Anda di halaman 1dari 45

Course Name

P-1

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-2

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-3

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-4

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-5

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-6

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-7

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-8

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-9

Traffic model includes two factors

Service Model: Analyze the data rate for each service type to determine the average throughput for single user User behavior: Analyze the user distribution to get the throughput of each TRx

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-10

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-11

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-12

Real Time Gaming: Low bit rate, real-time, high burst, asynchronous, asymmetric uplink and downlink traffic, and interactive. VoIP (Voice over IP) and video conference: The bit rate is between low bit speed and middle bit speed, real-time, synchronization, symmetric uplink and downlink traffic, and interactive.

Streaming media: The bit rate is between low bit rate and middle bit rate, not in real time, low delay shaking, synchronization, asymmetric uplink and downlink traffic, non-interactive.
IM and WWW network browsing (basic Internet application): The bit rate is between low bit rate and middle bit rate, no information loss, asymmetric, asynchronous uplink and downlink traffic, middle delay, and interactive. File transmission and media download: The bit rate is between low bit rate and middle bit rate, no information loss, low priority, non-real time, asymmetric, and asynchronous uplink and downlink traffic.

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-13

Some parameters are related with traffic mode


PPP session time: the duration of each session RRC connected time: the RRC connected time in each session Packet transmission time: the packet transmission time in each RRC connection Ratio of RRC to PPP = RRC connected time/PPP session time Ratio of Packet to RRC=Packet transmission time/RRC connected time

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-14

One session includes many packet calls, and one packet call includes many packets.

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-15

Considering single voice user, the entire service period falls into OFF and ON periods. In the ON period, users send fixed size packet in fixed time and generate voice data. In the OFF period, no data is generated. Various applications such as voice, video and data, form video meeting service frames through different protocol stacks.

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-16

The Web model is the most complicated in all models. The measurement for HTTP services indicate that large web pages are formed by relatively small objects. That is

to say, each page consists of some web embedded objects, such as main page,
embedded image, and embedded Java program.

In a package call, package service characteristics are related to the Web server and browser HTTP version. Currently, HTTP/1.0 and HTTP/1.1 are used. The maximum difference of the two versions are that the TCP connection of transmission layer of main object and embedded object are different.

In HTTP/1.0, each main object and embedded object of the Web page download use
different TCP connections. In the browsing process of most customer terminals, embedded objects use multiple TCP connections at the same time, which is called HTTP/1.0 - burst mode transmission. Meanwhile, the maximum TCP number can be connected is configurable. Most browser is set to 4. When the embedded object exceeds the number, a new TCP connection is set up, and the original connection is built. TCP overhead and congestion control is based on each object.

In HTTP/1.1, consecutive TCP connections are used to download object. That is, the transmission object connected in serial on a single TCP connection is called HTTP/1.1 -consecutive mode transmission. TCP overhead and congestion control are based on

each connection.

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-17

Outlook email is used mostly on the market. The outlook transmission is dependent on remote procedure call (RPC) and uses complex protocols. When invoking the Outlook, there are 11 activated TCP connections. Each email processing consists of multiple MAPI segment elements. Each MAPI segment processing can be divided into more specific segments

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-18

PPP: Peer-Peer Protocol

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-19

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-20

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-21

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-22

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-23

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-24

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-25

Single User Throughput in Busy Hour = PPP Session Time (s) x PPP Session Duty Ratio x Bearer Rate (kbit/s) x [1/(1 - BLER)] x BHSA x Penetration Ratex1 Peak to Average Ratio/3600 According to the Erl, single-user busy hour throughput of VoIP service =Erl x Mean Bit Rate (kbps) x BHSA x Penetration Rate

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-26

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-27

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-28

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-29

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-30

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-31

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-32

SFBC: Space Frequency Block Coding

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-34

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-35

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-36

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-37

PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering function. RLC: Radio link control protocol MAC: Perform scheduling control function

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-38

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-39

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-40

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-41

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-42

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-43

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-44

Confidential Information of Huawei. No Spreading Without Permission

Course Name

P-45

Confidential Information of Huawei. No Spreading Without Permission

Anda mungkin juga menyukai