You are on page 1of 56

OWJ102103 WCDMA RNO RF Optimization

ISSUE 1.0

Wireless Curriculum Development Section

Review

This

lecture

introduces

the

various

stages

involved in optimizing a 3G radio network and focuses mainly on the RF Optimization phase.


Step-by-step approach for the analysis of drive survey data collected by Agilent Scanner and test UE is presented. The analysis is carried out using the post processing tool Actix Analyzer.

2
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Review

RF optimization will be an ongoing activity and will need to be revisited as traffic increases in the network and as new sites are deployed.

In

addition,

as

the

network

matures,

the

optimization process should be enhanced to take into account statistical data and key performance indicators collected throughout the network.

3
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents
Chapter 1 Optimization Phases Chapter 2 RF Optimization Chapter 3 RF Analysis Approaches Chapter 4 Antenna Adjustment Example Chapter 5 Drop Call Analysis Example

4
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Network Optimization Phases Flow Chart

5
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Network Optimization Phases Step 1

Single Site Verification


To verify the functionality of every new site.

Objectives
To ensure there are no faults related to site installation or parameter settings.

6
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Network Optimization Phases Step 2

RF Optimization
Once all the sites in a given area are integrated and verified, RF (or Cluster) optimization could begin.

Objectives
To optimize coverage while at the same time keeping interference and pilot pollution under control over the target area. This phase also includes the verification and optimization of the 3G neighbor lists.

7
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Network Optimization Phases Step 3

Services Testing & Parameter Optimization


To be conducted in areas of good RF conditions in order to exclude any coverage issues. Such testing does not need to be performed for each cell but the drive route must include different clutter types and environments.

Objectives
To assess the performance and identify any need for specific parameter optimization.

8
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Network Optimization Phases Step 4

Regular Reference Route Testing & Stats Analysis


Constant monitoring and evaluation of the network performance can be based on field testing as well as network stats analysis. Results of the regular analysis may necessitate re-visits to the RF optimization and/or parameters tuning.

Objectives
To identify any new issues that could arise, for example, as a result of increase in traffic or changes in the environment.

9
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents
Chapter 1 Optimization Phases Chapter 2 RF Optimization Chapter 3 RF Analysis Approaches Chapter 4 Antenna Adjustment Example Chapter 5 Drop Call Analysis Example

10
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Optimization - Preparation


Clutters
RF optimization should be carried out for groups or clusters of sites rather than on single site basis.

Drive Routes
Cluster drive surveys should include the coverage areas of each cell and all the major roads and streets as well as any other important locations.

Tools
Agilent scanner Qualcomm UE in continuous AMR call Actix Analyzer
11

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

RF Optimization - Targets
Item
CPICH RSCP CPICH Ec/Io Active Set size (estimated)

Requirements
Target Minimum Target Minimum Target Max % - 85 dBm -95 dBm -8 dB - 14 dB 3 < 10 % 8 dB <15 dBm >95 %

Comments
Corresponds to outdoor measurements. Applicable for unloaded network. Based on scanner data. % of time a cell is seen as a pilot polluter. Relative to best server when cell is not in Active Set. Assuming 21 dBm max. For e1a, e1b & e1c

Pilot pollution Threshold UE Tx power SHO Success rate Max Target

12
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Optimization Flow Chart


Drive Test Identify any RF Issues Identify candidate cells for changes Identify nature of required changes Implement changes N Repeat Drive Test Problem Resolved? Finish
13
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Determine amount of changes

RF Optimization - Solutions

      

Antenna tilt Antenna azimuth Antenna location Antenna height Antenna type Site location New site

14
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents
Chapter 1 Optimization Phases Chapter 2 RF Optimization Chapter 3 RF Analysis Approaches Chapter 4 Antenna Adjustment Example Chapter 5 Drop Call Analysis Example

15
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Cell Dominance

Cells with no dominance at all


A site was not radiating during the drive survey Very poor dominance can also be caused by blocking of the antenna. So a site visit must be made to verify the antenna clearance.

Cells with either excessive or poor dominance


This could be due to a high site or non-optimum antenna tilts. Cells with too large dominance will be causing interference to adjacent cells resulting in poorer capacity.

16
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Cell Dominance

Areas of non-dominance:
Areas where there is not a single clear dominant cell and where the best server changes too frequently. Result: Excessive number of soft hand off events reducing the system efficiency and increasing the probability of call drops.

UE vs. Scanner Best Serving Cells:


Comparison between the UE and scanner SC plots. Significant differences between the plots may indicate a missing neighbor or failed soft handoff problem.

17
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Cell Dominance

18
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches CPICH Coverage

Check areas of poor coverage, suggestion value as below:


Good: RSCP -85 dBm Fair: -95 dBm RSCP < -85 dBm

Poor: RSCP < - 95 dBm




Examine the RSCP coverage on per cell bases in order to highlight any cells that have too large a footprint.

19
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches CPICH Coverage

20
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Interference

CPICH Ec/Io Plot


Good: Ec/Io -8 dB Fair: -14 dB Ec/Io < -8 dB Poor: Ec/Io < - 14 dB

The -8 dB threshold takes into account the expected future interference increase as a result of increased traffic.

21
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Interference


Whats the problem?

-14 -15 -16 -104 -17 -18 -19 -20 Ec/Io RSCP -15.5

-90 -95 -100 -105 -110 -115 -120

Because the RSCP Level is POOR, the fundamental cause of low Ec/Io is POOR COVERAGE
22
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Interference

-14 -15 -16 -17 -18 -19 -20 Ec/Io

-63 -15.5

-60 -65 -70 -75 -80 -85 -90

Whats the problem?

RSCP

RSCP level is GOOD, this will imply strong SYSTEM INTERFERENCE

23
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Interference

24
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches UL Coverage

Uplink Coverage (UE Tx Power)


High UE Tx power means possible poor uplink coverage. Areas of high Tx power should be compared to the CPICH pilots to verify if the problem only exists on the uplink.

25
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches UL Coverage

26
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Pilot Pollution

Pilot Pollution Point Define:


Not all points in the active set Within a certain margin of the best server( the margin is set to 8dB)

Cells which are frequently seen as polluters (e.g. >8% time) should be marked and investigated.

Pilot Pollution results should be used in conjunction with the Estimated Active Set Size

27
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Pilot Pollution

-60 -65 RSCP (dBm) -70 -75 -80 -85 -90 SC1 SC2 SC3 SC4 SC5 SC6 N t Pil t P lluti n
28
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Margin

-62

-64

-66

-68

-69 -81

A tive Set

Pil t P lluti n

RF Analysis Approaches Pilot Pollution


SC 8 9 10 11 12 13 16 17 18 19 20 21 32 35 37 43 48 53 67 80 130 Count 2 6 165 157 156 1 8 135 95 94 76 74 73 56 54 39 33 19 8 7 3 2 2 % in Pollution Set 2.9% 10. % 9.8% 9.7% 9.2% 8.4% 5.9% 5.9% 4.7% 4.6% 4.6% 3.5% 3.4% 2.4% 2.1% 1.2% 0.5% 0.4% 0.2% 0.1% 0.1%

Should be investigated

29
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Pilot Pollution

Estimated Active Set Size


Another useful measure of pilot pollution is by looking at the estimated active set based on the scanner data. This plot is obtained by modeling the network soft handoff parameters within Actix. In order to see areas of excessive SHO candidates, the estimated active set size is allowed to exceed maximum of 3. This can be done in conjunction with the Pilot pollution analysis.

30
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Pilot Pollution

Estimated Active Set Size Example

31
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Neighbor List




Neighbor List Verification


The neighbor list could be verified and optimized using the Neighbor List Verification tool within Actix.

Recommendations for Each Cell:


Retain: This indicates that those neighbors have been confirmed from the drive survey data. Add: Missing neighbors Remove: These neighbors that were not measured but are in the neighbor list.

Careful consideration is needed prior to removing neighbours since the Actix results are drive route dependent.
32
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Neighbor List

Neighbor List Verification Example


Sample Sample Action Nbr SC Count Count
576 Retain Retain Retain Retain Retain Add Retain Retain Retain Retain Retain Remove Remove Remove Remove Remove Remove 018 010 016 032 011 130 021 008 020 012 017 053 019 034 037 013 051 82 46 31 20 18 17 17 12 6 5 2 0 0 0 0 0 0

SC
009

Cell
70548

Site
Ajman Central

Latitude
25.41204

Longitude
55.447

%
14.2% 8.0% 5.4% 3.5% 3.1% 3.0% 3.0% 2.1% 1.0% 0.9% 0.3% 0.0% 0.0% 0.0% 0.0% 0.0% 0.0%

33
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches SHO




UE SHO Performance
The success rates for event 1a, 1b & 1c and can be obtained from Actix
Number f ti e et tes
Event unt Event - e 328 Event - e 306 Event c - e 64

Number f

tive et

te

mpletes

Event unt Event - e 326 Event - e 305 Event c - e 62

ft-

ndover uccess

te

Event te Event - e 99.4 Event - e 99. Event c - e 96.9


Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

34

RF Analysis Approaches Drop Call

Drop Call Analysis - RF related issues :


Poor coverage (RSCP & Ec/Io) High interference and hence poor Ec/Io Poor uplink coverage (insufficient UE Tx power) Poor dominance (best cell changes too frequently resulting in too many SHO events) Pilot pollution (too many cells present) Missing neighbors Fast change of RF conditions (e.g. turning a corner)

35
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Drop Call

Drop Call Analysis Example 1

RSCP & Ec/Io degrades BOTH for scanner and UE

Check for Coverage problems

Call Drop
36
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Drop Call

Drop Call Analysis Example 2

Ec/Io (and RSCP) degrades for UE ONLY while scanner shows no degradation

UE camp on new cell immediately after drop, and UE did not measure this cell before Drop

Call Drop
Check the Neighbor
37
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

RF Analysis Approaches Drop Call

Drop Call Analysis Example 3


Too many and too quick changes of best server

UE to perform measurements and SHO in time difficultly

PingPong Handover, need to improve cell dominance

Call Drop
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

38

Course Contents

Chapter 1 Optimization Phases Chapter 2 RF Optimization Chapter RF nal sis Approaches

Chapter 4 Antenna Adjustment Example Chapter 5 Drop Call Anal sis Example

39
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Antenna Adjustment Example




RSCP Coverage before Adjustment

40
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Antenna Adjustment Example




RSCP Coverage after Adjustment

41
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Antenna Adjustment Example




RSCP Distribution

CPICH RSCP Dist ib ti 40.00% 35.00% 30.00% 25.00% 29.33% 25.98%

20.31% 5.47%

15.00% 10.00% 1.44% 5.00% 0.00%


5t 10 -

30.27% 31.04%

20.00%

0.02%

-9 5 -9

5t

-85 -8

5t

-75 -7

5t

-65

>

-65

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

ef e A j st e t

Afte A j st e t

18.65%

37.48%

42

Antenna Adjustment Example




Down Tilt from 4 to 6 Result

43
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Antenna Adjustment Example




Down Tilt from 4 to 8 Result

44
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents

Chapter 1 Optimization Phases Chapter 2 RF Optimization Chapter RF Anal sis Approaches

Chapter 4 Antenna Adjustment Example Chapter 5 Drop Call Anal sis Example

45
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example




Drop Call Distribution

46
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example

 

There are total 5 drop calls in the plot. The example of drop call 1 is analyzed to show the process of analysis in the following.

Drop call 1 occurred at an area of frequent change of best server as shown by the scanner scrambling code plot

47
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example




CPICH RSCP and Ec/Io before the Call Drop

48
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example

Compare Ec/Io from both scanner and UE at the time of the drop as shown in Figure. This clearly shows the UE Ec/Io to drop to < -21 dB while the scanner remained above -11 dB.

49
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example




Best server before and after the Call Drop

50
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example

Comparing the best servers from the UE and the scanner at the time of drop:
Drop Call 1 (UE vs. scanner best server) shows that for the scanner and UE SC008 is the best server prior to the drop. However, about 30 seconds before the drop, the scanner selected SC018 as the best server while the UE continued to have only SC009 in its active set resulting in the drop call. Immediately after the drop, the UE camps on SC018.

51
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example




UE Active Set and Monitor Set Before and After the Call Drop

52
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example

Conclusion
Examining the UE Active and Monitored set, Figure does not show SC018 to be measured by the UE prior to the drop. This scenario resembles a missing neighbor problem

53
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example




Coverage of Drop Call Point

54
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Drop Call Analysis Example

Solution:
Looking at drop call Figure clearly shows that at the location of the drop, SC018 should not be the best server. Cell SC018 clearly requires some down tilting to control its interference into the area of Drop 1. To illustrate this, RSCP coverage of SC018 shows clearly that the cells is extending into a large area. E.g. around the location of drop call, SC018 RSCP is > -75dBm. Add the Missing Neighbors

55
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

56
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

You might also like