Premium
Analyzing group behavior patterns in a cellular mobile network for 5G use‐cases
Author(s) -
Soos Gabor,
Ficzere Daniel,
Varga Pal
Publication year - 2021
Publication title -
international journal of network management
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.373
H-Index - 28
eISSN - 1099-1190
pISSN - 1055-7148
DOI - 10.1002/nem.2157
Subject(s) - computer science , mobile broadband , cellular network , cellular traffic , computer network , broadband , quality of service , key (lock) , core network , mobile telephony , telecommunications , mobile radio , computer security , wireless
Summary The massive demand for broadband mobile network services are quite successfully covered already by 3G and 4G cellular mobile systems. The challenges for 5G are more diverse: answering the demands of Ultra‐Reliable Low Latency Communications (URLLC) and massive Machine Type Communications (mMTC) users—besides elevating mobile broadband to the next level. While generic, high‐level targets for KPIs (Key Performance Indicators) are widely communicated, it is not yet well‐understood how the various demands can affect the traffic mixture. Both the radio‐ and the core‐domains of the cellular network have to cope with traffic peaks, and have to obey various QoS (Quality of Service) guarantees. In order to cover these gaps, traffic‐related characteristics (data volume, signaling message types, and traffic peaks) should be determined, and this knowledge should be used during network planning, optimization, and service shaping. This paper aims to provide insights into user behavioral patterns for these three key application areas: enhanced Mobile Broadband (eMBB), URLLC and mMTC. Since traffic volume‐ and burst‐related user behavior is not expected to change suddenly, current targeted data collection on legacy mobile network links would provide a good basic insight for future, 5G usage—at least as traffic patterns. We have collected live pre‐5G mobile network data then analyzed them throughout this paper in order to reveal traffic patterns—and their distinguishing features—for the three key 5G application areas.