Published online by Cambridge University Press: 05 June 2016
A simulation methodology is needed in the 5G technical work in order to ensure consistency of results obtained, by means of a computer simulation. This methodology must comprise a procedure for calibrating the simulator, guidelines for evaluating, and a mechanism supporting and controlling the validity of the performed simulations. This chapter provides a methodology for simulation to align assumptions. The alignment allows for a direct comparison of different 5G technology components. The chapter is based on the experience of the authors in the simulation work performed in the framework of the International Mobile Telecommunications-Advanced (IMT-Advanced) definition and in METIS [1]. Finally, some relevant test cases and preferred models are introduced.
Evaluation methodology
In this section, methodology guidelines are given to enable consistent performance evaluations. The guidelines may serve as a framework with aligned assumptions, consistent choice of models and simulation reference metrics to ensure that the results can be compared. The results on different levels are not meant to be compared but to be used as possible input, e.g. link-level simulations can be used as input to system-level simulations but should not be compared to them. Below, the main performance indicators, as well as suitable channel and propagation models, are explained and defined. The main characteristics of the evaluation scenarios are out of the scope of this chapter, since they are thoroughly described in Chapter 2.
Performance indicators
The main performance indicators to be used in the evaluation of the 5G system are defined and explained hereafter. It should be noted that the material (of the performance indicators) is based on [1]–[4].
User throughput
The user throughput is defined as the total amount of received information bits at the receiver divided by the total active session time at the data link layer [2][3]. Active session time does not include the waiting time at the application layer, e.g. reading time for web-browsing, or back-off time introduced by TCP/IP's traffic control, and therefore it is, in general, different from the session length.
A second definition of the user throughput accounts for the whole session time, instead of only the active session time. Both definitions are equivalent for full buffer traffic model, which does not have neither reading nor back-off times.
To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.