Professional Documents
Culture Documents
Optimization
ISSUE 1.0
2
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Review
3
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Course Contents
Chapter 2 RF Optimization
4
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Network Optimization Phases – Flow Chart
New Site
RF Optimization
Integrated
Y
5
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Network Optimization Phases – Step 1
Objectives
To ensure there are no faults related to site installation or
parameter settings.
6
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Network Optimization Phases – Step 2
RF Optimization
Once all the sites in a given area are integrated and verified, RF
(or Cluster) optimization could begin.
Objectives
To optimize coverage while in the same time keeping
interference and pilot pollution under control over the target area.
This phase also includes the verification and optimization of the
3G neighbor lists.
7
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Network Optimization Phases – Step 3
Objectives
To assess the performance and identify any need for specific
parameter optimization.
8
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Network Optimization Phases – Step 4
Objectives
To identify any new issues that could arise, for example, as a
result of increase in traffic or changes in the environment.
9
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Course Contents
Chapter 2 RF Optimization
10
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Optimization - Preparation
Clutters
RF optimization should be carried out for groups or clusters of
sites rather than on single site basis.
Drive Routes
Cluster drive surveys should include the coverage areas of each
cell and all the major roads and streets as well as any other
important locations.
Tools
Agilent scanner
Qualcomm UE in continuous AMR call
Actix Analyzer
11
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Optimization - Targets
12
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Optimization – Flow Chart
Drive Test
Implement changes
Problem Resolved?
Finish
13
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Optimization - Solutions
Antenna tilt
Antenna azimuth
Antenna location
Antenna height
Antenna type
Site location
New site
14
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Course Contents
Chapter 2 RF Optimization
15
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Cell Dominance
16
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Cell Dominance
Areas of non-dominance:
Areas where there is not a single clear dominant cell and where
the best server changes too frequently.
Result: Excessive number of soft hand off events reducing the
system efficiency and increasing the probability of call drops.
17
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Cell Dominance
18
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – CPICH Coverage
19
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – CPICH Coverage
20
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Interference
21
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Interference
What’s the
-14 -90 problem?
-15 -15.5 -95
-16 -100
-104
-17 -105
-18 -110
-19 -115
-20 -120
Ec/Io RSCP
22
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Interference
-14
-63
-60 What’s the
-15 -15.5 -65 problem?
-16 -70
-17 -75
-18 -80
-19 -85
-20 -90
Ec/Io RSCP
23
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Interference
24
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – UL Coverage
25
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – UL Coverage
26
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Pilot Pollution
27
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Pilot Pollution
-60
-65 Margin
-70
RSCP (dBm)
-75
-62
-64
-66 -68
-80 -69
-85 -81
-90
SC1 SC2 SC3 SC4 SC5 SC6
Not
Active Set Pilot Pollution
Pilot Pollution
28
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Pilot Pollution
30
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Pilot Pollution
31
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Neighbor List
Sample Sample
SC Cell Site Latitude Longitude Action Nbr SC %
Count Count
009 70548 Ajman Central 25.41204 55.447 576 Retain 018 82 14.2%
Retain 010 46 8.0%
Retain 016 31 5.4%
Retain 032 20 3.5%
Retain 011 18 3.1%
Add 130 17 3.0%
Retain 021 17 3.0%
Retain 008 12 2.1%
Retain 020 6 1.0%
Retain 012 5 0.9%
Retain 017 2 0.3%
Remove 053 0 0.0%
Remove 019 0 0.0%
Remove 034 0 0.0%
Remove 037 0 0.0%
Remove 013 0 0.0%
Remove 051 0 0.0%
33
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – SHO
UE SHO Performance
The success rates for event 1a, 1b & 1c and can be obtained
from Actix
Number of Active Set Updates
Event Count
Event 1a - 328
Event 1b - 306
Event 1c - C 64
Event Count
Event 1a - 326
Event 1b - 305
Event 1c - C 62
Event Rate
Event 1a - 99.4
Event 1b - 99.7
Event 1c - C 96.9
34
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Drop Call
35
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Drop Call
Call Drop
36
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
RF Analysis Approaches – Drop Call
Call Drop
UE to perform measurements
and SHO in time difficultly
Call Drop 38
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Course Contents
Chapter 2 RF Optimization
39
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Antenna Adjustment Example
40
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Antenna Adjustment Example
41
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Antenna Adjustment Example
RSCP Distribution
40.00%
35.00%
30.00%
25.00%
37.48%
20.00%
31.04%
30.27%
29.33%
25.98%
15.00%
20.31%
18.65%
10.00%
1.44%
0.02%
5.47%
5.00%
0.00%
43
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Antenna Adjustment Example
44
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Course Contents
Chapter 2 RF Optimization
45
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
Drop Call Distribution
46
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
47
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
48
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
49
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
Best server before and after the Call Drop
50
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
51
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
UE Active Set and Monitor Set Before and After the Call Drop
52
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
Conclusion
Examining the UE Active and Monitored set, Figure does not
show SC018 to be measured by the UE prior to the drop.
This scenario resembles a missing neighbor problem
53
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
54
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
Drop Call Analysis Example
Solution:
Looking at drop call Figure clearly shows that at the location of
the drop, SC018 should not be the best server.
Cell SC018 clearly requires some down tilting to control its
interference into the area of Drop 1. To illustrate this, RSCP
coverage of SC018 shows clearly that the cell’s is extending into
a large area. E.g. around the location of drop call, SC018 RSCP
is > -75dBm.
Add the Missing Neighbors
55
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal
56
Confidential Information of Huawei.
No Spreading without Permission. Security Level: Internal