These Favraud
These Favraud
EDITE - ED 130
Doctorat ParisTech
THÈSE
pour obtenir le grade de docteur délivré par
TELECOM ParisTech
Spécialité « Electronique et Communications »
Romain FAVRAUD
le 22 Novembre 2017
Jury
M. Christian BONNET, Professeur, Eurecom, France Président
Mme Carla-Fabiana CHIASSERINI, Professeur associé, Politecnico di Torino, Italie Rapporteur
M. Riku JÄNTTI, Professeur associé, Aalto University, Finlande Rapporteur
M. Tommy SVENSSON, Professeur, Chalmers University of Technology, Suède Examinateur
M. Klaus MOESSNER, Professeur, University of Surrey, Royaume-Uni Examinateur
TELECOM ParisTech
école de l’Institut Mines-Télécom - membre de ParisTech
ABSTRACT
iii
iv
v
vi
This has not been an always easy journey. "Learn the hard way!"
they said. I guess I somehow did, and I am quite happy that this
journey was successful and is finally, as I am writing, coming to an
end. But even though pursuing a PhD degree may look like a long
and solitary walk, it cannot be started and surely not finished alone.
That is why I would like to take these few lines to thank all the
people that made this possible.
First, I would like to thank Franck Andreani and Cyril Gazzano
from Naval Group who offered me this opportunity, as well as Joël
Caravetta, Jean-Hugues Chauvot, Patrick Saretti and all the other peo-
ple in Naval Group I had the chance to work with.
I, of course, thank my PhD advisor, Navid Nikaein, first for accept-
ing to supervise this thesis, and mostly, for having been able to guide
me successfully through it.
I would like to thank all members of the thesis committee for tak-
ing the time to read this thesis and providing their constructive and
helpful feedback.
I would like to thank my colleagues and friends from Eurecom,
who greatly helped me getting over the difficulties and provided a
lot of interesting discussions and ideas, as well as many laughs: Lau-
rent Gallo, Konstantinos Alexandris, Jingjing Zhang, Chia-Yu Chang,
Irfan Khan, Paolo Viotti, Pierre-Antoine Vervier, Xiwen Jiang, Qian-
rui Li, Yongchao Tian, Shengyun Liu, Haifan Yin, Ruggero Schiavi,
Anta Huang, Francesco Pace, Daniele Venzano, Kurt Cutajar, Elena
Lukashova and many others that made that journey enjoyable!
I sincerely thank my friends Colin, Jawad, Sammy and Lucas, who
were far away but more than supportive and helpful all along, as well
as Agnès for providing me the necessary joy over the final steps.
Finally, I thank my parents and my sister for continuously support-
ing me in my life, and in that maybe not so crazy idea this was!
vii
CONTENTS
Abstract iii
Résumé v
Acknowledgments vii
Contents viii
List of Figures xiii
List of Tables xv
1 introduction 1
1.1 Motivations . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . 2
2 state of the art and problem statement 5
2.1 Uses cases and current solutions . . . . . . . . . . . . . 5
2.1.1 Military and Naval uses cases . . . . . . . . . . . 5
2.1.2 Public Safety uses cases . . . . . . . . . . . . . . 8
2.2 Network topologies . . . . . . . . . . . . . . . . . . . . . 9
2.2.1 Scenarios . . . . . . . . . . . . . . . . . . . . . . . 9
2.2.2 Scenarios of reference . . . . . . . . . . . . . . . 12
2.3 Problem Statement . . . . . . . . . . . . . . . . . . . . . 13
2.3.1 High level requirements . . . . . . . . . . . . . . 14
3 design constraints and rat choice 17
3.1 External constraints . . . . . . . . . . . . . . . . . . . . . 17
3.2 RAT of autonomous network . . . . . . . . . . . . . . . 18
3.2.1 LTE state of the art . . . . . . . . . . . . . . . . . 19
3.2.2 Backhaul link consideration . . . . . . . . . . . . 24
4 architecture of the autonomous bts 27
4.1 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.1.1 Support of Legacy UEs . . . . . . . . . . . . . . 27
4.1.2 Autonomous operation . . . . . . . . . . . . . . 27
4.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . 29
4.3 e2NB states . . . . . . . . . . . . . . . . . . . . . . . . . . 32
4.4 e2NB network topologies . . . . . . . . . . . . . . . . . 33
5 design elements and procedures of e2nb 35
5.1 Physical layer interfaces . . . . . . . . . . . . . . . . . . 35
5.1.1 Background LTE information . . . . . . . . . . . 35
5.1.2 Uu interface . . . . . . . . . . . . . . . . . . . . . 36
5.1.3 Un relay interface . . . . . . . . . . . . . . . . . . 38
5.2 Physical layer design issues . . . . . . . . . . . . . . . . 43
5.2.1 Synchronization . . . . . . . . . . . . . . . . . . . 43
5.2.2 Range limitation . . . . . . . . . . . . . . . . . . 45
5.2.3 HARQ modifications for Un interface . . . . . . 46
5.3 e2NB procedures and parameters configuration . . . . 47
5.3.1 eNB parameters . . . . . . . . . . . . . . . . . . . 48
ix
x Contents
xiii
xiv List of Figures
xv
INTRODUCTION
1
Wireless communications have never been so widely used by hu-
mans. While the frequency spectrum is limited, new technologies
enabling faster or more energy efficient wireless communications are
emerging every year, pushing forwards the possibilities and the ex-
pectations of end users.
In such a crowded landscape, Long Term Evolution (LTE) is be-
coming the technology reference for 4G cellular networks, as it is
increasingly adopted by all major operators all over the world. Cur-
rently, LTE is rising to the challenge of addressing several issues (e.g.
cellular networks’ capacity crunch, ultra-high bandwidth, ultra-low
latency, massive numbers of connections, super-fast mobility, diverse-
spectrum access) that speed up the pace towards 5G. Moving cells
have been envisioned to expand the coverage and provide higher
data-rates at low cost thus enabling several new use cases in Intel-
ligent Transportation System (ITS), Unmanned Aerial Vehicle (UAV)
and drones communications, etc. Moreover, LTE is expected to be an
important part of the 5G solution for future networks and also play
an essential role in advancing Public Safety (PS) communications.
1.1 motivations
1
2 introduction
1.2 contributions
To the best of our knowledge, there have not been extensive re-
search and contributions to extend the LTE connectivity to more than
two wireless hops from a base station that has access to the CN with-
out making use of out-band radios. However, as we will detail in this
work, this is of interest for several use cases that have strict require-
ments on frequency resources or hardware availability such as PS and
military communications. In this thesis, we study how to evolve the
LTE communication systems to enable new use cases in constrained
environments relying on autonomous moving cells.
In the first chapter, we introduce the use cases that we are target-
ing in our study by reviewing the operational situations encountered
by military, navy and PS entities. We show the limitations of their
1.2 contributions 3
e2NB internal states that allow the dynamic meshing of the BTS and
finish this chapter with examples of resulting network topologies.
Then, we detail on the specific e2NB design elements and proce-
dures in the fourth chapter. Especially, we explore the choice of the
physical layer interfaces by first underlining the limitations of the
legacy User to UTRAN (Uu) interface before analytically comparing
Half Duplex (HD) and Full Duplex (FD) approaches justifying the use
of the LTE relay (Un) interface. We then present the main features and
procedures of the e2NB to enable the discovery and initial connection
of the BTSs. We then present in details the e2NB operation flow and
states allowing for node discovery and network split-and-merge be-
fore discussing on the specific CN features that are required. This
operation flows and states have been first presented in the following
contribution:
— R. Favraud, C. Y. Chang and N. Nikaein, "Autonomous Self-
Backhauled LTE Mesh Network With QoS Guarantee," in IEEE
Access, vol. 6, pp. 4083-4117, 2018.
In the fifth chapter, we investigate the coordination and orchestra-
tion functionality within the proposed architecture. As we are tar-
geting an applicable solution with constrained resources suitable for
both Frequency Division Duplexing (FDD) and Time Division Du-
plexing (TDD) operation, we propose a cross layer hierarchical re-
source scheduling algorithm in order to efficiently meet Quality of
Service (QoS) requirements for real-time traffic while maximizing the
throughput for elastic flows. This problem is tackled in two contribu-
tions:
— R. Favraud, N. Nikaein and C. Y. Chang, "QoS Guarantee in
Self-Backhauled LTE Mesh Networks," GLOBECOM 2017 - 2017
IEEE Global Communications Conference, Singapore, 2017.
— R. Favraud, C. Y. Chang and N. Nikaein, "Self-backhauled au-
tonomous LTE mesh networks," 2017 IEEE 13th International
Conference on Wireless and Mobile Computing, Networking
and Communications (WiMob), Rome, 2017.
Finally, in the sixth chapter, we aim to demonstrate the feasibility
and reliability of our proposed architecture, We first implement the
corresponding self-backhauling air interface (Un interface) on Open
Air Interface (OAI) platform and compare with the legacy LTE air-
interface on both computing requirements and spectral efficiency. We
then evaluate the efficiency and adaptability of our proposed hierar-
chical resource scheduling algorithm in various network topologies
and heterogeneous traffic flows with QoS requirements to show its
adaptability and limitations in both FDD and TDD configurations.
In the conclusion, we summarize the remaining uncertainties con-
cerning real-field deployments and we conclude this study drawing
the required steps to push the proposed solution forward to a func-
tional Radio Frequency (RF) wireless communication system.
S TAT E O F T H E A R T A N D P R O B L E M S TAT E M E N T
2
In this chapter, we introduce the specific use cases that we are tar-
geting in our study. We first briefly review the operational situations
encountered by military and navy entities and give a brief overview
of medium range naval communication systems. Then, we review PS
use cases and requirements as well as current PS communication sys-
tems. We present the common network topologies that can arise for
both military and PS communication systems depending on the op-
erational situation. Then, summarizing the discovered shortcomings,
we formulate the main goal of this study. Finally, we define the high
level requirements for a communication system to answer the consid-
ered use cases and we review the associated external constraints.
5
6 state of the art and problem statement
Legend
VLF
HF/VHF/UHF Satellite
SHF/EHF
Aircraft
Helicopter Aircraft
UAV Air
Land Sea Sea Land
Ship
Tank Ship Ship
USV Ship
Head
Troops Quarters
Aircraft
carrier Submarine
Speed boat Ship
UHF
Frequency band SHF, EHF
(500 KHz wide channel)
5 Mbps unprotected
Maximum data-rate < 2 Mbps
2 Mbps protected
240 ms on spot
Minimum latency > 100 ms
480 ms otherwise
2.2.1 Scenarios
12 Out-of-coverage - - -
grated devices) that requires a seamless access to the CN. Such a de-
ployed network can support a variety of use cases; however, stringent
requirements shall be considered when utilizing it for PS communica-
tions, namely robustness, reliability, and non-prone to malfunctions
and outages [14]. Despite aforementioned deployment requirements,
such fixed BTSs may still not survive against unexpected events such
as earthquake, hurricane, tsunami, and wildfire. Moreover, it may not
cover distant lands due to costly deployment. Nevertheless, first re-
sponders still need efficient PS communications in all circumstances
even in harsh environments that require some large area opportunis-
tic BTSs deployments. In that sense, the PS wireless communications
cannot rely solely on the planned network and must be able to ensure
minimum services and sufficient level of quality when the planned
network is not fully available or not possible to deploy [14]. Such a
network architecture could also answer military use cases that do not
fit with the classical cellular architecture.
In view of the above limitations, Table 2 captures twelve scenarios
that can arise depending on four criteria: (i) UE-to-BTS connectivity,
(ii) BTS-to-CN connectivity, (iii) BTS mobility, and (iv) BTS-to-BTS
connectivity. These twelve situations are also illustrated in Figures 2,
3, 4 and 5. In the following, we go through these cases in more details.
Slow Slow
Nominal
Backhaul Link
BTS UE Backhaul Link BTS UE Backhaul Link BTS UE
UE UE UE UE UE UE
BTS BTS BTS relay
UE relay UE relay 2 UE 3
UE 1 UE Fixed BTS and relays UE Fixed BTS and relays
Fixed BTS and relay Limited backhaul access Limited backhaul access
Full backhaul access Full interconnectivity Slow interconnectivity
UE UE UE UE
UE UE
BTS BTS BTS relay
UE relay 4 UE relay 5 UE 6
UE Fixed BTS and relay UE Fixed BTS and relay UE Fixed BTS and relay
No backhaul access No backhaul access No backhaul access
Full interconnectivity Slow interconnectivity No interconnectivity
PS / Mil PS / Mil
CN CN
Services Services
UE UE
Slow Backhaul
Moving Slow Backhaul Moving BTS
Fast
interconnection BTS
UE UE
UE UE
UE 7
UE 8
BTS UE Moving BTS BTS UE Moving BTS
Limited backhaul access Limited backhaul access
Full interconnectivity Limited interconnectivity
UE UE UE
Moving BTS Moving BTS Moving BTS
9 10 11
UE UE
Moving BTS Moving BTS Moving BTS
No backhaul access No backhaul access No backhaul access 12
Full interconnectivity Limited interconnectivity No interconnectivity No BTS coverage
1. The Performance-Enhancing Proxy (PEP) in IETF RFC 3135 and RFC 3449 can
be adapted to improve performance.
2.3 problem statement 13
many mobile UEs around ships but some may require high band-
width to transmit real time videos or photos. Voice communications
are currently handled by dedicated systems and usually restricted to
each ship with few calls going from ship to ship.
For PS, communications are for the moment mostly voice commu-
nications due to the lack of high data rate service. In situation of
mobility without a fixed deployment, the number of involved BTSs
can vary from one to a few tens depending the area to cover. In
these cases, transmissions are mostly voice group communications
with potential records or transmissions to centralized BTSs and head
quarters.
We can summarize the considered scenarios and their characteris-
tics in Table 3.
Naval Mobile PS
Scenario
communications communications
Number of UEs
Tens Tens to hundreds
per BTS
We have seen in sections 2.1.1 and 2.1.2 that current military and
PS communication systems are not up to the requirements of new use
cases, especially regarding maximum achievable data rates.
Moreover, we have seen in section 2.2.1 that several similar network
topologies can arise in PS and military use cases. However, as under-
lined in Baldini et Al. [9] study and in section 2.1.2, most PS commu-
nication systems are based on fixed deployed cellular networks and
cannot support all these network topologies as they require a steady
access to a common CN.
Thus, we see that both PS and military authorities could benefit
from new communication systems that would address their evolving
14 state of the art and problem statement
needs (high data rates, low latency, etc.) and match these use cases
(adaptability to various network topologies).
The goal of this study is to define a wireless communication sys-
tem to cover the network centric scenarios (ranging from 1 to 11 in
Table 2) that would provide better performance than current sys-
tems presented in section 2.1.1 and 2.1.2. Such a system would al-
low providing services to mobile users around BTS without requiring
connectivity to other external entities, while aiming for the widest
network coverage through BTSs interconnections to form a joint au-
tonomous network or several disjoint autonomous networks. Note that
while our initial targeted use cases are related to the PS and military
communications requiring emergency or opportunistic deployments,
such solution remains applicable to other use cases, e.g., moving ve-
hicular, ITS, drone networks, UAV communications, etc. [13, 18].
17
18 design constraints and rat choice
Baldiny et Al. survey from 2013 [9] compares the following com-
munication systems for PS use: Analog Professional Mobile Radio
(PMR); Digital Mobile Radio (DMR); P25; TETRA V.1; TETRA V.2;
TETRAPOL; Global System for Mobile communications (GSM) / Gen-
eral Packet Radio Service (GPRS)/ Universal Mobile Telecommunica-
tion System (UMTS) / 3G; LTE; Satellite Networks; WiFi / Worldwide
Interoperability for Microwave Access (WiMAX); Ad-hoc Networks;
Marine Communications; Avionics Communications. In their conclu-
sion, the authors notice that "LTE has emerged as the technology of
choice and future solution in PS". Indeed, 4G LTE is designed with
a number of interesting properties, namely high spectral efficiency,
frequency flexibility, large coverage area through high power support
and native support of variety of Internet Protocol (IP)-based services
thanks to the flat IP architecture. Ferrus et Al. [21] come to the same
conclusion, noting that LTE has reached the required maturity level
and wide adoption to replace the previous PS communication sys-
tems. However, both articles observe that LTE faces several challenges
to be adopted as the next PS wireless access technology as it is initially
designed for commercial markets.
The LTE term is mainly used to refer to the Evolved Packet System
(EPS) while it originally corresponds only to the Radio Access Net-
work (RAN) part of the EPS, called the E-UTRAN that corresponds
to the deployed BTSs [23]. The EPS, that we will call LTE hereinafter,
is the new terrestrial cellular network specificied by the 3GPP to re-
place 2G and 3G cellular systems as shown on Figure 6.
802.11ac
802.11b 802.11a 802.11g 802.11n
802.11ad
802.16d
Fixed WiMAX WiBRO
IS-95A IS-95B IS-95C
CDMA CDMA cdma2000
802.16e
1xEV-DO Mobile WiMAX2
Release 0, A, B WiMAX
PDC iMode
802.16m
E-GPRS Commercially
EDGE 4G 4G+
EDGE
IS-136 Evolution
TDMA LTE
Rel - 8/9
LTE-Advanced
GPRS TD-SCDMA Rel - 10 ++
HSDPA
HSPA+
HSUPA
GSM HSCSD W-CDMA
4G
2G 2.5G 3G 3.5G 3.9G IMT-Advanced
— Provide higher data rates and better quality of service than pre-
vious cellular systems
LTE architecture
SGi
EPC
HSS PCRF S7 P-GW
S6a S5-S8
X2 X2
Uu Uu Uu Uu
Uu
eNodeB eNodeB eNodeB
UE UE
UE UE UE
Figure 7 – LTE nominal architecture (Release 8).
3.2 rat of autonomous network 21
EPC EPC
eNodeB
UE
UE
UE eNodeB
eNodeB
UE
UE relay UE
UE
e2NB
e2NB
UE eNodeB + UE
local EPC
functions UE e2NB
UE UE
UE UE
UE e2NB e2NB
3 – Isolated E-UTRAN
Figure 9 – Topologies based on standard LTE BTS (1,2,3) and the envisioned
LTE network (4).
24 design constraints and rat choice
Several solutions can be envisioned for the wireless links that can
realize the mesh to interconnect the mobile BTSs. Note that what we
use the backhaul term hereinafter for the wireless links between the
BTSs and not only to name the connection of a BTS to a CN.
The most straightforward approach is to rely on a dedicated RATs
for the inter-connection of the BTSs. In nominal cellular architecture
with fixed deployments, wireless backhauling is often used relying on
Point To Point (PTP) or Point To Multi-Point (PTMP) RAT using direc-
tional antennas. Taipale T. studies the feasibility of a wireless mesh
for LTE small-cell backhauling [25] and details a new wireless mesh
solution developed by Nokia Networks (NN) and VTT Technical Re-
search Centre of Finland (VTT) as 802.11 (WiFi) and 802.16 (WiMAX)
mesh features and other available mesh networks were found not to
be suitable for this use case. However, the requirements of such a
backhaul are quite different from the one of PS use cases where some
communications can be handled locally, plus it relies on fixed BTS
which is not adequate. The 911-NOW proposal from Bell Labs [26] de-
tails a PS architecture that relies on meshing of moving BTS and inves-
tigates several problems that arise independently of the meshing RAT.
Thus, it does not really address the radio perspective and associated
problems (limited frequency resources, scheduling, etc.). The Abso-
lute FP7 project developed autonomous eNBs and new aerial LTE BTS
and multi-mode UEs for emergency PS communications, supporting
communications between eNBs through a satellite network or using
dedicated WiFi links [27, 28].
While some of these solutions might cover the use cases we identi-
fied, none matches the external requirements we draw in section 3.1.
Indeed, using a dedicated RAT requires dedicated frequency bands
and the associated hardware for the backhaul links while we target
a solution that minimizes the hardware and frequency resource re-
quirements and have already selected LTE as the access RAT. Even
if some hardware resources can be shared (such as antennas), isola-
tion between the access and backhaul bands at each BTS is required,
which might not be possible due to regulatory constraints on getting
frequency resources for each distinct band (PS use cases) or due to
other systems (military use cases). For instance, dividing a 10MHz
channel bandwidth into two 5MHz sub-bands to isolate access and
3.2 rat of autonomous network 25
4.1 challenges
27
28 architecture of the autonomous bts
Coordinated scheduling
Because the radio resources are shared between access and back-
haul links, scheduling shall guarantee end-to-end QoS, in particular
for real-time traffics [31]. However, due to network mobility, wire-
less medium characteristics, and multi-hop nature of the traffic flows,
legacy scheduling algorithms (i.e. in LTE and ad-hoc network) are not
directly and efficiently applicable. Moreover, due to the characteris-
tic of concurrent radio resource accesses from different e2NBs over
backhaul and access link, the coordinated scheduling is required to
avoid blocking issues. However, a fully centralized scheduling may
suffer from scalability issues due to significantly higher overhead and
complexity making such approach not applicable.
Security
Service continuity
4.2 architecture
eNB
It provides the same operations as in a legacy LTE eNB in that it
communicates with UEs through the legacy Uu interface and with
MME and optionally S-GW through the legacy S1 interface [32].
1. Some related services and application can also be included such as IP Multi-
media Subsystem (IMS).
30 architecture of the autonomous bts
e2NB
Coordination & Orchestration Entity Agent
Routing
eNB
Local EPC
HSS P-GW
vUE MME S-GW
NAS
IP RRC RRC IP
PDCP PDCP
RLC RLC
MAC MAC
PHY PHY
e2NB x vUE y UE z
vUEs
These vUEs constitute the main differentiation from the legacy ap-
proaches. They are cleverly utilized to establish the inter-e2NB com-
munications. Each single vUE is managed and instructed by the
COE and can report real-time radio information (e.g., received sig-
4.2 architecture 31
Routing
Each e2NB is not only providing services to its local UEs but also
to remote UEs (and potentially to other eNBs, e.g., EPC as a service).
Furthermore, it relies on the routing service for discovery and coop-
eration in order to enable network wide UE services. Thus in the
envisioned architecture, the e2NB becomes a true service provider
by publishing the offered services as well as a service consumer by
subscribing to the service of other e2NBs.
COE agent
Relaying on a mesh
Serving local UEs
Local
EPC
EPC
connections
TX/RX Radio Chain TX/RX Radio Chain TX/RX Radio Chain
Uu Uu/Un Uu Uu/Un
Using this different nodes states and the properties of the described
e2NB, several topologies can be achieved such as the one presented
on Figure 9.(4). As stated in section 4.3, the state of each e2NB is
evolving due to the mobility of e2NBs and changes in the related
channels and traffic. The effective topology and the state of each
e2NB are directly related.
A network example is shown with the three different topologies
and the associated states in Figure 12. Firstly, a mesh network with
six e2NBs (e2NB1 to e2NB6) of which five are in the Meshed state and
serve UEs while one (e2NB2) is in the vUE relay state. Connections be-
tween Meshed state e2NBs have both Downlink (DL) and Uplink (UL)
directions relying on two corresponding vUEs, while connections be-
tween Meshed e2NB to the vUE relay e2NB only rely on the vUE at the
vUE relay e2NB, i.e., no vUE at the Meshed e2NB. Then, e2NB7 and
e2NB8 left the main mesh network but both are still in Meshed state as
they are still connected together. Finally, e2NB9 is in Isolated state as
it is not connected to any other e2NB. Last but not least, we can notice
that there is one extra instantiated vUE at each e2NB, for instance, 4
vUEs at e2NB2, in order to detect potential new neighboring e2NBs
or eNBs due to node mobility.
UE4
UE6
e2NB6 UE7
meshed e2NB7 e2NB8
meshed meshed
e2NB5
UE1 meshed
e2NB1 UE5
meshed UE8
e2NB4 e2NB9
meshed isolated
e2NB2 UE
vUE relay
vUE
eNB
35
36 design elements and procedures of e2nb
1 frame
Subframe 0 1 2 3 4 5 6 7 8 9
Slot 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
PRB 5
PRB 4
PRB 3
PRB 2
PRB 1
PRB 0
1 RB
Symbols 1 RE
0 1 2 3 4 5 6 7 8 9 10 11 12 13
12
subcarriers
1 CRS
5.1.2 Uu interface
two reasons for that. First, the current analog RF cancellation tech-
niques reaches a maximum of 65-70dB which limits the maximum
transmit power with a fixed a minimum receiving power. Indeed,
assuming a minimum receiving power of -101.5dBm (3GPP require-
ment for a 10MHz channel [39] at a macro cell BTS) and the use
of a high quality 16 bit Analog-to-Digital Converter (ADC) receiver
providing 84dB of dynamic range (2 bits of margin), the maximum ac-
ceptable input signal power that would not saturate the receiver ADC
is -17.5dBm. This puts with a 65dB analog RF cancellation, without
any margin (for instance for PAPR of OFDMA), the maximum BTS
transmit power at 47,5dBm which is quite high but might be limiting
in military operations. Using a lower transmission power ensure that
the ADC will not be saturated after the analog cancellation. Second
and more importantly, current implementations show that combined
analog plus digital cancellation can reach up to 110dB [33–35, 37, 38,
40]. This is far from enough when using high transmission power.
Indeed, using a 46dBm (40W) transmitter, it brings the noise floor of
the receiver to -64dBm, losing tens of dB from a HD case. This will
significantly drain the battery of classical UEs and reduce the cell ra-
dius UL coverage and will also limit the maximum distance for the
backhaul links. This is what can be seen on the estimated crossover
points of [41], showing when FD is beneficial over HD depending
on the transmitting power as [42] shows that the FD approach can
greatly increase the performance subject to a smaller coverage.
A second problem apart from radio performance also arises. It
comes from the incompatibility of FD with respect to the legacy UEs
as it is not part of the standard and additional procedures are needed
on both network and terminal side to support the FD transmission
on the access (e.g. assigning different TDD configurations to different
UEs). However, such procedure could be easily implemented for the
backhaul links.
To sum up, we have first that the Uu interface is not suitable for HD
in-band inter-e2NB communication while maintaining Uu support for
legacy UEs and then that FD radios are not yet suitable for high power
applications. Fortunately, the Uu limitations for HD in-band can be
bypassed thanks to the Un interface.
PDSCH
11, 12 or 13 symbols; PRBs are allocated in per-user basis
Symbol
0 1 2 3 4 5 6 7 8 9 10 11 12 13
PDCCH
1, 2 or 3 symbols of all PRBs
R-PDSCH
10, 11 or 12 symbols (13 is forbidden in standard); PRBs are allocated in per-user basis
Symbol
0 1 2 3 4 5 6 7 8 9 10 11 12 13
R-PDCCH R-PDCCH
4, 5 or 6 symbols for DL control info 6 or 7 symbols for UL control info
1 to 8 PRBs depending on aggrega�on level 1 to 8 PRBs depending on aggrega�on level
5.2.1 Synchronization
Time synchronization
e2NB1 0 1 2 3 4 5 6 7 8 9 10 11 12 13
OK
e2NB2 0 1 2 3 4 5 6 7 8 9 10 11 12 13
e2NB1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 Fail
e2NB2 0 1 2 3 4 5 6 7 8 9 10 11 12 13
PS use cases). Last but not least, 3GPP specified the minimum re-
quirement for TDD time synchronization to be up to 10 (large cell) or
3 (small cell) micro-seconds [48].
In the case of FDD network, UL timing synchronization also mat-
ters. A fixed RN that connects to a DeNB can adjust its UL timing
advance to its DeNB before starting its own eNB stack. However, as
an e2NB may start independently from other nodes, it will not be able
to update its UL reference timing. A global UL SF synchronization
will in average maximize the number of symbols that can be used for
UL as it does for DL.
Frequency synchronization
FDD mode
way for efficient resource utilization in the mesh backhaul, and the
corresponding HARQ process will not follow aforementioned fixed
loop over SFs. To tackle with such dynamic HARQ process scenario,
we propose to add the HARQ process information in UL DCI 0 of
R-PDCCH to identify which HARQ process shall be re-transmitted.
TDD mode
vUE Uu eNB
PSS / SSS
MIB
SIBs
PRACH Preamble
RACH Response
RRC Connection Request
RRC Connection Setup
RRC: RRC Connection Setup Complete +
NAS: Attach request
RRC: dlInformationTransfer +
EMM: Authentication Request
RRC: ulInformationTransfer +
EMM: Authentication Response
RRC: dlInformationTransfer +
EMM: Security Mode Command
RRC: ulInformationTransfer +
EMM: Security Mode Complete
RRC: Security Mode Command
RRC: Security Mode Complete
RRC Connection Reconfiguration +
EMM: Attach Request +
ESM: Activate Default EPS Bearer Context Request
RRC Connection Reconfiguration Complete
RRC: ulInformationTransfer +
EMM: Attach Complete +
ESM: Activate Default EPS Bearer Context Accept
Proprietary message exchange
Proprietary message exchange
Switch to Un
Detection procedure
There are two ways to detect adjacent eNBs, being e2NBs or legacy
eNBs. The first one relies only on the e2NB (autonomous detection)
while the second one leverages UEs connected to the e2NB (assisted
detection).
BTSs via only listening to some small time duration close to the SF
0 and SF 5 in a frame. Nevertheless, the co-located eNB will need
to blank some eNB transmissions to enable such detection and thus
impacts the local UE in terms of detection, synchronization and fail-
ure in radio link. To better depict such impact, we can first see that
the vUE does not need to continuously detect neighboring e2NBs but
only periodically to check whether there is a new neighboring eNB.
Furthermore, the corresponding parameter in SIB can be configured
to make the link more prone to be in-sync state. For instance, the
eNB can blank SF(s) or even frame(s) without making its served UEs
be out-of-synch state if N310, T310 and N311 in the SIB2 are config-
ured adequately larger. Hence, a controlled blanking (sub-)frames is
feasible to allow vUE to detect PSS/SSS of neighboring e2NBs and
get their PCIs.
After receiving a new PCI, the vUE will start to receive MIB and
SIBs to confirm the Public Land Mobile Network (PLMN) identity as
well as the E-UTRAN Cell Identifier (ECI) to form the E-UTRAN Cell
Global Identifier (ECGI). This will uniquely identify the e2NB during
the configuration procedure using a predefined hash function. While
MIB and SIB1 have fixed position in frames, other SIB positions in
time are defined by each eNB. To optimize such reception of SIBs
at vUE, the eNBs shall configure the position of SIBs 2 to be always
in non-MBSFN SFs, for instance in SF 4 or SF 9 for FDD mode, to
limit the vUE access time to the radio chain. Furthermore, the COE
agent should properly allocate non-MBSFN SFs to the vUE for SIB
decoding.
Connection procedure
Based on the e2NB identity (ECGI), the COE agent can determine
from its topology knowledge if such detected e2NB is already part
of the mesh to decide whether to establish the connection to such
neighboring e2NB.
Then, the random access process will be initiated by vUE to trans-
port the Physical Random Access Channel (PRACH) preamble. Note
the PRACH configuration index in SIB2 should be set such that the
possible SFs for a UE/vUE to transmit the Random Access Channel
(RACH) preamble duration and position do not overlap with MBSFN
SFs as the eNB might not be listening to the UL channel due to the
backhaul transportations. Once the eNB successfully receives the
RACH preamble, it can transmit the RACH response to vUE in a
predefined window size between 2 and 10 ms long. However, the
vUE should not continuously listen to a such long duration to limit
perturbation of served UEs; hence we can set the eNB to always trans-
mit the response after a fixed amount of time over a non MBSFN SF
and to allocate UL SFs for this procedure over non MBSFN SFs.
The vUE then follows the legacy attach procedure used by UEs [53]
to establish the connection until reaching the Radio Resource Control
(RRC) Reconfiguration Complete step in Figure 17. It is noted that
similarly to the Random Access (RA) message exchange, the eNB
should be configured to transmit messages in a pre-configured timely
manner over non MBSFN SFs. Then, the Un interface will be con-
figured and used after finishing the attach complete and activating
default EPS bearer procedure in order to exchange between vUE and
eNB. Note the RRC connection shall be maintained during message
exchange in Un interface and it will be released when such connec-
tion can not be maintained, for instance, radio link failure case.
The complete detection and connection procedure is limited by the
frequency and tile the COE can allocate for listening the channel,
which depends on the current traffic on the considered e2NB. How-
ever, these procedures can be realized on all the bands available to
the e2NB. If the e2NB has several radio chains, it can dedicate some
for discovery and initial connection. However this can be efficient
only if the other e2NBs are not selecting the same bands for the same
purpose.
Startup phase
Such startup phase only happens when we just (re-)start the e2NB.
It is used to configure eNB parameters before starting the eNB proto-
52 design elements and procedures of e2nb
col stack with the operation flow in Figure 18. In the legacy LTE sys-
tem, the initial configuration phase includes choosing the PCI value
through the self-configuration processes relying on the common CN
[30, 52, 54].
However, in our case, the newly startup e2NB do not have the ac-
cess to a common CN. Hence, following the e2NB architecture, a spe-
cific vUE is firstly orchestrated and instantiated by the local COE
agent to detect adjacent e2NBs or eNBs as shown on Figure 18. Such
BTS detection mechanism can follow the common cell search scheme
of legacy UE defined by 3GPP [55]. When detecting the neighbor-
ing BTS, the local COE agent will notify whether a connection shall
be established or not based on the broadcasted PLMN identity in
SIB1. If yes, the vUE will follow the aforementioned attach procedure
shown in Figure 17 for connection establishment to the e2NB. Such
connection between the vUE and e2NB can exchange the higher-level
information to agree on the R-PDCCH and R-PDSCH configuration
before using Un. Then, the e2NB will continue to orchestrate another
vUE in order to detect and connect to another neighboring e2NBs. Fi-
nally, after connecting to all selected neighboring e2NBs, such newly
startup eNB will be into one of the three main states depending on
the number of connected e2NBs.
Before stating the operation flow of other states, we detail on how
to configure parameter at startup phase. Based on all detected BTSs
Startup
(no vUE, no eNB)
Initialize new vUE
Success
Update embedded
eNB parameters
and connected e2NBs, the COE agent can derive an adequate PCI
value to be used by the embedded eNB. Furthermore, it will also
configure parameters related to the eICIC/FeICIC and SIBs as the
parameters listed in group (a) of section 5.3.1. Whereas if no other
eNB/e2NB is detected by the vUE, the e2NB parameter will be self-
configured by its local COE. Such self-configuration can be based on
some hash functions relying on a suitable unique identity configured
by the vendor or by the responsible authority to statistically reduce
parameter colliding probability [56].
Isolated state
Such e2NB state is with one instantiated eNB and vUE in order
to serve local UEs and detect neighboring e2NBs following the flow
chart in Figure 19.
When the embedded vUE connects to a neighboring e2NB or the
embedded eNB have a new connection to a vUE, the e2NB will then
merge in its topology and go into the Meshed state. Otherwise, the
e2NB will monitor and update its eNB parameters.
Isolated state
(vUE, eNB)
No new e(2)NB e(2)NB detection New eNB detected
detected procedure
Remote vUEs New e2NB detected
supervision
New e2NB connection Update embedded
Fail
No change Remote procedure eNB parameters
vUE Success
Conflict eNB connection
Initialize new vUE
parameters
No Yes Update topology
and routes
Update embedded
eNB parameters
Merge procedures
Meshed state
(vUEs, eNB)
No new e(2)NB e(2)NB detection
Loss Remote detected New eNB detected
procedure
vUE connection Remote vUEs New e2NB
supervision detected
Otherwise New Remote e2NB connection Update embedded
vUE connection Fail
procedure eNB parameters
Embedded vUE
Success
Otherwise supervision
Initialize new vUE
Loss Embedded
vUE connection No new
Destroy Update topology reachable e2NB
corresponding vUE and routes
Meshed state
Such e2NB state is with one instantiated eNB and several vUEs to
serve local UEs, connect to neighboring e2NBs, and detect neighbor-
ing e2NBs with flow chart in Figure 20. Within such state, the e2NB
can remain in meshed state or transit to isolated state with possible
split or merge if the topology is changed. Note in the specific case
that satisfies: (a) all local UEs can be handovered to other e2NBs,
(b) no local UE requires direct access to the embedded applications
or to the gateway, and (c) high interference to neighboring e2NB; an
e2NB can turn off its embedded eNB and work as the vUE relay to
mesh backhaul links. Transition from Meshed state to vUE relay state
should be confirmed by the COE Controller.
To meshed state To vUE relay state To meshed state To vUE relay state
5.4.1 MME
the Tracking Area Update (TAU) for connected UE, and collaborate
with each other to enable the paging mechanism at the corresponding
e2NB to reach target vUE/UE. Secondly, the MME shall be changed
and the access context shall be exchanged during the S1 handover
of UE between e2NBs. Thirdly, the MME will maintain a unique S-
GW/P-GW for each UE and manage the bearer for UE to enable the
corresponding service.
5.4.3 S/P-GW
5.4.4 Routing
59
60 coe algorithms
other work investigating wireless LTE backhaul for other use cases.
For instance, Sapountzis evaluates the use of flexible TDD to realize
the wireless backhaul of LTE BTS [62]. However, while backhaul and
access are considered together to optimize the network, playing for
instance on user association, backhaul and access are using disjoint
bands and all flows are directed towards or from a common gateway.
Hence, we propose a coordinated and cross-layer approach to un-
leash the performance barriers when meshing e2NBs in order to guar-
antee the QoS in per-flow basis of the self-backhauling LTE mesh net-
work. As distributed scheduling is generally inefficient in QoS guar-
antee, it is based on an hybrid centralized and distributed scheduling
relying on centralized routing. It is designed to be lightweight with
low complexity to allow for fast computation and easy implementa-
tion. Last but not least, such approach will rely on the coordination
between COEs of meshed e2NBs that will be described in next sec-
tion.
Flow properties
SuperFrame Performance indicator (source/destination node,
TX/RX Routes and e2NB status datarate,
allocations latency requirements)
D = f (L
Algorithm 2: SFrt SuF , Ve2N B , L)
Input : Ve2N B is the set of e2NBs
LSuF is the superframe duration
L is the set of link load with loadu,v of edge u → v
Nu is the neighboring e2NB set of u from Ve2N B
Output : SFrtD is the set of the number of SFs required by each e2NB for
foreach u ∈ Ve2N B do
rP RB D [u] = v∈Nu P RBu,v
D (LL
P
u,v · LSuF ) ;
D
D [u] = rP RB [u] ;
SFrt ND P RB
nP RB U [u] = SFrt D [u] · N U
P RB ;
foreach v ∈ Nu do
D
LLu,v = 0 ; /* allocated over DL in SFrt [u] */
U U
rP RB = P RBv,u (LLv,u · LSuF ) ;
if rP RB U 6= 0 then
tP RB U = min(rP RB U , nP RB U [u]) ;
nP RB U [u] = nP RB U [u] − tP RB U ;
T ransportedRatio = (1 − rP tP RB U ) ;
RB U
LLv,u = LLv,u · T ransportedRatio ;
LSuF . Such AFR indicates the level of resource reusing within the
whole network and cannot be smaller than 1. Then, as the second
step, we get an estimate of the number of “free SFs” in a SuF duration
as SFf ree via excluding SFs that are already reserved for real-time
traffic from all MBSFN SFs. Thirdly, we compute BeD [u] and BeU [u]
as the sum of average TBS per PRB of all saturated DL and UL di-
rections from u, respectively. These two summations use T BS (a, b)
function which outputs the TBS when applying MCS index a with
b PRBs. Here, M CSu,v D represents the applied MCS index on DL di-
P N −1
u∈Ve2N B SFT X [u]
AF R =
(3a)
−1
Nmbsf n (LN )
SuF
X
SFf ree =
Nmbsf n (LN D
SuF ) − SFrt [u] · AF R (3b)
u∈Ve2N B
X
BeD D
[u] = T BS M CSu,v ,1 (3c)
v∈SuD
& '
BeD [u] · SFf ree
SFeD [u] = P D
(3d)
v∈Ve2N B Be [v ]
X
BeU [u] = U
T BS M CSv,u ,1 (3e)
v∈SuU
& '
B U [u] · SFf ree
SFeU [u] = Pe U
(3f)
v∈Ve2N B Be [v ]
else
remove(SF, SFT X [u][v ]) ;
if T ransmit ==S1 then
Ae2N B = u Ae2N B ;
if min(T x(u, ∗)) ≥ 1 then
foreach v ∈ Ve2NB ∧ (u, v ) ∈ Elink do
T x(u, v ) = T x(u, v ) − 1 ;
D [u] ≥ 1 then
if SFrt
SFrtD [u] = SF D [u] − 1 ;
rt
else if SFeD [u] ≥ 1 then
SFeD [u] = SFeD [u] − 1 ;
else if SFeU [u] ≥ 1 then
SFeU [u] = SFeU [u] − 1 ;
foreach u ∈ Ve2N B do
D [u] 6= 0 then
if SFrt
rtDisSat = 1 ;
68 coe algorithms
The results of CSA (i.e., SFT X ) are transported to each COE agent
for a distributed link scheduling. Such DLS aims to allocate the fre-
quency domain resource (i.e., PRB) and transport bits (i.e., TBS) of
the e2NB u in per-SF basis as shown in Algorithm 5. Here, a local
network view is maintained by each e2NB via forming the vUE set
(i.e., VvU E ) and UE set (i.e., VU E ) for its link scheduling purpose. Our
designed algorithm is to prioritize backhaul links (i.e., vUEs using
U n interface) over access links (i.e. UEs using U u interface) as the
former one can only reach 60% of peak rate (max number of MBSFN
SFs per frame) compared to 100% for the legacy UE while also prior-
itizing real-time traffics over elastic ones. Among vUEs/UEs in the
same set (i.e., VvU E /VU E ), we firstly sort them based on the number
of queued real-time traffic bits and then provide P RMmin PRBs in
a round-robin way. Furthermore, in the PRB provisioning, the num-
ber of requested bit (i.e. ReqBit) within the corresponding queues
is used to derive the allocated PRBs, and thus prevent resource over-
provisioning. It has to be noted that Algorithm 5 can be adapt to
apply priorities among UEs/vUEs.
6.4 relaying direction selection 69
if satisf y == 1 then
/* Schedule UEs after satisfying all vUEs */
foreach x ∈ VU E do
ReqBit = priority
P
p=0 Q [x] [p] ;
if SF ∈ SFT X [u] [∗] then
if TP RB > 0 ∧ T BS [x] < ReqBit then
P RB [x] = P RB [x] + P RBmin ;
TP RB = TP RB − P RBmin ;
T BS [x] = T BS (M CS [x], P RB [x]) ;
satisf y = 0 ;
if satisf y == 1 then
/* Schedule elastic traffics after fulfilling real-time ones */
priority = priority + 1 ;
previous discussion.
can decide to put an e2NB or more in vUE relay mode which will
stop the Access-access interference that could be the result of that node
transmissions.
75
76 experimentations
50 200
PDCCH dci position 1
PDCCH dci position 2
DL dci
30
100
20
DL dci
50
10
UL dci
UL dci
0 0
0 1 2 3 0 1 2 3
Aggregation level Aggregation level
(a) DCI encoding and mapping (b) DCI search and decoding
Tx PDCCH + DLSCH
2000 Rx PDCCH + DLSCH
Tx R−PDCCH + R−PDSCH
Rx R−PDCCH + R−PDSCH
1500
Processing time (us)
1000 20MHz
500
5MHz
0
0 4 910 13 1617 22 2728
MCS
Figure 24 – TX/RX time for PDCCH/PDSCH and R-PDCCH/R-PDSCH.
0
0 5 10 15 20 25
SNR (dB)
Figure 25 – Minimum SNR level to decode 75% of the TBs.
gregation level 0. This metric can reflect the reliability and justify the
utilized effectiveness of the interface. 75% is chosen as a tighter value
than usual reference test values for 3GPP systems that uses 70% (see
Table 8.2.1.1.1-2 [71]). Such experiment is taken under different radio
bandwidth (5, 10, 20 MHz), different values of DLSS and ESI that
modify the number of symbols used by the Un interface as explained
in section 5.1.3, and varying MCS values (0,4,9,10,16,17,22,27,28).
Either 12 symbols (DLSS = 1, ESI = 5) or 10 symbols (DLSS = 3,
ESI = 5) are available for R-PDSCH. The 10-symbol configuration
can not actually be successfully decoded when only receiving the first
transmission as stated in section 5.1.3 when the code rate is larger
than 1 (i.e., MCS 28). Since there are fewer symbols for R-PDSCH
transportation, a higher code rate is experienced and a slightly higher
SNR level is required to reach 75% of successful decoding. We can see
that the difference between the required SNR over Uu and Un inter-
face increases as the MCS increases, reaching around 1.5dB between
PDSCH and R-PDSCH with 12 symbols when using MCS 28, and
almost 5dB between PDSCH and R-PDSCH with 10 symbols when
using MCS 27. This is due to the required SNR increasing non lin-
early with the increase of code rate. Moreover, we can see that due
to our current implementation that does not allow for the second slot
of a PRB to be used for a R-PDSCH if its first slot is used for R-
PDCCH, the achieved TBS at equivalent bandwidth usage (including
R-PDCCH) is smaller using the Un interface. Finally, we can observe
that for higher TBS values (resulting from high MCS), no result are
available for the R-PDSCH configuration relying on 10 symbols for
the transportation. This is due to the code rate being higher than
1 in these configuration, as explained in section 5.2.2, preventing to
transmit and decode.
To sum up, the spectral efficiency of the R-PDCCH/R-PDSCH is
slightly lower than the one of PDSCH due to the fewer number of
available symbols. R-PDSCH also reaches slightly lower maximum
data rate (especially for large MCS that leads to large TBS) due to the
lower number of assignable PRBs, however this is due to the current
implementation limitations. Moreover, we can see that using fewer
than 11 symbols for R-PDSCH leads to impossible MCS values, low-
ering the maximum achievable throughput. This calls for the use of
dedicated TBS tables to optimize these cases or to restrict the usable
ranges in the common TBS table.
We also examine the results under different aggregation levels in
Figure 26 under 10MHz radio bandwidth when modifying the used
MCS value. It can be observed that the required SNR level to achieve
75% successful transportation is similar in both R-PDCCH/R-PDSCH
and PDCCH/PDSCH cases with a small difference on the achieved
TBS when using a smaller MCS. However, the gap between the achiev-
able TBS of R-PDCCH/R-PDSCH and PDCCH/PDSCH increases when
80 experimentations
4
x 10
4
PDSCH 50PRBs Aggreg 0
PDSCH 50PRBs Aggreg 1
3.5 PDSCH 50PRBs Aggreg 2
PDSCH 50PRBs Aggreg 3
R−PDSCH 48PRBs Aggreg0
3 R−PDSCH 48PRBs Aggreg1
R−PDSCH 44PRBs Aggreg2
R−PDSCH 41PRBs Aggreg3
2.5
TBS (bits) 2
1.5
0.5
0
−5 0 5 10 15 20
SNR (dB)
Figure 26 – Minimum SNR level for several aggregation levels.
using larger MCS and higher aggregation level due to the limitations
of our implementation (no use of the second slots of PRBs used for R-
PDCCH to carry R-PDSCH). However, the complete implementation
would see the SNR difference between R-PDSCH and R-PDCCH to
increase as it would slightly increase the code rate. Moreover, we can
see as expected that starting from 5dB of SNR, aggregation level 0 is
sufficient and higher aggregation levels are not useful. In such a case,
the differences between R-PDCCH/R-PDSCH and PDCCH/PDSCH
efficiency is comparatively small.
Simulation parameters
Network topologies
Here, we consider three different representative network topologies
as shown in Figure 27(a), 27(b) and 27(c). These topologies echo back
to what was presented in Table 3 with less than ten BTSs for naval
and PS scenarios and more than ten BTSs for the PS scenario. In
each topology, all e2NBs have 10 attached UEs and are connected to
adjacent e2NBs as indicated by the bi-directional arrows as shown in
Figure 27.
Traffic patterns
Depending on the scenarios, both real-time and elastic traffic flows
are continuously generated during the simulations. These traffic pat-
terns simulates to what is presented in Table 3. For real-time traf-
fic flows, we randomly pair all UEs to establish bi-directional VoIP
7.2 evaluation of the proposed approach 83
calls. Each call generates 20 bytes payload packets with a 20ms ar-
rival rate in fixed distribution. Each packet represents a 40 bytes
final transport size on the physical layer that includes all the protocol
headers from User Datagram Protocol (UDP) to MAC layer relying
on Robust Header Compression (ROHC). For QoS requirement of
the real-time traffic, we use the maximum one-way-delay of 150ms
for 95-percentile of the packet to ensure a quality call with a Mean
Opinion Score (MOS) of 3.5 using a G.729 codec [75]. Whereas the
elastic traffic is set between BTSs to represent the inter-site data trans-
fers that often happen in military and public safety scenarios. Each
elastic traffic is served in the best effort manner to maximize its data
rate. It behaves as a buffer saturating flow, continuously generating
packets at the initial node such that the buffer is never empty.
14000
12000
10000
8000
6000
4000
2000
0
B.
B.
B.
V
V
V
L.
L.
L.
/U
/U
/U
L.
L.
L.
L.
L.
L.
B.
B.
B.
D
U
L.
L.
L.
D
(i) Elastic flow: 1 2 (ii) Elastic flow: 4 6 (iii) Elastic flows: 1 2&4 6
(a) Throughput of elastic flows over three elastic traffic scenarios.
1
0.9 B. V
0.8 DL. V
0.7 UL. V
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
10 20 30 40 50 60 70 80 90 100 110
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows
with two elastic flows: 1 → 2 and 4 → 6.
Figure 28 – Hexagonal topology with 7 e2NBs and 70 UEs using 10MHz in
FDD mode.
86 experimentations
14000
Elastic flow 1 2 Elastic flow 4 6
Data rate (kbps)
12000
10000
8000
6000
4000
2000
0
B.
B.
B.
L.
L.
L.
V
V
V
V
/U
/U
/U
B.
B.
B.
L.
L.
L.
U
/U
/U
L.
L.
L.
V/
D
V
V
L.
L.
L.
D
(i) Elastic flow: 1 2 (ii) Elastic flow: 4 6 (iii) Elastic flows: 1 2&4 6
(a) Throughput of elastic flows over three elastic traffic scenarios.
1
0.9 B. V
0.8 DL. V/UL. V
0.7
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
10 20 30 40 50 60 70 80 90
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows
with two elastic flows: 1 → 2 and 4 → 6.
Figure 29 – Hexagonal topology with 7 e2NBs and 70 UEs using 10MHz in
TDD mode.
88 experimentations
9000
Data rate (kbps)
)
D
D
D
D
(T
(F
(T
(F
(T
(F
V
V
L.
L.
L.
L.
L.
L.
U
(i) Elastic flow: 1 2 (ii) Elastic flow: 4 6 (iii) Elastic flows: 1 2&4 6
(a) Throughput of elastic flows over three elastic traffic scenarios.
1
0.9 UL. V (FDD)
0.8 UL. V (TDD)
0.7
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
10 20 30 40 50 60 70 80 90
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows
with two elastic flows: 1 → 2 and 4 → 6.
Figure 30 – Hexagonal topology with 7 e2NBs and 70 UEs using 10MHz in
TDD mode or 5MHz in FDD mode.
7.2 evaluation of the proposed approach 89
6000
5000
4000
3000
2000
1000
0
B. V DL. V UL. V B. V DL. V UL. V B. V DL. V UL. V
(i) Elastic flow: 26 (ii) Elastic flow: 7 5 (iii) Elastic flows: 2 6&7 5
(a) Throughput of elastic flows over three elastic traffic scenarios.
1
0.9 B. V
0.8 DL. V
0.7 UL. V
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
10 20 30 40 50 60 70 80 90 100 110
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency of real-time flows
with two elastic flows: 2 → 6 and 7 → 5.
Figure 31 – Line topology with 7 e2NBs and 70 UEs using 5MHz in FDD
mode.
90 experimentations
sion since it exploits the full FDD capability and is able to save some
SFs for elastic traffic. However, the difference between the full algo-
rithm and baseline algorithm is smaller than the one shown in the
hexagonal topology of Figure 28. A potential reason is due to fewer
SFs can be shared by e2NBs to deliver elastic flows due to the topol-
ogy. Firstly, as the maximum number of hops over the network as in-
creased from 2 to 6, the SuF duration (i.e., LSuF ) will be reduced by a
factor around 3. However, each e2NB still needs at least one allocated
SF (or an UL opportunity to an adjacent node) within this SuF dura-
tion to deliver real-time traffic and ensure latency requirement. After
allocating SFs for real-time flows within this shorter SuF duration, a
fewer number of unallocated SFs can be shared to deliver elastic traf-
fics and thus the throughput difference between several algorithms
is reduced. Lastly, we can observe that the difference between the
throughput of one-hop flow scenario (7 → 5) and the throughput
of two-hop flow scenario (2 → 6) is similar to the phenomenon we
already explained in the hexagonal topology.
In Figure 31.(b), we show the performance metric of real-time flows
under the two elastic flow scenarios (i.e., 2 → 6 & 7 → 5) in terms
of the CDF plot of 95-percentile packet delay among all real-time
flows. All real-time flows are satisfied as the maximum 95-percentile
delay is about 110ms that is smaller than the requested 150ms, i.e.,
the satisfaction ratio is 100%. Moreover, we can observe that baseline
algorithm provides a slightly lower latency than the others as the
trade-off we already explained in the previous hexagonal topology.
The latency difference is smaller between the baseline algorithm and
the others than the one in the 7 e2NBs hexagonal topology. Such
phenomenon is due to the less flexibility on MBSFN SF allocation of
this topology as explained in the previous paragraph. Similar results
can be observed on Figure 44 in Appendix A for the two other traffic
scenarios.
ing process such that the UEs within a pair are either served by the
same e2NB or by one-hop adjacent e2NBs as B. 1V, DL. 1V, UL. 1V
shown in Figure 32.(a). This constraint matches the use cases where
users are mainly communicating with other users in the same area or
vicinity.
We can observe in Figure 32.(a) that both full and simplified algo-
rithms provide a higher throughput of elastic flows than the base-
line algorithm over all considered scenarios: with non-restricted VoIP
flows, with one hop restricted VoIP flows, and without VoIP flow.
Moreover, we can observe that the throughput is higher when VoIP
flows are restricted to a maximum of one hop over the mesh: double
throughput when with a single elastic flow (either 7 → 5 or 2 → 6)
and 30% gain when with two elastic flows (close to the one without
12000
Data rate (kbps)
V
1V
1V
1V
L.
L.
L.
/U .V
D 1V
/U .V
D 1V
/U .V
D 1V
D L. V B.
D L. V B.
D L. V B.
/U
/U
/U
B.
B.
B.
1V /UL
1V /UL
1V /UL
B.
B.
B.
L.
L.
L.
L.
L.
L.
D
D
L.
L.
L.
(i) Elastic flow: 2 6 (ii) Elastic flow: 7 5 (iii) Elastic flows: 2 6&7 5
(a) Throughput of elastic flows over three elastic traffic scenarios.
1
0.9 B. V
0.8 DL. V/UL. V
0.7
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
0 20 40 60 80 100 120
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows
with two elastic flows: 2 → 6 and 7 → 5.
1
0.9 B. 1V
0.8 DL. 1V/UL. 1V
0.7
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
10 20 30 40 50 60 70 80 90 100
Latency (ms)
(c) CDF plot of the 95-th percentile of packet latency among real-time flows
under maximum 1-hop mesh with two elastic flows: 2 → 6 and 7 → 5.
Figure 32 – Line topology with 7 e2NBs and 70 UEs using 10MHz in TDD
mode.
92 experimentations
any VoIP flows, i.e., DL./UL.) Such results confirm our intuition. We
can also observe that, as in the TDD modes of the 7 e2NBs hexagonal
topology, the throughput of the one-hop elastic flow (7 → 5) is almost
two times as the throughput of two-hop elastic flow (2 → 6).
In Figure 32.(b), without any restrictions on the maximum num-
ber of hops among inter-UE VoIP flows, the baseline algorithm only
achieves a slightly better latency than the others. We can observe in
Figure 32.(c), where VoIP flows are restricted to a maximum of one
hop over the mesh, that the baseline algorithm performs much better
that the others as it can distribute the MBSFN SFs evenly between
e2NBs and thus reduce the waiting time in queues as well as the la-
tency. Last but not least, all algorithms can provide 100% satisfaction
for all VoIP flows among each case, but both simplified and full al-
gorithms can achieve a higher throughput of elastic flows. Similar
findings can be drawn from observation of Figure 45 in Appendix A
for the other traffic scenarios.
)
D
D
D
D
(T
(F
(T
(F
(T
(F
V
V
L.
L.
L.
L.
L.
L.
U
(i) Elastic flow: 2 6 (ii) Elastic flow: 7 5 (iii) Elastic flows: 2 6&7 5
(a) Throughput of elastic flows over three elastic traffic scenarios.
1
0.9 UL. V (FDD)
0.8 UL. V (TDD)
0.7
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
0 20 40 60 80 100 120
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows
with two elastic flows: 2 → 6 and 7 → 5.
Figure 33 – Line topology with 7 e2NBs and 70 UEs using 10MHz in TDD
mode or 5MHz in FDD mode.
7.2 evaluation of the proposed approach 93
provide more MBSFN SFs in a frame for backhaul links (i.e., 60%
in FDD than 40% in TDD mode). We can observe in Figure 33.(a)
that with non-restricted VoIP flows, the FDD mode always provides
a higher data rate than the TDD mode. In the mean time, we can
observe in Figure 33.(b) that FDD mode is slightly outperforming the
TDD mode in terms of the latency, although both modes can achieve
100% of satisfaction. This phenomenon is also due to a higher number
of MBSFN SFs in the FDD mode. The observation of Figure 46 in
Appendix A leads to similar findings for the other traffic scenarios.
4500
4000 Elastic flow 12 11
Elastic flow 15 13
3500
Data rate (kbps)
Elastic flow 2 16
3000
2500
2000
1500
1000
500
0
B. V DL. V UL. V B. 2V DL. 2V UL. 2V B. DL./UL.
(a) Throughput of elastic flows over three concurrent elastic flows.
1
0.9 B. V
0.8 DL. V
0.7 UL. V
0.6 Dissatisfaction flow region:
CDF
Figure 34 – Hexagonal topology with 19 e2NBs and 190 UEs using 5MHz in
FDD mode.
7.2 evaluation of the proposed approach 95
100
90
80
Percentage (%) 70
60
50
40
30
20 % UL successful transmission
10 % UL channel noise too high
0
1 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 84
vUE id
Figure 35 – vUE UL transmission successful rate of hexagonal topology
with 19 e2NBs and 190 UEs using 5MHz radio bandwidth of
FDD mode under UL. 2V.
and hence reduces the expected total number of required DL SFs for
96 experimentations
4500
4000 Elastic flow 12 11
Elastic flow 15 13
3500
real-time traffic. Once again, the full algorithm shows the best trade-
off between throughput and meeting latency requirements.
tdd mode Finally, we examine the TDD mode over the same topol-
ogy using TDD UL/DL configuration 4 on a 10MHz radio bandwidth.
We also evaluated the results when not applying any restrictions on
the maximum number of hops over the mesh; however, all algorithms
fail to handle so many multi-hop VoIP flows and most VoIP packets
are dropped from the queues. Hence, we do not show these results
here and apply the restriction on the maximum number of hops over
the mesh to pair UEs and generate bi-directional VoIP flows.
The results without VoIP flows and with VoIP flows and such con-
straint (i.e., Nhop = 2 or Nhop = 3) are shown in Figure 37. We can ob-
serve in Figure 37.(a) that both simplified and full algorithms outper-
form the baseline one on the throughput over all scenarios, providing
twice as much cumulated throughput when applying the restriction
to two or three hops and around three times as much when without
any VoIP flow. Regarding latency aspect, we can see in Figure 37.(b)
and Figure 37.(c) that these three algorithms have very close perfor-
mance; however, none of them can satisfy 100% of the VoIP flows
when restricting the maximum hops to 3 over the mesh network. In
contrast, 100% satisfaction is achieved with restrictions on the two
hops which was not the case when using a 5MHz FDD channel (cf.
Figure 34(c)) as the trade-off of a lower throughput (cf. Figure 34(a))
7.2 evaluation of the proposed approach 97
4500
4000 Elastic flow 12 11
B.
L.
3V
2V
3V
2V
/U
B.
B.
L.
L.
L.
/U
/U
D
3V
2V
L.
L.
D
D
(a) Throughput of elastic flows over three concurrent elastic flows.
1
0.9 B. 3V
0.8 DL. 3V/UL. 3V Dissatisfaction
0.7 flow region:
0.6 flows in this
CDF
0.5
0.4
0.3
0.2
0.1
0
0 20 40 60 80 100 120 140
Latency (ms)
(c) CDF plot of the 95-th percentile of packet latency among real-time flows
under maximum 2-hop mesh with three elastic flows: 12 → 11, 15 → 13 and 2 → 16.
Figure 37 – Hexagonal topology with 19 e2NBs and 190 UEs using 10MHz
in TDD mode.
7.2.4 Summary
TDD mode can provide the best trade-off in two specific scenarios:
(a) a unique one hop elastic flow over the 7 e2NBs hexagonal topol-
ogy, and (b) two hops restriction on VoIP flows over the 19 e2NBs
hexagonal topology. In the later case, the runner-up is the same algo-
rithm in FDD mode since it does not perform as expected due to a
higher interference along the UL directions. Using a more conserva-
tive scheduler for UL transmissions will potentially further improve
its results and allows the FDD to outperform the TDD mode. More-
over, our proposed full algorithm always achieves the best trade-off
as it takes into account the network topology, considered real-time
traffic characteristics and it leverages FDD characteristics. Thus, it
has a better estimation on the number of required SFs for real-time
D . Last but not least, the simplified algorithm can be
traffic, i.e., SFrt
used in TDD mode as it has the same performance as the full version,
We have observed that the FDD mode performs generally better
than the TDD mode thanks to the higher number of available MBSFN
SFs for the self-backhauling. It is also easier to manage HARQ and
other feedback reports in FDD mode as explained in chapter 5 and 6.
We have also seen that the conservativeness of the DLS on the applied
AMC strategy is of importance to well utilize the UL direction in FDD
mode. We can conclude that the FDD approach performs better at
equivalent aggregated bandwidth usage than the TDD approach in
7.3 performance comparison of in-band and out-band deployment 99
In-band Un deployment
2.5
2
1.5
1
0.5
0
e2NB1 e2NB 2 e2NB1 e2NB3 UE 1 e2NB1
Figure 39 – Data rate of traffic flow of in/out-band deployments.
7.3 performance comparison of in-band and out-band deployment 101
×104
7 Elastic flow e2NB 2 e2NB1 Elastic flow UE 2 e2NB2
Data rate (kbps)
6
5
4
3
2
1
0
In-band Un deployment Out-band Uu deployment
(a) First scenario
×104
5
Elastic flow e2NB1 e2NB2 Elastic flow UE 2 e2NB 2
Data rate (kbps)
4
3
2
1
0
In-band Un deployment Out-band Uu deployment
(b) Second scenario
Figure 40 – Cumulated data rate of two traffic flows.
102 experimentations
7.4 summary
105
106 conclusion
fic while maximizing the throughput for elastic flows over the mesh
network. This complete architecture allows the designed network and
designed e2NB to be a SON with self-configuration, self-organization
and self-healing features.
We performed several experiments to assess the behavior and per-
formance of the proposed solution. Firstly, we evaluated the pro-
posed mesh physical layer that relies on the Un interface through
link-level emulation over the OAI platform. Secondly, using network
simulations, we evaluated the proposed scheduling approach over
several mesh network topologies with different traffic. We showed
the efficiency of the underlying physical layer on both computing re-
quirements and spectral efficiency using the OAI emulations. We also
demonstrated the effectiveness of the proposed hierarchical schedul-
ing approach to ensure QoS requirements while maximizing through-
put of elastic flows.
At the end of this study, we have shown that the e2NB is the best
candidate to answer the considered use cases that were not yet cov-
ered by current PS and military wireless communication systems. Par-
ticularly, we have detailed many design points and procedures that
are required at the e2NB to realize the self-backhauled LTE mesh net-
work before evaluating the physical layer in emulation as well as the
proposed scheduling approach in simulations.
To better identify the applicability of the proposed network archi-
tecture and of the e2NB in real deployments, the e2NB should be
implemented in a real RF prototype. Several steps are required to
develop a working prototype. Firstly, while we have designed most
of the required features of the e2NB, only part of them were imple-
mented and experimented. Regarding the physical layer, synchro-
nization procedures need to be applied. Moreover, the efficiency
of the channel measurements realized by vUEs should be evaluated
as the measurement window and periodicity can be much smaller
than the ones of a legacy UE. The impact of the proposed HARQ
modification for the TDD backhaul operation should be evaluated.
Lastly, while hardware modifications on the radio are expected to
be very limited, requiring only faster TX/RX switching time on the
radio chain(s) than for legacy BTS, they should be evaluated thor-
oughly. On higher layers, we over-viewed the content of messages
that should be exchanged between e2NB to enable the COE communi-
cations but did not specify any protocol for these message exchanges.
Thus, protocols for message exchanges between COE agents should be
designed and the election process of the COE controller should be de-
fined. Moreover, as we have seen in chapter 7, flow control algorithms
matter to ensure an efficient behavior and the high performance of
8.1 perspectives and future work 107
109
110 bibliography
[38] Dinesh Bharadia and Sachin Katti. « FastForward: Fast and Con-
structive Full Duplex Relays ». In: Proceedings of the 2014 ACM
Conference on SIGCOMM. SIGCOMM ’14. Chicago, Illinois, USA:
ACM, 2014, pp. 199–210. isbn: 978-1-4503-2836-4.
[39] Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station
(BS) radio transmission and reception. Technical Specification 36.104.
Version 8.14.0. 3GPP, 2017.
[40] Kai-Cheng Hsu, Kate Ching-Ju Lin, and Hung-Yu Wei. « Full-
duplex Delay-and-forward Relaying ». In: Proceedings of the 17th
ACM International Symposium on Mobile Ad Hoc Networking and
Computing. MobiHoc ’16. Paderborn, Germany: ACM, 2016. isbn:
978-1-4503-4184-4. doi: 10.1145/2942358.2942370.
[41] J. H. Yun. « Intra and Inter-Cell Resource Management in Full-
Duplex Heterogeneous Cellular Networks ». In: IEEE Transac-
tions on Mobile Computing 15.2 (Feb. 2016), pp. 392–405. issn:
1536-1233.
[42] Ankit Sharma, Radha Krishna Ganti, and J. Klutto Milleth. « Joint
Backhaul-Access Analysis of Full Duplex Self-Backhauling Het-
erogeneous Networks ». In: CoRR abs/1601.01858 (2016). url:
http://arxiv.org/abs/1601.01858.
[43] Oumer Teyeb, Vinh Van Phan, Bernhard Raaf, and Simone Redana.
« Dynamic Relaying in 3GPP LTE-Advanced Networks ». In:
EURASIP Journal on Wireless Communications and Networking 2009.1
(Sept. 2009), p. 731317. issn: 1687-1499. doi: 10 . 1155 / 2009 /
731317. url: https://doi.org/10.1155/2009/731317.
117
ADDITIONAL FIGURES
A
This appendix gathers figures that were not displayed in section 7.2
to improve readability.
0,5
0
10 20 30 40 50 60 70 80 90 100 110
Latency (ms)
(a) CDF plot of the 95-th percentile of packet latency among real-time flows.
1 → 2 elastic flow scenario.
1
Basic
DL.
CDF
0,5
UL.
0
10 20 30 40 50 60 70 80 90 100 110
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows.
4 → 6 elastic flow scenario.
Figure 41 – Hexagonal topology with 7 e2NBs and 70 UEs using a 10MHz
FDD configuration.
1
Basic
DL.
CDF
0,5
0
10 20 30 40 50 60 70 80 90
Latency (ms)
(a) CDF plot of the 95-th percentile of packet latency among real-time flows.
1 → 2 elastic flow scenario.
1
Basic
DL.
CDF
0,5
0
10 20 30 40 50 60 70 80 90
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows.
4 → 6 elastic flow scenario.
Figure 42 – Hexagonal topology with 7 e2NBs and 70 UEs using a 10MHz
TDD configuration.
119
120 additional figures
1
UL. FDD
DL. TDD
CDF
0,5
0
10 20 30 40 50 60 70 80 90
Latency (ms)
(a) CDF plot of the 95-th percentile of packet latency among real-time flows.
1 → 2 elastic flow scenario.
1
UL. FDD
DL. TDD
CDF
0,5
0
10 20 30 40 50 60 70 80 90
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows.
4 → 6 elastic flow scenario.
Figure 43 – Hexagonal topology with 7 e2NBs and 70 UEs using a 10MHz
TDD and a 5MHz FDD configuration.
1
Basic
DL.
UL.
CDF
0,5
0
0 20 40 60 80 100 120 140
Latency (ms)
(a) CDF plot of the 95-th percentile of packet latency among real-time flows. 2 → 6
elastic flow scenario.
1
Basic
DL.
UL.
CDF
0,5
0
0 20 40 60 80 100 120 140
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows. 7 → 5
elastic flow scenario.
Figure 44 – Line topology with 7 e2NBs and 70 UEs using a 5MHz FDD
configuration.
additional figures 121
1
Basic
DL.
CDF
0,5
0
0 20 40 60 80 100 120 140
Latency (ms)
(a) CDF plot of the 95-th percentile of packet latency among real-time flows.
2 → 6 elastic flow scenario without VoIP hop limitation.
1
Basic
DL.
CDF
0,5
0
10 20 30 40 50 60 70 80 90 100
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows.
2 → 6 elastic flow scenario with VoIP 1 hop constraint.
1
Basic
DL.
CDF
0,5
0
10 20 30 40 50 60 70 80 90 100 110
Latency (ms)
(c) CDF plot of the 95-th percentile of packet latency among real-time flows.
7 → 5 elastic flow scenario without VoIP hop limitation.
1
Basic
DL.
CDF
0,5
0
10 20 30 40 50 60 70 80 90 100
Latency (ms)
(d) CDF plot of the 95-th percentile of packet latency among real-time flows.
7 → 5 elastic flow scenario with VoIP 1 hop constraint.
Figure 45 – Line topology with 7 e2NBs and 70 UEs using a 10MHz TDD
configuration.
122 additional figures
1
UL. FDD
DL. TDD
CDF
0,5
0
0 20 40 60 80 100 120 140
Latency (ms)
(a) CDF plot of the 95-th percentile of packet latency among real-time flows.
2 → 6 elastic flow scenario without VoIP hop limitation.
1
UL. FDD
DL. TDD
CDF
0,5
0
0 20 40 60 80 100 120 140
Latency (ms)
(b) CDF plot of the 95-th percentile of packet latency among real-time flows.
7 → 5 elastic flow scenario without VoIP hop limitation.
Figure 46 – Line topology with 7 e2NBs and 70 UEs using a 10MHz TDD or
a 5MHz FDD configuration.
RÉSUMÉ EN FRANÇAIS
B
Cette section en français résume de manière courte les travaux
menés dans le cadre de cette thèse. Le lecteur est prié de consul-
ter les sections originales correspondantes s’il souhaite obtenir plus
de détails.
b.1 introduction
b.1.1 Motivation
123
124 résumé en français
b.1.2 Contributions
Legend
VLF
HF/VHF/UHF Satellite
SHF/EHF
Aircraft
Helicopter Aircraft
UAV Air
Land Sea Sea Land
Ship
Tank Ship Ship
USV Ship
Head
Troops Quarters
Aircraft
carrier Submarine
Speed boat Ship
UHF
Bande de fréquence SHF, EHF
(canal de 500 KHz)
Exigences fonctionnelles
SGi
EPC
HSS PCRF S7 P-GW
S6a S5-S8
X2 X2
Uu Uu Uu Uu
Uu
eNodeB eNodeB eNodeB
UE UE
UE UE UE
Figure 48 – Architecture nominale du LTE (Release 8).
une liaison logique qui s’appuie sur la préexistence d’un lien IP entre
les eNBs connectés.
Comme nous l’avons indiqué, les spécifications du LTE évoluent
continuellement et de nouvelles fonctionnalités sont ajoutées à chaque
nouvelle version. En particulier, le 3GPP a commencé à travailler sur
des fonctionnalités orientées "sécurité publique" à partir de la "Re-
lease 11". La Figure 49 regroupe les principaux travaux.
Cependant, malgré tous ces travaux, un certain nombre de fonction-
nalités d’importances pour les réseaux militaires et pour les réseaux
de sécurité publique ne sont pas traités. Ainsi, bien que le 3GPP
définisse un type d’eNB autonome (Isolated E-UTRAN) et les fonc-
tions minimales qu’il doit remplir, les liaisons entre eNBs autonomes
ne sont pas spécifiées et ne sont pas possibles même si ceux-ci sont
en portée radio. Il s’agit pourtant d’une fonctionnalité nécessaire à
l’établissement d’un réseau autonome.
Ainsi, nous choisissons le LTE pour réaliser toutes les liaisons sans
fil du réseau autonome.
EPC EPC
eNodeB
UE
UE
UE eNodeB
eNodeB
UE
UE relay UE
UE
e2NB
e2NB
UE eNodeB + UE
local EPC
functions UE e2NB
UE UE
UE UE
UE e2NB e2NB
3 – Isolated E-UTRAN
e2NB
Coordination & Orchestration Entity Agent
Routing
eNB
Local EPC
HSS P-GW
vUE MME S-GW
NAS
IP RRC RRC IP
PDCP PDCP
RLC RLC
MAC MAC
PHY PHY
e2NB x vUE y UE z
Nous avons défini trois états principaux pour l’e2NB. Ceux-ci cor-
respondent aux différents états d’interconnexion possibles. Les tran-
sitions entre les états sont gérées par l’agent COE en fonction de
l’évolution de la topologie du réseau et des connexions avec d’autres
e2NBs.
Les différents états et les transitions possibles sont présentés Fig-
ure 52.
L’état Isolé (Isolated) correspond à l’état dans lequel l’e2NB n’est
connecté à aucun autre e2NB. Il gère ses UEs comme un eNB clas-
sique et maintient un vUE en fonction pour assurer les procédures
de détection d’autres e2NBs. L’état Maillé (Meshed) correspond à
l’état dans lequel l’e2NB est connecté à au moins un autre e2NB via
un ou des vUEs. Toutes les fonctions de l’e2NB sont activées. L’état
vUE relai correspond à un état dans lequel l’eNB de l’e2NB est arrêté.
L’e2NB peut prendre cet état sur décision du COE afin de réduire
les interférences si la couverture radio peut être assurée par d’autres
e2NBs.
Relaying on a mesh
Serving local UEs
Local
EPC
EPC
connections
TX/RX Radio Chain TX/RX Radio Chain TX/RX Radio Chain
Uu Uu/Un Uu Uu/Un
UE4
UE6
e2NB6 UE7
meshed e2NB7 e2NB8
meshed meshed
e2NB5
UE1 meshed
e2NB1 UE5
meshed UE8
e2NB4 e2NB9
meshed isolated
e2NB2 UE
vUE relay
vUE
eNB
Flow properties
SuperFrame Performance indicator (source/destination node,
TX/RX Routes and e2NB status datarate,
allocations latency requirements)
Le contrôleur COE est unique sur une sous partie du réseau maillé
et est élu par les agents COE qui en font partie. Il est chargé d’agréger
les informations qui lui sont remontées par les agents COE, en par-
ticulier les caractéristiques des flux temps réel générés par les UEs
locaux (exigences de qualité de service, débit, etc.) ainsi que des indi-
cateurs de qualité de canal et d’interférence avec les nœuds adjacents.
Le contrôleur COE se charge alors, par le biais des algorithmes décrits
dans le chapitre 6 et en particulier du Controller Scheduling Algo-
rithm (CSA) (Algorithme 1), de déterminer pour chaque e2NB dont
il a la charge, sur quelles sous-trames cet e2NB pourra transmettre à
ses voisins et sur quelles sous-trames celui-ci devra se placer en mode
140 résumé en français
b.7 expérimentations
b.8 conclusion
A la fin de cette étude, nous avons montré que le2NB est un bon
candidat à répondre aux cas d’utilisation considérés qui n’étaient
pas encore couverts par les systèmes actuels de communication sans
fil militaires et pour la sécurité publique. Particulièrement, nous
avons détaillé de nombreux points de conception et procédures qui
B.8 conclusion 143
sont nécessaires à l’e2NB pour réaliser le réseau maillé LTE sur une
bande. Nous avons évalué la couche physique en émulation ainsi que
l’approche d’ordonnancement proposée par des simulations.
Pour mieux identifier l’applicabilité de l’architecture de réseau pro-
posée et de l’e2NB dans des déploiements réels, l’e2NB devrait être
implémenté dans un vrai prototype radiofréquence. Plusieurs étapes
sont nécessaires pour développer un prototype fonctionnel. Première-
ment, alors que nous avons conçu la plupart des fonctionnalités requi-
ses par l’e2NB, seulement une partie d’entre elles ont été mises en œu-
vre et expérimentées. Concernant la couche physique, la synchronisa-
tion et les procédures doivent être appliquées. De plus, l’efficacité des
mesures de canaux réalisées par les vUEs doit être évaluée compte
tenu de la possibilité pour les intervalles de mesure d’être beaucoup
plus petites et moins fréquentes que celles d’un UE classique. L’impact
des modifications proposées concernant l’HARQ pour le mode TDD
doit être évalué. Enfin, bien que les modifications matérielles de la
chaîne radio devraient être très limitées, ne nécessitant a priori qu’un
temps de commutation TX/RX plus court que sur la chaîne radio
d’un eNB, il est nécessaire de les évaluer minutieusement. Concer-
nant les couches supérieures, nous avons défini le contenu des mes-
sages qui devrait être échangés entre e2NBs pour permettre les com-
munications entre COEs mais nous n’avons pas spécifié de protocole
pour ces échanges de messages. Ainsi, les protocoles d’échange de
messages entre agents COE doivent être conçus ainsi que le proces-
sus d’élection du contrôleur COE. De plus, comme nous l’avons vu
au chapitre 7, les algorithmes de contrôle de flux sont nécessaires
pour assurer un comportement efficace et des hautes performances
du réseau maillé lorsqu’il y a un nombre élevé de nœuds ou un nom-
bre élevé de flux en temps réel. Ainsi, l’efficacité des politiques de
contrôle des flux devraient être évaluées. Finalement, les exigences
sur les éléments du cœur de réseau et sur la couche supérieure de
services pour permettre la séparation et la fusion transparente des
réseaux maillés ont seulement été décrites à haut niveau et devraient
être étudiés dans les détails. Tandis que les modifications sur le cœur
de réseau ne devraient pas être majeures, les exigences de sécurité
spécifique aux autorités militaires et de sécurité publiques n’ont pas
été évaluées et pourrait avoir un impact plus important.
L’approche proposée n’est pas définitive et pourrait subir quelques
évolutions. Par exemple, des extensions de l’approche pour le fonc-
tionnement avec les stations de base multi-sectorielles ont été pro-
posées au chapitre 6, mais leur efficacité devrait être évaluée. De
même, les techniques de formation de faisceaux sont connues pour
améliorer fortement les performances dans les réseaux maillés. Cepen-
dant, l’intégration efficace de cette fonctionnalité dans les algorithmes
d’ordonnancement n’est pas simple et nécessiterait plus d’études. Bien
que nous visions une solution fonctionnant avec un minimum de
144 résumé en français
ACK Acknowledgment.
ADC Analog-to-Digital Converter.
AFR Average Frequency Reuse.
AMC Adaptive Modulation and Coding.
ANR Automatic Neighbour Relation.
ARQ Automatic Repeat reQuest.
BS Base Station.
BTS Base Transceiver Station.
D2D Device-to-Device.
DCI Downlink Control Information.
147
148 Acronyms
FD Full Duplex.
FDD Frequency Division Duplexing.
FeICIC Further enhanced Inter Cell Interference Coordina-
tion.
FirstNet First Responder Network Authority.
NACK Non-acknowledgment.
NATO North Atlantic Treaty Organization.
NDI New Data Indicator.
NeNodeB Nomadic eNodeB.
NFV Network Functions Virtualization.
NN Nokia Networks.
nrt Neighbour Relation Table.
RA Random Access.
RACH Random Access Channel.
RAN Radio Access Network.
RAT Radio Access Technology.
RB Resource Block.
RBP Resource Block Pair.
RE Resource Element.
RF Radio Frequency.
RIFAN 2 Réseau Intranet des Forces Aéro-Navales 2.
Acronyms 151
RN Relay Node.
ROHC Robust Header Compression.
R-PDCCH Relay Physical Downlink Control Channel.
R-PDSCH Relay Physical Downlink Shared Channel.
RRC Radio Resource Control.
RSRP Reference Signal Received Power.
RX Receiver.