W(level3) wcdma rno rf optimization-20041217-a-1[1].0

56
Wireless Curriculum Development Section Wireless Curriculum Development Section ISSUE ISSUE OWJ102103 WCDMA RNO RF Optimization 1.0 1.0

description

wcd ma

Transcript of W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Page 1: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Wireless Curriculum Development SectionWireless Curriculum Development SectionWireless Curriculum Development SectionWireless Curriculum Development Section

ISSUEISSUE

OWJ102103 WCDMA RNO RF Optimization

OWJ102103 WCDMA RNO RF Optimization

1.01.0

Page 2: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

2

ReviewReview

This lecture introduces the various stages

involved in optimizing a 3G radio network and

focuses mainly on the RF Optimization phase.

Step-by-step approach for the analysis of drive

survey data collected by Agilent Scanner and test

UE is presented. The analysis is carried out using

the post processing tool “Actix Analyzer”.

Page 3: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

3

ReviewReview

RF optimization will be an ongoing activity and will

need to be revisited as traffic increases in the

network and as new sites are deployed.

In addition, as the network matures, the

optimization process should be enhanced to take

into account statistical data and key performance

indicators collected throughout the network.

Page 4: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

4

Course ContentsCourse Contents

Chapter 1 Optimization Phases

Chapter 2 RF Optimization

Chapter 3 RF Analysis Approaches

Chapter 4 Antenna Adjustment Example

Chapter 5 Drop Call Analysis Example

Page 5: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

5

Network Optimization Phases – Flow ChartNetwork Optimization Phases – Flow Chart

New Site Integrated

Single Site Verification

RF Optimization

Cluster of Sites Ready?

Service Test and Parameter Optimization

Regular Reference Route Testing and Stats Analysis

Re-optimization Needed?

Y

N

N

Y

Page 6: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

6

Network Optimization Phases – Step 1Network Optimization Phases – Step 1

Single Site Verification

To verify the functionality of every new site.

Objectives

To ensure there are no faults related to site installation or

parameter settings.

Page 7: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

7

Network Optimization Phases – Step 2Network Optimization Phases – Step 2

RF Optimization

Once all the sites in a given area are integrated and verified, RF

(or Cluster) optimization could begin.

Objectives

To optimize coverage while in the same time keeping

interference and pilot pollution under control over the target

area. This phase also includes the verification and optimization

of the 3G neighbor lists.

Page 8: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

8

Network Optimization Phases – Step 3Network Optimization Phases – Step 3

Services Testing & Parameter Optimization

To be conducted in areas of good RF conditions in order to

exclude any coverage issues. Such testing does not need to be

performed for each cell but the drive route must include different

clutter types and environments.

Objectives

To assess the performance and identify any need for specific

parameter optimization.

Page 9: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

9

Network Optimization Phases – Step 4Network Optimization Phases – Step 4

Regular Reference Route Testing & Stats Analysis

Constant monitoring and evaluation of the network performance

can be based on field testing as well as network stats analysis.

Results of the regular analysis may necessitate re-visits to the

RF optimization and/or parameters’ tuning.

Objectives

To identify any new issues that could arise, for example, as a

result of increase in traffic or changes in the environment.

Page 10: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

10

Course ContentsCourse Contents

Chapter 1 Optimization Phases

Chapter 2 RF Optimization

Chapter 3 RF Analysis Approaches

Chapter 4 Antenna Adjustment Example

Chapter 5 Drop Call Analysis Example

Page 11: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

11

RF Optimization - PreparationRF Optimization - Preparation

Clutters

RF optimization should be carried out for groups or clusters of sit

es rather than on single site basis.

Drive Routes

Cluster drive surveys should include the coverage areas of each

cell and all the major roads and streets as well as any other imp

ortant locations.

Tools

Agilent scanner

Qualcomm UE in continuous AMR call

Actix Analyzer

Page 12: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

12

RF Optimization - TargetsRF Optimization - Targets

Item Requirements Comments

CPICH RSCPTarget ≥ - 85 dBm Corresponds to outdoor

measurements.Minimum -95 dBm

CPICH Ec/IoTarget ≥ -8 dB Applicable for unloaded

network.Minimum - 14 dB

Active Set size (estimated)

Target ≤ 3 Based on scanner data.

Pilot pollution

Max % < 10 %% of time a cell is seen as a pilot polluter.

Threshold 8 dBRelative to best server when cell is not in Active Set.

UE Tx power Max <15 dBm Assuming 21 dBm max.

SHO Success rate Target >95 % For e1a, e1b & e1c

Page 13: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

13

RF Optimization – Flow ChartRF Optimization – Flow Chart

Drive TestDrive Test

Identify any RF IssuesIdentify any RF Issues

Identify candidate cells for changes

Identify candidate cells for changes

Identify nature of required changes

Identify nature of required changes

Determine amount of changes

Determine amount of changes

Implement changesImplement changes

Repeat Drive TestRepeat Drive Test

FinishFinish

N

Problem Resolved?Problem Resolved?

Page 14: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

14

RF Optimization - SolutionsRF Optimization - Solutions

Antenna tilt

Antenna azimuth

Antenna location

Antenna height

Antenna type

Site location

New site

Page 15: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

15

Course ContentsCourse Contents

Chapter 1 Optimization Phases

Chapter 2 RF Optimization

Chapter 3 RF Analysis Approaches

Chapter 4 Antenna Adjustment Example

Chapter 5 Drop Call Analysis Example

Page 16: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

16

RF Analysis Approaches – Cell DominanceRF Analysis Approaches – Cell Dominance

Cells with no dominance at all

A site was not radiating during the drive survey

Very poor dominance can also be caused by blocking of the ant

enna. So a site visit must be made to verify the antenna clearan

ce.

Cells with either excessive or poor dominance

This could be due to a high site or non-optimum antenna tilts.

Cells with too large dominance will be causing interference to adj

acent cells resulting in poorer capacity.

Page 17: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

17

RF Analysis Approaches – Cell DominanceRF Analysis Approaches – Cell Dominance

Areas of non-dominance:

Areas where there is not a single clear dominant cell and where

the best server changes too frequently.

Result: Excessive number of soft hand off events reducing the

system efficiency and increasing the probability of call drops.

UE vs. Scanner Best Serving Cells:

Comparison between the UE and scanner SC plots. Significant

differences between the plots may indicate a missing neighbor

or failed soft handoff problem.

Page 18: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

18

RF Analysis Approaches – Cell DominanceRF Analysis Approaches – Cell Dominance

Page 19: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

19

RF Analysis Approaches – CPICH Coverage RF Analysis Approaches – CPICH Coverage

Check areas of poor coverage, suggestion value as below:

Good: RSCP ≥ -85 dBm

Fair: -95 dBm ≤ RSCP < -85 dBm

Poor: RSCP < - 95 dBm

Examine the RSCP coverage on per cell bases in order to hig

hlight any cells that have too large a footprint.

Page 20: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

20

RF Analysis Approaches – CPICH CoverageRF Analysis Approaches – CPICH Coverage

Page 21: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

21

RF Analysis Approaches – InterferenceRF Analysis Approaches – Interference

CPICH Ec/Io Plot

Good: Ec/Io ≥ -8 dB

Fair: -14 dB ≤ Ec/Io < -8 dB

Poor: Ec/Io < - 14 dB

The -8 dB threshold takes into account the expected future interference increase as a result of increased traffic.

Page 22: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

22

RF Analysis Approaches – InterferenceRF Analysis Approaches – Interference

Because the RSCP Level is POOR, the fundamental cause of low Ec/Io is POOR COVERAGE

Because the RSCP Level is POOR, the fundamental cause of low Ec/Io is POOR COVERAGE

-15.5

-104

-20

-19

-18

-17

-16

-15

-14

Ec/Io RSCP-120

-115

-110

-105

-100

-95

-90

What’s the problem?

Page 23: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

23

RF Analysis Approaches – InterferenceRF Analysis Approaches – Interference

RSCP level is GOOD, this will imply strong SYSTEM INTERFERENCE

RSCP level is GOOD, this will imply strong SYSTEM INTERFERENCE

-15.5

-63

-20

-19

-18

-17

-16

-15

-14

Ec/Io RSCP-90

-85

-80

-75

-70

-65

-60 What’s the problem?

Page 24: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

24

RF Analysis Approaches – InterferenceRF Analysis Approaches – Interference

Page 25: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

25

RF Analysis Approaches – UL CoverageRF Analysis Approaches – UL Coverage

Uplink Coverage (UE Tx Power)

High UE Tx power means possible poor uplink coverage.

Areas of high Tx power should be compared to the CPICH pilots

to verify if the problem only exists on the uplink.

Page 26: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

26

RF Analysis Approaches – UL CoverageRF Analysis Approaches – UL Coverage

Page 27: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

27

RF Analysis Approaches – Pilot PollutionRF Analysis Approaches – Pilot Pollution

Pilot Pollution Point Define:

Not all points in the active set

Within a certain margin of the best server( the margin is set to

8dB)

Cells which are frequently seen as polluters (e.g. >8% time)

should be marked and investigated.

Pilot Pollution results should be used in conjunction with the

Estimated Active Set Size

Page 28: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

28

RF Analysis Approaches – Pilot PollutionRF Analysis Approaches – Pilot Pollution

-62 -64 -66 -68 -69

-81

-90

-85

-80

-75

-70

-65

-60

SC1 SC2 SC3 SC4 SC5 SC6

RSC

P (d

Bm)

Active Set Pilot Pollution

Margin

NotPilot Pollution

Page 29: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

29

RF Analysis Approaches – Pilot PollutionRF Analysis Approaches – Pilot Pollution

SC Count % in Pollution Set8 206 12.9%9 165 10.3%

10 157 9.8%11 156 9.7%12 148 9.2%13 135 8.4%16 95 5.9%17 94 5.9%18 76 4.7%19 74 4.6%20 73 4.6%21 56 3.5%32 54 3.4%35 39 2.4%37 33 2.1%43 19 1.2%48 8 0.5%53 7 0.4%67 3 0.2%80 2 0.1%

130 2 0.1%

Should be investigated

Page 30: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

30

RF Analysis Approaches – Pilot PollutionRF Analysis Approaches – Pilot Pollution

Estimated Active Set Size

Another useful measure of pilot pollution is by looking at the

estimated active set based on the scanner data. This plot is

obtained by modeling the network soft handoff parameters within

Actix.

In order to see areas of excessive SHO candidates, the

estimated active set size is allowed to exceed maximum of 3.

This can be done in conjunction with the Pilot pollution analysis.

Page 31: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

31

RF Analysis Approaches – Pilot PollutionRF Analysis Approaches – Pilot Pollution

Estimated Active Set Size Example

Page 32: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

32

RF Analysis Approaches – Neighbor ListRF Analysis Approaches – Neighbor List

Neighbor List Verification

The neighbor list could be verified and optimized using the

Neighbor List Verification tool within Actix.

Recommendations for Each Cell:

Retain: This indicates that those neighbors have been confirmed

from the drive survey data.

Add: Missing neighbors

Remove: These neighbors that were not measured but are in the

neighbor list.

Careful consideration is needed prior to removing neighbours since the Actix results are drive route dependent.

Page 33: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

33

RF Analysis Approaches – Neighbor ListRF Analysis Approaches – Neighbor List

Neighbor List Verification Example

009 576 Retain 018 82 14.2%Retain 010 46 8.0%Retain 016 31 5.4%Retain 032 20 3.5%Retain 011 18 3.1%

Add 130 17 3.0%Retain 021 17 3.0%Retain 008 12 2.1%Retain 020 6 1.0%Retain 012 5 0.9%Retain 017 2 0.3%

Remove 053 0 0.0%Remove 019 0 0.0%Remove 034 0 0.0%Remove 037 0 0.0%Remove 013 0 0.0%Remove 051 0 0.0%

70548 Ajman Central 25.41204 55.447

Nbr SCSample Count

%Latitude LongitudeSample Count

ActionSC Cell Site

Page 34: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

34

RF Analysis Approaches – SHORF Analysis Approaches – SHO

UE SHO Performance

The success rates for event 1a, 1b & 1c and can be obtained

from Actix Number of Active Set Updates

Event CountEvent 1a - Cell Addition328Event 1b - Cell Removal306Event 1c - Cell Replacement64

Number of Active Set Update Completes

Event CountEvent 1a - Cell Addition326Event 1b - Cell Removal305Event 1c - Cell Replacement62

Soft-Handover Success Rate

Event RateEvent 1a - Cell Addition99.4Event 1b - Cell Removal99.7Event 1c - Cell Replacement96.9

Page 35: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

35

RF Analysis Approaches – Drop CallRF Analysis Approaches – Drop Call

Drop Call Analysis - RF related issues :

Poor coverage (RSCP & Ec/Io)

High interference and hence poor Ec/Io

Poor uplink coverage (insufficient UE Tx power)

Poor dominance (best cell changes too frequently resulting in

too many SHO events)

Pilot pollution (too many cells present)

Missing neighbors

Fast change of RF conditions (e.g. turning a corner)

Page 36: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

36

RF Analysis Approaches – Drop CallRF Analysis Approaches – Drop Call

Drop Call Analysis Example 1

Call Drop

RSCP & Ec/Io degrades BOTH for scanner and UE

Check for Coverage problems

Page 37: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

37

RF Analysis Approaches – Drop CallRF Analysis Approaches – Drop Call

Drop Call Analysis Example 2

Call Drop

Ec/Io (and RSCP) degrades for UE ONLY while scanner shows no degradation

Ec/Io (and RSCP) degrades for UE ONLY while scanner shows no degradation

UE camp on new cell immediately after drop, and UE did not

measure this cell before Drop

UE camp on new cell immediately after drop, and UE did not

measure this cell before Drop

Check the NeighborCheck the Neighbor

Page 38: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

38

RF Analysis Approaches – Drop CallRF Analysis Approaches – Drop Call

Drop Call Analysis Example 3

Call Drop

Too many and too quick changes of best server

Too many and too quick changes of best server

UE to perform measurements and SHO in time difficultly

UE to perform measurements and SHO in time difficultly

PingPong Handover, need to improve cell dominance

PingPong Handover, need to improve cell dominance

Page 39: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

39

Course ContentsCourse Contents

Chapter 1 Optimization Phases

Chapter 2 RF Optimization

Chapter 3 RF Analysis Approaches

Chapter 4 Antenna Adjustment Example

Chapter 5 Drop Call Analysis Example

Page 40: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

40

Antenna Adjustment ExampleAntenna Adjustment Example

RSCP Coverage before Adjustment

Page 41: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

41

Antenna Adjustment ExampleAntenna Adjustment Example

RSCP Coverage after Adjustment

Page 42: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

42

Antenna Adjustment ExampleAntenna Adjustment Example

RSCP Distribution

CPICH RSCP Distribution

1.44

%

20.3

1% 29.3

3%

30.2

7%

18.6

5%

0.02

%

5.47

%

25.9

8%

31.0

4% 37.4

8%

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

Before Adjustment After Adjustment

Page 43: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

43

Antenna Adjustment ExampleAntenna Adjustment Example

Down Tilt from 4 to 6 Result

Page 44: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

44

Antenna Adjustment ExampleAntenna Adjustment Example

Down Tilt from 4 to 8 Result

Page 45: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

45

Course ContentsCourse Contents

Chapter 1 Optimization Phases

Chapter 2 RF Optimization

Chapter 3 RF Analysis Approaches

Chapter 4 Antenna Adjustment Example

Chapter 5 Drop Call Analysis Example

Page 46: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

46

Drop Call Analysis ExampleDrop Call Analysis Example

Drop Call Distribution

Page 47: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

47

Drop Call Analysis ExampleDrop Call Analysis Example

There are total 5 drop calls in the plot.

The example of drop call 1 is analyzed to show the process of

analysis in the following.

Drop call 1 occurred at an area of frequent change of best

server as shown by the scanner scrambling code plot

Page 48: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

48

Drop Call Analysis ExampleDrop Call Analysis Example

CPICH RSCP and Ec/Io before the Call Drop

Page 49: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

49

Drop Call Analysis ExampleDrop Call Analysis Example

Compare Ec/Io from both scanner and UE at the time of the

drop as shown in Figure. This clearly shows the UE Ec/Io to

drop to < -21 dB while the scanner remained above -11 dB.

Page 50: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

50

Drop Call Analysis ExampleDrop Call Analysis Example

Best server before and after the Call Drop

Page 51: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

51

Drop Call Analysis ExampleDrop Call Analysis Example

Comparing the best servers from the UE and the scanner at

the time of drop:

Drop Call 1 (UE vs. scanner best server) shows that for the

scanner and UE SC008 is the best server prior to the drop.

However, about 30 seconds before the drop, the scanner

selected SC018 as the best server while the UE continued to

have only SC009 in its active set resulting in the drop call.

Immediately after the drop, the UE camps on SC018.

Page 52: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

52

Drop Call Analysis ExampleDrop Call Analysis Example

UE Active Set and Monitor Set Before and After the Call Drop

Page 53: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

53

Drop Call Analysis ExampleDrop Call Analysis Example

Conclusion

Examining the UE Active and Monitored set, Figure does not

show SC018 to be measured by the UE prior to the drop.

This scenario resembles a missing neighbor problem

Page 54: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

54

Drop Call Analysis ExampleDrop Call Analysis Example

Coverage of Drop Call Point

Page 55: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

55

Drop Call Analysis ExampleDrop Call Analysis Example

Solution:

Looking at drop call Figure clearly shows that at the location of

the drop, SC018 should not be the best server.

Cell SC018 clearly requires some down tilting to control its

interference into the area of Drop 1. To illustrate this, RSCP

coverage of SC018 shows clearly that the cell’s is extending into

a large area. E.g. around the location of drop call, SC018 RSCP

is > -75dBm.

Add the Missing Neighbors

Page 56: W(level3) wcdma rno rf optimization-20041217-a-1[1].0

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

56