All articles published by MDPI are made immediately available worldwide under an open access license. No special
permission is required to reuse all or part of the article published by MDPI, including figures and tables. For
articles published under an open access Creative Common CC BY license, any part of the article may be reused without
permission provided that the original article is clearly cited.
Feature Papers represent the most advanced research with significant potential for high impact in the field. Feature
Papers are submitted upon individual invitation or recommendation by the scientific editors and undergo peer review
prior to publication.
The Feature Paper can be either an original research article, a substantial novel research study that often involves
several techniques or approaches, or a comprehensive review paper with concise and precise updates on the latest
progress in the field that systematically reviews the most exciting advances in scientific literature. This type of
paper provides an outlook on future directions of research or possible applications.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world.
Editors select a small number of articles recently published in the journal that they believe will be particularly
interesting to authors, or important in this field. The aim is to provide a snapshot of some of the most exciting work
published in the various research areas of the journal.
In this paper, we introduce an analytical framework for the performance evaluation of the VDSL2-based access systems. It allows for the obtaining of approximations of the achievable bit rate per user, taking into account several factors, such as the bit-loading limitation per sub-carrier; interference scenario, including the number and positions of the active interferers along the cable; crosstalk statistics; and vectoring. A closed-form expression for the maximum sub-carrier frequency that can be loaded with the maximum number of allowed bits is also presented. Formulas are obtained assuming log-normal statistics for the signal-to-interference-plus-noise ratio (SINR) per sub-carrier. The validity of the proposed formulas has been assessed by computer calculations. A very good agreement between the exact and the approximated bit rates has been obtained. The framework can be used for preliminary design of VDSL2 systems in terms of the bit rate coverage, as well as to analyze performance of other access technologies such as ADSL and G.fast.
According to the Digital Agenda for Europe (DAE), by 2020, all Europeans should access the Internet at speeds greater than 30 Mbit/s, and not less than 50% of European households should be able to subscribe to contracts at speeds over 100 Mbit/s. The technology originally assumed as a baseline for the latter target of the DAE was considered to be Fiber-to-the-Home (FttH). This turned out to be a reasonable solution only in green-field deployments, where it can be delivered at a reasonable cost, but in Europe, telecommunication operators have to deal mostly with brown-field deployments in built-up, often dense urban areas. In particular, pervasive FttH deployment should have replaced copper for supporting novel ultra-broadband (UBB) services and network back-hauling. However, the very high costs (per home) of the FttH network have discouraged telecommunication operators to fully invest in FttH due to a non-favorable return of investments [1,2]. Thus, the need of UBB (such as for 4 K TV and cloud computing-based services) to their subscribers, as well as to provide back-hauling for actual and (possibly) future 5G radio access networks has led to a renewed interest in copper-based access technologies and in the related access network architectures to fully exploit their potentials. To improve achievable performance of copper, two main strategies can be followed. The first consists of the deployment of access network architectures capable of reducing the length of the copper wire to subscribers. The second focuses on the performance improvement of digital subscriber line (DSL) transmission technologies obtained with an increase of the transmission band and the adoption of techniques to reduce crosstalk.
In the last few years, the main approach toward UBB developed by most European telecommunication operators involved a careful evolutionary migration path from the presently ubiquitously deployed all-copper DSL access networks to all-optical access networks based on passive optical networks (PONs) . The evolutionary strategy is implemented case-by-case using one of the possible intermediate hybrid fiber–copper access solutions, including fiber-to-the-cabinet (FttC), fiber-to-the-distribution point (FTTDp) and fiber-to-the-building (FttB), which progressively reduce the wire lengths to the subscribers. The International Telecommunication Union (ITU) has recently finalized the standardization activity for the G.fast solution  to be used in (future) FttDp architectures . Thanks to the reduction in copper wire length for FttDp (e.g., the typical distance between the Dp and the customer premises equipment (CPE) is about 100 m), the G.fast solution will allow the use of frequency ranges up to hundreds of MHz. Depending on the cable quality, the standard will presumably exploit the twisted pair’s spectrum up to about 100 or 200 MHz, thus achieving the maximum theoretical transmission capacity greater than 1 Gbit/s . However, even though the costs for FttDp deployment are lower than the costs for FttH, they can be still considerably high due to the large number of Dp’s to be deployed and connected by fiber to the back-haul/core network. Up to now, this fact limits the rapid and pervasive deployment of G.fast technology.
Very high-speed DSL type 2 (VDSL2, ITU-T G.993.2 ) technology in the FttC architectures is currently the (only) solution adopted by telecommunication operators to provide UBB services. Thus, during the last few years, there has been a resurgent interest by standardization organizations and by the main manufacturers to find solutions to improve VDSL2 performance. In particular, recent VDSL2 systems allow very high bit rates to be achieved, thanks to the usage of vectoring , which reduces the far-end crosstalk (FEXT), and/or extending the transmission band up to 35 MHz (e.g., V-plus) , and/or adopting advanced coding techniques to improve transmission over copper (e.g., Huawei’s SuperVector ). ITU has recently approved the VDSL profile 35b  to accommodate these new technologies.
Performance of VDLS2 is commonly expressed in terms of the statistics (i.e., mean and percentiles) of the achievable bit rate per user. Their evaluations require the knowledge of the access network geometry, the models of propagation environment, and FEXT. Simulation tools including these models are typically used by telecommunication operators to assess performance. Proper FEXT characterization is an important issue to obtain realistic results. Direct propagation channel models depend on the cabinet-to-user distance and on the copper-pair propagation characteristics. These are described by the primary and secondary constants of the cable as a function of frequency . Concerning FEXT, several models (mostly based on experimental data) have been proposed by ITU  and other organizations/institutions, such as in . The document in  reports the attenuation model and the FEXT model based on the 99th percentile of FEXT measurements in the cable, i.e., only of all pairs in all cables experience more crosstalk than the model value at the considered distance. Nevertheless, as indicated in , the worst-case assumption is acceptable for designing DSL system power spectral density (PSD) masks in order to limit the “impact” onto neighboring DSL services . However, in most of the cases, this does not correspond to realistic situations, and could negatively bias any performance gain inherent to technologies aimed at avoiding and/or mitigating FEXT-dominant crosstalk. In general, these FEXT models do not reflect the wide field variation of FEXT strengths throughout the channel, and they do not account for the variation in FEXT coupling dispersion throughout the cable.
To compensate for the limitations of the worst-case assumption, FEXT models adding FEXT coupling dispersion with respect to the model have been presented in the literature. Two important examples are reported in [13,14], where FEXT dispersion (in dB) has been modeled using beta and normal distributions. Both models in [13,14] allow accounting for inter-binder interference by adding an additional attenuation factor (in dB) to FEXT fluctuations, whose value depends on the relative positions of the binders in the cable.
To further include frequency selectivity in existing FEXT models, authors in [16,17] have proposed two distinct parametric stochastic models for FEXT frequency fluctuations. Then, the overall FEXT model is obtained by multiplying the model, including dispersion, by the selectivity term at a frequency evaluated in accordance with the models in  or . Finally, in , FEXT fluctuations have been modeled by the gamma distribution. This channel model is limited to MHz and so it is not considered in the following.
The adoption of a simulation-based approach for preliminary planning of the access network can be time consuming. To overcome this inconvenience, in this paper, we propose an analytical framework based on two approximated stochastic models for the user bit rate that can be easily implemented on any calculator. In particular, differently from , we introduce a novel normal stochastic model of the bit rate per user accounting for the bit-loading limitation per sub-carrier and for vectoring. A bit-loading limitation per sub-carrier is imposed by the VDSL2 standard, i.e., the number of bits per sub-carrier cannot exceed , and cannot be lower than . Moreover, we also present a closed-form expression for the maximum sub-carrier frequency transmitting up to bits. This formula evidences the dependence of on the FEXT statistics, on the pair-coupling characteristics, on the distance of the reference user from the cabinet, on the geometry of the interference scenario, and on vectoring. Models have been obtained starting from log-normal approximations of the signal-to-interference-plus-noise ratio (SINR) per sub-carrier introduced in  and further validated in  and these are not discussed further. The presented analytical framework facilitates the preliminary design and performance assessment of current and enhanced VDSL2 systems and other technologies, such as ADSL and G.fast (ITU G.9701). The formulas presented in this paper are valid for the downstream (DS) transmission direction only, but can be re-adapted to upstream (US). The validity of the bit rate models presented in this paper has been assessed by computer calculations. A very good agreement with the bit rate values obtained from exact calculations has been observed for variable access network topologies, interference scenarios, and for distances which are of interest for practical VDSL2 deployment.
The bit rate coverage for fixed VDSL2 networks is introduced and evaluated in this paper. It is defined as the probability the bit rate per user is greater than a reference bit rate value. Coverage is obtained after saturating over all possible positions of interferers in the access network, and over all the distances of the reference user from the cabinet. By definition, the bit rate coverage provides an indication of the percentage of users that can be served with an assigned bit rate level for the given access network configuration and cable load (i.e., the number of active copper lines), independently of the position of terminals with respect to the cabinet(s). In a practical setting, VDSL2 coverage can be evaluated by first collecting bit rate measurements from a set of VDSL2 active lines from one cabinet in the area, and then evaluating the cumulative distribution of these measurements. When more cabinets are considered, the bit rate coverage can be calculated for each cabinet separately. This means we take into account the specific propagation and interference conditions of the single cabinet, and then combine results from all the cabinets in some way (for example, by averaging). Coverage results obtained from exact calculations are compared with those obtained using the bit rate approximations presented in this paper. A very good agreement between exact and approximated results was obtained.
The paper is organized as follows. In Section 2, we describe the typical access network architecture for VDSL2 deployment, and we define the expression of the SINR per sub-carrier. The log-normal approximation of the SINR is introduced in Section 3. In Section 4, we derive the bit rate approximations, including the bit-loading limitations. The validity of the proposed models is discussed in Section 5 under variable interference scenarios. Some applications of the proposed formulation, including VDSL2 coverage, are illustrated in Section 6. Finally, conclusions are drawn.
2. Access Scenario and Performance Parameter Definition
The typical geometry of FttC access networks is depicted in Figure 1.
Interferers are inside the buildings served by the same cable. The ith building contains active interferers using copper pairs in the same or in other binders inside the same cable. The typical number of copper pairs in each binder varies from 25 up to 50; the cable from the cabinet typically contains four or eight binders. As shown in Figure 1, buildings are at distances , , from the cabinet. Active users in the same building can be randomly located on the floors. The main VDSL2 performance parameter is the bit rate achieved by a single user at distance d from the cabinet. It is defined as:
In Equation (1), is the set of sub-carrier indices assigned to DS transmission, is the symbol rate, is the number of bits that can be allocated on the kth sub-carrier in accordance with the following criterion:
where and are the minimum and maximum number of bits, respectively, that can be allocated per sub-carrier, and in Equation (1) is:
and is the performance gap . The term is the SINR of the kth sub-carrier at frequency for the reference user at distance d from the cabinet and it is defined as:
In Equation (4), is the direct-channel transfer function at frequency , is the background noise power, and is the power transmitted by the reference user on the kth sub-carrier. We assume DS users in the same cable use the same transmission power. This avoids harmful FEXT of high-power users on low-power users. The term accounts for the (possible) FEXT reduction due to vectoring , i.e., in the no vectoring case, and otherwise . The exact values of depend on the selected vectoring algorithm, and on its specific implementation in the DSL Access Multiplexer (DSLAM). Considering the typical vectoring algorithm indicated in , we have observed that increases with the frequency up to about dB at 35 MHz. Finally, is the FEXT power:
where is the number of interferers on the reference receiver (r); is the FEXT transfer function at distance d accounting for the interference of the pth user; and , on the kth sub-carrier of the reference user. To keep notation simple, the dependence of on the corresponding coupling length has been omitted. For DS transmissions, we have :
where is the coupling length between the pth interfering user and the reference user, and is the FEXT coupling coefficient. For assigned reference, distance d, can be easily obtained from the access network geometry in Figure 1. The term (in dB) is a random variable accounting for FEXT fluctuations with respect to the FEXT condition . The term is assumed to be normal (in dB), and its mean and variance do not depend on d. Furthermore, we consider that the do not vary with frequency, and are statistically independent and identically distributed (i.i.d.). From Equation (5) to Equation (6), the in Equation (4) is
where is the signal-to-background noise ratio and the random variables are i.i.d., having a mean of and standard deviation .
3. Log-Normal Approximation of SINR
From the Appendix, in Equation (7) can be approximated as
is the equivalent number of interfering users. This can be easily seen in the case of co-located interferers (i.e., for each p) where we obtain . In general, explicitly accounts for the positions of interfering users with respect to the reference user expressed by the coupling lengths . In the case of the cable with binders, indicated with , , the coupling coefficient among binders , assuming the copper line associated to the reference user is in the first binder, in Equation (9) is:
where is the number of interferes in the pth binder and is the coupling length of the pth active user in the qth binder. The second term in Equation (10) is a sort of equivalent number of interferers due to active lines residing in the adjacent binders. This fact can be again evidenced in the co-located interferers case, yielding
From Equation (11), it is observed that thanks to the separation of binders in the cable, the total number of interferers is lower than the number of active users in the cable.
The normal random variable in Equation (8) has a mean and standard deviation , which depend on d, and is a normal random variable . When applying Wilkinson’s method , and can be calculated as (see the Appendix):
The and terms are two geometrical parameters accounting for the given access network geometry characteristics. It can be shown is monotonically increasing with d, and its minimum is . Thus, when increases (infinitely in the limit), the FEXT fluctuation in tends to reduce. Extension of the proposed and more complex scenarios have been discussed in .
Due to log-normality of the denominator in Equation (8), each argument of the logarithms in Equation (1) can be approximated as
where is normal with a mean and standard deviation . Similarly, is normal with a mean and standard deviation . The normal random variable in Equation (14) is the same as in , and it accounts for the specific FEXT coupling situation (see Appendix). The moments of the normal random variables , and have been obtained using Wilkinson’s method without neglecting the 1 term in Equation (14) and in the denominator of Equation (8). Results have been reported in the following formulas starting with the moments of . By repeated application of Wilkinson’s method, we obtain (for simplicity we omit the dependence on the distance d in the following formulas):
where and with
and and are the mean and the standard deviation of the normal random variable associated to the log-normal approximation of the denominator in Equation (8). Finally, and for , and and are in Equation (12). Equations (15)–(18) evidence the dependence of the bit rate statistics on the FEXT parameters and , and on the scenario geometry with and . To overcome the limitations of Wilkinson’s approach , other methods to evaluate the log-normal parameters can be considered . However, in some cases, it may be not possible to obtain closed-form expressions for the parameters of the log-normal random variable approximating the sum.
On the Suitability of Log-Normal Sum Assumption
In , authors discussed the suitability of log-normal sum approximation when the FEXT fluctuations were distributed in accordance with the beta distribution . Assuming the parameters of the log-normal FEXT are calculated, in order to have the same mean and variance of the exponentially beta-distributed FEXT, authors have proved in  (by computer calculations) that the log-normal sum assumption still provides accurate results even in the beta-distributed FEXT case. This fact can be further confirmed considering the following two results presented in the literature. From , we can observe that Kullback–Leibler distances evaluated with normal and beta exponent assumptions are close. Furthermore, in , authors affirm that a log-normal distribution provides a good approximation for the sum of positive random variables under general conditions. Reasoning presented in  seems to be correct, despite that we believe that results in  should be considered as a conjecture/intuition rather than a formal proof. In fact, the paper indicates some desirable properties for a random variable to properly approximate the sum of positive random variables. The log-normal distribution owns these, but it is not clear if it is the unique distribution possessing these properties. However, the conjecture in  enforces the validity of the log-normal sum assumption considered in this paper. In addition, in , it was observed that the log-normal sum approximation of the sum of exponential beta random variables improves with the number of the summed random variables. It is out of the scope of this paper to further investigate this topic.
4. Bit Rate Approximations for Access Network Planning
From Equation (1) and using Equation (14), in the case of no bit-loading limitations per sub-carrier (e.g., theoretically ), the bit rate per user can be modeled with the following normal random variable :
whose mean and standard deviation are:
For convenience, the dependence of the bit rate per user on d and has been evidenced in Equation (19).
4.1. First Bit Rate Approximation
For a given FEXT situation (i.e., for fixed ), let be the index of the last sub-carrier that can be loaded with bits. Depending on the considered VDSL2 standard profile (such as the VDSL2 Profile 35b, 998E35), if we assume is inside the set of indices of the sub-carriers of the first DS frequency sub-band, the bit rate in Equation (1) can be approximated as:
and is the index of the first sub-carrier of the first DS sub-band. In the remainder of this section, we assume for each k, and we prove that
In Equation (23), denotes the floor operator, is the sub-carrier spacing for the considered VDSL2 profile, and is the union of the set of the DS sub-carrier indices ranging from to the end of the first DS sub-band, with the sets of indices of the sub-carriers in the remaining DS sub-bands. The operator in Equation (21) is necessary to exclude the un-wanted (and inexistent) additional term in the bit rate due to sub-carriers that cannot be loaded with a number of bits lower than bits (e.g., = 1 for VDSL2). The selection of the floor operator in Equation (23) leads to a conservative estimate. Ceil or round operators may also be used for defining . In these other cases, the bit rate may differ with respect to Equation (21) by the additional bit rate due to one sub-carrier only. This difference can be considered negligible in the case of bit rates of tens of megabits per second.
Equation (23) evidences that under high-SINR and dominant-FEXT conditions, i.e., for relatively short distances of the user from the cabinet, the maximum frequency that can be used to transmit bits per symbol is a function of the FEXT statistics (i.e., and ) of the equivalent number of interferers and of the FEXT coupling coefficient . The adoption of efficient transmission coding schemes can reduce the gap and then improve performance, increasing . To obtain in Equation (23), we observe that in order to transmit bits per sub-carrier, condition holds. Furthermore, assuming a dominant FEXT, we obtain , and
For a given FEXT situation and for a fixed distance d, Equation (24) is a monotonic decreasing function of the sub-carrier frequency . Let be the value of satisfying Equation (24) with equality. Inverting Equation (24) with respect to , we obtain in Equation (23). Thus, the last sub-carrier that can be loaded with bits has frequency ; does not account for the US and DS sub-bands, which are specific to the considered VDSL2 profile. In particular, if falls in the US band, the maximum DS sub-carrier that can be loaded at corresponds to the last sub-carrier in the previous DS band (if any). Otherwise, if lies in the US band, being the first sub-band in the VDSL2 profile, then it is never possible to transmit bits per symbol on any DS sub-carrier.
The bit rate in Equation (21) can be used to numerically evaluate the average bit rate, as well as other percentiles. However, it can be difficult to evaluate the exact expression of the probability distribution function of the bit rate in Equation (21), even when the floor operation in Equation (23) is removed. Even in this case, the bit rate in Equation (21) is given by the sum of two terms: the first being log-normal, and the second being the sum of normal random variables whose number depends on .
4.2. Normal Approximation with Bit-Loading Limitations
An important simplification of Equation (21) can be obtained by removing the floor operation in Equation (23) and substituting with its mean evaluated with respect to . Other percentiles could be considered in the following formula instead of the mean. The expression of the mean of the log-normal can be easily obtained in closed form, that is,
Then, we can approximate the bit rate in Equation (21) with the following normal random variable:
where is the set given by the union of the set of indices of DS sub-carriers ranging from to the end of the first DS sub-band, with the set including the indices of the sub-carriers in the remaining DS sub-bands. Equation (26) provides a normal approximation of the bit rate per user. It can be observed that Equation (26) overestimates the bit rate with respect to Equation (21). In fact, when , some sub-carriers in the second term of Equation (26) can be loaded with a number of bits greater than . This can be negligible when the number of sub-carriers at is relatively small. In the absence of vectoring, typically only sub-carriers in the first DS sub-bands can be loaded at or more. Furthermore, due to the removal of the operator in Equation (26), the estimated bit rate also includes the (unrealistic and negligible) contribution due to sub-carriers transmitting a number of bits per symbol lower than . As shown in the following, the normal approximation in Equation (26) provides accurate results for distances up to 400 m from the cabinet, which is well beyond the typical distances envisaged for VDSL2 practical deployment.
5. On the Validity of the Bit Rate Approximations
The effectiveness of the bit rate approximation in Equation (19) has been assessed in , and the results are not repeated here. In this section, we discuss on the validity of Equations (21) and (26) in terms of the cumulative distribution function (CDF) of the bit rate under variable interference scenarios and FEXT conditions in the non-vectored case. Vectoring is discussed in the next subsection. Results have been obtained considering co-located and uniformly distributed interferers between 50 m and 1000 m along the cable. In accordance with VDLS2 Profile 35b (998E35 ), we set the maximum VDSL2 frequency to MHz, the symbol rate is ksymbol/s, kHz, , and . Moreover, the overall transmission power was dBm and a flat transmitter power spectrum was assumed. The FEXT coupling coefficient was . For validation purposes, the exact value of is not important. FEXT statistics are assumed to be normal, having a mean (dB) and standard deviation (dB) . We further assumed and/or were variable, so as to assess the validity and the limitations of the considered model under different FEXT conditions.
In Figure 2 we report the 5th and the 50th percentile of the bit rate as a function of the distance d of the reference user from the cabinet for variable numbers of interferers , 15, 25 and a uniform distribution of the interfering users along the cable. Similar considerations applied to the co-located interferers case. Curves in Figure 2 were obtained using exact formulas in Equation (1) with the SINR in Equation (4) and FEXT as in Equation (5) (without the log-normal approximation; solid lines for the 50th and dashed lines for the 5th percentile) and the bit rate approximations in Equations (21) (with dots) and (26) (with + marks for the 50th and * marks for the 5th percentile). Results in Figure 2 show the very good agreement between the exact and approximated bit rate in Equation (21) at every distance d. Instead, the normal approximation in Equation (26) overestimates the exact results (see for example the points marked with * in Figure 2) and provides very accurate results for distances lower than 400 m and .
Differences between approximated bit rates are not clearly distinguishable in Figure 2. For this reason, in Figure 3, we plot the differences between the exact and the approximated values of the 50th and 5th percentiles obtained from Equations (21) (solid lines) and (26) (dashed lines). Differences have been normalized with respect to the corresponding bit rate values obtained using the exact formula in Equation (7). Differences in Figure 3 are in the order of a few percent of the bit rate, and this further confirms the validity of the considered approximations. Furthermore, results obtained with Equation (26) are closer to the exact values, as they are greater than those provided by Equation (21) for low percentiles.
The effectiveness of Equations (21) and (26) are further confirmed by results in Figure 4 concerning the CDFs of the exact and approximate bit rates in Equations (21) and (26) for variable distance d and for , 25. From Figure 4, exact and approximated CDFs are practically superimposed in all cases. As expected, the differences between Equations (21) and (26) are more evident at distances greater than 400 m, where bit rates were relatively small and the addition of an (unrealistic) term due to sub-carriers with the number of bits per symbol lower than 1 was not negligible. Finally, by increasing distance d, the CDFs corresponding to Equation (21) tended to be closer to the exact the CDF obtained with exact calculation because FEXT becomes gradually negligible with respect to background noise. This effect is visible for distances greater than 700 m (not shown to avoid an overcrowded graph). To evidence the differences between the CDFs obtained with the exact and approximated calculations in Figure 4, in Figure 5, we plot the normalized differences among the percentiles. Differences were mostly below and this further confirms the validity of the proposed approximations.
The applicability of Wilkinson’s method for obtaining the statistics of the log-normal sum approximation is mainly related to the values of . To further investigate the effectiveness of the proposed approximations, we have re-calculated the CDFs of the bit rate using Equations (21) and (26), for dB and variable (dB) for some distances d and . All results have been summarized in Table 1, reporting the normalized differences between the 5th percentiles of the exact and approximated bit rates. Normalization of the difference was taken with respect to the corresponding exact bit rate. The results are for the variable distance d, for ranging from 4 dB up to 7 dB, and for . From the results in Table 1, it is observed that the differences increased with , and they were more than for at distances of about 300 m, for both approximations in Equations (21) and (26). This may render the two approximations unusable. The reduction of the normalized difference with the distance m for any was due to the FEXT decrease with the distance. In general, it has been observed that for dB, the approximations in Equations (21) and (26) provide accurate results, which are in very good agreement with the exact CDFs at any practical distance envisaged for VDSL2 deployment. In fact, the normalized difference of percentiles is always below for both Equations (21) and (26) at any distance. This also confirms results concerning the applicability of Wilkinson’s method in , which are accurate when dB. For dB, only the estimate of percentiles below are accurate enough. Thus, the proposed formulation based on Wilkinson’s approach can even be used to assess percentiles of CDFs ranging from up to , when dB. Discrepancies are due to the inability of Wilkinson’s approach to provide a good approximation for the distribution tails. In these cases, alternative methods (such as those in ) should be considered to evaluate the parameters of the log-normal random variable approximating the sum. Instead, for , the proposed bit rate approximations in Equations (21) and (26) provide results that are in very good agreement with the exact CDFs at any practical distance (see, for example, results in Figure 4).
Validity of Formulas with Vectoring
In Figure 6, we plot the 5th and the 50th percentile of the bit rate as a function of the distance d of the reference user from the cabinet for a variable number of interferers ; a uniform distribution of the interfering users along the cable; and a vectoring coefficient dB, assumed to be constant with frequency. This assumption is reasonable, and leads to a lower bound on the achievable bit rate with vectoring, as sub-carriers at lower frequencies may experience smaller values of v.
As expected, the achievable bit rate significantly increases with respect to the non-vectoring case. Furthermore, bit rate curves corresponding to different interfering users tend to become closer, i.e., the vectoring algorithm cancels FEXT rendering bit rate performance less sensitive to the cable load, in practice. From results in Figure 6, the approximation in Equation (21), i.e., the first approximation, is in very good agreement with the exact results for distances up to 600 m. This is well beyond the typical distances considered for VDSL2 deployment. Instead, even in this case (see discussion in the previous section), the approximation in Equation (26), i.e., the normal approximation, overestimates the bit rates at distances above 500 m.
For both approximations, a systematic error occurs in the bit rate estimate for distances greater than 600 m. This is due to the presence of the vectoring reduction factor v in Equation (23), leading to an overestimation of the number of sub-carriers that can be loaded at , even when FEXT is negligible (e.g., at large distances), and the hypothesis of a dominant FEXT is no longer applicable. In order to further analyze the validity of the first and normal approximation in the vectoring case in Figure 7, we plot the CDFs of the exact and approximate bit rates in Equations (21) and (26) for variable distance d, , 25 and dB. In the vectoring case, the normal approximation in Equation (26) is not accurate for a small number of interfering users. Instead, it remains valid in interference scenarios characterized by medium–heavy loads (e.g., ) for all the distances that are of interest for VDSL2 deployment. Finally, the first approximation provides very accurate results even in the vectoring case.
6. Applications of the Proposed Formulations
After having validated the approximated bit rate formulas, now we illustrate two simple applications of Equation (23) to infer the number of bits that can be transmitted on a generic sub-carrier at frequency for a given interference scenario. Then, we apply the proposed formulas for evaluating the VDSL2 coverage, which can be used for network planning. Coverage results obtained using the previous bit rate approximation are compared with those obtained using exact bit rate calculations.
From now on, given the cabinet-to-user distance d, we assume the single interference scenario is specified by the number of interferers and their positions along the copper cable (i.e., by and in the bit rate formulas) and by the FEXT parameters and (i.e., by and in the bit rate formulas).
6.1. On the Number of Bits Per Sub-Carrier
When we assume in Equation (23) can vary from 4 up to 15, condition holds. In this case, Equation (23) can be used to assess the corresponding maximum sub-carrier frequency that can be loaded with bits for a given . It is well known that of the values taken by the normal random variable are in the interval .
In Table 2, we report the values of the frequencies obtained by substituting in Equation (23) when takes values between 4 and 15. The values in Table 2 indicate the frequencies allowed to transmit bits per symbol in accordance with FEXT coupling conditions accounted for by and on the distance d. In particular, considering m, from the results in Table 2, in the worst-case coupling condition (e.g., ), we can transmit 15 bit per symbol on DS for frequencies ranging from 138 kHz up to 170 kHz. Instead, under more favorable coupling conditions (e.g., ) we can transmit 15 bits for sub-carriers at frequencies up to 870 kHz. The values in Table 2 do not account for the sub-bands specified in the selected VDSL2 profile. As an example, the value of the low frequency of MHz for m, corresponding to 6 bits per symbol falls in the US band of Profile 17a.
If we plot the number of bits per sub-carrier as a function of the frequencies indicated in Table 2, we obtain the “step” plot in Figure 8 corresponding to m. The results account for the DS-band allocation of the VDSL2 35b profile. As an example, in Figure 8, we have evidenced the two extremes of the interval corresponding to the number of bits that can be loaded on the sub-carrier at frequency MHz in of the cases.
6.2. Bit Rate Coverage Definition and Calculation
Starting from the proposed approximated bit rate formulas, we can derive an integral formula for the VDSL2 bit rate coverage in the absence of bit-loading limitation. The results are valid for VDSL2 systems operating over a single copper cable originating from one cabinet, but they can be extended to other and more complex situations, as detailed in the following. We assume the parameters characterizing direct propagation and FEXT statistics for the copper cable are known. In addition, the access network geometry (i.e., the links connecting users in the buildings to the copper cable) have been specified. The distance d of the reference user from the cabinet is allowed to vary between and in accordance with an assigned (continuous or discrete) probability density function , which accounts for the given access network geometry, and the positions of the buildings along the cable.
In the no-bit-loading limitation case, the bit rate per user can be approximated by Equation (19). Thus, for fixed d and for given positions of interferers along the copper cable, the probability the bit rate exceeds the threshold is
where is the Q-function . In the bit-loading limitation case, we adopt the approximation in Equation (26) to evaluate the coverage. After some algebra we obtain
where and .
Then, in the case of the no-bit-loading limitation per sub-carrier, the bit rate coverage conditioned to the set of distances , , of the interferers from the cabinet is
The bit rate coverage is then obtained from Equation (29) as
where the expectation in Equation (30) is taken with respect to the distances , , of the interferers along the cable. An equation similar to Equation (29) can be obtained in the no-bit-loading limitation case, substituting Equation (28) for the integral in Equation (29).
In the worst-case interference scenario, i.e., for (co-located interferers), we have and for each d. In this case, the bit rate coverage is given in Equation (29) (no-bit-loading limitation) and corresponds to its lowest achievable value. Thus, these two equations provide two lower bounds on the achievable area coverage.
When we consider more copper cables in the area originating from the same and/or other cabinets, bit rate coverage has to be re-calculated for each cable and for each cabinet. This means that in a planning stage, we locate the single cabinet in the area, and then we draw the path of the cable(s) from the cabinet connecting users in the buildings. Assuming a total number of active users distributed in the buildings connected to the cable (e.g., the cable load), we analytically evaluate the area coverage using Equation (29), and we determine the percentage of users that can be served with a specified bit rate from that cabinet. In a realistic scenario, the distance d of the reference user can assume values in the (discrete) set containing the distances of the user terminals in the buildings from the cabinet. The distances of interfering users can assume values in the same set. This allows the calculation of the integral in Equation (29) as a discrete sum. We repeat the coverage calculation for every cabinet to be positioned in the area. For planning purposes, we could assert planning is successful if all the (calculated) coverage values (or a percentage of them) are always above a specified threshold, e.g., (or even higher). If this condition is not met, perhaps some cabinets/cables should be re-positioned in the area, and then the coverage re-calculated. It should be noted that the interference scenario, the FEXT characteristics, the access network geometry and the distribution of the cabinet-to-user distances d can be different for each cable and for each cabinet.
In Figure 9, we report the single copper cable coverage in Equation (29) for in the co-located interferers scenario. A Monte Carlo approach has been used to evaluate the coverage using the bit rates evaluated with the exact formulas, and those calculated with the first approximation in Equation (21). Results have then been compared with those obtained using Equation (28), which is based on the normal approximation in Equation (26). In the same figure, we also plot the coverage obtained in the no-bit-loading limitation case, i.e., using Equation (27) in the same scenario. In the no-vectoring case, the approximated results are practically superimposed with those obtained using exact calculations. A very good agreement has been obtained with Monte Carlo-based results using both bit rate approximations. Coverage results obtained without bit-loading limitations are more optimistic at short distances (higher bit rates), despite that the results are close to those including the bit-loading limitation per sub-carrier. As expected, the coverage level reduces by increasing the number of active interfering users in the cable. The coverage reduction due to the bit-loading limitation is more marked for a large number of interferers (e.g., a high cable load). Instead, degradation is limited for the low-cable load case (i.e., ). The results in Figure 9 show that even under high-coupling FEXT conditions, telecommunication operators can safely propose commercial VDSL2 offers guaranteeing services of up to 30 Mbit/s. In fact, from Figure 9, such a bit rate can be provided to almost of the population, regardless of the position of the users in the access network. Thanks to vectoring, the coverage at 100 Mbit/s is increased from up to for (medium load). The results obtained from the exact calculation and those based on the first approximation are practically superimposed, while the normal approximation provides more optimistic results (about higher with respect to the exact results) for larger distances (i.e., small bit rates). For small distances (i.e., high bit rates), both approximations are in very good agreement with the results obtained from the exact calculations.
Starting from the log-normal approximation of the SINR per sub-carrier, we have derived an analytical framework for the approximated evaluation of the user bit rate in VDSL2 access networks. The proposed formulation can be easily applied to other DSL technologies, such as ADSL and G.fast. The framework allows us to easily account for the bit-loading limitation per sub-carrier, network topology, FEXT characteristics and vectoring. The effectiveness of the proposed formulas has been tested by computer calculations under variable FEXT conditions and different interference scenarios. A very good agreement between the approximated and exact results has been obtained. Concerning the usage of the framework equations, it has been observed that the normal approximation can be used to obtain accurate bit rate estimates and coverage results in the non-vectoring scenario. In the vectoring case, the normal approximation is sufficiently accurate only for shorter distances of the reference user from the cabinet. Instead, a first approximation provides results that are practically superimposed to the exact results in every scenario, i.e., with or without vectoring. Furthermore, it has been observed that the normal approximation without the bit-loading limitation can also be used to obtain an approximation of the area coverage, which is commonly used for access network planning.
Authors contributed equally to this work.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. Derivation of the SINR Approximation
Let us indicate with and the following two log-normal random variables:
Depending on the coupling lengths, the log-normal random variables in are not i.i.d., while are assumed to be i.i.d. We determine the statistics of so that the first- and second-order moments of the two random variables are equal. By considering equality of means, we obtain
Furthermore, we impose that the statistics of , i.e., and , are selected to have for each d. In this case, from Equation (A2), we obtain . By imposing equality of the variances of and , we obtain
As the random variables are i.i.d., we have and for each p and d; y is a normal random variable having a mean and standard deviation , which can be calculated by scaling the statistics of by . From Equation (A3), we have
and from Equation (A4), we obtain . The mean and the standard deviation of the random variable , i.e., and , can be calculated by solving the non-linear system of two equations:
From Equations (A5) to (A6), after some algebra, we obtain in Equation (9) and in Equation (13). When other log-normal sum approximation methods are considered, they should be applied to the following normalized random variable:
so that the SINR per sub-carrier-approximated formulation in Equation (8) still holds. As , from Equation (A7), it is possible to determine the equivalent value of corresponding to the specific FEXT situation described by the coupling distances and by the realizations of the random variables , that is,
From Equation (A8), the random variable accounts for the overall FEXT condition as experienced by the reference user. It depends on the number of interferers () and on the geometrical characteristics of the access network (represented by the coupling distances ), as well as the coupling effects in the cable accounted for by the random variables .
Schneir, J.R.; Xiong, Y. Cost Analysis of Network Sharing in FTTH/PONs. IEEE Commun. Mag.2014, 8, 126–134. [Google Scholar] [CrossRef]
ATIS. ATIS Multiple Input Multiple Output Crosstalk Channel Model; ATIS Technical Report NIPP-NAI-2009-014R3; Alliance for Telecommunications Industry Solutions: Washington, DC, USA, 2009. [Google Scholar]
Sorbara, M.; Duvaut, P.; Shmulyian, F.; Singh, S.; Mahadevan, A. Construction of a DSL-MIMO Channel Model for Evaluation of FEXT Cancellation Systems in VDSL2. In Proceedings of the IEEE Sarnoff Symposium, Princeton, NJ, USA, 30 April–2 May 2007; pp. 1–6. [Google Scholar]
Xu, W.; Schroeder, C.; Hoeher, P.A. A Stochastic MIMO Model for Far-End Crosstalk in VDSL Cable Binders. In Proceedings of the ICC ’09, IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009; pp. 1–5. [Google Scholar]
The statements, opinions and data contained in the journal Information are solely
those of the individual authors and contributors and not of the publisher and the editor(s).
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
The statements, opinions and data contained in the journals are solely
those of the individual authors and contributors and not of the publisher and the editor(s).
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.