Published online by Cambridge University Press: 05 June 2016
A simulation methodology is needed in the 5G technical work in order to ensure consistency of results obtained, by means of a computer simulation. This methodology must comprise a procedure for calibrating the simulator, guidelines for evaluating, and a mechanism supporting and controlling the validity of the performed simulations. This chapter provides a methodology for simulation to align assumptions. The alignment allows for a direct comparison of different 5G technology components. The chapter is based on the experience of the authors in the simulation work performed in the framework of the International Mobile Telecommunications-Advanced (IMT-Advanced) definition and in METIS . Finally, some relevant test cases and preferred models are introduced.
In this section, methodology guidelines are given to enable consistent performance evaluations. The guidelines may serve as a framework with aligned assumptions, consistent choice of models and simulation reference metrics to ensure that the results can be compared. The results on different levels are not meant to be compared but to be used as possible input, e.g. link-level simulations can be used as input to system-level simulations but should not be compared to them. Below, the main performance indicators, as well as suitable channel and propagation models, are explained and defined. The main characteristics of the evaluation scenarios are out of the scope of this chapter, since they are thoroughly described in Chapter 2.
The main performance indicators to be used in the evaluation of the 5G system are defined and explained hereafter. It should be noted that the material (of the performance indicators) is based on –.
The user throughput is defined as the total amount of received information bits at the receiver divided by the total active session time at the data link layer . Active session time does not include the waiting time at the application layer, e.g. reading time for web-browsing, or back-off time introduced by TCP/IP's traffic control, and therefore it is, in general, different from the session length.
A second definition of the user throughput accounts for the whole session time, instead of only the active session time. Both definitions are equivalent for full buffer traffic model, which does not have neither reading nor back-off times.