Course Name
Confidential Information Information of Huawei. No Spreading Without Permission
P-1
Course Name
Confidential Information Information of Huawei. No Spreading Without Permission
P-2
Course Name
Confidential Information Information of Huawei. No Spreading Without Permission
P-2
Course Name
Confidential Information Information of Huawei. No Spreading Without Permission
P-3
Course Name
Confidential Information Information of Huawei. No Spreading Without Permission
P-4
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-5
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-6
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-7
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-8
Course Name
P-9
Traffic model includes two factors
Service Model: Analyze the data rate for each service type to determine the average throughput for single user
User behavior: Analyze the user distribution to get the throughput of each TRx
Confidential Information of Huawei. No Spreading Without Permission
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-10
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-11
Course Name
P-12
Real Time Gaming: Low bit rate, real-time, high burst, asynchronous, asymmetric uplink
and downlink traffic, and interactive.
VoIP (Voice over IP) and video conference: The bit rate is between low bit speed and middle bit speed, real-time, synchronization, symmetric uplink and downlink traffic, and interactive.
Streaming media: The bit rate is between low bit rate and middle bit rate, not in real time, low delay shaking, synchronization, asymmetric uplink and downlink traffic, non-interactive.
IM and WWW network browsing (basic Internet application): The bit rate is between low bit rate and middle bit rate, no information loss, asymmetric, asynchronous uplink and downlink traffic, middle delay, and interactive.
File transmission and media download: The bit rate is between low bit rate and middle bit rate, no information loss, low priority, non-real time, asymmetric, and asynchronous uplink and downlink traffic.
Confidential Information of Huawei. No Spreading Without Permission
Course Name
P-13
Some parameters are related with traffic mode
PPP session time: the duration of each session
RRC connected time: the RRC connected time in each session
Packet transmission time: the packet transmission time in each RRC connection
Ratio of RRC to PPP = RRC connected time/PPP session time
Ratio of Packet to RRC=Packet transmission time/RRC connected time
Confidential Information of Huawei. No Spreading Without Permission
Course Name
P-14
One session includes many packet calls, and one packet call includes many packets.
Confidential Information of Huawei. No Spreading Without Permission
Course Name
P-15
Considering single voice user, the entire service period falls into OFF and ON periods. In the ON period, users send fixed size packet in fixed time and generate voice data. In the OFF period, no data is generated.
Various applications such as voice, video and data, form video meeting service frames through different protocol stacks.
Confidential Information of Huawei. No Spreading Without Permission
Course Name
P-16
The Web model is the most complicated in all models. The measurement for HTTP services indicate that large web pages are formed by relatively small objects. That is to say, each page consists of some web embedded objects, such as main page, embedded image, and embedded Java program.
In a package call, package service characteristics are related to the Web server and browser HTTP version. Currently, HTTP/1.0 and HTTP/1.1 are used. The maximum difference of the two versions are that the TCP connection of transmission layer of main object and embedded object are different.
In HTTP/1.0, each main object and embedded object of the Web page download use different TCP connections. In the browsing process of most customer terminals, embedded objects use multiple TCP connections at the same time, which is called HTTP/1.0 - burst mode transmission. Meanwhile, the maximum TCP number can be connected is configurable. Most browser is set to 4. When the embedded object exceeds the number, a new TCP connection is set up, and the original connection is built. TCP overhead and congestion control is based on each object.
In HTTP/1.1, consecutive TCP connections are used to download object. That is, the transmission object connected in serial on a single TCP connection is called HTTP/1.1 -consecutive mode transmission. TCP overhead and congestion control are based on each connection.
Confidential Information of Huawei. No Spreading Without Permission
Course Name
P-17
Outlook email is used mostly on the market. The outlook transmission is dependent on remote procedure call (RPC) and uses complex protocols. When invoking the Outlook, there are 11 activated TCP connections. Each email processing consists of multiple MAPI segment elements. Each MAPI segment processing can be divided into more specific segments
Confidential Information of Huawei. No Spreading Without Permission
Course Name
PPP: Peer-Peer Protocol
Confidential Information of Huawei. No Spreading Without Permission
P-18
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-19
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-20
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-21
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-22
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-23
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-24
Course Name
P-25
Single User Throughput in Busy Hour = PPP Session Time (s) x PPP Session Duty Ratio x Bearer Rate (kbit/s) x [1/(1 - BLER)] x BHSA x Penetration Ratex(1+ Peak to
Average Ratio )/3600
According to the Erl, single-user busy hour throughput of VoIP service =Erl x Mean Bit Rate (kbps) x BHSA x Penetration Rate
Confidential Information of Huawei. No Spreading Without Permission
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-26
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-27
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-28
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-29
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-30
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-31
Course Name
SFBC: Space Frequency Block Coding
Confidential Information of Huawei. No Spreading Without Permission
P-32
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-34
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-35
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-36
Course Name
P-37
PDCP: Packet Data Convergence Protocol, perform data integrity check and ciphering function.
RLC: Radio link control protocol
MAC: Perform scheduling control function
Confidential Information of Huawei. No Spreading Without Permission
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-38
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-39
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-40
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-41
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-42
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-43
Course Name
Confidential Information of Huawei. No Spreading Without Permission
P-44