsing through Mozilla Firefox, Chrome or Internet Explorer.

• Encryption

Most of the secure services need encryption, so as to ensure the

data security in terms of confidentiality, integrity and

authenticity by enabling SSL for the data transmission. The

data security and protection in the radio network is achieved through Packet Data Convergence Protocol (PDCP), which

provides header compression algorithms for IP packets. In

addition, these algorithms can be negotiated during RRC Radio Bearer (RB) establishment or reconfiguration procedures [27]. • Encapsulation

Additionally, encapsulation is also found in some services to secure the transmission further to protect the data from intruders.

For example a flow can be characterised like sample tags given in the Table 2.2.

Table 2.2: Sample tags captured from the traffic capturing tool

protocol functionality service-provider client-application encryption HTTP social-networking Facebook Mozilla-Firefox SSL HTTP video-playback Apple iPhone-Media-Player -RTSP media-playback - -

(27)

-IP PACKETS BURSTS SESSIONS time (s) time (s) time (s) Burst Sizes (bytes) > 200 ms S1 B1 S2 > 300 s Session Sizes (bytes) Burst Duration B2 Session Duration USERS time (s) U1 U2 B3

Figure 2.6: Essential terms and their definitions with respect to traffic [11] 4. IP Packets

The major information of IP packets from the traces such as epoch

timestamps and IP packet sizes will be analysed for any

regularities/irregularities in the traffic flow for different services. 5. Bursts

It is important to understand the term bursts, which is assumed to be a set of one or more IP packets arriving with inter-arrival time

less than 200 milliseconds as shown in Figure 2.6. Even if it is a

single packet with no packets accompanying it with inter-arrival time less than 200 ms, then that particular packet is also considered as a burst.

It should be noted that, the inter-arrival time of packets within a burst can be assumed with different values other than 200 ms such as 2 s, 5 s or 10 s and so on for different services depending on the assumptions on user behaviour, but it is assumed to have a fixed value in this study i.e. 200 ms for all the services to reduce

complexity in comparison and analysis. In addition, this value is

(28)

and related analysis on the traffic data. So, if the packet inter-arrival time is more than 200 ms, then it will be considered as the end of the current burst or start of the next burst.

It is interesting to know about the characteristics of the bursts in terms of inter-arrival times, duration and size of bursts for different

services in the radio network scenario. In addition, numerous

research work state the principle of bursty behaviour in packet arrivals for most TCP services, rather than regular inter-arrivals of packets.

6. Sessions

For a single user, there may be continuous flow of packets for a certain time period or intermittent gaps between the packet flows, when a single service is considered. Thus, as shown in Figure 2.6, a session is termed as the traffic during downlink data transmission

with no inactivity for about 300 seconds. If there is such an

inactivity, the session is assumed to terminate and new session for the same user starts again with arrival of packets belonging to the same service considered.

7. Users

If a particular service is considered, the whole trace file is checked with the help of tags, for the users who use this service. This information is used for further investigating into the flow of packets towards the user for different services.

After the differentiation of services with the aforementioned criteria, the research is carried out on analysing several parameters both from the traffic and buffer model implemented. Finally, the analysis of essential parameters to understand the radio resource utilisation is also made.

2.3

Related Work

The ever-increasing need for high-bandwidth applications accessible through 3G and LTE networks widens the research opportunities in analysing existing network scenario and identifying possible quality enhancements and resource optimization procedures in the radio networks. In addition, there are various work related to performance measurements with the help of emulation of a real network and analysis of several parameters involving quality improvements in the wireless networks.

(29)

RNC Buffer Related Work

In [19], analysis of TCP performance with respect to RLC buffer size is analysed, with the help of simulations carried out resembling the real radio networks and there are reflections of TCP congestion control mechanisms such as slow start (exponential growth) and congestion avoidance (linear growth). The ETSI discrete event simulation model is proposed to study the Discontinuous Reception (DRX) mechanism exercised between the network and MS to study the inactivity timer threshold and DRX cycle

[14]. In addition, the expected waiting times, queue length and power

saving factor are also analysed in [14].

A research work related to usability of instant messaging service over a 3G WCDMA network gives the technical performance analysis and usability evaluations of the radio network controller under different network set-ups [25]. An analysis related to link throughput according to changes in the buffer size by varying TCP flavour (Tahoe, Reno, NewReno or SACK), FTP file size, RLC buffer size and DCH data rates is conducted in [23]. The performance of TCP over dedicated channels with different bit rates and different transmission time intervals (TTI) is examined to understand end-to-end packet delay, delay in the radio access network and throughput in the wireless link [17].

RRM Related Work

The findings in [10] suggest the fundamental limitation of the current state machine design with respect to transitions and timer values in UMTS

network. The up-switching threshold (bytes) and down-switching timer

(seconds) for transport channel switching are considered to be static leading to consideration of all traffic with same characteristics leading to the difficulty in balancing the trade-off between network essentials in terms of network management, system overhead and performance.

Some of the accessibility issues such as termination failures and frequent user registrations are studied to understand the performance of the network according to user types and device types in [9].

In addition, resource utilization in terms of channel switching is an

important consideration, under which there are various algorithms

proposed to meet the specifications of RNC and evaluations are made with the help of simulations. Furthermore, several impacts of parameter settings on performance with respect to packet loss probability and utilisation of

dedicated channels are analysed in [16]. Moreover, the behaviour of

(30)

of blocking rate, mean packet delay and cell throughput to decrease the number of blocked calls keeping other metrics at a satisfactory level [24].

Even though there are numerous works in the radio resource and performance analysis, this research aims at studying in detail the RNC buffer filling with fixed channel bit-rate conditions, taking the most widely used data services existing in wireless 3G and LTE networks into consideration.

(31)

Chapter 3

Research Methodology

This chapter is organised as follows: Section 3.1 explains the aim and objectives, Section 3.2 gives the guiding questions to be addressed and motivation behind the research and Section 3.3 describes the research methodology handled in order to fulfil the goals of the thesis work.

3.1

Aim and Objectives

The goal of this thesis work is to investigate how traffic from real, operating networks impacts the buffer filling in the radio network nodes. The objectives to achieve this goal are to

• analyse packet traces from real networks;

• fit a parameterized model of IP packet inter-arrival times and IP packet sizes to the existing packet traces, taking into account different services;

• implement and analyse different parameters of the RNC buffer model; • evaluate buffer filling for users using different services in the radio

network, in terms of resulting parameters of the model;

• with the resulting level of buffer filling, analyse radio resource utilization and radio network performance in terms of RNC buffer and DCH parameters for different services.

3.2

Research Questions

The leading questions that should be addressed in this research work are • RQ 1: What are the variations in terms of inter-arrivals, durations

(32)

• RQ 2: How long does the RNC buffer show empty buffer levels during DCH transmission for different services?

• RQ 3: How do different services perform on dedicated channel data transmission in terms of user throughput and channel utilisation? The first question is mainly to find out the distribution of the traffic models supplied to the buffer as input to understand the characteristics of the data traffic obtained.

The second question is framed to address how different services incur empty durations in the RNC buffer due to intermediate inactivity during

dedicated channel transmission according to the channel bit-rate

conditions assumed. In addition, this is essential to gather information

about the performance of different services in the radio network in terms of buffer utilisation.

From the third question, the analysis will reflect the radio resource utilisation with respect to dedicated channel for different services.

3.3

Research Methodology

The research work comes under the category of empirical data analysis and it deals with traffic data analysis of obtained traces with respect to different services and further investigation related to the radio network buffer filling for different services. The following describes the steps carried out to obtain the necessary outcomes of this research as shown in Figure 3.1.

1. The data traffic is analysed to get the knowledge of obtainable parameters from the trace files.

2. The traces are classified according to different services so as to be analysed further in terms of important parameters of the traffic and this is mentioned in Section 2.2.

3. From the traces, the packet sizes and inter-arrival times are examined for different services and bursts of the data traffic is also analysed, so as to understand the regularities or irregularities of bursts in traffic for different services.

4. The RNC buffer is modelled with a series of assumptions and approximations to understand how buffer performance is affected by different services in a real RNC.

5. The obtained traffic separated as sessions for different services are supplied as input to the buffer to evaluate the buffer filling.

(33)

6. To validate the buffer model, the buffer levels achieved and packet delays occurred due to buffering are estimated for different services. 7. During DCH transmission, the empty buffer times and percentage of

empty time durations are obtained for different services and this helps to understand how different data services perform in the radio network scenario.

8. The radio resource utilisation is studied in terms of obtained user throughput and channel utilisation on the DCH link for different services from the buffer model.

Traces obtained from Traffic Capturing Tool

Encoded user IMSI + (IP packet sizes and epoch

timestamps)

Service / Functionality

*Burst Characteristics: (Inter-arrival times, durations and sizes)

**Session Characteristics: (Duration and Data

Volume) Session-wise traffic data file RNC Buffer (Leaky-bucket) ***DCH ****FACH Buffer Parameters: (Buffer levels, Buffering packet delay) DCH Parameters: (Empty buffer time,

User throughput, Channel utilisation) * - Bursts are assumed to be one or more IP packets with inter-arrival time less than 200 ms

** - Sessions are traffic flows towards a user with no inactivity greater than 300 s, after which session ends *** - Dedicated Channel with high bit rates up to 2 Mbps with exception of background services having fixed 512 kbps **** - Forward Access Channel with low bit rates because of the shared nature of the channel

Traffic Data Analysis

RNC Buffer Modelling & Analysis

Transport Channels

Figure 3.1: Step-by-step flow of the research work

In [10], real network traces are used for evaluating the improvement of energy levels in the UE by leveraging an existing feature called fast

dormancy supported by 3GPP specifications. The real network traces

obtained for our research work contain additional details in terms of traffic parameters to understand the buffer filling at radio network part for different data services.

(34)

Chapter 4

Traffic Data Analysis

The obtained packet traffic data is analysed by classifying the services under their corresponding QoS classes as mentioned before, so as to understand the inter-arrival times and packet sizes for different services.

Some of the major parameters needed to understand the traffic

characteristics of different services are also explained in this section.

4.1

Service Distribution

Primarily it is essential to know the amount of each service traffic present in the collected traffic data. The sessions considered for different services vary in the amount of data transmission and time duration. As mentioned before, the session ends after 300 s of inactivity. So, the total data volume, total number of sessions and total duration of the session are estimated for each service.

Total Data Volume [%]

The data volume of a session is calculated by summing up the IP

packet sizes during that particular session. The percentage total data

volume for each service is estimated using the ratio between the total data volume calculated from all the sessions of a particular service and total data volume for all the services present in the trace file.

The percentage of total data volume is calculated so as to ensure clarity in the picture as shown in Figure 4.1. It is evident from Figure 4.1 that, almost all the streaming, file-download and web-browsing services show larger data volumes than other services.

Total Number of Sessions [%]

The total number of sessions for a service in % is the ratio between the number of sessions for that particular service and the total number of

(35)

sessions for all the services. As can be seen from the Figure 4.1, web-browsing, social-networking, instant-messaging and email show a comparatively large number of sessions.

0 20 40 60 80 100

Total Data Volume[%]Total Number of Session[%]Total Session Duration[%]

% of total

Details of Service Sessions

YouTube web-browsing video-playback software-update social-networking media-playback maps instant-messaging gaming file-sharing file-download-.*-iTunes-iTunes file-download-.*-Android-Market-Android-Market email audio-playback advertisement

Figure 4.1: Service Distribution Total Session Duration [%]

In addition to the above analysis related to total data volume [%] and total number of sessions [%], the total session duration [%] for different

services is also important. It is calculated from the ratio between the

duration of all the sessions of a particular service and total session

duration of all the services. It is evident from the Figure 4.1 that,

web-browsing, social-networking, instant-messaging, email and

advertisement show longer durations of sessions than other services. This is similar to that of the total number of sessions [%].

In short, all the streaming, web-browsing, maps and file-download services have shorter session durations and lower number of sessions, but transmit larger data volume than social-networking, instant-messaging, email and advertisement services.

4.2

IP Packet Characteristics

4.2.1 Packet Sizes [SP]

The characteristics of the traffic flow can be understood from the packet sizes and inter-arrival times for different services.

(36)

Figure 4.2 gives an overview of packet sizes in the form of CDF plot, from which almost all GBR streaming services are found to have 80% of packet sizes on 1448 bytes, other than media-playback which has varying packet sizes between 52 and 1448 bytes.

Figure 4.2: Packet sizes for different services

In case of non-GBR interactive services such as gaming,

instant-messaging and social-networking, 60% packet sizes are found to be 52 bytes, whereas web-browsing and maps show packet sizes of 1448 bytes

(37)

for roughly 70% of the values.

So there exists notable diversity within this group and this may be due to the services such as web-browsing and maps sending large chunks of

data towards the user. On the other hand, services such as

instant-messaging and social-networking send small chunks of data most of the time, when the user is connected to the network and accessing these services.

Similar behaviour to that of streaming services is observed in case of file-download and software-update services, whereas advertisement and

file-sharing show packet sizes of 52 bytes in 50% of the values. It is

interesting to look at the file-sharing services, which show small packet sizes probably due to signalling in the network.

4.2.2 Inter-arrival Times [IP]

As can be seen from Figure 4.3, similarities among services in terms of inter-arrival times are observed. It is evident from the Figure 4.3 that roughly around 70% of inter-arrival times are less than 200 ms for almost all the services and this implies that there are more packets as bursts, according to our assumptions, from the traffic data obtained.

(38)

Figure 4.3: Inter-arrival times between packets for different services

4.3

Burst Characteristics

It is important to evaluate the characteristics of bursts of packets for different services, before analysing the buffer filling at the radio network, in order to get a clear picture on the data volume sent as packet bursts. This might vary with respect to different services. This analysis has been carried out based on the assumption of burst inter-arrival times greater than 200 ms.

(39)

Thus the first research question on analysis related to bursts, is addressed in this section. This deals with the study of bursty behaviour of packet arrivals in terms of burst inter-arrival times, durations and sizes taking different services into consideration.

4.3.1 Burst Inter-arrival Times [IB]

The formula used for calculating this value is as follows,

InB= tBs,n− tBe,n−1 (4.1) where,

InB - Inter-arrival time of burst n in seconds

tBs,n - Epoch time stamp of first packet or start of current burst

tB

e,n−1 - Epoch time stamp of last packet or end of previous burst

It should be noted that, the inter-arrival times between bursts have a minimum value of 200 ms, below which the packets are considered as bursts. In addition, there is a maximum value of 300 seconds, above which the session is considered to be terminated and new session will commence with arrival of packets of the service considered.

It can be observed from Figure 4.4 that GBR-streaming services, interactive services except instant-messaging and background services except advertisement and file-sharing show most of the inter-arrival times between bursts less than 1 second.

Moreover, instant-messaging and advertisement have roughly 60% of

the burst inter-arrival times less than 1 second. However in case of

file-sharing, there is only 40% of the inter-arrival times are less than 1 second.

(40)
(41)

advertisement audio-playback email file-download-.*-Android-Market-Android-Market file-download-.*-iTunes-iTunes file-sharing gaming instant-messaging maps media-playback social-networking software-update video-playback web-browsing YouTube 0 2 4 6 8 10 12 14 Services

Inter-Arrival of Bursts [seconds] Mean Inter-Arrival Time between Bursts

Figure 4.5: Mean Inter-Arrival Time between Bursts

In addition, the mean value of the burst inter-arrivals are calculated with the confidence intervals as shown in the Figure 4.5, which has most of the services showing the inter-arrival time roughly around 1 second, which is relatively high in case of instant-messaging and file-sharing having values more than 5 seconds.

4.3.2 Burst Durations [DB]

It is important to understand the duration of how long the burst exists for different services, which may be regular or irregular according to the type of service and also the conditions in the network during data collection. This is calculated from the formula,

DnB= tBe,n− tBs,n (4.2)

where,

DnB - Duration of burst n in seconds

tBe,n - Epoch time stamp of last packet or end of current burst

tBs,n - Epoch time stamp of first packet or start of the current burst

From the Figure 4.6, media-playback is found to have short duration of bursts i.e. less than 1 ms in roughly around 50% of the values. This might be because of real-time streaming causing short duration of bursts or

(42)

individual packet arrivals in case of media-playback.

As shown in Figure 4.6, most of the other services show a duration of bursts in the range of 200 ms and 1 second, which is observed in more than 70% of the bursts for almost all the services except advertisement and software-update, which show around 40% of the burst durations more than 1 second.

Figure 4.6: Duration of Bursts for different services

(43)

implies that most of the services have duration of bursts less than 5 seconds, but advertisement and software-update show comparatively long burst durations. advertisement audio-playback email file-download-.*-Android-Market-Android-Market file-download-.*-iTunes-iTunes file-sharing gaming instant-messaging maps media-playback social-networking software-update video-playback web-browsing YouTube 0 50 100 150 200 250 300 Services

Duration of Bursts [seconds] Mean Duration of Bursts

Figure 4.7: Average Burst Durations

4.3.3 Burst Sizes [SB]

The constraint that groups the packets m,m+1...m+N in a single burst, is that every packet fulfils the following condition,

tPm+1− tPm< 200 ms (4.3)

where,

tPm+1 - Epoch timestamp of the next packet, in seconds

tPm - Epoch timestamp of the current packet, in seconds

Even though most of the services show almost similar behaviour in terms of burst inter-arrivals and durations, the size of bursts are found to vary according to the type of service. This value is calculated as follows:

SnB= SmP+ Sm+1P + · · · + Sm+NP (4.4)

where, SB

n - Data Volume or Size of the burst n, in bytes

(44)

number of packets in the burst), in bytes

Figure 4.8: Burst sizes for different services

As shown in Figure 4.8, GBR streaming services such as audio and media playback show around 80% of the burst sizes in the range of 1448 bytes and 10 kB, whereas video-playback is found to have around 80% of the burst sizes between 1 kB and 1 MB. The reason behind this characteristics emphasizes the larger contents sent as bursts in case of

(45)

video-playback than the audio and media-playbacks.

In contrast, non-GBR interactive services such as instant-messaging and gaming have most of the bursts in the range of 52 and 1448 bytes, which is because of single packets as bursts most of the time. However,

maps, social-networking, web-browsing, email, advertisement and

software-update show burst sizes between 100 bytes and 100 kB in roughly 70% of the values.

Conversely, file-sharing service is observed to have lower burst sizes most of the time showing less than 100 bytes of burst sizes in 70% of the obtained values, which is contradictory to file-download iTunes showing 40% and file-download-Android showing roughly around 80% of the burst sizes in the range of 1 kB and 10 kB.

Eventhough the presumption was like all the file-download services have similar characteristics in downloading, the obtained results from burst sizes for different services show varying characteristics.

advertisement audio-playback email file-download-.*-Android-Market-Android-Market file-download-.*-iTunes-iTunes file-sharing gaming instant-messaging maps media-playback social-networking software-update video-playback web-browsing YouTube 0 50 100 150 200 250 Services Burst Sizes [KB] Mean Burst Sizes

Figure 4.9: Mean burst sizes for different services

From the Figure 4.9 above, most of the services have burst sizes less than 50 kB, but GBR streaming services except media-playback have bursts of sizes between 50 and 100 kB and software-update service has larger bursts in the range of 100 to 200 kB.

(46)

4.4

Session Characteristics

4.4.1 Duration of Sessions [DS]

The following analysis is related to understanding the length of sessions for different services. From the following Figure 4.10 showing the duration of sessions in minutes, it is evident that almost all the services have most of their session durations approximately less than 100 minutes.

It is interesting to note that, around 70% of the streaming and file-sharing services show session durations between 1 and 100 minutes, which is higher than interactive services and background services.

(47)

Figure 4.10: Durations of Sessions for different services

4.4.2 Data Volume Transmitted per Session [SS A]

For each session the data volume transmitted in kB is calculated by summing up the IP packet sizes during that session for different services.

From the following Figure 4.11, the GBR streaming services are found to have 70% of the sessions with data volumes in the range of 10 kB and 100 MB.

(48)

Figure 4.11: Data Volume per Session for different services

Conversely in case of non-GBR interactive services, instant messaging shows around 80% of the sessions with session data volume less than 10 kB, followed by gaming and social-networking with 80% session data volume in the range of 1 kB and 100 kB. However, maps and web-browsing services show around 60% of the sessions with data volumes between 10 kB and 10 MB.

In case of background services roughly around 80% of the sessions have session data volumes below 100 kB, other than file-download-Android

(49)

showing 70% of the sessions having data volume ranging from 1 MB to 10 MB, which is observed to transmit highest volumes of data per session from the obtained traces.

From the analysis related to session data volumes, it is clear that GBR-streaming services achieve larger data volumes than other services, which may be because of the bulk data sent towards the user during each session in terms of streaming services.

4.4.3 Clean Service Traffic Percentage [CS]

It should be noted that the traffic data considered for different services,

may possess other services also in the bursts of packets, due to

simultaneous access of different services at the user side.

Moreover, the interest on clean traffic percentage is mainly due to improve the understanding on how traffic data for different services show clean service packets in the bursts. In other words, there are possibilities that the bursts of packets of a particular service may have a few packets belonging to other services.

So, the percentage of packets belonging to a particular service during a session is calculated to understand this value from the obtained traffic

data. Here, the term session has the same definition as mentioned in

Section 2.2.2. This also helps us to ensure how reliable different traffic

data from the traces, representing the services under consideration.

This is calculated by finding the ratio between amount of data

transmitted as clean service packets only during a session SCS and total

data volume transmitted during the session SAS.

CS = S S C SS A × 100% (4.5) where,

CS - Clean Service Traffic Percentage per session

SCS - Amount of data transmitted as clean service packets per session

SAS - Total data volume transmitted or summation of all packet sizes per

session as explained in Section 4.4.2

So, the higher the value of CS, cleaner the service is. The mean clean

(50)

confidence interval is plotted in the Figure 4.12 below, showing most of the

services achieve CS greater than 75%.

advertisement audio-playback email file-download-.*-Android-Market-Android-Market file-download-.*-iTunes-iTunes file-sharing gaming instant-messaging maps media-playback social-networking software-update video-playback web-browsing YouTube 0 20 40 60 80 100 Services Clean Bursts [%] Percentage of Clean Bursts per User Session

Figure 4.12: Mean Clean Service Traffic Percentage for different services

4.5

Summary

To put it in a nutshell, the traffic data analysis is essential to understand the behaviour of the flow of traffic for different services in terms of packet sizes, inter-arrival times, bursts and sessions. Some of the points to remember from this analysis are as follows:

• Packet sizes obtained from the traces are mostly 52 and 1448 bytes, for which different services share these sizes in different proportions, depending on their corresponding data volume transmitted.

• In case of inter-arrival times, except file-sharing, which has

approximately 60% of its inter-arrival times greater than 200 ms, other services show lower inter-arrivals than 200 ms most of the time leading to conclusion that large number of packets are transmitted as bursts of packets with our assumption of 200 ms.

• When it comes to bursty behaviour of the TCP traffic, most of the services show bursty arrival of packets in 90% of the traces. Furthermore, services such as advertisement, software-update and gaming show higher proportion of mixture of other services also in

the bursts than other services. However, most of the sessions

considered for different services show more than 75% clean service packets and helpful for analysis on each service separately.

(51)

• Most of the user sessions considered are found to have their durations below 1 hour, but still there are some sessions which last for longer durations than an hour.

• The total data volume transmitted to the users during their sessions is dependent on the type of traffic, since different services have varying size in the amount of data sent. Thus, there exist relatively high data volumes in case of streaming and file-download services.

For the subsequent study on buffer filling, the analysis related to burst

characteristics is of major importance, because it is helpful in

understanding the traffic data filling buffer, given the inter-arrival times and sizes of bursts. Moreover, the traffic profiles for different services and their properties in terms of several parameters serve the purpose of deducing their traffic behaviour in the radio networks in general.

(52)

Chapter 5

RNC Buffer Modelling

This chapter is organised as follows: Section 5.1 gives an overview on how the buffer is modelled explaining how the input from the obtained traces is handled, and an example scenario to understand how the output parameters are estimated from the buffer model. Section 5.2 explains the major design assumptions and approximations made for the buffer model. Section 5.3 describes the transitions in the play-out rates of the RNC buffer due to link bit-rate considerations when there is a switching between channels. Section 5.4 is intended to provide the validation of the model by explaining the possible packet buffering delays and how it conforms with QoS packet delay budget for different services. Finally, Section 5.5 describes the achieved buffer levels and its relationship with the burst sizes for different services.

5.1

Trace-Based Simulation Buffer Model

The real network data obtained has been differentiated into

session-wise traffic data files for each service. In addition, as mentioned before sessions are active periods containing downlink data traffic for users under each service.

From this traffic data, each packet data in terms of epoch timestamp and packet size for different services is given as input to the buffer. However, each packet will be serviced according to the bit-rate in the channel existing at that particular moment of packet arrival.

The UE is considered to be Idle during every session initiation and the major parameters affecting buffer filling are the channel bit-rates and

switching considerations, which are set as default for our study.

Furthermore, according to the 3GPP Release 7 as mentioned in [27] the conditions for channel switching and bit-rates for both dedicated channel (DCH) and forward access channel (FACH) in the pseudo code are

(53)

as follows:

At the point of a packet arrival, INITIAL CONDITIONS

If UE is Idle:

Channel = DCH and TransmissionRate = 512 kbps; If UE is not Idle and Channel == DCH:

TransmissionRate = 512 kbps;

If UE is not Idle and Channel == FACH: TransmissionRate = 16 kbps;

CHANNEL UPSWITCHING

If UE is not Idle, Channel == FACH and BufferLevel > 512 bytes:

Channel = DCH and TransmissionRate = 512 kbps; CHANNEL DOWNSWITCHING

If UE is not Idle, Channel == DCH and Emptytime > 3 seconds: Channel = FACH: TransmissionRate = 16 kbps;

SERVICE-DEPENDENT CHANNEL UPSWITCHING ON QoS

If UE is not Idle and Service is Streaming/Interactive and TransmissionTime > MaxAccDelay :

TransmissionRate = BufferLevel/MaxAccDelay

where, MaxAccDelay is the maximum acceptable packet delay caused in the network and acceptable for the user and it

differs for different services. It takes the value of 1

second for streaming and 400 milliseconds for interactive according to [13] on QoS requirements.

If 512 kbps < TransmissionRate < 1 Mbps: TransmissionRate = 1 Mbps;

else

(54)

0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 A1 A2 A3 D1 D2 D3 A4 D4 IP Packet Arrivals & Departures Buffer Filling Empty Time Empty Time Buffer Levels Packet Buffering Delay 0 1 2 3 4 5 6 7 Channel Switching User Throughput DCH FACH

Figure 5.1: Calculation of different parameters of the buffer model As shown in Figure 5.1, if there is an arrival of packet, it will fill the buffer and gradually the buffer level decreases according to the rate of transmission through the channel allocated during that particular state of UE. These buffer levels are important to understand, how different services remain in the RNC buffer, given the transmission rates and switching conditions according to our model. Furthermore, some of the services may cause the buffer levels to increment quickly due to large burst sizes, whereas other services may show low levels due to smaller burst sizes.

Moreover, there may be empty times, during which there are no data in the buffer and it is measured during DCH transmission only, since the resource allocated during dedicated channel transmission is relatively high and needs optimisation also. On the other hand, FACH transmission is shared and it has low bit-rates and less resource allocation, since many users share the channel simultaneously.

In addition, the packet buffering delay is measured using the value obtained as the difference between the time of arrival of packet in buffer and time of the packet leaving the buffer totally.

This packet buffering delay is an important factor because, the buffer should not take longer time to process the packets, since the end-to-end packet delays should be within the acceptable limit for delay-sensitive services. This has been used for validation of the model and the results will be explained in Section 5.4.

(55)

during each DCH session for different services, to understand the achieved throughput in the DCH transmissions. This is estimated from the ratio between number of bits transmitted and total time period on DCH.

Additionally, the DCH Utilization has been calculated for every DCH session according to the channel bit-rate assumptions, which are presented in Section 6.2.2.

Further explanation on estimation of these parameters in detail with the help of formulae are given in the following sections with the results obtained, when the buffer model is supplied with the real network traces.

5.2

Design Assumptions

For ease of analysis and simplicity, a leaky-bucket buffer model having a random rate of arrival of packets and deterministic rate of departure of packets is chosen. However, the play-out rates set by the buffer depend on UE states as mentioned in Section 5.1.

Packet Arrival Empty RNC Buffer Move Packet to RNC buffer Previous Packets Serviced

Wait until previous packets are serviced

Send Packet No

Yes

No

Yes

Figure 5.2: Flowchart of RNC buffer model in relation with queueing As shown in Figure 5.2, the RNC buffer model can be understood as a First-In-First-Out (FIFO) queuing model with the play-out bit-rate

(56)

depending on the channel bit-rate at the moment of packet arrival. The time at which the packet is fully serviced is calculated as follows:

tpd= tp−1d + tps (5.1)

where,

tpd - Epoch time stamp of the complete packet departure from the buffer, in

seconds

tp−1d - Epoch time stamp when the previous packet is serviced (if the

packet arrives at empty buffer, this time is the packet arrival time), in seconds

tps - Time taken to service the packet fully, in seconds

The time taken to service a packet is calculated from the following formula,

tps = S

p

BCH (5.2)

where,

Sp - Packet Size, in bits

BCH - Transmission bit-rate depending on the transport channel allocated,

in bps.

5.3

Transport Channels and State Transitions

As mentioned in the Section 2.1.3, the transport channels such as DCH and FACH are allocated by the RNC, to attain data transmission according to the data in buffer. As can be seen from the Figure 5.3, there are two modes of operations according to the activity of data transmission through different transport channels and the channel switching is dependent on parameters such as

• Up-switch Threshold • Down-switch Timer • Inactivity Timer

(57)

512 Kbps

Mode:Idle CELL_DCH

CELL_FACH Down switch timer:

no traffic for 3 seconds

Up switch threshold: buffer level > 512 bytes No traffic for 300 seconds (Session Termination) Up-switch trigger

buffer level > 1 byte

16 Kbps Mode:Active

1 Mbps 2 Mbps

Inactivity timer: Packet Buffering Delay >

Maximum Acceptable Delay ( Up-switch Streaming & Interactive

only)

Figure 5.3: Switching between transport channels and UE State Transitions If there is no data transmission between the UE and CN for a while i.e. the UE is Idle and there is a packet arrival, the transport channel primarily allocated will be DCH, which makes the UE to enter into CELL DCH state.

During this state, the UE is capable of sending large chunks of data with good QoS and bit-rates, since the user is allocated with a dedicated channel at 512 kbps, which is an assumption on the initial bit-rate for our study. Furthermore, it can reach higher values upto 2 Mbps according to the packet buffering delay in case of streaming and interactive services.

It should also be noted that, if the data rates are increased, the power and cost incurred will also be increased accordingly. In 3G, the UE power consumption values are found to be around 30 mW in case of power saving modes such as CELL PCH and URA PCH, 400 mW in case of CELL FACH and 800 mW in case of CELL DCH state. In other words, CELL FACH state consumes only 50% of power than the CELL DCH state [18].

However, as FACH is a shared channel among several users, the bit-rate cannot be guaranteed and it is assumed to have 16 kbps bit-rate, and it will be allocated only if the user can be served with low data rates. Yet it can be shifted up to DCH when the buffer level is increased to higher values than 512 bytes of data.

From the understanding gained from the 3GPP standards Release 9 [27], the practical bit-rate assumptions through DCH and FACH has been

References

Related documents

As we noticed on page 101, the Z-transform can be converted to the discrete time Fourier transform by a simple change of variable.. 6.6 Using Laguerra Functions and FFT to Com-

In Panel (b) we show the maximum OOS cross-sectional R 2 attained by a model with n factors (on the x-axis) across all possible values of the prior root expected SR 2 (κ) for

Initiated in 2009, The Empty Gallery Interviews is an ongoing series and probes the rituals associated with making, exhibiting and viewing within a diverse range of gallery

Abstract: Based on the need for distributed end-to-end quality management for next generation Internet services, this paper presents a ready-to-deploy quality assessment concept for

Although this study shows no significant difference between partograph well plotted or not compared to mode of delivery, likely due to an insufficient number of patients, could

Reaction to fire performance (as predicted time to flashover) before and after accelerated ageing according to NT FIRE 053 Method A and B, and after

These statements are supported by Harris et al (1994), who, using MBAR methods, find differ- ences in value relevance between adjusted and unadjusted German accounting numbers.

When an offer is activated to solve congestions issues, RTE may pay an extra cost for this kind of balancing operations.. For an upward balancing operation, the