Sunday 25 August 2013

Centralized SON


I was going through the presentation by SKT that I blogged about here and came across this slide above. SKT is clearly promoting the benefits of their C-SON (centralized SON) here.


The old 4G Americas whitepaper (here) explained the differences between the three approaches; Centralized (C-SON), Distributed (D-SON) and Hybrid (H-SON). An extract from that paper here:

In a centralized architecture, SON algorithms for one or more use cases reside on the Element Management System (EMS) or a separate SON server that manages the eNB's. The output of the SON algorithms namely, the values of specific parameters, are then passed to the eNB's either on a periodic basis or when needed. A centralized approach allows for more manageable implementation of the SON algorithms. It allows for use case interactions between SON algorithms to be considered before modifying SON parameters. However, active updates to the use case parameters are delayed since KPIs and UE measurement information must be forwarded to a centralized location for processing. Filtered and condensed information are passed from the eNB to the centralized SON server to preserve the scalability of the solution in terms of the volume of information transported. Less information is available at the SON server compared to that which would be available at the eNB. Higher latency due to the time taken to collect UE information restricts the applicability of a purely centralized SON architecture to those algorithms that require slower response time. Furthermore, since the centralized SON server presents a single point of failure, an outage in the centralized server or backhaul could result in stale and outdated parameters being used at the eNB due to likely less frequent updates of SON parameters at the eNB compared to that is possible in a distributed solution.

In a distributed approach, SON algorithms reside within the eNB’s, thus allowing autonomous decision making at the eNB's based on UE measurements received on the eNB's and additional information from other eNB's being received via the X2 interface. A distributed architecture allows for ease of deployment in multi-vendor networks and optimization on faster time scales. Optimization could be done for different times of the day. However, due to the inability to ensure standard and identical implementation of algorithms in a multi-vendor network, careful monitoring of KPIs is needed to minimize potential network instabilities and ensure overall optimal operation.

In practical deployments, these architecture alternatives are not mutually exclusive and could coexist for different purposes, as is realized in a hybrid SON approach. In a hybrid approach, part of a given SON optimization algorithm are executed in the NMS while another part of the same SON algorithm could be executed in the eNB. For example, the values of the initial parameters could be done in a centralized server and updates and refinement to those parameters in response to the actual UE measurements could be done on the eNB's. Each implementation has its own advantages and disadvantages. The choice of centralized, distributed or hybrid architecture needs to be decided on a use-case by use case basis depending on the information availability, processing and speed of response requirements of that use case. In the case of a hybrid or centralized solution, a practical deployment would require specific partnership between the infrastructure vendor, the operator and possibly a third party tool company. Operators can choose the most suitable approach depending upon the current infrastructure deployment.

Finally, Celcite CMO recently recently gave an interview on this topic on Thinksmallcell here. An extract below:

SON software tunes and optimises mobile network performance by setting configuration parameters in cellsites (both large and small), such as the maximum RF power levels, neighbour lists and frequency allocation. In some cases, even the antenna tilt angles are updated to adjust the coverage of individual cells.

Centralised SON (C-SON) software co-ordinates all the small and macrocells, across multiple radio technologies and multiple vendors in a geographic region - autonomously updating parameters via closed loop algorithms. Changes can be as frequent as every 15 minutes– this is partly limited by the bottlenecks of how rapidly measurement data is reported by RAN equipment and also the capacity to handle large numbers of parameter changes. Different RAN vendor equipment is driven from the same SON software. A variety of data feeds from the live network are continuously monitored and used to update system performance, allowing it to adapt automatically to changes throughout the day including outages, population movement and changes in services being used.

Distributed SON (D-SON) software is autonomous within each small cell (or macrocell) determining for itself the RF power level, neighbour lists etc. based on signals it can detect itself (RF sniffing) or by communicating directly with other small cells.

LTE has many SON features already designed in from the outset, with the X.2 interface specifically used to co-ordinate between small and macrocell layers whereas 3G lacks SON standards and requires proprietary solutions.
C-SON software is available from a relatively small number of mostly independent software vendors, while D-SON is built-in to each small cell or macro node provided by the vendor. Both C-SON and D-SON will be needed if network operators are to roll out substantial numbers of small cells quickly and efficiently, especially when more tightly integrated into the network with residential femtocells.

Celcite is one of the handful of C-SON software solution vendors. Founded some 10 years ago, it has grown organically by 35% annually to 450 employees. With major customers in both North and South America, the company is expanding from 3G UMTS SON technology and is actively running trials with LTE C-SON.

Quite a few companies are claiming to be in the SON space, but Celcite would argue that there are perhaps only half a dozen with the capabilities for credible C-SON solutions today. Few companies can point to live deployments. As with most software systems, 90% of the issues arise when something goes wrong and it's those "corner cases" which take time to learn about and deal with from real-world deployment experience.

A major concern is termed "Runaway SON" where the system goes out of control and causes tremendous negative impact on the network. It's important to understand when to trigger SON command and when not to. This ability to orchestrate and issue configuration commands is critical for a safe, secure and effective solution.

Let me know your opinions via comments below.

Friday 23 August 2013

How Cyber-Attacks Can Impact M2M Infrastructure


An Interesting presentation from Deutsche Telekom in the Network Security Conference which highlights some of the issues faced by the M2M infrastructure. With 500 Billion devices being predicted, security will have to be stepped up for the M2M infrastructures to work as expected. Complete presentation embedded below:


Wednesday 21 August 2013

eIMTA: Enhanced Interference Mitigation & Traffic Adaptation


eIMTA is one of the features being discussed in 3GPP Rel-12. The pictures above and below provide the details.
As can be seen, at the moment all the eNodeB's associated with a network has to transmit the same UL/DL pattern throughout out the system. With eIMTA, each eNodeB can decide the UL/DL pattern itself depending on the load.
The main challenge would be interference management while using this scheme.

See also, this slideshare presentation for details:

Monday 12 August 2013

C-RAN Architecture and Challenges


I have blogged about Cloud RAN or C-RAN in the Metrocells blog here and am looking forward to more discussions on this topic in the SON conference later this year.


I came across this interesting presentation from Orange in the LTE World Summit this year where the authors have detailed the C-RAN architecture and also discussing the fronthaul challenges faced by C-RAN. The presentation is embedded as follows. Please feel free to add your comments with your opinions.




Thursday 8 August 2013

2 Factor and 3 Factor Authentication (2FA / 3FA)

Found an interesting slide showing 2 Factor Authentication in picture from a presentation in LTE World Summit


You can also read more about this and Multi-factor Authentication (MFA) on Wikipedia here.

Tuesday 6 August 2013

M2M, Cellular and Small Cells

I have written a post on this topic in the Cisco Service Provide Mobility blog here. The article is embedded as follows:



Feel free to add any comments you may have on the blog post here.

Friday 2 August 2013

Mobile Relay Nodes (MRN) in Rel-12


Interesting article in IEEE Comms Magazine (embedded below) about the Moving Relay Node (MRN). 3GPP has done a study on a similar topic available in 3GPP TR 36.836. To make the case for the MRN they provide a reference scenario of high speed train

The TGV Eurostar in Europe is 393 m long, moves at speed reaching 300 km/h. The Shinkansen in Japan has similar characteristics, with 480 m long, 300 km/h of commercial speed. The high speed train in China is 432 m long moving at speed reaching 350 km/h.

Due to fast moving and well shield carriage, the network in high speed train scenario faces severe Doppler frequency shift and high penetration loss, reduced handover success rate and increased power consumption of UEs.


To improve the coverage of the train deployment, access devices can be mounted on the high speed train, providing a wireless backhaul connection via the eNBs along the railway by outer antenna e.g. installed on top of the train, and wireless connectivity to the UEs inside carriages by inner antenna installed inside.

MRN is a good solution but when it has to operate alongside with many other technologies can pose challenges. The IEEE article summarises it as follows:

Furthermore, new challenges regarding interference management arise due to the use of MRNs. As the distance between an MRN and the vehicular UE served by it is very short, the MRN and the vehicular UE can communicate with each other using very low power. In addition, the VPL can further help to dampen the signal of the MRN access link that propagates out from the vehicle. Thus, compared to direct transmission, the use of MRNs generates less interference from the access link, for both downlink and uplink, to UE outside the vehicles. This is appreciated in a densely deployed urban scenario where link availabilities are usually dependent on interference rather than coverage. For the backhaul link, however, the problem becomes complicated, as interference is expected both between different MRN backhaul links, and between MRN backhaul links and macro UE. The use of predictor antennas can improve CSI accuracy to enable the use of advanced interference avoidance and cancellation schemes for the backhaul links. Nevertheless, whether enhancements on the current intercell interference coordination (ICIC) framework in LTE are needed to support the use of MRNs still requires further investigation.

I have been thinking of possible use of 8x8 MIMO, this can be one possible scenario where the network may use 8x8 or even 4x4. Anyway, the complete article is embedded below:




Wednesday 31 July 2013

Making LTE fit for the IoT

Another presentation from the #FWIC2013. This presentation by Vodafone covers some of the areas where the LTE standards are being tweaked for making M2M work with them without issues.


Another area is the access barring that I have blogged about before here. This will become important when we have loads of devices trying to access the network at the same time.

The presentation is embedded below and you can also listen to the audio here.


Monday 29 July 2013

Big Data and Vulnerability of Cellular Systems

I am sure most of you are aware of Big Data, if not watch this video on my old post here. Moray Rumney from Agilent recently gave a talk in #FWIC on how Big Data techniques can be used to exploit the vulnerabilities in a cellular system. Though the talk focussed on GSM and 3G, it is always a good intro. The presentation embedded below:



You can also listen to the audio of his presentation here.

Sunday 28 July 2013

New RRC message in Rel-11: In-device coexistence indication

I have blogged about about IDC here and here. If the eNB is interested in knowing if the device is having an interference issue it can ask the UE to send this message in the RRC Conn Reconfiguration message. The UE would send the message if it has interference issues.
Inter-frequency handover is a good solution in case the UE is experiencing interference.

From the Rel-11 whitepaper posted last week here:

To assist the base station in selecting an appropriate solution, all necessary/available assistance information for both time and frequency domain solutions is sent together in the IDC indication. The IDC assistance information contains the list of carrier frequencies suffering from on-going interference and the direction of the interference. Additionally it may also contain time domain patterns or parameters to enable appropriate DRX configuration for time domain solutions on the serving LTE carrier frequency.

Note that the network is in the control of whether or not to activate this interference avoidance mechanism. The InDeviceCoexIndication message from the UE may only be sent if a measurement object for this frequency has been established. This is the case, when the RRCConnectionReconfiguration message from the eNB contains the information element idc-Config. The existence of this message declares that an InDeviceCoexIndication message may be sent. The IDC message indicates which frequencies of which technologies are interfered and gives assistance to possible time domain solutions. These comprise DRX assistance information and a list of IDC subframes, which indicate which HARQ processes E-UTRAN is requested to abstain from using. This information describes only proposals, it is completely up to the network to do the decisions.

Wednesday 24 July 2013

Connectivity in 'Connected Vehicles'

An interesting presentation from the Future of Wireless International conference about the evolution and options for connected cars and other vehicles



Friday 19 July 2013

Nice way of showing HetNets, by Cisco #LTEWS

This is from a presentation by Akram Awad of Cisco in the LTE World Summit 2013 in Amsterdam. I really like the way HetNets are explained





Wednesday 17 July 2013

Decision Tree of Transmission Modes (TM) for LTE


4G Americas have recently published whitepaper titled "MIMO and Smart Antennas for Mobile Broadband Systems" (available here). The above picture and the following is from that whitepaper:

Figure 3 above shows the taxonomy of antenna configurations supported in Release-10 of the LTE standard (as described in 3GPP Technical Specification TS 36.211, 36.300). The LTE standard supports 1, 2, 4 or 8 base station transmit antennas and 2, 4 or 8 receive antennas in the User Equipment (UE), designated as: 1x2, 1x4, 1x8, 2x2, 2x4, 2x8, 4x2, 4x4, 4x8, and 8x2, 8x4, and 8x8 MIMO, where the first digit is the number of antennas per sector in the transmitter and the second number is the number of antennas in the receiver. The cases where the base station transmits from a single antenna or a single dedicated beam are shown in the left of the figure. The most commonly used MIMO Transmission Mode (TM4) is in the lower right corner, Closed Loop Spatial Multiplexing (CLSM), when multiple streams can be transmitted in a channel with rank 2 or more.

Beyond the single antenna or beamforming array cases diagrammed above, the LTE standard supports Multiple Input Multiple Output (MIMO) antenna configurations as shown on the right of Figure 3. This includes Single User (SU-MIMO) protocols using either open loop or closed loop modes as well as transmit diversity and Multi-User MIMO (MU-MIMO). In the closed loop MIMO mode, the terminals provide channel feedback to the eNodeB with Channel Quality Information (CQI), Rank Indications (RI) and Precoder Matrix Indications (PMI). These mechanisms enable channel state information at the transmitter which improves the peak data rates, and is the most commonly used scheme in current deployments. However, this scheme provides the best performance only when the channel information is accurate and when there is a rich multi-path environment. Thus, closed loop MIMO is most appropriate in low mobility environments such as with fixed terminals or at pedestrian speeds.

In the case of high vehicular speeds, Open Loop MIMO may be used, but because the channel state information is not timely, the PMI is not considered reliable and is typically not used. In TDD networks, the channel is reciprocal and thus the DL channel can be more accurately known based on the uplink transmissions from the terminal (the forward link’s multipath channel signature is the same as the reverse link’s – both paths use the same frequency block). Thus, MIMO improves TDD networks under wider channel conditions than in FDD networks.

One may visualize spatial multiplexing MIMO operation as subtracting the strongest received stream from the total received signal so that the next strongest signal can be decoded and then the next strongest, somewhat like a multi-user detection scheme. However, to solve these simultaneous equations for multiple unknowns, the MIMO algorithms must have relatively large Signal to Interference plus Noise ratios (SINR), say 15 dB or better. With many users active in a base station’s coverage area, and multiple base stations contributing interference to adjacent cells, the SINR is often in the realm of a few dB. This is particularly true for frequency reuse 1 systems, where only users very close to the cell site experience SINRs high enough to benefit from spatial multiplexing SU-MIMO. Consequently, SU-MIMO works to serve the single user (or few users) very well, and is primarily used to increase the peak data rates rather than the median data rate in a network operating at full capacity.

Angle of Arrival (AoA) beamforming schemes form beams which work well when the base station is clearly above the clutter and when the angular spread of the arrival is small, corresponding to users that are well localized in the field of view of the sector; in rural areas, for example. To form a beam, one uses co-polarized antenna elements spaced rather closely together, typically lamda/2, while the spatial diversity required of MIMO requires either cross-polarized antenna columns or columns that are relatively far apart. Path diversity will couple more when the antennas columns are farther apart, often about 10 wavelengths (1.5m or 5’ at 2 GHz). That is why most 2G and 3G tower sites have two receive antennas located at far ends of the sector’s platform, as seen in the photo to the right. The signals to be transmitted are multiplied by complex-valued precoding weights from standardized codebooks to form the antenna patterns with their beam-like main lobes and their nulls that can be directed toward sources of interference. The beamforming can be created, for example, by the UE PMI feedback pointing out the preferred precoder (fixed beam) to use when operating in the closed loop MIMO mode TM4.

For more details, see the whitepaper available here.

Related posts:


Monday 15 July 2013

What's next with 802.11!


From another brilliant presentation by R&S from their LTE Summit 2013. Last year I had a similar overview from Agilent here. This one is much more detailed on what's coming next for WiFi.



Friday 12 July 2013

Thursday 11 July 2013

Present and Future Technologies for Internet of Things (IoT)

An Interesting presentation from our Future of Wireless Conference (#FWIC2013) in Cambridge earlier this month. A question being asked is what technology will be used for Internet of Things (IoT) or Internet of Everything (IoE) as its also referred to nowadays. These 3 slides below summarises what technologies are see applicable to which scenarios.




Complete slides are embedded below and if you like to see the video, its available here.



Monday 8 July 2013

Adaptive Video Streaming: Principles, Improvements and Innovation


An Interdigital presentation from last year explains the principle of adaptive streaming very well for those who would not know how it worked.


This process of adaptation could be improved based on the quality of coverage at any particular time.

Interdigital are proposing a further enhancement of improving the adaptation further based on the User behaviour. If for example the user is far away then the quality need not be great on the device. On the other hand if the user is very close-by, the quality should be as good as it can get. They have explained it in a whitepaper for whoever is interested here.

A video showing this method is embedded below:


Sunday 7 July 2013

500 Billion devices by 2030, etc...

Few weeks back in the LTE World Summit 2013, I heard someone from Ericsson mention that internally they think that by 2030 there will be 500 Billion Connected devices on the planet. The population projections for 2030 is somewhere around 8.5 Billion people worldwide. As a result the figure does not come much as a surprise to me.

John Cunliffe from Ericsson is widely credited for making the statement 50 Billion connected devices by 2020. Recently he spoke in the Cambridge Wireless and defended his forecast on the connected devices. He also provided us with the traffic exploration tool to see how the devices market would look up till 2018. Here is one of the pictures using the tool:



In terms of Cellular connectivity, we are looking at 9 Billion devices by 2018. The interesting thing to notice is that in 2017, there are still some 4 Billion feature phones. While in the developed world our focus is completely on Smartphones, its interesting to see new and existing SMS/USSD based services are still popular in the developing world. Some months back I heard about Facebook developing SMS/USSD based experience for Feature phones, I am sure that would attract a lot of users from the developing world.

One thing missing from the above is non-cellular connections which will make bulk of connectivity. Wi-Fi for example is a major connectivity medium for tablets. In fact 90% of the tablets have only WiFi connectivity. Bluetooth is another popular method of connectivity. While its mostly used in conjunction with phones, it is going to be a popular way of connecting devices in the Personal Area Network's (PAN's). So its no surprise that we will see 50 Billion connected devices but maybe not by 2020. My guess would be around 2022-23.

Monday 1 July 2013

Is it too early to talk '5G'


While LTE/LTE-A (or 4G) is being rolled out, there is already a talk about 5G. Last week in the LTE World Summit in Amsterdam, there was a whole track on what should 5G be without much technical details. Couple of months back Samsung had announced that they have reached 5G breakthrough. In my talk back in May, I had suggested that 5G would be an evolution on the Radio Access but the core will evolve just little. Anyway, its too early to speculate what the access technology for 5G would be.

Ericsson has published a '5G' whitepaper where they talk about the vision and why and what of 5G rather than going into any technical details. It is embedded below:


Sunday 30 June 2013

Multi-RAT mobile backhaul for Het-Nets

Recently got another opportunity to hear from Andy Sutton, Principal Network Architect, Network Strategy, EE. His earlier presentation from our Cambridge Wireless event is here. There were many interesting bits in this presentation and some of the ones I found interesting is as follows:

Interesting to see in the above that the LTE traffic in the backhaul is separated by the QCI (QoS Class Identifiers - see here) as opposed to the 2G/3G traffic.




This is EE's implementation. As you may notice 2G and 4G use SRAN (Single RAN) while 3G is separate. As I mentioned a few times, I think 3G networks will probably be switched off before the 2G networks, mainly because there are a lot more 2G M2M devices that requires little data to be sent and not consume lots of energy (which is an issue in 3G), so this architecture may be suited well.


Finally, a practical network implementation which looks different from the text book picture and the often touted 'flat' architecture. Andy did mention that they see a ping latency of 30-50ms in the LTE network as opposed to around 100ms in the UMTS networks.


Mark Gilmour was able to prove this point practically.

Here is the complete presentation:



Saturday 29 June 2013

Timing Accuracy and Phase Performance Requirements in LTE/LTE-A/4G

Nice quick summary videos from Chronos.



If you are interested in learning more on this topic or discussions, I would recommend joining the Phase Ready Linkedin group.

Monday 24 June 2013

3 Band Carrier Aggregation in Release-12


So it looks like in the latest 3GPP RAN meeting finally more than 2 carriers have been proposed for Carrier Aggregation. The TDoclist has a few items on 3 carriers for CA. In some cases its been specified that there is 1 uplink component carrier (1UL CC) but in other cases its not specified and I have not looked into details. Its good to finally see more than 2 carriers being discussed.

Rohde&Schwarz have explained in one of their whitepapers about the numbering of CA bands.

Now there is a possibility that we may have 2 contiguous bands and 1 band from an Inter-band so the naming would be accordingly. There are also going to be new carrier types (NCT), Band 29 for example. See details here.

Finally, If you want to learn more about Carrier Aggregation (CA) or other LTE-Advanced features, my article from last year, here, would be useful.

Thursday 20 June 2013

Economical M2M using LTE - #LTEWS

In the upcoming LTE World Summit 2013 (programme here), I will be doing a briefing on the topic 'Economical M2M using LTE'. I have some ideas but I would like to hear more on what you think? In fact, is LTE the right technology from the M2M device point of view? Or do they better stick to 2G (I dont think 3G is good enough generally from low data M2M point of view). What other issues can be foreseen? Security? Roaming?
A recent presentation from Telefonica shows how they are partnering with other operators worldwide to create universal solutions. Will this help? Why not use these solutions for everything, not just LTE? LTE is data only technology isn't it?

The presentation is embedded below to draw your own conclusion but I an interested in hearing your thoughts on Twitter or here on the blog.

Sunday 16 June 2013

Five Future Technologies (#FutureTech) we may see soon in our devices!

Remember 'Internet of Everything' rather than 'Internet of Things', here is a recent Cisco video explaining this vision:

You can read more on these topics on Cisco blogs.


Next is the self-healing technology:



Spray-on clothes
These will go very well with phones where you can spray paint phone covers and maybe if its possible to dissolve the skin and re-use it, it would be an added bonus.


Just think how the technology used to design Robots can enable flexible phones and other devices.




With sensors becoming smaller and cheaper, more of them are being put in our devices. Many years back people were saying that breath analysers could be available in mobiles but I guess there wasnt a business case for that. Also many of these sensors have come as part of Bluetooth add-ons to keep the cost/weight/size of the device down. Now there is a possibility of whole new range of sensors coming to our devices.

You can read more details on this here.


Finally, there is always one user who would ask me why is there no mention of LTE in the videos above so here is a **bonus** video.

I have to mention that this didnt sound very convincing to me as a selling point. Its like back in the year 2000, 3G was being sold as an enabler to the must have 'Video calling'.

Friday 7 June 2013

3GPP Public Safety focus in Rel-12


Public Safety is still a hot topic in the standards discussion and on this blog as well. Two recent posts containing presentations have been viewed and downloaded like hotcakes. See here and here.

3GPP presented on this topic in the Critical Communications World that took place last month. The following is from the 3GPP press release:

The ’Critical Communications World’ conference, held recently in Paris, has focused largely on the case for LTE standardized equipment to bring broadband access to professional users, by meeting their high demands for reliability and resilience.
Balazs Bertenyi, the 3GPP SA Chair, reported on the latest status of the first 3GPP features for public safety, in particular those covering Proximity services (Direct mode) and Group call. He spoke of the need to strike a balance between more or less customisation, to make use of commercial products while meeting the specific requirements for Public Protection and Disaster Relief (PPDR).
To ensure that these needs are met, Balazs Bertenyi called for the wholehearted participation of the critical communications community in 3GPP groups, by sending the right people to address the technical questions and obstacles that arise during the creation of work items.

A presentation and video from that event is embedded below:




For more details see here.

Monday 3 June 2013

New Carrier Type (NCT) in Release-12 and Band 29

One of the changes being worked on and is already available in Release-11 is the Band 29. Band 29 is a special FDD band which only has a downlink component and no uplink component. The intention is that this band is available an an SCell (Secondary cell) in CA (Carrier Aggregation). 

What this means is that if this is only available as an SCell, any UE that is pre-Rel-11 should not try to use this band. It should not read the system information, reference information, etc. In fact the System Information serves little or no purpose as in CA, the PCell will provide the necessary information for this SCell when adding it using the RRC Reconfiguration message. This gives rise to what 3GPP terms as New Carrier Type for LTE as defined here. An IEEE paper published not long back is embedded below that also describes this feature in detail. 

The main thing to note from the IEEE paper is what they have shown as the unnecessary information being removed to make the carrier lean.

China Mobile, in their Rel-12 workshop presentation, have suggested 3 different types/possibilities for the NCT for what they call as LTE-Hi (Hi = Hotspot and Indoor).

Ericsson, in their Rel-12 whitepaper mention the following with regards to NCT:

Network energy efficiency is to a large extent an implementation issue. However, specific features of the LTE technical specifications may improve energy efficiency. This is especially true for higher-power macro sites, where a substantial part of the energy consumption of the cell site is directly or indirectly caused by the power amplifier.

The energy consumption of the power amplifiers currently available is far from proportional to the power-amplifier output power. On the contrary, the power amplifier consumes a non-negligible amount of energy even at low output power, for example when only limited control signaling is being transmitted within an “empty” cell.

Minimizing the transmission activity of such “always-on” signals is essential, as it allows base stations to turn off transmission circuitry when there is no data to transmit. Eliminating unnecessary transmissions also reduces interference, leading to improved data rates at low to medium load in both homogeneous as well as heterogeneous deployments.

A new carrier type is considered for Release 12 to address these issues. Part of the design has already taken place within 3GPP, with transmission of cell-specific reference signals being removed in four out of five sub frames. Network energy consumption can be further improved by enhancements to idle-mode support.

The IEEE paper I mentioned above is as follows:



Sunday 2 June 2013

Everything you wanted to know on Cloud Encryption

Cloud has been in the news recently for not the right reasons. The main worry with cloud is not just where your data is located and who can have access to it but also if some rogue person or institution gets access what they will do with your data. Then there is also an issue of which third party programs are allowed to access your data and they may not be as strict in complying with the security requiremenys as the original cloud platform.

I like Dropbox (even though I am still a free user) but it is used as an example in many case studies for security related to cloud. A quick search on Google and some useful links summarising the issues with Dropbox security here, here and here.

A user on slideshare recently uploaded many presentations from the Cloud Asia 2013 in Singapore here. One of the presentations that I really liked is embedded below.

The two main things from the presentation that I really want to highlight is the Worldwide compliance which can be a bit of an issue once you want to offer your service universally and the other is the different level of encryption that is required to keep the data secure. Pictures of both as follows:



Enjoy the presentation:



Friday 31 May 2013

Friday rant: OTT, Viber, Roaming, etc.

The same old story, mobile operators are seeing that their revenue is not growing, even though they are upgrading their networks and introducing new features / technologies. The following is from Total Telecom:

The global telecom services market generated revenue of €1.12 trillion in 2012, although at 2.7% growth was slower than in the previous year, according to the 2013 DigiWorld Yearbook published by IDATE on Thursday.
The "DigiWorld" as a whole - which also includes telecoms hardware, software and computer services, computer hardware, TV services, consumer electronics and Internet services – recorded revenues of €3.17 trillion last year, up 2.8% on 2011. By 2016 that figure will have risen to €3.66 trillion, IDATE predicts, with telecoms services contributing €1.25 trillion (see chart).
Telecoms operators are experiencing flat growth, while over-the-top (OTT) providers are seeing revenues increase by 15% a year, Vincent Bonneau, head of IDATE's Internet business unit, told attendees at the DigiWorld Yearbook launch in London earlier this month.

Another interesting piece of news was that Viber has launched a desktop application which means it can now rival Skype fully.

Guess what, I would think that operators have more to worry from this news than Skype. I have stopped using Skype for some time now due to many issues I have with it and have moved to Viber for a few months.   If you are a regular reader to this blog then you would have read my recent post complaining about the global roaming rates. When I am travelling abroad, I make sure there is WiFi and use Viber as a substitute for Voice and SMS. In fact I can send MMS and emoticons using Viber which would cost a fortune over cellular otherwise.

Sometimes it feels like the operators are sleepwalking into their own destruction by not innovating enough and fast to be a challenge for these OTT services. Not entirely sure what the solutions are but there are quite a few ideas around to start thinking in that direction. An interesting presentation by Dean Bubley I posted here is a good starting point. Another one from him and Martin Geddes is embedded below, which is quite interesting and intutive.



Enough of my rants, what do you think about this?

Thursday 30 May 2013

Internet Trends by Mary Meeker at #D11

The last time I posted the presentation by Mary Meeker was back in 2011 but the things have moved on and its amazing to see some of the things that have changed. I think the slide that summarises what I mean is as follows:

Nomophobia and FOMO are a big problem and I see this day in day out working in this industry.

The slide pack which was actually posted yesterday has already crossed 550K as I write this, in just 1 day. So you can understand how eagerly awaited event this has become every year.



To download the above, click on the Slideshare icon and then you can save from Slideshare site.

If you want to watch the video of her presentation, its available on All things digital website here.

Tuesday 28 May 2013

NEC on 'Radio Access Network' (RAN) Sharing

Its been a while we looked at anything to do with Network Sharing. The last post with an embed from Dr. Kim Larsen presentation, has already crossed 11K+ views on slideshare. Over the last few years there has been a raft of announcements about various operators sharing their networks locally with the rivals to reduce their CAPEX as well as their OPEX. Even though I understand the reasons behind the network sharing I believe that the end consumers end up losing as they may not have a means of differentiating between the different operators on a macro cell.

Certain operators on the other hand offer differentiators like residential femtocells that can enhance indoor coverage or a tie up with WiFi hotspot providers which may provide them wi-fi access on the move. The following whitepaper from NEC is an interesting read to understanding how RAN sharing in the LTE would work.