WO2012177430A1 - Method of coordinating fault detection responses by access nodes of a network - Google Patents
Method of coordinating fault detection responses by access nodes of a network Download PDFInfo
- Publication number
- WO2012177430A1 WO2012177430A1 PCT/US2012/041845 US2012041845W WO2012177430A1 WO 2012177430 A1 WO2012177430 A1 WO 2012177430A1 US 2012041845 W US2012041845 W US 2012041845W WO 2012177430 A1 WO2012177430 A1 WO 2012177430A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cell
- access node
- algorithm
- instructing
- qoe
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/16—Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0203—Power saving arrangements in the radio access network or backbone network of wireless communication networks
- H04W52/0206—Power saving arrangements in the radio access network or backbone network of wireless communication networks in access points, e.g. base stations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/52—Allocation or scheduling criteria for wireless resources based on load
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- This invention relates generally to communication systems, and, more particularly, to wireless communication systems.
- Wireless communication systems use a network of access nodes to provide wireless connectivity to associated geographical areas that are typically referred to as cells or sectors.
- the access nodes in relatively advanced systems such as systems that implement the Long Term Evolution
- LTE Long Term Evolution
- eNodeBs evolved node Bs
- the access nodes used in wireless communication systems may also be referred to using terms including base stations, base station routers, macrocells, access points, femtocells, pico-cells, and the like.
- Users access the wireless communication system using access terminals that communicate with one or more of the access nodes over an air interface.
- the access terminals may be mobile devices such as mobile phones, smart phones, notepad computers, network computers, and the like.
- the access terminals may also include comparatively immobile or fixed devices such as desktop computers, wireless interface cards or radios installed in other devices, and the like.
- the access nodes may be configured as elements of a self-organizing network (SON).
- eNodeBs in a wireless communication system that operates according to LTE may be self- organizing nodes of the network.
- Self-organizing eNodeBs should be capable of self-configuration, self-optimization, and self-healing.
- Self-configuration is executed automatically after the eNodeB is deployed and includes allocating an IP address to the eNodeB, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server, establishing links over interfaces between the eNodeB and other eNodeBs in the self-organizing network, and the like.
- OAM operations and maintenance
- Self- optimization includes optimizing the configuration of the eNodeB based upon the location of the eNodeB and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the eNodeB to mitigate some detected faults by automatically triggering appropriate recovery actions.
- a sleeping cell is defined as an eNodeB that is no longer functioning and yet has not triggered an alarm at a corresponding OAM server. Sleeping cell conditions can be detected on a single earner, on a subset of earners, or for the entire cell. The neighboring access nodes can then take predetermined actions to compensate for the potential loss of coverage resulting from the detected sleeping cell.
- the LTE standards and/or protocols define a cell outage detection and compensation (COC) procedure that allows eNodeBs to tilt one or more antennas to provide additional wireless coverage in the geographical area served by the sleeping cell.
- the sleeping cell compensation algorithms are defined in isolation of other algorithms that are being performed by the neighboring access nodes concurrently with the sleeping cell compensation algorithm.
- the disclosed subject matter is directed to addressing the effects of one or more of the problems set forth above.
- the following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
- a method for coordinating access nodes when a sleeping cell is detected.
- the method may include modifying a coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node.
- the access node implements resource allocation algorithms and a cell identification algorithm.
- the method may also include instructing the resource allocation algorithms and/or the cell identification algorithm to perform a predetermined action concurrently with the modification.
- Figure 1 conceptually illustrates a first exemplary embodiment of a wireless communication system
- Figure 2 conceptually illustrates a second exemplary embodiment of a wireless communication system:
- Figure 3 conceptually illustrates a third exemplary embodiment of a wireless communication system
- Figure 4 conceptually illustrates one exemplary embodiment of a method of coordinating access nodes when a sleeping cell is detected in a wireless communication network.
- the present application describes embodiments of techniques for coordinating actions and/or responses of access nodes in a network when a sleeping cell is detected in the network.
- the access node can compensate for the loss of coverage caused by the sleeping cell, e.g., by tilting one or more antennas to provide additional coverage in the area served by the sleeping cell.
- the corrective actions are taken independently of other functions and/or algorithms that may be affected by the changing antenna radiation pattern. Tor example, shifting the antenna to improve coverage in areas served by the sleeping cell can degrade the quality of experience (QoE) for existing users being served by the access node, thereby decreasing their quality of experience.
- QoE quality of experience
- tilting the antenna may change the access nodes that are neighbors (or neighbor's neighbors) of the compensating access node. Shifting the antenna radiation pattern to compensate for lost sleeping cell coverage may therefore impact the algorithms that allocate physical cell identifiers to the access nodes and other resource allocation algorithms such as the call admission control algorithm and the load balancing algorithm.
- the present application describes embodiments of access nodes that generate notifications to other algorithms when an access node modifies its antenna radiation pattern to compensate for lost coverage resulting from a sleeping cell.
- notifications can be transmitted to physical cell identifier algorithms and/or resource allocation algorithms so that the operation or configuration of these algorithms can be modified to maintain a quality of experience for users served by the access node prior to modification of the antenna radiation pattern.
- algorithms that can be modified include the physical cell ID algorithm (which may be modified by running the algorithm to verify or change the current allocation of physical cell identifiers), the call admission control algorithm (which may be modified to allow new users only if the quality of experience of existing users is being met), and load-balancing algorithms
- FIG. 1 conceptually illustrates a first exemplary embodiment of a wireless communication system 100.
- the wireless communication system 100 supports wireless connectivity in a plurality of cells or sectors 105 that are served by a corresponding plurality of access nodes 1 10.
- Wireless connectivity may be provided according to the Long Term Evolution (LTE) of the standards and/or protocols defined by the Third Generation Partnership Project (3GPP).
- LTE Long Term Evolution
- 3GPP Third Generation Partnership Project
- embodiments of the techniques described herein may be used in networks that operate according to other standards and/or protocols.
- embodiments of these techniques may be used in second-generation (2G) and/or third generation (3G) networks that operate according to the corresponding standards and/or protocols.
- the access nodes 1 10 form a self-organizing network (SON) that operates according to LTE.
- the access nodes 1 10 may therefore be configured to self-configure, self-optimize and self-heal.
- Self-configuration is executed automatically after the access node 100 is deployed and includes allocating an IP address to the access node 100, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server 1 12, establishing links over interfaces between each access node 100 and other access nodes 100 in the self- organizing network, and the like.
- Self-optimization includes optimizing the configuration of the access node 100 based upon the location of the access node 100 and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the access node 100 to mitigate some detected faults by automatically triggering appropriate recovery actions.
- Access nodes 110 in the illustrated embodiment of the wireless communication system 100 are electronically and/or communicatively connected to one or more serving gateways (SGWs) 1 15 that route and forward user data packets.
- SGWs serving gateways
- the serving gateways 115 may also act as the mobility anchor for the user plane during handovers and may be the anchor for mobility between LTE and other 3GPP technologies.
- Serving gateways may be electronically and'or communicatively coupled to one or more public data network (PDN) gateways (PGWs) 120 that provide connectivity to external packet data networks.
- PGW 120 may perform policy enforcement, packet filtering for different users, charging support, and the like.
- the PGW 120 may implement rules or policies provided by a policy and charging rules function (PCRF) 125, which may be electronically and/or communicatively coupled to one or more operators 130 for providing IP services.
- PCRF policy and charging rules function
- the PGW 120 may also be electronically and/or communicatively coupled to the operator
- the SGW T 1 15 may also be electronically and/or communicatively coupled to a mobility management entity (MME) 1 5.
- MME mobility management entity
- the MME 135 is a control-node for the LTE access network and the MME 135 is responsible for idle mode user equipment (UE) tracking and paging procedure including retransmissions.
- the MME 135 may also support bearer activation/deactivation processes and may be responsible for choosing the SGW 1 15 for a UE at the initial attach and at time of intra-LTE handover.
- Non Access Stratum (NAS) signaling terminates at the MME 135 and the MME 135 may be responsible for generation and allocation of temporary identities to UEs.
- the MME 135 may also be responsible for other authorization, authentication, and mobility functions.
- the MME 135 can authenticate the user by interacting with a home subscriber server (HSS) 140.
- HSS home subscriber server
- the HSS 140 is a central database that contains user-related and subscription-related information.
- the functions of the HSS 140 may include functionalities such as mobility management, call and session establishment support, user authentication, and access authorization.
- One or more of the access nodes 1 10 may be identified as a sleeping cell when the access node
- the sleeping cell condition may be detected on one carrier, on a subset of carriers, on a particular radio access technology (RAT), or on the entire cell 105.
- the wireless communication system 100 implements an LTE Cell Outage Detection and Compensation (COC) procedure that allows neighboring access nodes 1 10 to detect a sleeping cell and compensate for the resulting loss of coverage, e.g., by adjusting the tilt of one or more antennas to modify the antenna radiation pattern and provide coverage to a portion of the coverage area of the sleeping cell 105.
- COC LTE Cell Outage Detection and Compensation
- the illustrated embodiment of the wireless communication system 100 also supports an interaction mechanism between the CoC algorithm and other algorithms that may operate concurrently with the modifications triggered by detection of the sleeping cell.
- Exemplary algorithms that may be operating concurrently with the modifications include algorithms for allocating physical cell identifiers to the access nodes 1 10 and resource allocation algorithms such as call admission control algorithms, load-balancing algorithms, and the like.
- the wireless communication system 100 may therefore define one or more actions to be taken by the other algorithms in response to detecting a sleeping cell, e.g., actions that can be taken to maintain the QoE of existing users and'or increase the number of users with a required QoE.
- FIG. 2 conceptually illustrates a second exemplary embodiment of a wireless communication system 200.
- the illustrated embodiment of the wireless communication system 200 includes a network of access nodes 205 that provide wireless connectivity within a corresponding network of cells 210.
- the cells 210 are depicted as perfect non-overlapping hexagons. However, persons of ordinary skill in the art should appreciate that actual cells 210 may have irregular and time -varying shapes that may overlap in part or entirely with other cells 210.
- the cell 210(1) is a sleeping cell, as indicated by the dashed lines of the hexagon.
- One or more of the other cells 210(2-4) may therefore adjust their coverage patterns to compensate for the lost coverage, or hole in the coverage area, that results from the sleeping cell.
- modifying the coverage area e.g., by modifying an antenna tilt to provide coverage in the sleeping cell 210(1), could degrade the QoE of existing users such as users that are being served by the cells 210(2-4).
- the degradation may be particularly acute if there are a large number of guaranteed bit rate (GBR) users being served by the compensating cells 210(2-4).
- GBR services include voice calls, video conferencing, realtime gaming, and the like. Continuing to admit new users to the compensating cells 210(2-4) may further degrade the QoE of the existing users.
- FIG. 3 conceptually illustrates a third exemplary embodiment of a wireless communication system 300.
- the wireless communication system 300 includes an access node 305 that provides wireless connectivity using one or more antennas 10.
- the access node 305 also implements functionality including an outage detection algorithm 315, a physical cell identifier algorithm 320, a call admission control algorithm 325, and a load-balancing algorithm 330.
- the outage detection algorithm 315 is configured to detect sleeping cells by monitoring and comparing statistics for events such as handovers during a selected period of time. Alternatively, the outage detection algorithm 315 may receive information indicating outages of one or more cells from the network.
- Outages can be detected on a single earner, a subset of carriers, a particular RAT, or for the entire sleeping cell.
- the physical cell identifier algorithm 320 is configured to negotiate with other access nodes to allocate identifiers so that the identifiers are collision-free (e.g. , neighboring access nodes do not have the same identifier) and confusion- free (e.g., a neighbor's neighbor of an access node does not have the same identifier).
- the call admission control algoritlmi 325 is configured to determine whether to admit requested calls or call sessions, e.g., based on the current loading of one or more carriers, sectors, and ⁇ 'or cells.
- the load-balancing algoritlmi 330 is configured to shift calls or call sessions between different carriers, sectors, and/or cells to redistribute or balance the load over the carriers, sectors, and/or cells.
- the access node 305 is initially providing wireless connectivity to mobile nodes or other user equipment or access terminals 335 that fall within a coverage area defined by the radiation pattern 340 of the antenna 310.
- the outage detection algorithm 315 determines that a neighboring cell 345 is a sleeping cell.
- the cell 345 may have been providing wireless connectivity to one or more mobile units 350.
- the mobile units 350 may not have an active session with the cell 345 but may be located in the geographical area previously served by the sleeping cell 345 and may later attempt to access the wireless communication system 300.
- the access node 305 may decide to compensate for the sleeping cell 345 by modifying its antenna tilt to provide coverage over at least a portion of the coverage hole created by the sleeping cell 345. Modifying the antenna tilt may modify the antenna radiation pattern 340 to generate a different antenna radiation pattern 355.
- FIG. 3 shows a single access node 3 10 compensating for the lost coverage, in alternative embodiments more than one neighboring cell may decide to modify its antenna tilt to compensate for the lost coverage of the sleeping cell 345.
- the outage detection algorithm 315 may notify other algorithms that are concurrently operating in the access node 305 when the outage detection algorithm 315 detects the sleeping cell 345.
- the notifications make the other algorithms aware of the failure conditions in the sleeping cell 345 so that these algorithms can take appropriate action to mitigate the QoE impact on existing users such as the access terminals 335.
- the QoE of the users may be indicated by measured uplink bit rates, downlink bit rates, estimated air interface delays, packet loss, and the like.
- notiiications and the corresponding actions taken by the algorithms may occur in each of the neighboring cells that detect the sleeping cell 345 and decide to compensate for the lost coverage.
- the notifications may include triggers that are sent to algorithms operating on the cell 305 that is compensating for the nearby cell outage.
- these algorithms include the Physical Cell-ID algorithm 320, the call admission control algorithm 325, and the load-balancing algorithm 330, which may implement intra-carrier, inter-carrier and/or inter-radio access technology (RAT) load balancing algorithms.
- RAT inter-radio access technology
- the triggers may instruct one or more algorithms to utilize different sets of thresholds.
- the algorithms may download different sets of thresholds from a network source such as the OAM server depending on information obtained from incoming UE measurements of various QoE parameters. If the measurements indicate that the QoE of existing GBR users are being met, then one set of thresholds can be downloaded and used to configure the corresponding algorithm. However, if the measurements indicate that the QoE of existing GBR users are not being met as the compensation is being performed, then a different set of thresholds are downloaded and used to configure the corresponding algorithm.
- the access node 305 may use individual measurements or statistical combinations of measurements to determine whether the QoE requirements are being met within specified tolerances.
- the algorithms may then take the predetermined actions based on the new threshold values to meet the QoE of existing users while also attempting to maximize the number of users being served.
- the PCID algorithm 320 may execute itself to ensure collision free and confusion free PCIs have been allocated. In some cases this may result in new identifiers being assigned to one or more access nodes including the access node 305, its neighbors, and/or its neighbor's neighbors.
- the call admission control algorithm 325 may implement a first threshold that allows only certain new GBR users 350 (e.g., non-voice users) when the QoE requirements of existing GBR users 335 are being met.
- the algorithm 325 may also implement a second threshold that indicates that the algorithm 325 may not admit any new GBR users 350 when the QoE requirements of existing GBR users 335 are not being met.
- the load balancing algorithm 330 may be configured using a set of thresholds to indicate that GBR traffic should be load balanced away from the carrier, subset of carriers, cell, and/or RATs that are compensating for the failure of the sleeping cell 345.
- the new thresholds may also indicate that new GBR traffic onto should not be allowed onto the compensating carrier, cell, or RAT.
- the type and the level of load balancing may depend on whether the sleeping cell condition is detected only on one carrier or RAT, or on all the carriers/RATs of the cell 345.
- the predetermined actions of the algorithms supported by the access node 305 are selected to attempt to reduce the effects of the compensation on the QoE of the users 335 on the cell 305.
- more than one cell may compensate for the sleeping cell 345 and in that case the predetermined actions can be executed on each of the compensating cells.
- the neighboring cells may also coordinate their actions.
- the neighboring cells may participate in the physical cell allocation process so that collision-free and confusion-free identifiers are assigned to the cells.
- the outage detection, compensation, notification, and predetermined actions may take place concurrently and/or substantially continuously.
- the access node 305 may slowly tilt its antenna 310 to compensate for the detected sleeping ceil 345, e.g.
- Notifications may therefore be sent at predetermined intervals or substantially continuously during the tilting process, e.g. , every tenth or hundredth of a second, and the algorithms may modify their configuration/operation in response to each notification.
- This process may continue until a convergence criterion is met. For example, the process may continue until the antenna tilt has finished, collision-free and confusion-free identifiers have been allocated, call admission control according to the new thresholds has reached a relatively steady state, and the load-balancing algorithm has finished balancing the new and existing loads according to the new thresholds.
- Embodiments of these techniques may therefore reduce the impact of CoC on existing GBR users and provide tight coordination between Cell Outage Compensation and other mechanisms operating on the access node 305.
- FIG. 4 conceptually illustrates one exemplary embodiment of a method 400 of coordinating access nodes when a sleeping cell is detected in a wireless communication network.
- a cell outage is detected (at 405) by one or more cells in the wireless communication network.
- a cell eNB_A
- eNB_B a nearby cell
- Neighboring cells such as eNB_A can detect (at 405) a sleeping cell through the comparison of statistics of certain events, like handovers over a period of time.
- the neighboring cell eNB_A decides (at 410) to compensate for the sleeping cell through modification of its antenna tilt to provide coverage over the coverage hole detected for the sleeping cell eNB_B.
- the level of tilt may be determined or gauged using UE measurement feedback such as measurements of radio link failures (RLFs).
- the neighboring cell eNB_A may then tilt its antenna until the measured values of the RLFs are less than a threshold value.
- the choice of antenna tilt is a tradeoff between providing adequate coverage while meeting the capacity and QoE requirements of individual UEs within the cell for the various carriers, e.g. , as indicated by a packet delay budget and/or a measured packet loss error rate.
- the cell eNB_A may start receiving measurement values for the various users concurrently with the changing coverage caused by the compensation.
- the users may include users previously being served by the neighboring cell eNB_A and new users that request access in response to the changing coverage from the neighboring cell eNB_A.
- the UE measurements may include measured uplink and/or downlink loads or bit rates.
- the neighboring cell eNB_A can deduce other parameters such as the air interface delay and over-the-air packet loss for communications with the various users. Some of these UE measurements may be for users with guaranteed bit rate (GBR) services and other UE measurements may be collected for users with non- GBR services and/or best effort services.
- GBR guaranteed bit rate
- Triggers may then be sent to one or more of the algorithms operating on the neighbor cell eNB_A so that these algorithms can be operated and'or configured consistently with the outage compensation.
- triggers are sent (at 415, 420, 425) to at least three different algorithms operating on the neighboring cell concurrently with the actions that the neighboring cell is taking to compensate for the nearby cell outage.
- the algorithms implemented by the neighboring cell in the illustrated embodiment include a physical cell identifier algorithm, a call admission control algorithm, and a load balancing algorithm that can perform inter-carrier and/or inter- RAT load balancing.
- Instructions and/or thresholds may be downloaded or executed in response to receiving the triggers (at 415, 420, 425).
- two different sets of thresholds may be downloaded from the OAM based on the information obtained from the incoming UE measurements. For example, one set of thresholds can be downloaded if the QoE of existing GBR users are being met.
- a different set of thresholds can be downloaded if the QoE of existing GBR users are not met.
- the QoE metrics considered may include measured uplink and/or downlink bit rates, estimated air interface delay, packet losses, or combinations thereof.
- the algorithms may use the new threshold values to configure and/or carry out predetermined actions in an attempt to meet the QoE of existing users while maximizing the number of users being served.
- one of the triggers is sent (at 415) to the physical cell identifier algorithm.
- Changing the antenna radiation pattern to compensate for the coverage hole caused by the sleeping cell may change the list of neighbors to the neighboring cell eNB_A and the list of each neighbor's neighbors.
- the physical cell identiiier algorithm therefore executes (at 430) in response to the trigger and determines whether any physical cell identifiers need to be modified to ensure collision- free and confusion-free identifiers. Changes in one cell identifier may ripple throughout the system and so physical cell identifier algorithms on other cells may also need to be executed response to the coverage compensation procedure.
- the physical cell identifier algorithm on the neighboring cell eNB_A may communicate and/or negotiate with similar functionality on other cells to allocate the appropriate physical cell identifiers to ensure collision-free and confusion-free identifiers are allocated throughout the system.
- a trigger may also be sent (at 420) to the call admission control algorithm, in the illustrated embodiment, the call admission control algorithm can then be reconfigured to admit or deny new users based upon a new set of thresholds.
- the call admission control algorithm may either allow only certain new GBR users (such as non-voice users) or to deny any new GBR users depending on whether the QoE of existing GBR users are being met.
- the trigger sent to the call admission control module may serve as an indication to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider or account for failure scenarios in other cells, such as the sleeping cell e B B.
- the new triggers may be different from existing triggers because the new triggers are selected to account for changes that are likely to occur in response to failure of the sleeping cell eNB_B and the resulting compensation performed by the neighbor cell eNB_A. For example, even though the QoE of existing users are currently being met by the neighbor cell, the failure event that happened on the sleeping cell may trigger compensation that can degrade the QoE of the existing users.
- the call admission control algorithm on eNB A requests (at 435) the appropriate thresholds from the OAM server and then modifies (at 435) its internal thresholds.
- the neighbor cell may have a predetermined set of thresholds stored internally and the neighbor cell may modify (at 435) the thresholds that it is using to control call admission by switching between the different sets of internally stored thresholds. These thresholds may have been previously downloaded from the OAM server. In one embodiment, the thresholds may be selected so that once they take effect the call admission control module only admits Best Effort users and in some cases certain non-voice GBR users, since admitting GBR users could result in the possibility that the QoE of new or existing users may not be met.
- the trigger received (at 420) by the call admission control module may indicate that new thresholds should be downloaded if the QoE of existing best effort users (e.g. , as indicated by measured values of bit rates, delay, packet loss) are not being met because their values fall below a threshold.
- the trigger sent (at 420) to the Call Admission Control module may indicate to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider failure scenarios in other cells. This trigger may indicate that the QoE of existing users are not being met because of the failure event that happened on the sleeping cell, which caused the neighbor cell eNB_A to compensate.
- the call admission control algorithm on the neighbor cell eNB_A can request the appropriate thresholds, which may be determined or selected based on the UE measurement reports coming in to the neighbor cell.
- the call admission control algorithm may then modify (at 435) its internal thresholds.
- the new thresholds may be selected so that the call admission control module does not admit any new GBR users and only admits Best Effort users, since admitting GBR users may result in their QoEs not being met.
- the sleeping cell eNB_B may return to normal operation, perhaps because the cell has been repaired, replaced, or reconfigured so that it can operate normally.
- the neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled.
- the neighbor cell eNB_A may then resume (at 440) normal operation. For example, the neighbor cell eNB_A may tilt its antenna back to the original configuration.
- the neighbor cell eNB_A may also trigger the call admission control algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the call admission control algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
- Another trigger may be sent (at 425) to the load balancing algorithm.
- a trigger may be sent (at 425) to a load balancing algorithm that can perform intra-c airier, inter-carrier, and/or inter-RAT load balancing algorithms.
- the type of load balancing performed by the algorithm may depend on whether the sleeping cell condition is detected on one carrier only, on multiple carriers, or on the entire cell including all carriers and RATs.
- the trigger tells the load balancing algorithm that new traffic is expected as a consequence of the compensation for the detected sleeping cell.
- the load balancing algorithm may then modify (at 445) one or more internal thresholds so that traffic is preferentially load balanced away from carriers or RATs that are expected to receive new traffic.
- the intra- carrier LTE load balancing algorithm is notified so that it can load balance GBR traffic away from the cell eNB_A that is compensating for the failure.
- the load balancing algorithm may also be instructed to deny any requested new GBR traffic onto the neighbor cell eNB_A.
- GBR users on other eNBs may not be load balanced to eNB A because eNB A is serving nearby sleeping cell eNB_B, which is in outage.
- the sleeping cell condition may only be detected on a specific earner and/or RAT.
- the trigger may therefore instruct the inter-carrier and/or inter-RAT load balancing algorithm to load balance GBR traffic away from the carrier and/or RAT on which sleeping cell condition is detected.
- the trigger may also instruct the load balancing algorithm to deny requested new GBR traffic for the carrier and/or RAT.
- internal thresholds in the inter-carrier RAT load balancing algorithms may be modified (at 445) so that the load balancing algorithms perform the indicated load balancing operations.
- various thresholds may be modified (at 445) so that the load balancing algorithm shifts existing GBR users on eNB_A to other carriers and/or to other RATs, perhaps on other cells.
- the target carriers and/or RATs for the load balancing operation may be selected so that the QoE of the load balanced user equipment has a higher likelihood of being met.
- the type and level of load balancing may depend on the severity of the QoE degradation experienced by the user equipment. In one embodiment, higher levels of QoE degradation result in more GBR users being load balanced to other carriers and/or RATs. Lower levels of QoE degradation may result in fewer ⁇ e.g., only voice) GBR users being load balanced away from the eNB A. If sleeping cell eNB_B returns to normal operation, the neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled.
- the neighbor cell eNB_A may then resume (at 450) normal operation. Tor example, the neighbor cell eNB_A may begin to tilt its antenna back to the original configuration.
- the neighbor cell eNB_A may also trigger the load balancing algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the load balancing algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
- Embodiments of the techniques described herein may have a number of advantages over conventional practice. For example, providing triggers to other algorithms in response to detecting a sleeping cell condition may allow the base station that compensates for the sleeping cell to maintain the QoE of the GBR users that are already being served by the base station that is compensating for one or more sleeping cells. Coordination of the different cell identifier and/or resource allocation algorithms may result in better QoE for all users and/or better optimization of resources to ensure that the QoE requirements of the users are being met with minimal resources. Furthermore, existing sleeping cell compensation techniques do not consider the impact of execution of the compensation algorithm on the other algorithms that are also in operation on the same base station. As a result, unexpected interactions may occur and lower the QoE of the users served on those base stations. Embodiments of the techniques described herein consider an account for these interactions so that any degradation in the QoE of the users may be reduced or avoided. Consequently, embodiments of the techniques described herein support a higher and more consistent level of QoE and improve performance for users.
- these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated, it has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium.
- the program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access.
- the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a method of coordinating access nodes when a sleeping cell is detected. The method may include modifying a coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node. The access node implements resource allocation algorithms and a cell identification algorithm. The method may also include instructing the resource allocation algorithms and/or the cell identification algorithm to perform a predetermined action concurrently with the modification.
Description
METHOD OF COORDINATING FAULT DETECTION RESPONSES BY ACCESS NODES
OF A NETWORK
BACKGROUND
This invention relates generally to communication systems, and, more particularly, to wireless communication systems.
Wireless communication systems use a network of access nodes to provide wireless connectivity to associated geographical areas that are typically referred to as cells or sectors. The access nodes in relatively advanced systems such as systems that implement the Long Term Evolution
(LTE) standards and/or protocols are referred to as evolved node Bs (eNodeBs). However, the access nodes used in wireless communication systems may also be referred to using terms including base stations, base station routers, macrocells, access points, femtocells, pico-cells, and the like. Users access the wireless communication system using access terminals that communicate with one or more of the access nodes over an air interface. The access terminals may be mobile devices such as mobile phones, smart phones, notepad computers, network computers, and the like. The access terminals may also include comparatively immobile or fixed devices such as desktop computers, wireless interface cards or radios installed in other devices, and the like.
The access nodes may be configured as elements of a self-organizing network (SON). For example, eNodeBs in a wireless communication system that operates according to LTE may be self- organizing nodes of the network. Self-organizing eNodeBs should be capable of self-configuration, self-optimization, and self-healing. Self-configuration is executed automatically after the eNodeB is deployed and includes allocating an IP address to the eNodeB, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server, establishing links over interfaces between the eNodeB and other eNodeBs in the self-organizing network, and the like. Self- optimization includes optimizing the configuration of the eNodeB based upon the location of the eNodeB and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the eNodeB to mitigate some detected faults by automatically triggering appropriate recovery actions.
One example of self-healing occurs when one or more access nodes in the network detect a sleeping cell. For example, in LTE, a sleeping cell is defined as an eNodeB that is no longer functioning and yet has not triggered an alarm at a corresponding OAM server. Sleeping cell conditions can be detected on a single earner, on a subset of earners, or for the entire cell. The neighboring access nodes can then take predetermined actions to compensate for the potential loss of coverage resulting from the detected sleeping cell. For example, the LTE standards and/or protocols define a cell outage detection and compensation (COC) procedure that allows eNodeBs to tilt one or more antennas to provide additional wireless coverage in the geographical area served by the sleeping
cell. However, the sleeping cell compensation algorithms are defined in isolation of other algorithms that are being performed by the neighboring access nodes concurrently with the sleeping cell compensation algorithm.
SUMMARY OF EMBODIMENTS
The disclosed subject matter is directed to addressing the effects of one or more of the problems set forth above. The following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
In one embodiment, a method is provided for coordinating access nodes when a sleeping cell is detected. The method may include modifying a coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node. The access node implements resource allocation algorithms and a cell identification algorithm. The method may also include instructing the resource allocation algorithms and/or the cell identification algorithm to perform a predetermined action concurrently with the modification. BRIEF DESCRIPTION OF THE DRAWINGS
The disclosed subject matter may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in which:
Figure 1 conceptually illustrates a first exemplary embodiment of a wireless communication system;
Figure 2 conceptually illustrates a second exemplary embodiment of a wireless communication system:
Figure 3 conceptually illustrates a third exemplary embodiment of a wireless communication system; and
Figure 4 conceptually illustrates one exemplary embodiment of a method of coordinating access nodes when a sleeping cell is detected in a wireless communication network.
While the disclosed subject matter is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosed subject matter to the particular forms disclosed, but
on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the appended claims.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
Illustrative embodiments are described below. In the interest of clarity, not all features of an actual implementation are described in this specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions should be made to achieve the developers' specific goals, such as compliance with system-related and business- related constraints, which will vary from one implementation to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure.
The disclosed subject matter will now be described with reference to the attached figures. Various structures, systems and devices are schematically depicted in the drawings for purposes of explanation only and so as to not obscure the description with details that are well known to those skilled in the art. Nevertheless, the attached drawings are included to describe and explain illustrative examples of the disclosed subject matter. The words and phrases used herein should be understood and interpreted to have a meaning consistent with the understanding of those words and phrases by those skilled in the relevant art. No special definition of a term or phrase, i.e., a definition that is different from the ordinary and customary meaning as understood by those skilled in the art, is intended to be implied by consistent usage of the term or phrase herein. To the extent that a term or phrase is intended to have a special meaning, i.e... a meaning other than that understood by skilled artisans, such a special definition will be expressly set forth in the specification in a definitional manner that directly and unequivocally provides the special definition for the term or phrase.
Generally, the present application describes embodiments of techniques for coordinating actions and/or responses of access nodes in a network when a sleeping cell is detected in the network. When an access node detects a sleeping cell, either by performing measurements or being informed by the network, the access node can compensate for the loss of coverage caused by the sleeping cell, e.g., by tilting one or more antennas to provide additional coverage in the area served by the sleeping cell. However, the corrective actions are taken independently of other functions and/or algorithms that may be affected by the changing antenna radiation pattern. Tor example, shifting the antenna to improve coverage in areas served by the sleeping cell can degrade the quality of experience (QoE) for existing users being served by the access node, thereby decreasing their quality of experience. For another example, tilting the antenna may change the access nodes that are neighbors (or neighbor's neighbors) of the compensating access node. Shifting the antenna radiation pattern to compensate for lost sleeping cell coverage may therefore impact the algorithms that allocate physical cell identifiers to the access nodes and other resource allocation algorithms such as the call admission control algorithm and the load balancing algorithm.
At least in part to address these drawbacks in the conventional practice, the present application describes embodiments of access nodes that generate notifications to other algorithms when an access node modifies its antenna radiation pattern to compensate for lost coverage resulting from a sleeping cell. For example, notifications can be transmitted to physical cell identifier algorithms and/or resource allocation algorithms so that the operation or configuration of these algorithms can be modified to maintain a quality of experience for users served by the access node prior to modification of the antenna radiation pattern. Examples of algorithms that can be modified include the physical cell ID algorithm (which may be modified by running the algorithm to verify or change the current allocation of physical cell identifiers), the call admission control algorithm (which may be modified to allow new users only if the quality of experience of existing users is being met), and load-balancing algorithms
(which may be modified to load balance traffic away from the access node in anticipation of new traffic from the coverage area of the sleeping cell).
Figure 1 conceptually illustrates a first exemplary embodiment of a wireless communication system 100. in the illustrated embodiment, the wireless communication system 100 supports wireless connectivity in a plurality of cells or sectors 105 that are served by a corresponding plurality of access nodes 1 10. Wireless connectivity may be provided according to the Long Term Evolution (LTE) of the standards and/or protocols defined by the Third Generation Partnership Project (3GPP). However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that embodiments of the techniques described herein may be used in networks that operate according to other standards and/or protocols. For example, embodiments of these techniques may be used in second-generation (2G) and/or third generation (3G) networks that operate according to the corresponding standards and/or protocols.
In the illustrated embodiment, the access nodes 1 10 form a self-organizing network (SON) that operates according to LTE. The access nodes 1 10 may therefore be configured to self-configure, self-optimize and self-heal. Self-configuration is executed automatically after the access node 100 is deployed and includes allocating an IP address to the access node 100, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server 1 12, establishing links over interfaces between each access node 100 and other access nodes 100 in the self- organizing network, and the like. Self-optimization includes optimizing the configuration of the access node 100 based upon the location of the access node 100 and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the access node 100 to mitigate some detected faults by automatically triggering appropriate recovery actions.
Access nodes 110 in the illustrated embodiment of the wireless communication system 100 are electronically and/or communicatively connected to one or more serving gateways (SGWs) 1 15 that route and forward user data packets. The serving gateways 115 may also act as the mobility anchor for the user plane during handovers and may be the anchor for mobility between LTE and other 3GPP technologies. Serving gateways may be electronically and'or communicatively coupled to one or more public data network (PDN) gateways (PGWs) 120 that provide connectivity to external packet data
networks. The PGW 120 may perform policy enforcement, packet filtering for different users, charging support, and the like. For example, the PGW 120 may implement rules or policies provided by a policy and charging rules function (PCRF) 125, which may be electronically and/or communicatively coupled to one or more operators 130 for providing IP services. In the illustrated embodiment, the PGW 120 may also be electronically and/or communicatively coupled to the operator
130.
The SGWT 1 15 may also be electronically and/or communicatively coupled to a mobility management entity (MME) 1 5. In the illustrated embodiment, the MME 135 is a control-node for the LTE access network and the MME 135 is responsible for idle mode user equipment (UE) tracking and paging procedure including retransmissions. The MME 135 may also support bearer activation/deactivation processes and may be responsible for choosing the SGW 1 15 for a UE at the initial attach and at time of intra-LTE handover. Non Access Stratum (NAS) signaling terminates at the MME 135 and the MME 135 may be responsible for generation and allocation of temporary identities to UEs. The MME 135 may also be responsible for other authorization, authentication, and mobility functions. In the illustrated embodiment, the MME 135 can authenticate the user by interacting with a home subscriber server (HSS) 140. In the illustrated embodiment, the HSS 140 is a central database that contains user-related and subscription-related information. The functions of the HSS 140 may include functionalities such as mobility management, call and session establishment support, user authentication, and access authorization.
One or more of the access nodes 1 10 may be identified as a sleeping cell when the access node
110 is no longer functioning but no alarm has been sent to or received by the OAM server 112. Depending on the circumstances, the sleeping cell condition may be detected on one carrier, on a subset of carriers, on a particular radio access technology (RAT), or on the entire cell 105. In the illustrated embodiment, the wireless communication system 100 implements an LTE Cell Outage Detection and Compensation (COC) procedure that allows neighboring access nodes 1 10 to detect a sleeping cell and compensate for the resulting loss of coverage, e.g., by adjusting the tilt of one or more antennas to modify the antenna radiation pattern and provide coverage to a portion of the coverage area of the sleeping cell 105. The illustrated embodiment of the wireless communication system 100 also supports an interaction mechanism between the CoC algorithm and other algorithms that may operate concurrently with the modifications triggered by detection of the sleeping cell. Exemplary algorithms that may be operating concurrently with the modifications include algorithms for allocating physical cell identifiers to the access nodes 1 10 and resource allocation algorithms such as call admission control algorithms, load-balancing algorithms, and the like. The wireless communication system 100 may therefore define one or more actions to be taken by the other algorithms in response to detecting a sleeping cell, e.g., actions that can be taken to maintain the QoE of existing users and'or increase the number of users with a required QoE.
Figure 2 conceptually illustrates a second exemplary embodiment of a wireless communication system 200. The illustrated embodiment of the wireless communication system 200
includes a network of access nodes 205 that provide wireless connectivity within a corresponding network of cells 210. In the interest of clarity, the cells 210 are depicted as perfect non-overlapping hexagons. However, persons of ordinary skill in the art should appreciate that actual cells 210 may have irregular and time -varying shapes that may overlap in part or entirely with other cells 210. The cell 210(1) is a sleeping cell, as indicated by the dashed lines of the hexagon. One or more of the other cells 210(2-4) may therefore adjust their coverage patterns to compensate for the lost coverage, or hole in the coverage area, that results from the sleeping cell. However, modifying the coverage area, e.g., by modifying an antenna tilt to provide coverage in the sleeping cell 210(1), could degrade the QoE of existing users such as users that are being served by the cells 210(2-4). The degradation may be particularly acute if there are a large number of guaranteed bit rate (GBR) users being served by the compensating cells 210(2-4). Exemplary GBR services include voice calls, video conferencing, realtime gaming, and the like. Continuing to admit new users to the compensating cells 210(2-4) may further degrade the QoE of the existing users. Failing to account for interactions between the cell compensation algorithm and other SON mechanisms (such as allocating cell identifiers, call admission control, and load-balancing) could lead to poor QoE for users who should not be affected by events happening on other access nodes. Ignoring these potential interactions may also result in less-than- optimal use of network resources.
Figure 3 conceptually illustrates a third exemplary embodiment of a wireless communication system 300. In the illustrated embodiment, the wireless communication system 300 includes an access node 305 that provides wireless connectivity using one or more antennas 10. The access node 305 also implements functionality including an outage detection algorithm 315, a physical cell identifier algorithm 320, a call admission control algorithm 325, and a load-balancing algorithm 330. The outage detection algorithm 315 is configured to detect sleeping cells by monitoring and comparing statistics for events such as handovers during a selected period of time. Alternatively, the outage detection algorithm 315 may receive information indicating outages of one or more cells from the network.
Outages can be detected on a single earner, a subset of carriers, a particular RAT, or for the entire sleeping cell. The physical cell identifier algorithm 320 is configured to negotiate with other access nodes to allocate identifiers so that the identifiers are collision-free (e.g. , neighboring access nodes do not have the same identifier) and confusion- free (e.g., a neighbor's neighbor of an access node does not have the same identifier). The call admission control algoritlmi 325 is configured to determine whether to admit requested calls or call sessions, e.g., based on the current loading of one or more carriers, sectors, and<'or cells. The load-balancing algoritlmi 330 is configured to shift calls or call sessions between different carriers, sectors, and/or cells to redistribute or balance the load over the carriers, sectors, and/or cells.
The access node 305 is initially providing wireless connectivity to mobile nodes or other user equipment or access terminals 335 that fall within a coverage area defined by the radiation pattern 340 of the antenna 310. In the illustrated embodiment, the outage detection algorithm 315 determines that a neighboring cell 345 is a sleeping cell. The cell 345 may have been providing wireless connectivity to one or more mobile units 350. Alternatively, the mobile units 350 may not have an active session with
the cell 345 but may be located in the geographical area previously served by the sleeping cell 345 and may later attempt to access the wireless communication system 300. The access node 305 may decide to compensate for the sleeping cell 345 by modifying its antenna tilt to provide coverage over at least a portion of the coverage hole created by the sleeping cell 345. Modifying the antenna tilt may modify the antenna radiation pattern 340 to generate a different antenna radiation pattern 355. Although Figure
3 shows a single access node 3 10 compensating for the lost coverage, in alternative embodiments more than one neighboring cell may decide to modify its antenna tilt to compensate for the lost coverage of the sleeping cell 345.
The outage detection algorithm 315 may notify other algorithms that are concurrently operating in the access node 305 when the outage detection algorithm 315 detects the sleeping cell 345.
The notifications make the other algorithms aware of the failure conditions in the sleeping cell 345 so that these algorithms can take appropriate action to mitigate the QoE impact on existing users such as the access terminals 335. The QoE of the users may be indicated by measured uplink bit rates, downlink bit rates, estimated air interface delays, packet loss, and the like. In various alternative embodiments, notiiications and the corresponding actions taken by the algorithms may occur in each of the neighboring cells that detect the sleeping cell 345 and decide to compensate for the lost coverage. The notifications may include triggers that are sent to algorithms operating on the cell 305 that is compensating for the nearby cell outage. In one embodiment, these algorithms include the Physical Cell-ID algorithm 320, the call admission control algorithm 325, and the load-balancing algorithm 330, which may implement intra-carrier, inter-carrier and/or inter-radio access technology (RAT) load balancing algorithms.
In one embodiment, the triggers may instruct one or more algorithms to utilize different sets of thresholds. For example, the algorithms may download different sets of thresholds from a network source such as the OAM server depending on information obtained from incoming UE measurements of various QoE parameters. If the measurements indicate that the QoE of existing GBR users are being met, then one set of thresholds can be downloaded and used to configure the corresponding algorithm. However, if the measurements indicate that the QoE of existing GBR users are not being met as the compensation is being performed, then a different set of thresholds are downloaded and used to configure the corresponding algorithm. Persons of ordinary skill in the art should appreciate that the access node 305 may use individual measurements or statistical combinations of measurements to determine whether the QoE requirements are being met within specified tolerances.
The algorithms may then take the predetermined actions based on the new threshold values to meet the QoE of existing users while also attempting to maximize the number of users being served. For example, the PCID algorithm 320 may execute itself to ensure collision free and confusion free PCIs have been allocated. In some cases this may result in new identifiers being assigned to one or more access nodes including the access node 305, its neighbors, and/or its neighbor's neighbors. The call admission control algorithm 325 may implement a first threshold that allows only certain new GBR users 350 (e.g., non-voice users) when the QoE requirements of existing GBR users 335 are being
met. The algorithm 325 may also implement a second threshold that indicates that the algorithm 325 may not admit any new GBR users 350 when the QoE requirements of existing GBR users 335 are not being met. The load balancing algorithm 330 may be configured using a set of thresholds to indicate that GBR traffic should be load balanced away from the carrier, subset of carriers, cell, and/or RATs that are compensating for the failure of the sleeping cell 345. The new thresholds may also indicate that new GBR traffic onto should not be allowed onto the compensating carrier, cell, or RAT. The type and the level of load balancing may depend on whether the sleeping cell condition is detected only on one carrier or RAT, or on all the carriers/RATs of the cell 345.
The predetermined actions of the algorithms supported by the access node 305 are selected to attempt to reduce the effects of the compensation on the QoE of the users 335 on the cell 305. in one embodiment, more than one cell may compensate for the sleeping cell 345 and in that case the predetermined actions can be executed on each of the compensating cells. The neighboring cells may also coordinate their actions. For example, the neighboring cells may participate in the physical cell allocation process so that collision-free and confusion-free identifiers are assigned to the cells. In one embodiment, the outage detection, compensation, notification, and predetermined actions may take place concurrently and/or substantially continuously. For example, the access node 305 may slowly tilt its antenna 310 to compensate for the detected sleeping ceil 345, e.g. , over a period of up to a few seconds. Notifications may therefore be sent at predetermined intervals or substantially continuously during the tilting process, e.g. , every tenth or hundredth of a second, and the algorithms may modify their configuration/operation in response to each notification. This process may continue until a convergence criterion is met. For example, the process may continue until the antenna tilt has finished, collision-free and confusion-free identifiers have been allocated, call admission control according to the new thresholds has reached a relatively steady state, and the load-balancing algorithm has finished balancing the new and existing loads according to the new thresholds. Embodiments of these techniques may therefore reduce the impact of CoC on existing GBR users and provide tight coordination between Cell Outage Compensation and other mechanisms operating on the access node 305.
Figure 4 conceptually illustrates one exemplary embodiment of a method 400 of coordinating access nodes when a sleeping cell is detected in a wireless communication network. In the illustrated embodiment, a cell outage is detected (at 405) by one or more cells in the wireless communication network. For example, a cell (eNB_A) may detect that a nearby cell (eNB_B) has gone into outage on a specific carrier, subset of earners, radio access technology, or combination thereof. Neighboring cells such as eNB_A can detect (at 405) a sleeping cell through the comparison of statistics of certain events, like handovers over a period of time. The neighboring cell eNB_A decides (at 410) to compensate for the sleeping cell through modification of its antenna tilt to provide coverage over the coverage hole detected for the sleeping cell eNB_B. In one embodiment, the level of tilt may be determined or gauged using UE measurement feedback such as measurements of radio link failures (RLFs). The neighboring cell eNB_A may then tilt its antenna until the measured values of the RLFs are less than a threshold value. For example, in embodiments of the wireless communication system
that implement 3G and 4G base stations, the choice of antenna tilt is a tradeoff between providing adequate coverage while meeting the capacity and QoE requirements of individual UEs within the cell for the various carriers, e.g. , as indicated by a packet delay budget and/or a measured packet loss error rate.
As the neighboring cell eNB_A performs the compensation process by tilting its antenna, the cell eNB_A may start receiving measurement values for the various users concurrently with the changing coverage caused by the compensation. The users may include users previously being served by the neighboring cell eNB_A and new users that request access in response to the changing coverage from the neighboring cell eNB_A. In various embodiments, the UE measurements may include measured uplink and/or downlink loads or bit rates. In one embodiment, the neighboring cell eNB_A can deduce other parameters such as the air interface delay and over-the-air packet loss for communications with the various users. Some of these UE measurements may be for users with guaranteed bit rate (GBR) services and other UE measurements may be collected for users with non- GBR services and/or best effort services.
Triggers may then be sent to one or more of the algorithms operating on the neighbor cell eNB_A so that these algorithms can be operated and'or configured consistently with the outage compensation. In the illustrated embodiment, triggers are sent (at 415, 420, 425) to at least three different algorithms operating on the neighboring cell concurrently with the actions that the neighboring cell is taking to compensate for the nearby cell outage. The algorithms implemented by the neighboring cell in the illustrated embodiment include a physical cell identifier algorithm, a call admission control algorithm, and a load balancing algorithm that can perform inter-carrier and/or inter- RAT load balancing. Instructions and/or thresholds may be downloaded or executed in response to receiving the triggers (at 415, 420, 425). In one embodiment, two different sets of thresholds may be downloaded from the OAM based on the information obtained from the incoming UE measurements. For example, one set of thresholds can be downloaded if the QoE of existing GBR users are being met.
A different set of thresholds can be downloaded if the QoE of existing GBR users are not met. The QoE metrics considered may include measured uplink and/or downlink bit rates, estimated air interface delay, packet losses, or combinations thereof. The algorithms may use the new threshold values to configure and/or carry out predetermined actions in an attempt to meet the QoE of existing users while maximizing the number of users being served.
In the illustrated embodiment, one of the triggers is sent (at 415) to the physical cell identifier algorithm. Changing the antenna radiation pattern to compensate for the coverage hole caused by the sleeping cell may change the list of neighbors to the neighboring cell eNB_A and the list of each neighbor's neighbors. The physical cell identiiier algorithm therefore executes (at 430) in response to the trigger and determines whether any physical cell identifiers need to be modified to ensure collision- free and confusion-free identifiers. Changes in one cell identifier may ripple throughout the system and so physical cell identifier algorithms on other cells may also need to be executed response to the coverage compensation procedure. For example, the physical cell identifier algorithm on the
neighboring cell eNB_A may communicate and/or negotiate with similar functionality on other cells to allocate the appropriate physical cell identifiers to ensure collision-free and confusion-free identifiers are allocated throughout the system.
A trigger may also be sent (at 420) to the call admission control algorithm, in the illustrated embodiment, the call admission control algorithm can then be reconfigured to admit or deny new users based upon a new set of thresholds. For example, the call admission control algorithm may either allow only certain new GBR users (such as non-voice users) or to deny any new GBR users depending on whether the QoE of existing GBR users are being met. In one embodiment, if the QoE of existing GBR users are being met, the trigger sent to the call admission control module may serve as an indication to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider or account for failure scenarios in other cells, such as the sleeping cell e B B. The new triggers may be different from existing triggers because the new triggers are selected to account for changes that are likely to occur in response to failure of the sleeping cell eNB_B and the resulting compensation performed by the neighbor cell eNB_A. For example, even though the QoE of existing users are currently being met by the neighbor cell, the failure event that happened on the sleeping cell may trigger compensation that can degrade the QoE of the existing users. After receiving (at 420) this trigger, the call admission control algorithm on eNB A requests (at 435) the appropriate thresholds from the OAM server and then modifies (at 435) its internal thresholds. Alternatively, the neighbor cell may have a predetermined set of thresholds stored internally and the neighbor cell may modify (at 435) the thresholds that it is using to control call admission by switching between the different sets of internally stored thresholds. These thresholds may have been previously downloaded from the OAM server. In one embodiment, the thresholds may be selected so that once they take effect the call admission control module only admits Best Effort users and in some cases certain non-voice GBR users, since admitting GBR users could result in the possibility that the QoE of new or existing users may not be met.
In one embodiment, the trigger received (at 420) by the call admission control module may indicate that new thresholds should be downloaded if the QoE of existing best effort users (e.g. , as indicated by measured values of bit rates, delay, packet loss) are not being met because their values fall below a threshold. For example, the trigger sent (at 420) to the Call Admission Control module may indicate to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider failure scenarios in other cells. This trigger may indicate that the QoE of existing users are not being met because of the failure event that happened on the sleeping cell, which caused the neighbor cell eNB_A to compensate. After receiving this trigger, the call admission control algorithm on the neighbor cell eNB_A can request the appropriate thresholds, which may be determined or selected based on the UE measurement reports coming in to the neighbor cell. The call admission control algorithm may then modify (at 435) its internal thresholds. In one embodiment, the new thresholds may be selected so that the call admission control module does not admit any new GBR users and only admits Best Effort users, since admitting GBR users may result in their QoEs not being met.
In some cases, the sleeping cell eNB_B may return to normal operation, perhaps because the cell has been repaired, replaced, or reconfigured so that it can operate normally. The neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled. The neighbor cell eNB_A may then resume (at 440) normal operation. For example, the neighbor cell eNB_A may tilt its antenna back to the original configuration. The neighbor cell eNB_A may also trigger the call admission control algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the call admission control algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
Another trigger may be sent (at 425) to the load balancing algorithm. For example, a trigger may be sent (at 425) to a load balancing algorithm that can perform intra-c airier, inter-carrier, and/or inter-RAT load balancing algorithms. The type of load balancing performed by the algorithm may depend on whether the sleeping cell condition is detected on one carrier only, on multiple carriers, or on the entire cell including all carriers and RATs. In one embodiment, the trigger tells the load balancing algorithm that new traffic is expected as a consequence of the compensation for the detected sleeping cell. The load balancing algorithm may then modify (at 445) one or more internal thresholds so that traffic is preferentially load balanced away from carriers or RATs that are expected to receive new traffic. For example, if the sleeping cell condition is detected on all carriers and RATs, the intra- carrier LTE load balancing algorithm is notified so that it can load balance GBR traffic away from the cell eNB_A that is compensating for the failure. The load balancing algorithm may also be instructed to deny any requested new GBR traffic onto the neighbor cell eNB_A. Furthermore, in some cases GBR users on other eNBs may not be load balanced to eNB A because eNB A is serving nearby sleeping cell eNB_B, which is in outage.
In some cases, the sleeping cell condition may only be detected on a specific earner and/or RAT. The trigger may therefore instruct the inter-carrier and/or inter-RAT load balancing algorithm to load balance GBR traffic away from the carrier and/or RAT on which sleeping cell condition is detected. The trigger may also instruct the load balancing algorithm to deny requested new GBR traffic for the carrier and/or RAT. Accordingly, internal thresholds in the inter-carrier RAT load balancing algorithms may be modified (at 445) so that the load balancing algorithms perform the indicated load balancing operations. For example, various thresholds may be modified (at 445) so that the load balancing algorithm shifts existing GBR users on eNB_A to other carriers and/or to other RATs, perhaps on other cells. The target carriers and/or RATs for the load balancing operation may be selected so that the QoE of the load balanced user equipment has a higher likelihood of being met. The type and level of load balancing may depend on the severity of the QoE degradation experienced by the user equipment. In one embodiment, higher levels of QoE degradation result in more GBR users being load balanced to other carriers and/or RATs. Lower levels of QoE degradation may result in fewer {e.g., only voice) GBR users being load balanced away from the eNB A.
If sleeping cell eNB_B returns to normal operation, the neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled. The neighbor cell eNB_A may then resume (at 450) normal operation. Tor example, the neighbor cell eNB_A may begin to tilt its antenna back to the original configuration. The neighbor cell eNB_A may also trigger the load balancing algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the load balancing algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
Embodiments of the techniques described herein may have a number of advantages over conventional practice. For example, providing triggers to other algorithms in response to detecting a sleeping cell condition may allow the base station that compensates for the sleeping cell to maintain the QoE of the GBR users that are already being served by the base station that is compensating for one or more sleeping cells. Coordination of the different cell identifier and/or resource allocation algorithms may result in better QoE for all users and/or better optimization of resources to ensure that the QoE requirements of the users are being met with minimal resources. Furthermore, existing sleeping cell compensation techniques do not consider the impact of execution of the compensation algorithm on the other algorithms that are also in operation on the same base station. As a result, unexpected interactions may occur and lower the QoE of the users served on those base stations. Embodiments of the techniques described herein consider an account for these interactions so that any degradation in the QoE of the users may be reduced or avoided. Consequently, embodiments of the techniques described herein support a higher and more consistent level of QoE and improve performance for users.
Portions of the disclosed subject matter and corresponding detailed description are presented in terms of software, or algorithms and symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the ones by which those of ordinary skill in the art effectively convey the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it is used generally, is conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated, it has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, or as is apparent from the discussion, terms such as "processing" or "computing" or "calculating" or "determining" or "displaying" or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical, electronic quantities within the computer system's registers and
memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Note also that the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium. The program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access. Similarly, the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.
The particular embodiments disclosed above are illustrative only, as the disclosed subject matter may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modiiied and all such variations are considered within the scope of the disclosed subject matter. Accordingly, the protection sought herein is as set forth in the claims below.
Claims
1. A method, comprising:
modifying at least one coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node, wherein the access node implements resource allocation algorithms and a cell identification algorithm; and
instructing at least one of the resource allocation algorithms or the cell identification algorithm to perform a predetermined action concurrently with said modification.
2. The method of claim 1, wherein modifying said at least one coverage area comprises changing at least one tilt of at least one antenna used by the access node.
3. The method of claim 1 , wherein instructing said at least one of the resource algorithms or the cell identification algorithm comprises initiating a physical cell identifier algorithm to allocate collision-free and confusion-free physical cell identifiers to the access node and neighboring access nodes.
4. The method of claim 1 , comprising measuring at least one quality of experience (QoE) for at least one user being served by the access node concurrently with modifying said at least one coverage area, wherein measuring said at least one QoE comprises measuring at least one of an uplink bit rate, a downlink bit rate, an estimated air interface delay, or a packet loss rate for said at least one user.
5. The method of claim 4, wherein instructing said at least one of the resource allocation algorithms to perform the predetermined action comprises instructing a call admission control algoritlmi to admit new guaranteed bit rate users when said at least one QoE is being met for said at least one user and instructing the call admission control algorithm to deny new guaranteed bit rate users when said at least one QoE is not being met for said at least one user.
6. The method of claim 5, wherein instructing the call admission control algorithms to admit or deny new guaranteed bit rate users comprises reconfiguring the call admission control algorithm using a fust set of admission thresholds when said at least one QoE is being met for said at least one user and a second set of admission thresholds when said at least one QoE is not being met for said at least one user.
7. The method of claim 4, wherein instructing said at least one of the resource allocation algoritlmis to perform the predetermined action comprises instructing a load-balancing algoritlmi to load balance traffic away from the access node.
8. The method of claim 7, comprising detecting a sleeping cell condition on at least one carrier or radio access technology supported by the sleeping cell, and wherein instructing the load-balancing algoritlmi to load balance traffic away from the access node comprises instructing the load-balancing algoritlmi to load balance traffic away from said at least one carrier or radio access teclmology that is experiencing the sleeping cell condition.
9. The method of claim 1 , wherein the access node concurrently modifies said at least one coverage area and instructs said at least one of the resource allocation algorithms or the cell identifier algorithm to perform the predetermined action substantially continuously until a convergence criterion is satisfied.
10. The method of claim 1, comprising:
determining that the sleeping cell has awakened;
modifying said at least one coverage area of the access node to account for resumed coverage in the previously sleeping cell; and
instructing said at least one of the resource allocation algorithms or the cell identification algorithm to perform a predetermined action concurrently with said modification, wherein the access node concurrently modifies said at least one coverage area and instructs said at least one of the resource allocation algorithms or the cell identifier algorithm to perform the predetermined action substantially continuously until a convergence criterion is satisfied.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020137033757A KR101561483B1 (en) | 2011-06-20 | 2012-06-11 | Method of coordinating fault detection responses by access nodes of a network |
EP12727096.5A EP2721860B1 (en) | 2011-06-20 | 2012-06-11 | Method of coordinating fault detection responses by access nodes of a network |
JP2014517012A JP5734514B2 (en) | 2011-06-20 | 2012-06-11 | Method for coordinating failure detection responses by network access nodes |
CN201280030284.8A CN103621134B (en) | 2011-06-20 | 2012-06-11 | The method coordinated is responded to fault detect by the access node of network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/163,814 US9204315B2 (en) | 2011-06-20 | 2011-06-20 | Method of coordinating fault detection responses by access nodes of a network |
US13/163,814 | 2011-06-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012177430A1 true WO2012177430A1 (en) | 2012-12-27 |
Family
ID=46246328
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2012/041845 WO2012177430A1 (en) | 2011-06-20 | 2012-06-11 | Method of coordinating fault detection responses by access nodes of a network |
Country Status (6)
Country | Link |
---|---|
US (1) | US9204315B2 (en) |
EP (1) | EP2721860B1 (en) |
JP (1) | JP5734514B2 (en) |
KR (1) | KR101561483B1 (en) |
CN (1) | CN103621134B (en) |
WO (1) | WO2012177430A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020038544A1 (en) * | 2018-08-20 | 2020-02-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods, apparatus and computer-readable mediums relating to detection of sleeping cells in a cellular network |
Families Citing this family (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101855523B1 (en) | 2011-10-06 | 2018-05-04 | 삼성전자주식회사 | Method and device of generating feedback in a communication system |
US8971302B2 (en) * | 2011-12-06 | 2015-03-03 | At&T Mobility Ii Llc | Cluster-based derivation of antenna tilts in a wireless network |
CN105517024B (en) * | 2012-01-30 | 2019-08-13 | 华为技术有限公司 | Self-organizing network coordination approach, device and system |
WO2013191600A1 (en) * | 2012-06-19 | 2013-12-27 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and radio access node for determining a cell state |
EP2871889B1 (en) * | 2012-07-31 | 2019-09-11 | Huawei Technologies Co., Ltd. | Terminal selection method, network entity, and system based on self-organizing networks |
US10142242B2 (en) | 2012-08-30 | 2018-11-27 | T-Mobile Usa, Inc. | Network support node traffic reduction for self-organizing networks |
US10506558B2 (en) | 2012-08-30 | 2019-12-10 | T-Mobile Usa, Inc. | Performance-based optimization of QoS factors |
US10499259B2 (en) | 2012-08-30 | 2019-12-03 | T-Mobile Usa, Inc. | Special events module for self-organizing networks |
US10506460B2 (en) | 2012-08-30 | 2019-12-10 | T-Mobile Usa, Inc. | Self-organizing network mechanism for energy saving during an outage |
US10243794B2 (en) | 2012-08-30 | 2019-03-26 | T-Mobile Usa, Inc. | Open architecture for self-organizing networks |
US10491282B2 (en) * | 2012-12-17 | 2019-11-26 | Ethertronics, Inc. | Communication load balancing using distributed antenna beam steering techniques |
US10276921B2 (en) | 2013-09-06 | 2019-04-30 | Centurylink Intellectual Property Llc | Radiating closures |
CN104519475A (en) * | 2013-09-30 | 2015-04-15 | 中兴通讯股份有限公司 | Network element status information processing method and device, MME (mobility management entity) and HSS (home subscriber server) |
CN105637925B (en) * | 2013-10-16 | 2019-05-21 | 英派尔科技开发有限公司 | Dynamic frequency and power resource allocation with refinement tactical management |
US9491098B1 (en) * | 2013-11-18 | 2016-11-08 | Amazon Technologies, Inc. | Transparent network multipath utilization through encapsulation |
CN104754629B (en) * | 2013-12-31 | 2020-01-07 | 中兴通讯股份有限公司 | Method and device for realizing self-healing of base station equipment |
IL234002A (en) * | 2014-08-07 | 2016-06-30 | Wireless Technologies Pte Ltd Cellwize | Method of operating a self-organizing network and system thereof |
WO2016048796A2 (en) | 2014-09-25 | 2016-03-31 | T-Mobile Usa, Inc. | Self-organizing network mechanism for energy saving during an outage |
WO2016068761A1 (en) * | 2014-10-28 | 2016-05-06 | Telefonaktiebolaget L M Ericsson (Publ) | First network node, method therein, computer program and computer-readable medium comprising the computer program for detecting outage of a radio cell |
US9509616B1 (en) | 2014-11-24 | 2016-11-29 | Amazon Technologies, Inc. | Congestion sensitive path-balancing |
US10038741B1 (en) | 2014-11-24 | 2018-07-31 | Amazon Technologies, Inc. | Selective enabling of sequencing for encapsulated network traffic |
CN104768164B (en) * | 2015-04-08 | 2019-03-15 | 新华三技术有限公司 | A kind of method and device of dynamic regulation wireless coverage |
GB2539639A (en) * | 2015-06-02 | 2016-12-28 | Sparkl Ltd | Interaction of devices in a networked environment |
US10249103B2 (en) | 2016-08-02 | 2019-04-02 | Centurylink Intellectual Property Llc | System and method for implementing added services for OBD2 smart vehicle connection |
US10110272B2 (en) | 2016-08-24 | 2018-10-23 | Centurylink Intellectual Property Llc | Wearable gesture control device and method |
US9867112B1 (en) | 2016-11-23 | 2018-01-09 | Centurylink Intellectual Property Llc | System and method for implementing combined broadband and wireless self-organizing network (SON) |
US10222773B2 (en) | 2016-12-23 | 2019-03-05 | Centurylink Intellectual Property Llc | System, apparatus, and method for implementing one or more internet of things (IoT) capable devices embedded within a roadway structure for performing various tasks |
US10150471B2 (en) | 2016-12-23 | 2018-12-11 | Centurylink Intellectual Property Llc | Smart vehicle apparatus, system, and method |
US10193981B2 (en) | 2016-12-23 | 2019-01-29 | Centurylink Intellectual Property Llc | Internet of things (IoT) self-organizing network |
CN110944352B (en) * | 2018-09-25 | 2022-11-01 | 维沃移动通信有限公司 | Link failure detection method and terminal for sidelink |
KR102634000B1 (en) | 2019-01-15 | 2024-02-06 | 삼성전자 주식회사 | A method and apparatus for analyzing performance degradation of a cell in a wireless communication system |
US10945120B2 (en) * | 2019-02-27 | 2021-03-09 | Oracle International Corporation | Methods, systems, and computer readable media for dynamically provisioning and using public land mobile network (PLMN) location mappings in service capability exposure function (SCEF) or network exposure function (NEF) |
US10972368B2 (en) | 2019-05-17 | 2021-04-06 | Oracle International Corporation | Methods, systems, and computer readable media for providing reduced signaling internet of things (IoT) device monitoring |
CN111148142B (en) * | 2019-12-31 | 2022-07-12 | 重庆大学 | Dormant cell detection method based on anomaly detection and integrated learning |
US11564130B2 (en) | 2020-02-19 | 2023-01-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Radio access technology aware cellular network inter-frequency coverage orchestrator |
US11381955B2 (en) | 2020-07-17 | 2022-07-05 | Oracle International Corporation | Methods, systems, and computer readable media for monitoring machine type communications (MTC) device related information |
US11445421B2 (en) | 2020-08-21 | 2022-09-13 | Sprint Communications Company L.P. | Load balancing wireless access node usage based on active users |
WO2022183375A1 (en) * | 2021-03-02 | 2022-09-09 | Oppo广东移动通信有限公司 | Wireless communication method, terminal device and network device |
US11895080B2 (en) | 2021-06-23 | 2024-02-06 | Oracle International Corporation | Methods, systems, and computer readable media for resolution of inter-network domain names |
US12089069B1 (en) | 2021-09-08 | 2024-09-10 | T-Mobile Usa, Inc. | Coverage improvement for 5G new radio wireless communication network to automatically adjust cell properties to improve coverage and capacity |
US11800382B1 (en) | 2021-09-08 | 2023-10-24 | T-Mobile Usa, Inc. | Coverage improvement for 5G new radio wireless communication network |
US11606732B1 (en) | 2021-09-08 | 2023-03-14 | T-Mobile Usa, Inc. | Coverage improvement for 5G new radio wireless communication network, such as for over-shooting cells |
CN116112935A (en) * | 2021-11-11 | 2023-05-12 | 中国移动通信集团设计院有限公司 | Method, device and equipment for compensating coverage area of failure cell |
WO2024068119A1 (en) * | 2022-09-30 | 2024-04-04 | British Telecommunications Public Limited Company | Cellular telecommunications network |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2154918A1 (en) * | 2008-08-13 | 2010-02-17 | Alcatel, Lucent | Decentralised method of handling a cell outage in a radiocommunication network |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6496475B1 (en) * | 1999-07-16 | 2002-12-17 | Samsung Electronics Co., Ltd. | System and method for selective recovery of a failed overhead channel in a wireless network |
US20060063521A1 (en) * | 2004-09-21 | 2006-03-23 | Benjamin Cheung | Method of monitoring wireless network performance |
US7499700B2 (en) * | 2004-12-10 | 2009-03-03 | Motorola, Inc. | Method and apparatus for mobile station management and system |
US8369271B2 (en) * | 2005-04-22 | 2013-02-05 | Alcatel Lucent | Method of configuring a cell of a wireless communication system for improved resource utilization |
US8185726B2 (en) * | 2006-04-27 | 2012-05-22 | Qualcomm Incorporated | Sleep optimization based on system information block scheduling |
US7826820B2 (en) * | 2006-09-08 | 2010-11-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Non-homogenous telecommunications base stations |
US7970585B2 (en) * | 2007-06-29 | 2011-06-28 | Hewlett-Packard Development Company, L.P. | Method and system for remote monitoring and control of wireless cell-sites |
FI122209B (en) * | 2007-08-10 | 2011-10-14 | 7Signal Oy | End-to-end quality of service monitoring system and system in radio network |
CN101796864B (en) * | 2007-09-05 | 2014-07-16 | Lm爱立信电话有限公司 | A method of monitoring cells in wireless communication systems |
US8700028B2 (en) * | 2008-03-14 | 2014-04-15 | Motorola Solutions, Inc. | Diagnostic management sessions in a communication network |
US8498207B2 (en) * | 2008-06-26 | 2013-07-30 | Reverb Networks | Dynamic load balancing |
WO2010011084A2 (en) * | 2008-07-23 | 2010-01-28 | 엘지전자 주식회사 | Method for self-configuring a cellular infrastructure as desired, and a device therefor |
US8682326B2 (en) * | 2008-12-23 | 2014-03-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Base station and method for vertical tilt antenna beam sweeping |
US20100216453A1 (en) * | 2009-02-20 | 2010-08-26 | Telefonaktiebolaget Lm Ericsson | Compensating for cell outage using priorities |
US8095075B2 (en) * | 2009-03-10 | 2012-01-10 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method of detecting a sleeping cell and remedying detected conditions in a telecommunication network |
US9538220B2 (en) * | 2009-06-12 | 2017-01-03 | Wi-Lan Labs, Inc. | Video streaming quality of experience degradation control using a video quality metric |
US8868725B2 (en) * | 2009-06-12 | 2014-10-21 | Kent State University | Apparatus and methods for real-time multimedia network traffic management and control in wireless networks |
US8750856B2 (en) * | 2009-08-13 | 2014-06-10 | Alcatel Lucent | Distributed sleeping cell detection |
US9826416B2 (en) * | 2009-10-16 | 2017-11-21 | Viavi Solutions, Inc. | Self-optimizing wireless network |
CN102056336B (en) * | 2009-11-02 | 2013-01-09 | 华为技术有限公司 | Method and device for cooperatively processing self-organizing operation, and communication system |
TWM406324U (en) * | 2009-11-19 | 2011-06-21 | Interdigital Patent Holdings | Wireless transmit/receive unit (WTRU) |
US8385900B2 (en) * | 2009-12-09 | 2013-02-26 | Reverb Networks | Self-optimizing networks for fixed wireless access |
US8605684B2 (en) * | 2010-01-08 | 2013-12-10 | Blackberry Limited | System and method for coordinated multi-point network operation to reduce radio link failure |
US8694043B2 (en) * | 2010-04-19 | 2014-04-08 | Telefonaktiebolaget L M Ericsson (Publ) | Interference-free neighbor cell measurements |
US8768339B2 (en) * | 2010-12-15 | 2014-07-01 | At&T Intellectual Property I, L.P. | Method and apparatus for providing long term evolution service outage and degradation management |
US8509762B2 (en) * | 2011-05-20 | 2013-08-13 | ReVerb Networks, Inc. | Methods and apparatus for underperforming cell detection and recovery in a wireless network |
US8861494B2 (en) * | 2011-06-03 | 2014-10-14 | Alcatel Lucent | Self-organizing communication networks |
-
2011
- 2011-06-20 US US13/163,814 patent/US9204315B2/en not_active Expired - Fee Related
-
2012
- 2012-06-11 CN CN201280030284.8A patent/CN103621134B/en not_active Expired - Fee Related
- 2012-06-11 JP JP2014517012A patent/JP5734514B2/en not_active Expired - Fee Related
- 2012-06-11 KR KR1020137033757A patent/KR101561483B1/en active IP Right Grant
- 2012-06-11 EP EP12727096.5A patent/EP2721860B1/en not_active Not-in-force
- 2012-06-11 WO PCT/US2012/041845 patent/WO2012177430A1/en unknown
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2154918A1 (en) * | 2008-08-13 | 2010-02-17 | Alcatel, Lucent | Decentralised method of handling a cell outage in a radiocommunication network |
Non-Patent Citations (1)
Title |
---|
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Self-Organizing Networks (SON) Policy Network Resource Model (NRM) Integration Reference Point (IRP); Information Service (IS) (Release 10)", 3GPP STANDARD; 3GPP TS 32.522, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG5, no. V10.2.0, 17 June 2011 (2011-06-17), pages 1 - 33, XP050553257 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020038544A1 (en) * | 2018-08-20 | 2020-02-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods, apparatus and computer-readable mediums relating to detection of sleeping cells in a cellular network |
Also Published As
Publication number | Publication date |
---|---|
US9204315B2 (en) | 2015-12-01 |
KR20140023393A (en) | 2014-02-26 |
EP2721860B1 (en) | 2019-03-13 |
CN103621134B (en) | 2017-08-25 |
JP5734514B2 (en) | 2015-06-17 |
JP2014517657A (en) | 2014-07-17 |
KR101561483B1 (en) | 2015-10-19 |
EP2721860A1 (en) | 2014-04-23 |
CN103621134A (en) | 2014-03-05 |
US20120320766A1 (en) | 2012-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9204315B2 (en) | Method of coordinating fault detection responses by access nodes of a network | |
US9571336B2 (en) | Method of improving coverage and optimisation in communication networks | |
US11503529B2 (en) | System and method to provide small cell power control and load balancing for high mobility user equipment in a network environment | |
CN110545525B (en) | System and method for assisting service removal using user equipment groups in a network environment | |
US20180263016A1 (en) | Coordination of capacity and coverage optimization of self-organizing networks | |
EP3107330B1 (en) | Method, system and computer program product to facilitate service hand-outs using user equipment groups in a network environment | |
EP2785108B1 (en) | QoE Optimization in Wireless Networks | |
US20130286851A1 (en) | Common radio element application manager for wireless small cells | |
US20120257544A1 (en) | Configuration space feedback and optimization in a self-configuring communication system | |
US10165454B2 (en) | Radio communication system, radio station, network operation management apparatus, and network optimization method | |
RU2741582C1 (en) | Serving a radio link including a plurality of uplink carriers | |
US10091697B1 (en) | Mitigation of uplink interference within heterogeneous wireless communications networks | |
Atayero et al. | Self organizing networks for 3GPP LTE | |
CN106572491B (en) | Access node management method, access net management entity, equipment and access node | |
Laine | Performance Management of 3rd Generation Partnership Project Long Term Evolution | |
JP7097797B2 (en) | Automatic connection switching in wireless communication network | |
Kakadia et al. | Self organizing networks (SON) | |
Decarreau | Self-Organization in Pre-5G Communication Networks | |
Naseer‐ul‐Islam et al. | Self‐Organization in Pre‐5 G Communication Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12727096 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20137033757 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2014517012 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |