Real-life C-RAN deployment considerations

Line Maria Pyndt Hansen, Sarah Renée Ruepp, Henrik Lehrmann Christiansen

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    369 Downloads (Pure)

    Abstract

    Cloud-Radio Access Network (C-RAN) is seen as a promising mobile network architecture for both current and future Radio Access Technologies (RATs). However, commercial C-RAN deployments are not yet commonly seen and thus experience from operational networks is limited. This means that standard procedures and best practices for roll out are yet to be established. This work provides a case study, where a small but densely populated part of the network owned by the Danish mobile network operator, TDC, is evaluated for C-RAN deployment. A roadmap is provided which uses traffic data as input and the output is a sequence of when the specific cells should have C-RAN deployed. Any operator to create their own roadmap towards C-RAN deployment can use the methods derived for the roadmap in this work.
    Original languageEnglish
    Title of host publicationProceedings of the 8th International Conference on the Network of the Future (NOF)
    Number of pages3
    PublisherIEEE
    Publication date2017
    Pages147-149
    DOIs
    Publication statusPublished - 2017
    EventInternational Conference on the Network of the Future - Strand campus of the King's College, London , United Kingdom
    Duration: 22 Nov 201724 Nov 2017
    Conference number: 8th
    https://nof17.lip6.fr/index.php

    Conference

    ConferenceInternational Conference on the Network of the Future
    Number8th
    LocationStrand campus of the King's College
    Country/TerritoryUnited Kingdom
    CityLondon
    Period22/11/201724/11/2017
    Internet address

    Keywords

    • C-RAN
    • Deployment
    • Inter-cell cooperation
    • Network operator
    • Shared processing

    Fingerprint

    Dive into the research topics of 'Real-life C-RAN deployment considerations'. Together they form a unique fingerprint.

    Cite this