رئيس مجلس الإدارة
سعيد اسماعيل
رئيس التحرير
مروة أبو زاهر

رئيس مجلس الإدارة
سعيد اسماعيل

رئيس التحرير
مروة أبو زاهر

Ericsson Microwave Outlook

Ericsson Microwave Outlook

Executive summary

High- and mid-band deployments, but especially the latter, will drive backhaul needs in the future.

As capacity requirements in mobile networks become more diverse, so will demands on backhaul transport networks.

In this year’s report, we have updated the backhaul capacity table structure to highlight variations in requirements

for several spectrum strategies and site types.

Coexistence with other radio services in parts of the 6–15 GHz range is a hot topic in backhaul spectrum,

in order to cater for increased spectrum needs for mobile networks.

Long-range microwave backhaul is essential in these bands, both today and in the future.

For example, around 30 percent of all transceivers are below 10 GHz in the countries studied,

but it varies per country from around 10 percent to more than 60 percent.

Microwave technology is continuously evolving to meet new requirements.

Modernized microwave planning and even more efficient spectrum use will play a significant role in achieving this.

It involves new key performance indicators (KPIs) and more balanced dimensioning that,

without negatively impacting quality of experience (QoE), can enable longer hop lengths,

higher capacity, improved energy savings and lower spectrum costs.

More aggressive frequency reuse enables wider channels, which results in higher capacity

and more efficient spectrum use.

Interference management in subnetworks can be a future step to enable prioritization between links and ensure

that links operate efficiently.

Security is a topic that is rightfully high on everyone’s agenda, and security in microwave networks is,

for the first time, covered in this report.

Microwave nodes are frequently located in remote, unsupervised locations which can be susceptible

to unauthorized access, and the possibility of eavesdropping, ingestion of manipulated software,

attacks via vulnerable third-party providers, hidden activities and denial of service attacks.

Communications service providers can mitigate these threats in several ways, as covered in the report

Backhaul capacity evolution

The expansion of 5G is continuing. It is now forecast to pass 4G to become the dominant mobile access technology

by subscription in 2028 and to account for 60 percent of all mobile subscriptions by 2029.

To date, around 300 service providers have launched commercial 5G services

and it is forecast that 75 percent of mobile data traffic will be served by 5G in 2029.

5G population coverage outside of mainland China has now reached around 40 percent,

but with large regional variations where some markets are at around 10 percent.

Global 5G population coverage is expected to increase significantly to up to 80 percent

by the end of 2029, creating the potential for significant user data throughput increases.1

In most markets, with the exception of Europe, mid-band population coverage matches 5G population coverage
reasonably well.

As 5G coverage increases, so will deployments of mid-band.

Today, high-band is more sparsely deployed and mainly found in the US.

Deployment of high-band will also increase, but more selectively than mid-band

and with a focus on urban environments.

In around 2030, we will see the introduction of 6G and this is expected to lead to more spectrum

being released in the mid- and centimeter wave (cmWave) bands pending decisions at World Radiocommunication Conference 2027 (WRC-27).

As it is too early for detailed analysis of these proposed new bands,

they are not included in this year’s capacity table.

For more on 6G spectrum, see the Ericsson white paper ‘6G spectrum – enabling the future mobile life beyond 2030’.2

Both mid-band deployments, with a large amount of spectrum and a high MIMO layer count,

and high-band deployments, will enable a significant increase in user throughput, driving backhaul needs.

Typical backhaul capacity requirements for distributed Radio Access Network (RAN) sites are shown in Figure 1.

The table shows how variations in backhaul capacity

requirements between regions, markets and service providers continue to be significant and are even increasing.

These variations are the result of differences in service provider spectrum holdings,

actual service provider spectrum deployments and deployed RAN features, such as carrier aggregation.

Increased deployment of mid-band is expected to have the largest overall impact on the network,

as it will be used in all regions and deployment areas.

Some of the reasoning behind the formulation of the table can be found in the Ericsson blog

‘Backhaul end-site capacity: Guesswork or science?’.3

As backhaul capacity needs in mobile networks become more diverse,

so will demands on backhaul transport networks.

Both high capacity and flexibility will be needed to cover lower-bandwidth deployments efficiently.

A thorough analysis of mobile network performance targets is key to finding the correct backhaul dimensioning

 

Spectrum, a shared gem

Microwave and millimeter-wave spectrums are key assets for the wireless backhaul of 5G,

and beyond, with around 10 million transceivers installed around the world.

Different frequency bands are used to provide critical transport network infrastructure in all areas,

from dense urban to deep rural areas, for ranges from hundreds of meters to beyond 100 km.

The traditional bands, 6–42 GHz, remain the backbone for (point-to-point) wireless backhaul, as shown in Figure 2

A remarkable journey

The E-band (80 GHz) has been on a remarkable journey over the last decade

and is now extensively used as a 5G backhaul band.

In recent years, there has also been a rapid maturation of radio technology for beyond 100 GHz.

Today, there are regulatory recommendations on channel arrangements,

ongoing equipment standardization and pre-commercial wireless backhaul equipment available

for trials in the W-band (92–114 GHz).

Both W-band and D-band (130–175 GHz) are untapped high-capacity spectrum

resources for the future wireless backhaul demand

Coexistence in 6–15 GHz

Spectrum is a scarce and very valuable resource.

Spectrum sharing and coexistence capabilities are becoming more important than ever

due to the demand for more spectrum for different types of wireless broadband use,

with technologies such as 5G/6G, Wi-Fi, satellite and wireless backhaul.

Opportunities for coexistence in parts of the 6–15 GHz range is the latest hot topic in backhaul spectrum,

as shown in Figure 2.

Access to spectrum can be achieved in different ways, such as through the ITU World Radiocommunication

Conferences (WRC), regional decisions, or decisions on a per-country basis.

Whichever method is pursued, harmonization of the selected frequency bands and technical conditions,

ideally on a global or at least a regional basis, is key to unlocking economies of scale

and to provide numerous benefits to consumers and enterprises.

Some countries have allocated 5.925–6.425 GHz (lower 6 GHz) for unlicensed use,

also known as license-exempt, including Wi-Fi and 5G NR-U (NR in unlicensed spectrum).

 

 

A few countries, such as the US, have expanded this allocation up to 7.125 GHz.

Although technical conditions have been established with the aim of protecting incumbent wireless backhaul,

introducing unlicensed use in a licensed backhaul band raises some concerns.

There continues to be debate about whether the backhaul is sufficiently protected in worst-case scenarios.

The Electronic Communications Committee (ECC) is also studying the impact of a bursty interference,

such as Wi-Fi beacon signals.

It remains to be seen what impact the growing use of unlicensed 6 GHz Wi-Fi

devices will have on the incumbent licensed wireless backhaul use

 And if interference issues arise, how will they be resolved,

as unlicensed spectrum is not controlled?

International harmonization

The WRC in 2023 (WRC-23) decided on an international harmonization of the upper 6 GHz spectrum,

6.425–7.125 GHz (or parts thereof), for International Mobile Telecommunications (IMT).

This is the generic term used by ITU for mobile systems, such as 5G.

The decision had support from countries representing 60 percent of the global population,

and more countries are expected to support this at the next WRC in 2027.

The intention of identifying a frequency band for IMT is to provide equipment manufacturers

with guidance on which spectrum may be made available for mobile services,

while leaving the final decision on implementation up to each nation

WRC-23 also decided on the agenda items for WRC-27.

One agenda item is to consider studies on sharing and compatibility

and develop technical conditions for the use of IMT, which includes the bands 7.125–8.4 GHz (or parts thereof),

and 14.8–15.35 GHz.

These bands have a large overlap with the 7, 8 and 15 GHz wireless backhaul bands (see Figure 2).

Notably, in addition to the decisions taken at WRC-23, an initiative in the US included 7.125–8.4 GHz

in the National Spectrum Strategy to be studied for wireless broadband use.

For more comprehensive information on 6G spectrum, see the Ericsson white paper.

Long-range wireless backhaul use

It is interesting to look at wireless backhaul use in the 6–15 GHz bands today,

as well as considering future demand.

These bands, especially 6–8 GHz, are essential for long-range wireless backhaul

due to their superior propagation characteristics for distances from about 20 km to beyond 100 km.

These are typically used in rural areas and for connecting them to urban centers.

A global and regional overview of the use of wireless backhaul spectrum

can be found in the Ericsson Microwave Outlook 2022,2 reporting around 10 million transceivers globally

National usage of wireless

backhaul spectrum Some countries have public data onwireless backhaul installations,

which can be used for a deeper analysis.

Figure 3 shows national usage of wireless backhaul spectrum in seven large countries around the world.

The size of each circle represents the installed base of transceivers,

with in total more than 1 million for these countries.

There are large variations in how much each backhaul band is used in different locations,

countries and regions.

Many of the bands are used in most countries, but the relative use varies.

For example, 30 percent of all transceivers in Figure 3 are used for the essential long-range bands in 6–8 GHz,

but it varies per country from around 10 percent to more than 60 percent.

This depends on the local demand and historic decisions on what

is the most valuable use of a frequency band in each region and country.

One example is the 11 GHz band, (10.7–11.7 GHz),

which some countries have prioritized for extensive wireless backhaul use,

while others have prioritized it for uncoordinated satellite earth station (receiver) use with no,

or very restricted, wireless backhaul use.

Figure 4 shows a useful geographical overview of the wireless backhaul deployments

for the bands in each of these countries.

Each red line corresponds to a point-to-point wireless backhaul link.

The 6–8 GHz bands, or parts thereof, are used for long-range wireless backhauling in all parts of these countries,

except for the most remote rural areas where there are few people and no terrestrial transport networks.

The 10–15 GHz bands are useful for shorter distances and therefore are used closer to urban centers.

 

Importance of coexistence

How much these bands are used also depends on the penetration of fiber transport networks in these countries and areas.

Even if there are many advantages of fiber transport,

it is simply too costly and not sufficiently reliable to be used in all locations.

Spectrum in the 6 GHz band, as well as 7–15 GHz bands, is being considered

by national regulators for the future growth of mobile networks.

Notably, mobile systems are less challenging in terms of coexistence with incumbent wireless backhaul,

which is in fixed known locations, uses passive antennas with very narrow beamwidths,

and features such as automatic transmit power control (ATPC) that further reduce any interference.

The licensed nature of mobile and backhaul allows for coordination, including geographical coordination.

Conclusion

Wireless backhaul is a somewhat “unsung hero” that has helped to enable the current global communication
networks.

It is important to carefully consider the extensive

and essential use of long-range wireless backhaul in these bands – today, as well as tomorrow.

Introducing unlicensed use raises many concerns, while there are opportunities

for coexistence with licensed mobile systems.

It is expected that the most valuable use of a frequency band will also, in the future,

vary in different regions, countries and locations.

Trusted microwave networks

The security of a microwave transport network can be compromised in a multitude of ways.

For example, full network access could be mistakenly given to contract workers hired

to do a limited site upgrade. Perhaps a disgruntled former employee has access to team login credentials.

A curious hacker could be exploring known Linux/open source vulnerabilities.

Or, accidental access could be obtained by a used equipment trader

who logs in to scrapped equipment that contains network information by testing default login credentials.

In recent years, the industry has responded to these potential risks by initiating

and increasing focus on implementing vulnerability management processes

and developing secure software and hardware architectures.

The active involvement of standardization bodies, such as the National Institute of Standards

and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) in the US,

and the National Cyber Security Centre (NCSC) in the UK,

has also resulted in recent releases of various requirements and documents for network security.

Threats and their mitigation in microwave networks

In Figure 5, the architecture of a 3GPP mobile network is shown, consisting of a Radio Access Network (RAN)

with radio units (RU), distributed units (DU) and central units (CU) deployed in local sites,

and the Core network deployed in a handful of national locations.

The RU, DU, and CU are often located in unsupervised sites that may be exposed to unauthorized access,

while the Core network is placed in high-security, data center-like locations.

The transport network connects the RAN with the Core network

and often consists of a mix of physical technologies,

such as optical and microwave links that are able to cover long distances with many nodes.

The nodes are frequently located in remote,

unsupervised locations which can be susceptible to unauthorized access,

thereby providing possibilities for eavesdropping, ingestion of manipulated software,

attacks via vulnerable third-party providers (3PPs), hidden activities and denial of service attacks (Figure 6).

Unauthorized access

In this article, an unauthorized access event is defined

as one where a user without access rights gains admission to information

or configuration rights in a node or a network by having access to physical hardware or login credentials.

To mitigate this, it is essential to implement strong access control policies with a centralized authentication process

requiring individual, strong passwords that are frequently updated,

and for this to be combined with multi-factor authentication.

Future enhancements are being discussed across the industry to make it more difficult

for external sources to access unauthorized information directly through physical hardware.

For instance, to prevent intrusion by probing memory chips

or the communication lines between different chips on a printed circuit board,

the hardware should be built on a trusted hardware architecture.

The intent is that components in the system should have a wall of protection against

other components in the system, which prevents unauthorized access to the complete system

if one component becomes implicated.

This could, for example, mean that communication between hardware components is encrypted and that data is authenticated.

An intuitive way to understand the difference between a common hardware architecture

and a trusted hardware architecture is a comparison between a coconut and a pomegranate.

The coconut has a hard shell protecting the content inside but once the shell is penetrated,

it is possible to access its content. The pomegranate, on the other hand,

has protective shells around all components within its outer shell.

Eavesdropping

The signal in a microwave network is similar to the signal from the RAN,

propagating through an unprotected medium, namely the air,

but it is still a rather complex task to intercept the traffic in mid-air.

It requires detailed knowledge about the transmitted signal such as the frequency, modulation,

data rates and coding of the transmitted data, which is proprietary to each vendor.

Still, data encryption is recommended to protect the network from eavesdropping.

  End-to-end encryption, specifically encryption and decryption in the Core network and the RAN nodes,

is the recommended solution.

It is also transparent to individual proprietary link technologies,

ensuring the information remains encrypted throughout the full transport network.

Another option for microwave is radio link encryption, which encrypts the signal

and provides the benefit of being impossible to detect if or when the radio link is being used.

However, if only radio link encryption is used,

there is still a vulnerability at each node where decrypted information may be monitored

if an unauthorized user is getting access to the node.

Hence, the recommendation is to have end-to-end encryption

with the option to add radio link encryption to protect the network even further.

Manipulated software

A complex threat involves the intentional manipulation of firmware running on microwave nodes.

To address this, the microwave vendor must secure software integrity through automatic

or manual updates of software from trusted sources, using secure protocols.

Furthermore, it is important to implement solutions that can secure the trust of the updated software,

such as ensuring users of systems can be certain that downloaded and booted software is not altered in any way,

and that it is digitally signed by the microwave vendor.

Attacks via vulnerable 3PPs

Nowadays, 3PP software components, such as Linux distributions and 3PP network stacks,

are an integral part of modern software development.

Vulnerability management – including control, tracking, assessment of impact

and mitigation of known and recently detected vulnerabilities in the 3PP software components – is, therefore,

crucial, as information about these vulnerabilities can quickly spread and provide simple

and straightforward opportunities for attackers to target and explore.

Microwave vendors should have a clear strategy for discovering,

tracking and addressing vulnerabilities in their equipment as part of their product development life cycle

and a well-defined process for sharing known vulnerabilities with service providers.

This strategy must comply with standards such as the 3GPP Network Equipment Security Assurance Scheme,

monitored by organizations like GSMA

Hidden activities/unawareness of changes

To limit the impact of an intrusion, it is of the utmost importance to detect attacks and security vulnerabilities as soon as possible.

One example is the detection of intentional or unintentional changes in security settings

that may lead to malicious activity, such as hidden configuration changes of the node.

To mitigate this, it is necessary to support security event logging on the microwave nodes,

which enables visibility of security events and activities.

Denial of service (DoS) attack

In a DoS attack, a node is flooded with requests, the aim being to make the node inaccessible

and thereby impact network performance.

To mitigate this, microwave nodes should have the ability to enable policies in the control plane

to prevent the build-up of request queues, which ensures that the network node continues to operate.

One option for achieving this could be a policy allowing the service provider to

configure a quality-of-service filter that manages the traffic flow of control plane packets

to protect the microwave node.

Securely configured microwave nodes are essential for the proper operation of microwave networks,

and both vendors and service providers play vital roles in ensuring that the necessary security functions

and hardening measures are in place.

Conclusion

This article provides insights into the rapidly evolving security landscape and highlights some common security
threats and their mitigations,

which are summarized in Figure 7.

Service providers can mitigate these threats through diligent security configurations,

and should also consider security features when selecting hardware.

Future security improvements may involve changes in trust boundaries, requiring comprehensive security design

and secure communication between internal platform components.

Overall, building reliable microwave networks requires both collaboration

and standardization to address security challenges and enable swift adaptation to evolving security requirements

The future of microwave planning

Microwave technology is evolving continuously to meet new requirements set

by the latest generations of radio access technologies and new use cases.

As capacity boundaries are pushed further, it is important to maintain sustainable requirements

which involves more balanced dimensioning.

Additionally, access to more spectrum, wider channels and high spectrum efficiency are key for achieving higher capacity.

More aggressive frequency reuse combined with interference management is a way to improve spectrum efficiency.

Benefits of more balanced dimensioning

Traditional microwave planning methods date back to the introduction of circuit-switched 2G (GSM) networks,

which were mainly deployed to provide voice services to mobile users.

The first generation of microwave links used a single, fixed modulation,

and it was therefore natural to plan the links based on strict availability targets.

This meant that a link should have a high likelihood of supporting the voice services it carried –

some 99.999 percent of the time – since if the link was down, then voice services were also down.

With the adoption of packet-switched networks for data in 3G, together with adaptive coding

and modulation (ACM) in high-capacity microwave links,

the need for such extreme availability for all ACM levels became unnecessary.

Instead, differentiated availability with different availability targets for different ACM levels became more significant.

In practice, differentiated availability means that lower modulation levels have higher availability targets

than the higher modulation levels.

A high availability target (for example, 99.99x percent) on a committed information rate (CIR)

ensures that services like voice and other high-priority service and control operations are guaranteed,

while a lower availability target on peak information rate (PIR) allows for traffic peaks

that occur more rarely.

It is also not uncommon for it to be the radio access network (RAN)

that limits the bitrate and the user experience due to phenomena such as radio channel fading

, shadowing and interference.

 

 

A good strategy, therefore, is to dimension the microwave backhaul in balance

with the RAN traffic it carries to avoid unnecessary overprovisioning of the backhaul.

Excessively strict availability targets limit the possible use cases of microwave backhaul links.

By contrast, a well-balanced dimensioning opens several possibilities, including longer hop lengths,

higher capacity, energy savings and use of higher sub-THz frequencies.

As a step toward a more balanced backhaul dimensioning, ETSI ISG mWT has defined a new KPI called backhaul traffic availability (BTA).

Put simply, BTA is defined as the probability that the backhaul link capacity supersedes

the RAN traffic it carries, which is the same as the probability that the link is uncongested.

The BTA thus depends on the probability distributions of the backhaul link capacity and the RAN traffic.

BTA applies to all frequency bands, but it is especially interesting for E-band

and future sub-THz links since it leads to higher capacity over longer hop lengths,

both in single- and multi-band configurations.

The need for higher capacity over longer hop lengths is demonstrated

by the growing deployments of multi-band links.

On the topic of KPIs, standardized ITU-T definitions of user QoE also exist for different services.

QoE is defined by a service-specific function of user rates and delays in the user downlink

and uplink, and are typically represented by a QoE rating ranging from 1 to 5,

where, for example, 4.5–5.0 is excellent, 3.5–4.5 is good, 2.5–3.5 is fair, and so on.

Balanced dimensioning in action

To illustrate the benefits of more balanced backhaul dimensioning,

a simulation was conducted of a 5G RAN in the 3.5 GHz band serving mixed traffic types like video-on-demand,

web-browsing, live streaming, cloud gaming and augmented reality (AR).

The RAN comprised three sites with three sectors each,

with the aggregated traffic from all sectors being transported over a multi-band backhaul
link combining E-band and 18 GHz band in the Gothenburg, Sweden, rain zone.

The traffic load in the RAN varied between low (20 percent), medium (50 percent) and high (70 percent) utilization,

where utilization is set by the number of users within each user type,

with the AR users being the most resource demanding.

Figure 8 shows the result from the simulation investigating

the effect of BTA on QoE of AR users and the maximum possible hop length of a multi-band backhaul link.

The left y-axis shows the percentage of ideal QoE for AR users.

Ideal QoE means the maximum possible QoE attained by using an ideal backhaul that does not have any impact on user QoE.

Ideal backhaul can be interpreted as a backhaul with infinite capacity and 100 percent availability.

The ideal QoE, therefore, only depends on the performance of the RAN and not the backhaul.

The blue curve represents how a large fraction of the ideal QoE is attained

by using a multi-band backhaul link instead of an ideal backhaul.

For example, 99 percent of the ideal QoE for AR users implies that the QoE

for AR users is 99 percent of the maximum possible QoE attained by using an ideal backhaul.

It can be argued that this is an insignificant reduction from the maximum QoE

 and that the AR users will not experience any negative impact during their sessions.

The right y-axis shows the maximum hop length of the multi-band backhaul link

as a function of BTA for the different RAN traffic load levels. The x-axis is common for all curves

and represents the BTA as defined by ETSI ISG mWT.

The lower the BTA, the higher the likelihood of congestion in the backhaul, and user QoE reduces correspondingly.

However, if a lower BTA and a correspondingly lower QoE is accepted,

then the maximum hop length can be increased. This is illustrated by some of the operating points in Figure 8,

where there is a clear connection between QoE, BTA and hop length. Take,

for example 99.9 percent of ideal QoE, which in the simulated case, corresponds to a BTA of around 99.98

percent at high load and is attained by a maximum hop length of 12.5 km

(which is illustrated by the purple arrows).

If 99 percent of the ideal QoE (corresponding to 99.77 percent in BTA) is accepted instead,

the maximum hop length can be more than doubled, to 27.5 km (which is illustrated by the green arrows).

In the ETSI Group Report, it is indicated that the optimum range for BTA values is between 99.5 percent

and 99.9 percent, but it is also recognized that the final choice is

up to the preferences of individual service providers and the needs of specific services.

It is important to emphasize that more balanced dimensioning

does not imply an increased risk of outage of critical services,

since the CIR is still associated with a high availability target like 99.99 percent to 99.999 percent.

It is rather that the PIR is associated with a more balanced availability requirement that matches the BTA.

When it comes to multi-band backhaul links like the one used in the simulation example,

CIR is provided by the low-band link while the PIR is provided by the E-band link.

It means that relaxing the PIR availability requirement of the E-band link only has a very minor,

if any, negative effect on user QoE while effectively resulting in more than two times longer hop length

Opportunity with interference management

Modern microwave links are very spectrally efficient, meaning that they provide many bits per second per Hertz (bps/Hz).

High spectral efficiency is ensured by successfully employing techniques like high-order modulation,

high-performance dual-polarized antennas (XPIC) and multiple-input, multiple-output (MIMO).

Microwave links also operate in regimes with high signal-to-noise ratio (SNR) thanks to efficient power amplifiers,

high-gain antennas and high receiver sensitivity.

This means microwave links are what is known as bandwidth-limited, meaning that their capacity is more limited

by the spectrum bandwidth than by their SNR.

Capacity grows linearly with bandwidth but only logarithmically with SNR,

which implies that it is more spectral-efficient to try and increase the bandwidth instead of SNR

when the link is in the high-SNR regime.

This is exactly what universal frequency reuse – or frequency reuse one (FR1) – sets out to achieve.

In FR1, all (or at least a majority of) links use the same frequency channel to allow wider channels to all links.

For example, instead of allocating four neighboring links a separate 28 MHz channel each,

they can all use the same 112 MHz channel which increases their possible peak rate by a factor of four.

The downside of using the same frequency channel is increased interference between the links.

However, since the links are in the bandwidth-limited regime,

the upside of more bandwidth is much larger than the downside of increased interference.

As with balanced dimensioning and BTA, a more relaxed availability requirement on peak rate has little,

if any, impact on user QoE.

Local traffic-aware transmit power control is an efficient way to limit interference between links in an FR1 network.

Traffic varies over both space and time across the network,

and local traffic-aware power control continuously adapts the transmission power of each link to the minimum

power needed to serve its immediate traffic needs.

This way, unnecessary interference is avoided in the network compared to using a fixed output power

or some other traffic-unaware power control.

Previous Microwave  Outlook reports have shown

the large benefits of this type of local traffic-aware power control in FR1 networks.

However, if the interference between neighboring links is large, then the links may start competing for capacity

by raising their transmission powers in an uncontrolled manner, and such situations need to be avoided.

One simple way of avoiding power rushes is to consider this issue in the initial network planning phase,

for example, by setting caps on the maximum permitted transmission power of each link in the network based on interference models.

Another, more sophisticated way is to employ interference management

by using centralized power control combined with traffic prioritization.

For example, if multiple interfering links are competing for capacity

but one of them carries higher priority traffic than the others,

then a centralized controller can allocate or schedule more capacity to the high-priority link.

Many links also have a natural isolation between them, which limits the interference

and the need for centralized interference management. This isolation is mainly provided

by the narrow-beam antennas with low side-lobe levels.

To illustrate isolation between links and how many links may need centralized interference management,

the use of FR1 was simulated in a real backhaul network

with a very dense deployment of microwave links.

The simulation was used to investigate how to divide

the complete network into subnetworks based on interference levels.

The principle was simple: if two or more links interfered with each other over a predefined interference-to-noise (I/N) threshold,

then the links were allocated to the samemulti-link subnetwork.

If a link was not transmitting/receiving too much interference to/from other links,

then it could operate independently of all the other links in a single-link subnetwork.

Centralized power control and interference management is only required

when links in the multi-link subnetworks start to compete for capacity.

Figure 9 shows how a large share of the total links in a dense network, with close to 1,000 links operating

at 15 GHz, is allocated to single- or multi-link subnetworks.

In this example, the antenna size was 0.6 meters,

and the availability target was 99.99 percent at 1024 QAM.

Two I/N thresholds were assumed, -6 dB and 0 dB, respectively.

The higher the I/N threshold, the higher the number of links that can operate independently in a single-link subnetwork.

Meanwhile, a stricter (or lower) I/N threshold means that more links need to be allocated to multi-link subnetworks.

To illustrate the effect of using more narrow-beam antennas to provide more isolation between links,

the same network deployment was also simulated with E-band links.

Figure 10 shows the share of total links allocated to single-link and multi-link subnetworks,

respectively. The narrow beam of the E-band antenna provides very good isolation between links,

which significantly reduces the need for centralized interference management since only 14 percent

and 8 percent (at the two different I/N thresholds) of the total number of links belong to a multi-link network.

This can be compared to the 15 GHz network in Figure 9,

where the equivalent shares were 83 percent and 65 percent, respectively

Conclusion

Modern microwave planning involves new KPIs and more balanced dimensioning

that can enable longer hop lengths, higher capacity, energy savings and lower spectrum costs,

without negatively impacting user QoE.

More aggressive frequency reuse, such as FR1, enables wider channels resulting in higher capacity

and more efficient spectrum use.

Interference in dense FR1 networks can be reduced effectively

by using local traffic-aware power control in all frequency bands.

The benefit of centralized interference management is more pronounced in the lower bands

than in E-band networks, as these have more isolation between links

which suffices for the use of local traffic-aware power control.

أخبار ذات صلة

Raya

Raya Information Technology Participates in the 28th Cairo ICT

Central Bank of Egypt

Central Bank of Egypt Secured First Places in the Cyber Drills at the Regional

OPPO

OPPO Celebrates Global Photography Talent at Paris Photo Fair 2024

MAQAM for Urban Development

MAQAM for Urban Development presents exclusive units offers for Optima Business Complex at Qarar

ITIDA

ITIDA” is proud to announce the participation of 8 leading Egyptian tech companies at Electronica 2024″

BroMan Real Estate

BroMan Real Estate Marketing Company starts its work in the Egyptian market with targeted sales of EGP 2 billion during 2025