You are on page 1of 230

Ultima Fort Basic Training TATA - Mumbai

August 2013
Sandeep Singh, Sr. Engineer-PS/CS sandeep.singh@teoco.com Mobile: +91 9967515311

Ultima Fort Training


Day 1, Session 1

Ultima Fort Overview

Ultima Fort Main Window Interface

Layer System

Toolbars

Calculations Sector Properties

RxLev, C/I, RxQual and TA info Map

13
Confidential & Proprietary

Ultima Fort Optimization Workflow

Import Network Environment

Plan Mobile Measurements (MP)

Collect Mobile Measurements (MS)

Create Network Model

Optimize Frequency Plan (OFP) Export

Neighbor-List Optimization (NBR)

Validate Network Model (QE)

Export

Implement Plan into Real Network

14
Confidential & Proprietary

Getting Started

Getting Started

Coordinates file Export Data from OSS/OMC-R

Skip to Export Data from OSS/OMC-R

Skip to Import Network Environment

15
Confidential & Proprietary

Sector Coordinates File

Back to Selection menu

The sector coordinates file must be in tab-delimited text file format (coordinates.txt) with geographical information for all the sectors in the optimization and guard-zone areas The file should contain the following columns: Sector (unique per network) LAC CI Latitude Longitude Azimuth An Advanced option (USE-SD-NAMES) allows importing sectors, based on either Coordinate or Network names (using LAC/CI)
16
Confidential & Proprietary

Export Data from OMC-R Huawei


Network Data
From the Management Tree tab on the left window, right click on the BSC (e.g., BSC248) and select Maintenance Client to launch the BSC6900 Local Maintenance Terminal

Back to Selection menu

19
Confidential & Proprietary

Export Data from OMC-R Huawei


Network Data

Back to Selection menu

From the BSC6900 Local Maintenance Terminal, select MML Commands System Management Configuration Management Configuration Data Management Backup Data Management Export Configuration Data MML Script (EXP CFGMML). You can run EXP CFGMML command directly in Command Input as well. Use the File Manager to retrieve the data. The path is visible when you run EXP CFGMML.
20
Confidential & Proprietary

Ultima Fort Optimization Workflow

Import Network Environment

Import

MP

MS

Modeler

RFO

NBR

QE

Implementation
21
Confidential & Proprietary

Folder Structure for Data Import

<Network Name> data folder

Environment folder <YYYYMMDD> Coordinates.txt file BSC folders BSC configuration files

23
Confidential & Proprietary

Folder Structure for Data Import

Multiple OSS/OMC-R configuration is supported.

24
Confidential & Proprietary

Network Environment Creation

BSS Network Configuration

Sector Coordinates and Azimuths

Name Matching

Environment Creation

Import

MP OFP

MS NBR

Modeler QE

Report Generation

Implementation

25
Confidential & Proprietary

Network Environment Creation

Import

MP OFP

MS NBR

Modeler QE
26
Confidential & Proprietary

Implementation

Import Network Environment

Click the Importer icon.

Click the Add icon, and choose your Environment Data folder.

The importer will automatically


Import MP OFP MS NBR Modeler QE
27
Confidential & Proprietary

recognize the coordinates.txt file.

Implementation

Layer Properties Adjustments

Right-click the requested sectors (850/1900) or go to Sites Properties.

28
Confidential & Proprietary

Layer Properties Adjustments

29
Confidential & Proprietary

Schema Format

The Schema Format Database

30
Confidential & Proprietary

Sector Properties Screen

Double-click any sector to display the Sector Properties screen.

Place the cursor on any sector. A map tip with the sector name is displayed.

Import

MP OFP

MS NBR

Modeler QE
31
Confidential & Proprietary

Implementation

Sector Properties Screen General Tab

32
Confidential & Proprietary

Sector Properties Screen GSM Tab

33
Confidential & Proprietary

Sector Properties Screen Frequencies Tab

34
Confidential & Proprietary

Sector Properties Screen Subcells Tab

35
Confidential & Proprietary

Sector Properties Screen Interference Tab

36
Confidential & Proprietary

Sector Properties Screen Handovers Tab

37
Confidential & Proprietary

Sector Properties Screen Frequency Restrictions Tab

38
Confidential & Proprietary

Summary - Ultima Fort Overview

In this session we learned about

Using Ultima Fort optimization to our advantage

Installing Ultima Fort software and dongle


Using the Help, Customer Support service, and Ultima Fort main GUI

Working with Ultima Fort workflow and terminology


Importing a network environment and becoming familiar with its structure

Using the Sector Properties screen

39
Confidential & Proprietary

Thank you
www.schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2006, Schema

Exercise 1
Import Network

Ultima Fort Training


Day 1, Session 2

Mobile Measurements Plan

Ultima Fort Workflow

Import

MP

MS

Modeler

OFP

NL

QE

Implementation
43
Confidential & Proprietary

Session 2 Agenda

Measurements Plan (MP)


MP Concept BA List Network Area Recommendations and Guidelines for Efficient MP MP for Selected Sectors MP Wizard

MP Output Files

44
Confidential & Proprietary

Session 2 Agenda

Mobile Measurements

When and where should measurements be recorded? How should mobile measurements be collected?

Mobile measurements data recordings optional session

Siemens/Alcatel/Nokia/Huawei/Nortel/Ericsson /Motorola per operators network


45
Confidential & Proprietary

Measurement Plan Concept


Recording length depends on:

How many BCCH frequencies to measure Network size Equipment Vendor Single/Dual band CBCCH active/not active

Recommendation

Measurement time frame should not exceed 10 days


Modeler QE

Import

MP
RFO

MS
NBR

Implementation

48
Confidential & Proprietary

BA List Structure

Operator Frequency Band

BCCH

Non-BCCH

Normal Operation: BA List = BCCH of Adjacent Cells

BCCH

Non-BCCH

BCCH

Non-BCCH

49
Confidential & Proprietary

BA List Frequency Rotation


Scanning Frequency Band 1-60 BA List Defined Neighbor BCCHs ARFCN to Scan

Rotation 1
1 3 5 9 1 2 1 4 1 6 2 2 2 7 3 1 3 5 3 7 4 2 4 5 5 1 2 5 1 2 5 1 2 5 1 2 5 2 3 5 2 3 5 2 3 5 2 3 5 3 4 5 3 4 5 3 4 5 3 4 5 3 6 5 3 6 5 3 6 5 3 6 5 4 4 5 4 4 5 4 4 5 4 5 4 6 5 4 6 5 4 6 5 4 5 4 8 5 4 8 5 4 8 5 4 8 5 5 2 5 5 2 5 5 2 5 5 2 1 8 1 9 2 0 2 1 2 3 2 4 2 5 2 6 2 8 2 9

Rotation 2 Rotation 3 Rotation 4 Rotation 5


Confidential & Proprietary

1 2

1 4

1 6

2 2

2 7

3 1

3 5

3 7

4 2

4 5

3 0

3 2

3 3

3 4

3 6

3 8

3 9

4 0

4 1

4 3

1 2

1 4

1 6

2 2

2 7

3 1

3 5

3 7

4 2

4 5

4 4

4 6

4 7

4 8

4 9

5 0

5 1

5 2

5 3

5 4

1 2

1 4

1 6

2 2

2 7

3 1

3 5

3 7

4 2

4 5

5 5

5 6

5 7

5 8

5 9

6 0

450 6

Network Area Definitions

Define the following network clusters to optimize a network:

Optimization area

Affected area
Remaining network area
Optimization and affected area Affected area Optimization area

51
Confidential & Proprietary

MP for Selected Sectors

Use one of the following for sector selection:


1. 2.

The GUI The Load Sector Selection function

Use the lasso icon or the pointer to select your sectors.

Circle the requested sector using the lasso. Double click to close the selection circle.
53

Load a list of predefined sectors from a file by selecting Load Sector Selection

Confidential & Proprietary

Measurements Plan Wizard Activation


The MP procedure involves a 3-step Wizard.

Click on Measurements Plan in the Tools menu


or the Moldeler menu.

Import

MP
RFO

MS
NBR

Modeler QE

Implementation

54
Confidential & Proprietary

Network data folder does not accept Schema Format. Single OMC-R/OSS supported per MP. Output folder Creates a new folder. Use of an existing folder deletes all of its files. DO NOT USE THE ROOT FOLDER!

BCCHs in use

When a UMTS network coexists with the GSM network, the maximum BA list length should be reduced by the number of UMTS carriers.

55
Confidential & Proprietary

Measurements Plan Wizard Step 1

56
Confidential & Proprietary

Measurements Plan Wizard Step 2

57
Confidential & Proprietary

Measurements Plan Wizard Reports

Estimation chart showing estimated duration of recording.

58
Confidential & Proprietary

Measurements Plan Wizard Step 3

Check Details!

59
Confidential & Proprietary

Measurements Plan Reports

Import

MP
RFO

MS
NBR

Modeler QE

Implementation

60
Confidential & Proprietary

Measurements Plan Reports

61
Confidential & Proprietary

Mobile Measurements Data Recordings

Recording Files are located in the Output folder, which was

Ericsson

defined in the Measurements


Plan Wizard.

Nokia
Alcatel Siemens Nortel Motorola

The procedure varies from

vendor to vendor:*

Huawei
Import MP RFO MS NBR Modeler QE

* Refer to Required Data Inputs for <vendor> Markets document.


62
Confidential & Proprietary

Implementation

Running Command Files Huawei


Folder Structure

Back to Selection menu

Import RFO

MP OFP

MS NBR

Modeler QE

Implementation

64
Confidential & Proprietary

Ultima Fort Training


Mobile Measurements
Day 2, Session 1

Ultima Fort Workflow

Import

MP

MS

Modeler

OFP

NL

QE

Implementation
67
Confidential & Proprietary

When should Measurements be Recorded?


Recommendation

Network Freeze during Measurements Recording.

Only on work days, not on weekends or holidays.


During the network/area peak hour. In case of Motorola these rules can be overruled.

Import

MP OFP

MS NBR

Modeler QE
68
Confidential & Proprietary

Implementation

How Should Mobile Measurements be Collected?


Freeze the network during the recording time frame. Stop the following activities when recording data:

Disable MSC trace files creation BSC split Site re-homing (BSC/site relations change) Changes of LAC and CI

Site additions
Sector mechanical changes such as tilt, azimuth, and antenna changes Frequency changes Neighbor additions or deletions

69
Confidential & Proprietary

How Should Mobile Measurements be Collected?

Only allow changes during the maintenance window:

TRX additions

Frequency changes (TCH)

Do not change RAN parameters. Details depend on the vendor.

Import

MP OFP

MS NBR

Modeler QE
70

Skip the Data Recordings Commands? Click Here

Implementation

Confidential & Proprietary

Mobile Measurements Data Recordings

Recording Files are located in the Output folder, which was

Ericsson

defined in the Measurements


Plan Wizard.

Nokia
Alcatel Siemens Nortel Motorola

The procedure varies from

vendor to vendor:*

Huawei
Import MP OFP MS NBR Modeler QE

* Refer to Required Data Inputs for <vendor> Markets document.


71
Confidential & Proprietary

Implementation

Running Command Files Huawei

Back to Selection menu

Mobile Measurements recording.

Import

MP OFP

MS NBR

Modeler QE
87
Confidential & Proprietary

Implementation

Running Command Files Huawei


Folder Structure

Back to Selection menu

Import RFO

MP OFP

MS NBR

Modeler QE

Implementation

88
Confidential & Proprietary

Summary

In this session we

learned about mobile measurements

learned about the MP procedure


learned how to collect measurements by running command files for each vendor reviewed MP guidelines and rules used MP functions analyzed MP reports

89
Confidential & Proprietary

Thank you
www.schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2006, Schema

Ultima Fort Training

Modeling & Network Analysis Day 2, Session 2

Ultima Fort Workflow

Import

MP

MS

Modeler

OFP

NBR

QE

Implementation
94
Confidential & Proprietary

Model Generation Workflow

Data Validity

C/I Data

C Data

Traffic Data

Network Configuration

Interfering Cell Identification

Data Merge Key: Shadowing Input


Automatic Data Processing and Modeling

Filtering

Network Model

C/I, C, Traffic Data


96

Output

Confidential & Proprietary

Interfering Cell Identification

Requirements for successful interferer identification:

Synchronize BSS Network Configuration with the recording.

Do not apply network changes (BSIC/BCCH) while

recording.

Have a good BCCH/BSIC plan. Maintain network data integrity BSC/Site/Cell existence and name matching.

99
Confidential & Proprietary

Interfering Cell Identification

Interferer identification

Recorded BCCH and BSIC


o o

Distance NBR Tier Distance

Note: A C/I histogram is not created when interferer identification has failed.

100
Confidential & Proprietary

What is Shadowing?

Phenomena

BCCH co-channelling exists between two

neighboring cells.

The mobile cannot identify the BSIC, and cannot lock onto the serving sector.

Outcome

There is no measured interference among

shadowed sectors.

101
Confidential & Proprietary

Shadowing 1st Level

102
Confidential & Proprietary

Shadowing 2nd Level

103
Confidential & Proprietary

Shadowing Relations

Maintenance Prevention

Estimation of shadowed sector interferers (analysis of measured impacts and network topology).

Solution

BCCH/BSIC retune Swap BCCH frequencies to avoid existing reuses.

104
Confidential & Proprietary

Importing MS and Network Configuration Data

Mobile Measurements (MS) and Network Configuration files are vendor-dependent. The Import process supports the following vendor folder structures:

Ericsson Nokia

Skip Importing MS Data? Click Here

Siemens
Alcatel Nortel

Import

MP OFP

MS NBR

Modeler QE
105

Huawei Motorola
Confidential & Proprietary

Implementation

Model Sub-Folder Structure Huawei (S6000)


Folder Structure
Model sub-folder Recording date sub-folders (MSC sub-folder) BSC sub-folder Network Configuration files + Mobile Recordings files
The MS Data files includes Neighbors.csv and

Back to Selection menu

FULL/HALF RLMF files.

Import

MP OFP

MS NBR

Modeler QE
107
Confidential & Proprietary

Implementation

Modeler Wizard

Click on the Modeler icon in the Toolbar

Choose the model subfolder within the Network folder

Import

MP OFP

MS NBR

Modeler QE
108
Confidential & Proprietary

Implementation

Modeler Wizard

Import

MP OFP

MS NBR

Modeler QE
109
Confidential & Proprietary

Implementation

Modeler Reports

110
Confidential & Proprietary

Modeler Reports

111
Confidential & Proprietary

Modeler Reports

112
Confidential & Proprietary

Modeler Reports (optional)

Affected traffic
Serving Sector 2AAI011 2AAI011 2AAI011 2AAI011 2AAI011 Interfering Sector 2AAI012 2AAI013 2AAIR11 2AAIR12 2AAIR13 Traffic (Erlang) Mean (dB) STD (dB) Estimated Affected traffic (Erlang) Estimated Affected Traffic (%) 23.350 15.340 9.761 8.548 36.609 23.350 16.485 7.768 6.581 28.186 23.350 14.597 7.571 8.541 36.578 23.350 10.631 7.087 13.463 57.659 23.350 32.118 9.581 0.417 1.787

The Named Affected Traffic report may be generated, based on the value of Advanced Network Properties parameter, GENERATE-AFFECTED-TRAFFIC-REPORT. .
113
Confidential & Proprietary

Display Sectors with Incoming Interference

Select all sectors with incoming interference.

Import

MP OFP

MS NBR

Modeler QE
114
Confidential & Proprietary

Implementation

Sector Interference Properties

Ultima Fort can display sector interference on the GIS map.

Click on the Show Sector Interference icon in the toolbar menu

Choose either Outgoing Sector Interference or Incoming Sector Interference


Import MP OFP MS NBR Modeler QE
115
Confidential & Proprietary

Implementation

Sector Interference GIS Representation

Outgoing

Sector X might interfere with 1020% of the traffic of this sector.

Sector X does not interfere with this sector.

Sector X

The requested sector (sector X) is flagged (black).

116
Confidential & Proprietary

Sector Interference GIS Representation

Incoming
This sector does not interfere with Sector X.

Sector X

This sector might interfere with 20-30% of sector X traffic.

117
Confidential & Proprietary

Sector Interference GIS Representation

Save Layer

118
Confidential & Proprietary

Sector Interference GIS Representation

Save Layer: Show two layers at the same Time

119
Confidential & Proprietary

Sector Interference List

Import

MP OFP

MS NBR

Modeler QE
120
Confidential & Proprietary

Implementation

Sector Frequency Noise List See who is interfering and how much?

121
Confidential & Proprietary

Sector Frequency Noise List


Choose a Channel Group ID

Choose a frequency from the list

122
Confidential & Proprietary

Sector Frequency Noise List

Sector reuse is shown on the map

Sector ACTELE2

123
Confidential & Proprietary

Sector Frequency Noise List

Sector reuse and sector interference are shown on the


map.

124

Sector SectorACTELE2 ACTELE2


Confidential & Proprietary

Time Advance

125
Confidential & Proprietary

Time Advance

126
Confidential & Proprietary

Sector Properties and Statistics

127
Confidential & Proprietary

Summary

In this session we learned about


Modeler concept Modeler flow Shadowing Modeler histograms Model folder structure

and we

used the Modeler Wizard analyzed the Modeler reports and the following outputs:
o o

GIS representation of interference between sectors sector noise calculation

128
Confidential & Proprietary

Thank you
www.schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2006, Schema

Exercise 3
Run Model
1. run modeler 2. select sectors with incoming interferences 3. show interference (incoming, outging) 4. show interference and handovers at the same time 5. show time advance 6. review noises for a few sectors 7. Question to smart engineers.

Ultima Fort Training


Day 2, Session 3

Quality Evaluator

Ultima Fort Workflow

Import

MP

MS

Modeler

FP

NBR

QE

Implementation
133
Confidential & Proprietary

What is the Quality Evaluator?


The QE is an advanced semi-dynamic simulator, based on the statistical Monte-Carlo approach. The QE module performs an in-depth analysis of GSM network

quality.
The QE supports the following relations: per-sector

sub-cell
channel group any other user-defined evaluation set Analysis is performed before results are implemented.
Import MP OFP MS NBR Modeler QE

Implementation

134
Confidential & Proprietary

Quality Evaluator Diagram

RF Environment Model

Network Configuration

Quality Evaluator Simulation

KPI Calculations FER, RxQuality, C/I

Import

MP OFP

MS NBR

Modeler QE

Implementation

136
Confidential & Proprietary

Quality Evaluator Analysis

Analysis is performed in the following modes:

Interference
Coverage Total Bad Quality

Import

MP OFP

MS NBR

Modeler QE

Implementation

137
Confidential & Proprietary

Quality Evaluator Advantages

Validate the current network model. Evaluate and predict network performance before implementation. Compare the quality of alternative frequency plans.

BCCH-TCH domain allocation

MAL length
Hopping Method (SFH, BB, Non Hopping)

What-If

scenarios in current network

Traffic changes (seasonal / future / boost). GSM features activation (DTX, TCH Allocation Priority TRX addition.

138
Confidential & Proprietary

Quality Evaluator Wizard

Activate the QE module after selecting the sectors to be evaluated.

Click on the Evaluator icon to


start the Quality Evaluator Wizard.

Import

MP OFP

MS NBR

Modeler QE

Implementation

139
Confidential & Proprietary

Quality Evaluator Wizard Step 1

Enter name for the Quality


Evaluation run.

Select the required accuracy level for the Quality Evaluation run.

Import

MP OFP

MS NBR

Modeler QE

Implementation

140
Confidential & Proprietary

Quality Evaluator Wizard Step 2


Multiply current traffic levels by this number to simulate prospective traffic density for the run.

Import

MP OFP

MS NBR

Modeler QE

Implementation

141
Confidential & Proprietary

Quality Evaluator Wizard Step 2

With RF features and Equipment menus you can make different QE comparison scenarios.

Move the slider to the position that represents the percentage of pedestrian (TU3) and vehicular traffic (TU50) in your network.
142
Confidential & Proprietary

Quality Evaluator Wizard Step 2

Network settings are taken from the Sector (or other NE component) Properties window.

Import

MP OFP

MS NBR

Modeler QE

Implementation

143
Confidential & Proprietary

Quality Evaluator Wizard Step 2

Import

MP OFP

MS NBR

Modeler QE

Implementation

144
Confidential & Proprietary

Quality Evaluator Wizard Step 2

Import

MP OFP

MS NBR

Modeler QE

Implementation

145
Confidential & Proprietary

Quality Evaluator Wizard Step 2

Import

MP OFP

MS NBR

Modeler QE

Implementation

146
Confidential & Proprietary

Quality Evaluator Wizard Step 2

When AMRPENETRATIONRATE is set to Network settings, it should be imported per cell, using an external traffic file.

Import

MP OFP

MS NBR

Modeler QE

Implementation

147
Confidential & Proprietary

Quality Evaluator Wizard Step 3

Import

MP OFP

MS NBR

Modeler QE

Implementation

148
Confidential & Proprietary

Quality Evaluator Wizard Step 3

Import

MP OFP

MS NBR

Modeler QE

Implementation

158
Confidential & Proprietary

Quality Evaluator Wizard Step 4


Pre-run data consistency check and QE launch
Check Details!

Import

MP OFP

MS NBR

Modeler QE

Implementation

159
Confidential & Proprietary

Quality Evaluator Wizard Step 4


Data consistency check reports

Import

MP OFP

MS NBR

Modeler QE

Implementation

160
Confidential & Proprietary

Quality Evaluator Report Analysis


Analyze reports, using the GUI Calculations window.
Right-click the requested evaluation run to open a menu

Edit your reports Create new reports

Import

MP OFP

MS NBR

Modeler QE

Implementation

161
Confidential & Proprietary

Quality Evaluator Report Analysis

Default Reports

162
Confidential & Proprietary

Quality Evaluator Report Analysis

User-defined Reports
Import MP OFP MS NBR Modeler QE

Implementation

163
Confidential & Proprietary

Quality Evaluator GIS Report Analysis


Select Load Layers.

Import

MP OFP

MS NBR

Modeler QE

Default GIS report displays the % of traffic affected by Bad Rxqual (5,6,7).

Implementation

164
Confidential & Proprietary

Comparing Predicted and Measured RxQual


Why compare? It is advisable to check the accuracy of the network model to ensure that essential data has been integrated. Network Model Accuracy Measured vs. predicted RxQual Visual and statistical comparisons

165
Confidential & Proprietary

Comparing Predicted and Measured RxQual


What is compared? The QE predicts network quality in terms of C/I, FER, and RxQual predictions. OSS performance statistics provide RxQual measurements, which give the RxQual distribution in a range of 0 to 7. RxQual comparison is performed at the sector level.

Import

MP OFP

MS NBR

Modeler QE

Implementation

166
Confidential & Proprietary

Comparing Predicted and Measured RxQual On what basis is data compared? Percentage-based

Traffic-based

Import

MP OFP

MS NBR

Modeler QE

Implementation

167
Confidential & Proprietary

Comparing Predicted and Measured RxQual

MS Data Files

Vendor Files
Import MP OFP MS NBR Modeler QE

Implementation

168
Confidential & Proprietary

Comparing Predicted and Measured RxQual


Correlation between predicted (QE) RxQual Bad Quality and measured (Switch) RxQual Bad Quality
Root Mean Square (RMS) value per selection Percentage of accurately predicted sectors regarding Bad RxQual, within a deviation of no more than 5% compared with the switch RxQual measurements

The comparison ratio (%) between predicted and measured average Bad Quality values

Percentage of the sectors that were accurate in their Number of 10/20/30 worst sectors detected both by prediction withinand a deviation of no more than 10% the switch by the Quality Evaluator compared with the switch RxQual measurements.
Select type of units to display.
169
Confidential & Proprietary

Compare Evaluation Workflow

Build Environment

Create Model

OFP 1

OFP 2

QE 0 Current Network

QE 1

QE 2

Comparison Analysis

170
Confidential & Proprietary

Compare Two or More Evaluation Runs


Use CTRL to highlight requested Evaluation Runs

Right-click Compare Evaluations

Import

MP OFP

MS NBR

Modeler QE

Implementation

171
Confidential & Proprietary

Compare Two or More Evaluation Runs

172
Confidential & Proprietary

Compare Two or More Evaluation Runs

173
Confidential & Proprietary

Quality delta Analysis

Layer with most improved and most degraded sectors

174
Confidential & Proprietary

Quality Evaluator Summary


In this session we

learned about QE concepts and advantages used the QE Wizard (step by step) analyzed QE reports

compared measured and predicted RxQual


compared two or more evaluation runs

175
Confidential & Proprietary

Thank you
www.schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2006, Schema

Exercise 5
Run Quality Evaluator
1. Run QE 2. Right click ->Load layers: see RxQual performance per sector 3. Compare to Measured RxQual data 4. Check correlation 5. Run another QE with different Traffic/RF features 6. Compare evaluations 7. Show Quality Delta Analysis

Ultima Fort Training


Day 3, Session 1

Design Analysis Pack

Design Analysis Pack


Wrong Azimuth Swapped Sectors

Overshooting Sectors Coverage-limited Sectors

179
Confidential & Proprietary

Design Analysis Pack

Select Sectors to be Analyzed Start Design-Analyzer run

Follow the Wizard

180
Confidential & Proprietary

Design Analysis Pack

Analysis Calculation complete. Load GIS layers

GIS layer displayed

181
Confidential & Proprietary

Wrong Azimuth Detection


Database discrepancy

Actual Sector Direction

Planning Tool Sector Direction

Confidential & Proprietary

Swapped Sectors Detection


Incorrect Installation

Is this site accurately installed?

Confidential & Proprietary

Swapped Sectors Detection


Incorrect Installation

A C B

Sectors B & C are swapped

Confidential & Proprietary

Swapped Sectors Detection


Incorrect Installation

Both Sectors were found to occupy each others planned azimuth

Confidential & Proprietary

Swapped Sectors Detection


Incorrect Installation
Sector Bs actual service area is Sector Cs planned service area

Confidential & Proprietary

Swapped Sectors Detection


Incorrect Installation
Sector Cs actual service area is Sector Bs planned service area

Confidential & Proprietary

Overshooting Sectors Detection


Identifying Overshooting Sectors

188
Confidential & Proprietary

Overshooting Sectors Detection


Table + GIS display

Ctrl+C Ctrl+V Ctrl+A

189
Confidential & Proprietary

Overshooting Sectors Detection


Identifying Overshooting Sectors

R = Average NBR dist. x dist_factor (2.0)

Affected area Interfered spans over 27km Traffic beyond R


Sector Traffic
190
Confidential & Proprietary

Overshooting Ratio =

Coverage-Limited Sectors Analysis


Detection of low signal level distribution

-87 dBm Threshold -90


Confidential & Proprietary

Network Analysis BCCH/BSIC reuse reports

192
Confidential & Proprietary

Network Analysis Frequency Usage report

193
Confidential & Proprietary

Measured RxQual Layer

194
Confidential & Proprietary

Thank you
www.schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2006, Schema

Exercise 4
Run Design Analysis

Ultima Fort Training


Day 3, Session 3

Neighbor-List Optimization

Ultima Fort Workflow

Import

MP

MS

Modeler

FP

NBR

QE

Implementation
205
Confidential & Proprietary

What is the Neighbor List Feature?

The neighbor list feature analyzes and optimizes the network neighbor list, using mobile measurements

and handover statistics.

Import

MP

MS NBR

Modeler QE

OFP

Implementation

206
Confidential & Proprietary

Why Optimize the Neighbor List?

Optimization:

Improves handover failure rate and network performance.

Increases the effectiveness of frequency planning by:


removing

unnecessary handover constraints.


handover candidates.

prioritizing

Import

MP

MS NBR

Modeler QE

OFP

Implementation

207
Confidential & Proprietary

Neighbor List Optimizer Outcomes

Optimizer outcomes use mobile measurements and handover statistics to analyze and optimize neighbor lists by:

recommending the addition of missing handover relations. recommending the removal of redundant handover relations. providing analysis information and various reports

for further investigation.


Import MP MS NBR Modeler QE

OFP

Implementation

208
Confidential & Proprietary

Importing Handover Statistics

Import

MP

MS NBR

Modeler QE

OFP

Implementation

209
Confidential & Proprietary

Neighbor List Optimizer Wizard


Select the requested sectors. Click Handover Plan in the Optimization menu.

Import

MP

MS NBR

Modeler QE

OFP

Implementation

210
Confidential & Proprietary

Neighbor List Optimizer Wizard Step 1

Import

MP

MS NBR

Modeler QE

OFP

Implementation

211
Confidential & Proprietary

Neighbor List Optimizer Wizard Step 2


Maximum number of outgoing handovers created for a specific sector

Factor for average distance between sector and interferers, where the HO probability exceeds the HO probability threshold
Import MP MS NBR Modeler QE

OFP

Implementation

212
Confidential & Proprietary

Neighbor List Optimizer Wizard Step 2

Determines the level of handover changes to be used. Select Minimum to reduce the number of handover changes or Maximum to increase it.

Determines whether to account for both incoming and outgoing handovers.


Import MP MS NBR Modeler QE

Maximum number of outgoing handovers created for a specific sector in the network.

OFP

Implementation

213
Confidential & Proprietary

Neighbor List Optimizer Wizard Step 3

Check Details!

Import

MP

MS NBR

Modeler QE

OFP

Implementation

214
Confidential & Proprietary

Neighbor List Optimizer Wizard Step 3

215
Confidential & Proprietary

Neighbor List Optimizer Wizard Step 3

216
Confidential & Proprietary

Neighbor List Optimizer Wizard Step 3

217
Confidential & Proprietary

Neighbor List Optimizer Reports

Original Neighbor List Data +Missing Neighbor Relations - Redundant Neighbor Relations = Optimal Neighbor Relations

218
Confidential & Proprietary

Apply Neighbor List Plan

View Handover Plan resultsby clicking on Show Handover Changes.

219
Confidential & Proprietary

Handover Change Representations

Red sectors indicate deleted


Neighbor Relations.

Blue sectors indicate unchanged


Neighbor Relations.

Green sectors indicate added


Neighbor Relations.

Import

MP

MS NBR

Modeler QE

OFP

Implementation

220
Confidential & Proprietary

Handover Change Score


A high positive number (dark green) indicates a neighbor list with missing neighbors.

Import

MP

MS NBR

Modeler QE

OFP

Implementation

A low negative number (dark red) indicates a neighbor list with redundant neighbors, which should be deleted.
221
Confidential & Proprietary

Exporting Handover Changes

Choose a Network folder. Create a new folder for exporting Handovers Plan Data.
222
Confidential & Proprietary

Summary

In this session we

learned about the Neighbor List Optimizer necessity and concept

imported handover statistics followed the Neighbor List Optimizer Wizard (step by

step)

analyzed Neighbor List Optimizer reports learned how to check the handover changes

representation on the GIS layer

learned how to export the handovers plan to the OSS


223
Confidential & Proprietary

Thank You
www.schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2005, Schema

Exercise 6
Run NBR Optimization

Ultima Fort Training

Day 4, Session 1

Frequency Plan Optimization (OFP)

Ultima Fort Workflow

Import

MP

MS

Modeler

OFP

NBR

QE

Implementation
228
Confidential & Proprietary

Introduction to OFP

The Spectrum Optimizer recommends an optimized and optimal Network Frequency Plan that maximizes traffic above user-defined quality thresholds. The Frequency Plan is based on a sophisticated network model, configuration, and definitions. The Spectrum Optimizer utilizes powerful genetic algorithms. The Spectrum Optimizer Wizard guides the user through the various stages of defining optimization settings.
MP FP MS NBR Modeler QE

Import

Implementation

229
Confidential & Proprietary

Introduction to OFP

Ultima Fort supports network quality optimization goals in terms of the following:

FER RxQual

C/I

Import

MP OFP

MS NBR

Modeler QE

Implementation

230
Confidential & Proprietary

What Can be Optimized?


BCCH and TCH Frequency Band Split (free plan) Separate Frequency Domains Planning

BCCH Domain + BSIC TCH Domain

Frequency Hopping

Non-Hopping
Base Band Synthesized Hopping

HSN
MAIO
231
Confidential & Proprietary

Import

MP OFP

MS NBR

Modeler QE

Implementation

What is Actually Optimized?



Import

FER reduction BER reduction Targeted C/I Targeted coding scheme for data services Frequency coordination with neighboring networks Quality under network expansion Quality under spectrum reduction External interference management

Uplink and Downlink


MP OFP MS NBR Modeler QE

Implementation

232
Confidential & Proprietary

Network Area Definitions

When optimizing a network, define the following network clusters:

Optimization area

Affected area (also known as simulation area)


External area (the rest of the network)
Optimization and affected areas Affected area

Optimization area

233
Confidential & Proprietary

Optimization Area
Reasonably-sized Optimization area = 200-500 sectors When a small optimization area is selected, there is less: sensitivity to modeling error

stress on the network during the preparation phase


data inconsistency problems resources required stress on the network during the implementation phase When a small optimization area is selected, there is a larger required optimization cycle.
Optimization area

234
Confidential & Proprietary

Optimization Constraints and Work Flow


Optimized items: BCCH, TCH, SFH, BSIC, HSN, MAIO

Frequency Domains (BCCH, TCH)

BSIC, HSN Domains

Logical Constraints

Neighbor cells / Triangulation constraints (Co/Adj reuse for BCCH/TCH/SFH) Sector/Site Separation constraints (Co/Adj reuse for BCCH/TCH/SFH) External Interference Matrix Frequency Restrictions Per Sector (Allowed with Penalty / Forbidden) Interference Matrix (Mobile Measurements) Sector (channel type) Priority Low/Normal/High Physical Constraints

Confidential & Proprietary

Area Frequency Domain

Area Frequency Domain Frequency assignment restrictions based on a geographic area (e.g., a

border between two countries).

Available Spectrum BCCH Domain


B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H B C C H T C H T C H T C H T C H T C H T C H T C H T C H T C H

TCH Domain

T C H

T C H

T C H

T C H

T C H

T C H

T C H

T C H

T C H

T C H

T C H

Restricted Band A
Import MP OFP MS NBR Modeler QE

Restricted Band B

Implementation

237
Confidential & Proprietary

Channel Type Frequency Domain

Possible allocation policies:


Consecutive Interleaved

BCCH

Mixed

TCH

Import

MP OFP

MS NBR

Modeler QE

Implementation

238
Confidential & Proprietary

Synthesized Hopping Schemes

Hopping Type Domain # of ARFCN > # of TRX (does not apply to non-hopping and baseband)

Four SFH schemes:


Ad-hoc per site Fixed per site Ad-hoc per sector Fixed per sector (HSN per site/sector)

MALs for ad-hoc are planned based on heuristics. MALs for fixed load are manually created and automatically assigned.
239
Confidential & Proprietary

Constraints per Domain

Logical Constraints:

Separation constraints: co-sector/site Relation constraints: neighbor list, triangulation, accessibility and user-defined (external IM)

Frequency constraints: ARFCNs list per sector


forbidden absolute constraint, prohibiting use allowed traffic weighted constraint, penalty for use

Physical Constraints: represented by C/I model

Import

MP OFP

MS NBR

Modeler QE

Implementation

240
Confidential & Proprietary

Network Constraints - Summary


Co-sector Interference

User-defined

Co-site

Neighbor Forbidden Frequencies


241
Confidential & Proprietary

Spectrum Optimizer Wizard


Select the requested sectors for optimization. Click on the Frequency Plan icon in the Optimization options menu.

Import

MP OFP

MS NBR

Modeler QE

Implementation

242
Confidential & Proprietary

Spectrum Optimizer Wizard Step 1

You can load an OFP template.

243
Confidential & Proprietary

Spectrum Optimizer Wizard Step 2

Select the Reveal Shadowing checkbox to avoid existing BCCH reuses in the Optimized Frequency Plan,

Select the Prioritize data Traffic checkbox to fit the Frequency Plan better for Traffic Data. Select this option to plan only for new TCH non-hopping TRXs (TRX expansion).
244

This option applies only when the optimized Frequency Plan relies on the existing Frequency Plan, with minimum changes.

Confidential & Proprietary

Spectrum Optimizer Wizard Step 3

Select the available NCCs (network color codes) for the plan (at least one).

Click here to display the selected frequencies.

245
Confidential & Proprietary

Spectrum Optimizer Wizard Step 4

Click here to access the frequency selector for the required domains.

246
Confidential & Proprietary

Spectrum Optimizer Wizard Step 4

247
Confidential & Proprietary

Spectrum Optimizer Wizard Step 4

248
Confidential & Proprietary

Spectrum Optimizer Wizard Step 5

249
Confidential & Proprietary

Spectrum Optimizer Wizard Step 6

Scaling Factor

Importing Relation Constraints

250
Confidential & Proprietary

Spectrum Optimizer Wizard Step 7

Check Details!

253
Confidential & Proprietary

Spectrum Optimizer Progress Window

254
Confidential & Proprietary

Spectrum Optimizer Progress Window

255
Confidential & Proprietary

Spectrum Optimizer Progress Window

256
Confidential & Proprietary

Spectrum Optimizer Report Analysis

257
Confidential & Proprietary

OFP Report Analysis

258
Confidential & Proprietary

OFP Report Analysis

260
Confidential & Proprietary

Applying a Frequency Plan to the Network

Right-click on the Frequency Plan and choose Apply Plan.

Import

MP OFP

MS NBR

Modeler QE

Implementation

261
Confidential & Proprietary

Exporting the Frequency Plan to the OSS

Choose: File Export Frequency Plan

Choose an origin folder (Network) and a destination folder to export the plan.

263
Confidential & Proprietary

Summary

In this session we

learned about the OFP workflow

used the Frequency Optimizer Wizard step-by-step


analyzed the Frequency Optimizer Reports learned how to compare two or more frequency plans

learned how to export the frequency plan to the OMC-R/OSS


264
Confidential & Proprietary

Thank You
www.schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2005, Schema

Exercise 7
Run OFP (Frequency Optimizer)

Hand Over Plan - Evaluation


Find Most Improved Sectors (GIS and Report)

2.

267
Confidential & Proprietary

Hand Over Plan - Evaluation


Check Handover Changes for key Sectors.

3.

268
Confidential & Proprietary

Hand Over Plan - Evaluation


Check Handover Changes for key Sectors.

3.

269
Confidential & Proprietary

Hand Over Plan - Evaluation


Check HO to BCCH and BCCH-BSIC Reuse

4.

270
Confidential & Proprietary

Handover Plan - Implementation


a. Apply Handover plan.

1.

(or)
1. 2.

b. Prepare an Optimized HO plan Import Optimized Plan to Forte.

271
Confidential & Proprietary

Handover Plan - Implementation


a. Apply Handover plan.

1.

272
Confidential & Proprietary

Handover Plan - Implementation


(or)
1.

b. Prepare an Optimized HO plan

Open current HO plan

273
Confidential & Proprietary

Handover Plan - Implementation


(or)
1.

b. Prepare an Optimized HO plan

Open Optimized HO plan (HO to add and remove)

274
Confidential & Proprietary

Handover Plan - Implementation


(or)
1.

b. Prepare an Optimized HO plan

Merge to a NEW HO plan

Current HO Plan (.txt)

HO to add

HO to Remove

BSC Implementation

NEW HO Plan (.txt)


275
Confidential & Proprietary

Handover Plan - Implementation


(or) 1. b. Prepare an Optimized HO plan 2. Import new HO plan to Forte.

NEW HO Plan (.txt)

276
Confidential & Proprietary

Frequency Plan - Evaluation


1.
2. 3. 4. 5.

Review Violated Constraints Report.


Run QE, find Worst RxQual Sectors. Compare with Current RxQual performance. Make a list of known problematic sectors. Check reuses using: Reuses + Noises + Interferences

6.

Review Frequency Usage Report.


277
Confidential & Proprietary

Frequency Plan - Evaluation


1.

Review Violated Constraints Report.

278
Confidential & Proprietary

Frequency Plan - Evaluation


2.

Run QE, find Worst RxQual Sectors.

279
Confidential & Proprietary

Frequency Plan - Evaluation


3.

Compare with Current RxQual performance.

280
Confidential & Proprietary

Frequency Plan - Evaluation


4.

Make a list of known problematic sectors. From your own experience with your network

281
Confidential & Proprietary

Frequency Plan - Evaluation


5.

Check reuses using:


Reuses + Noises + Interferences

282
Confidential & Proprietary

Frequency Plan - Evaluation


5.

Check reuses using:


Reuses + Noises + Interferences

283
Confidential & Proprietary

Frequency Plan - Evaluation


5.

Check reuses using:


Reuses + Noises + Interferences

284
Confidential & Proprietary

Frequency Plan - Evaluation


6.

Review Frequency Usage Report.

285
Confidential & Proprietary

Thank You
eldad@schema.com

Schema retains the sole proprietary rights to all information contained in this document. No part of this publication may be reproduced, stored in a retrieval system, transmitted in any form or by any means, including but not limited to: electronic, mechanical, magnetic, photocopy, recording, or otherwise, in use now or in the future, without prior written consent from Schema
Copyright 2005, Schema

Exercise 8
Review NBR plan, Frequency Plan

Checking Optimization Process


1. Check model accuracy and Frequency usage on current network (Optimization + Affected Area)

288
Confidential & Proprietary

Checking Optimization Process


2. GIS presentation of Bad Rx Quality in Planned area

289
Confidential & Proprietary

Checking Optimization Process


3. 10 sectors with worst Rx Qual performance
% bad Sector RxQual 59405 23.3 59545 22.32 59488 20.92 59427 16.99 59696 16.92 59638 16.92 59694 16.83 59315 16.67 59496 16.42 59753 16.31 59768 16.24 59406 15.6 59487 15.05 % bad Sector RxQual 59428 15.03 59918 14.86 59695 14.41 59283 14.39 59881 13.48 59595 13.46 59554 13.06 59978 13 59555 12.72 59649 12.65 59241 12.58 59769 12.09

4. 10 sectors with worst coverage problems


RxLevel Below Threshold (% Traffic) 58.33 38.53 35.28 35.06 34.78 33.33 31.7 31.34 31.03 29.45 29.41 29.03 26.35 26.03 RxLevel Below Threshold (% Traffic) 25.56 25.24 24.41 24.04 23.64 23.33 22.87 22.44 22.3 22.22 21.86 21.31 20.93 20.06

GIS snapshots of worst 2/3

Name 59315 59406 59428 59584 59427 59949 59562 59481 59404 59977 59391 59371 59698 59947

Name 59669 59405 59583 16345 59781 59364 59741 59373 59667 59948 59658 59911 59545 59664

-100dbm

290
Confidential & Proprietary

Checking Optimization Process


5. Worst polluters (Overshooters)
Name 59987 59669 59546 60001 59751 59455 59307 59488 59753 60003 59319 Overshooting Ratio 3.01 2.82 2.69 2.62 2.42 2.26 2.12 1.92 1.76 1.6 1.6

5.1 GIS representation of polluters in opt. area

5.2 GIS representation outgoing interferences of most polluters


291

5.3 GIS representation of polluters & Time Advance

Confidential & Proprietary

C/I Histogram
C/I Cumulative Distribution
4.5

C/I Histogram with Normal Distribution

C/I Normal Distribution


100 90

80

3.5

70 3 60 P12 2.5

%CDF*

50 2 40 1.5 30 1 P0 10

Traffic

20

0.5

0
-20 -19 -18 -17 -16 -15 -14 -13 -12 -11 -10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

C/I
292
Confidential & Proprietary

C/I to Impact Conversion

Adjacent Channel Offset


C/I Histogram with Mean 7.7dB and STD 5.8dB

18dB
8

Impact 2 Adj. Channel C/I Threshold

Impact 1 Co-Channel C/I Threshold

Affected Traffic

0
-20 -19 -18 -17 -16 -15 -14 -13 -12 -11 -10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

C/I
293
Confidential & Proprietary

You might also like