WO2012177430A1 - Method of coordinating fault detection responses by access nodes of a network - Google Patents

Method of coordinating fault detection responses by access nodes of a network Download PDF

Info

Publication number
WO2012177430A1
WO2012177430A1 PCT/US2012/041845 US2012041845W WO2012177430A1 WO 2012177430 A1 WO2012177430 A1 WO 2012177430A1 US 2012041845 W US2012041845 W US 2012041845W WO 2012177430 A1 WO2012177430 A1 WO 2012177430A1
Authority
WO
WIPO (PCT)
Prior art keywords
cell
access node
algorithm
instructing
qoe
Prior art date
Application number
PCT/US2012/041845
Other languages
French (fr)
Inventor
Kamakshi Sridhar
Original Assignee
Alcatel Lucent
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=46246328&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=WO2012177430(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Alcatel Lucent filed Critical Alcatel Lucent
Priority to KR1020137033757A priority Critical patent/KR101561483B1/en
Priority to EP12727096.5A priority patent/EP2721860B1/en
Priority to JP2014517012A priority patent/JP5734514B2/en
Priority to CN201280030284.8A priority patent/CN103621134B/en
Publication of WO2012177430A1 publication Critical patent/WO2012177430A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/16Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0203Power saving arrangements in the radio access network or backbone network of wireless communication networks
    • H04W52/0206Power saving arrangements in the radio access network or backbone network of wireless communication networks in access points, e.g. base stations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/52Allocation or scheduling criteria for wireless resources based on load
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • This invention relates generally to communication systems, and, more particularly, to wireless communication systems.
  • Wireless communication systems use a network of access nodes to provide wireless connectivity to associated geographical areas that are typically referred to as cells or sectors.
  • the access nodes in relatively advanced systems such as systems that implement the Long Term Evolution
  • LTE Long Term Evolution
  • eNodeBs evolved node Bs
  • the access nodes used in wireless communication systems may also be referred to using terms including base stations, base station routers, macrocells, access points, femtocells, pico-cells, and the like.
  • Users access the wireless communication system using access terminals that communicate with one or more of the access nodes over an air interface.
  • the access terminals may be mobile devices such as mobile phones, smart phones, notepad computers, network computers, and the like.
  • the access terminals may also include comparatively immobile or fixed devices such as desktop computers, wireless interface cards or radios installed in other devices, and the like.
  • the access nodes may be configured as elements of a self-organizing network (SON).
  • eNodeBs in a wireless communication system that operates according to LTE may be self- organizing nodes of the network.
  • Self-organizing eNodeBs should be capable of self-configuration, self-optimization, and self-healing.
  • Self-configuration is executed automatically after the eNodeB is deployed and includes allocating an IP address to the eNodeB, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server, establishing links over interfaces between the eNodeB and other eNodeBs in the self-organizing network, and the like.
  • OAM operations and maintenance
  • Self- optimization includes optimizing the configuration of the eNodeB based upon the location of the eNodeB and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the eNodeB to mitigate some detected faults by automatically triggering appropriate recovery actions.
  • a sleeping cell is defined as an eNodeB that is no longer functioning and yet has not triggered an alarm at a corresponding OAM server. Sleeping cell conditions can be detected on a single earner, on a subset of earners, or for the entire cell. The neighboring access nodes can then take predetermined actions to compensate for the potential loss of coverage resulting from the detected sleeping cell.
  • the LTE standards and/or protocols define a cell outage detection and compensation (COC) procedure that allows eNodeBs to tilt one or more antennas to provide additional wireless coverage in the geographical area served by the sleeping cell.
  • the sleeping cell compensation algorithms are defined in isolation of other algorithms that are being performed by the neighboring access nodes concurrently with the sleeping cell compensation algorithm.
  • the disclosed subject matter is directed to addressing the effects of one or more of the problems set forth above.
  • the following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
  • a method for coordinating access nodes when a sleeping cell is detected.
  • the method may include modifying a coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node.
  • the access node implements resource allocation algorithms and a cell identification algorithm.
  • the method may also include instructing the resource allocation algorithms and/or the cell identification algorithm to perform a predetermined action concurrently with the modification.
  • Figure 1 conceptually illustrates a first exemplary embodiment of a wireless communication system
  • Figure 2 conceptually illustrates a second exemplary embodiment of a wireless communication system:
  • Figure 3 conceptually illustrates a third exemplary embodiment of a wireless communication system
  • Figure 4 conceptually illustrates one exemplary embodiment of a method of coordinating access nodes when a sleeping cell is detected in a wireless communication network.
  • the present application describes embodiments of techniques for coordinating actions and/or responses of access nodes in a network when a sleeping cell is detected in the network.
  • the access node can compensate for the loss of coverage caused by the sleeping cell, e.g., by tilting one or more antennas to provide additional coverage in the area served by the sleeping cell.
  • the corrective actions are taken independently of other functions and/or algorithms that may be affected by the changing antenna radiation pattern. Tor example, shifting the antenna to improve coverage in areas served by the sleeping cell can degrade the quality of experience (QoE) for existing users being served by the access node, thereby decreasing their quality of experience.
  • QoE quality of experience
  • tilting the antenna may change the access nodes that are neighbors (or neighbor's neighbors) of the compensating access node. Shifting the antenna radiation pattern to compensate for lost sleeping cell coverage may therefore impact the algorithms that allocate physical cell identifiers to the access nodes and other resource allocation algorithms such as the call admission control algorithm and the load balancing algorithm.
  • the present application describes embodiments of access nodes that generate notifications to other algorithms when an access node modifies its antenna radiation pattern to compensate for lost coverage resulting from a sleeping cell.
  • notifications can be transmitted to physical cell identifier algorithms and/or resource allocation algorithms so that the operation or configuration of these algorithms can be modified to maintain a quality of experience for users served by the access node prior to modification of the antenna radiation pattern.
  • algorithms that can be modified include the physical cell ID algorithm (which may be modified by running the algorithm to verify or change the current allocation of physical cell identifiers), the call admission control algorithm (which may be modified to allow new users only if the quality of experience of existing users is being met), and load-balancing algorithms
  • FIG. 1 conceptually illustrates a first exemplary embodiment of a wireless communication system 100.
  • the wireless communication system 100 supports wireless connectivity in a plurality of cells or sectors 105 that are served by a corresponding plurality of access nodes 1 10.
  • Wireless connectivity may be provided according to the Long Term Evolution (LTE) of the standards and/or protocols defined by the Third Generation Partnership Project (3GPP).
  • LTE Long Term Evolution
  • 3GPP Third Generation Partnership Project
  • embodiments of the techniques described herein may be used in networks that operate according to other standards and/or protocols.
  • embodiments of these techniques may be used in second-generation (2G) and/or third generation (3G) networks that operate according to the corresponding standards and/or protocols.
  • the access nodes 1 10 form a self-organizing network (SON) that operates according to LTE.
  • the access nodes 1 10 may therefore be configured to self-configure, self-optimize and self-heal.
  • Self-configuration is executed automatically after the access node 100 is deployed and includes allocating an IP address to the access node 100, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server 1 12, establishing links over interfaces between each access node 100 and other access nodes 100 in the self- organizing network, and the like.
  • Self-optimization includes optimizing the configuration of the access node 100 based upon the location of the access node 100 and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the access node 100 to mitigate some detected faults by automatically triggering appropriate recovery actions.
  • Access nodes 110 in the illustrated embodiment of the wireless communication system 100 are electronically and/or communicatively connected to one or more serving gateways (SGWs) 1 15 that route and forward user data packets.
  • SGWs serving gateways
  • the serving gateways 115 may also act as the mobility anchor for the user plane during handovers and may be the anchor for mobility between LTE and other 3GPP technologies.
  • Serving gateways may be electronically and'or communicatively coupled to one or more public data network (PDN) gateways (PGWs) 120 that provide connectivity to external packet data networks.
  • PGW 120 may perform policy enforcement, packet filtering for different users, charging support, and the like.
  • the PGW 120 may implement rules or policies provided by a policy and charging rules function (PCRF) 125, which may be electronically and/or communicatively coupled to one or more operators 130 for providing IP services.
  • PCRF policy and charging rules function
  • the PGW 120 may also be electronically and/or communicatively coupled to the operator
  • the SGW T 1 15 may also be electronically and/or communicatively coupled to a mobility management entity (MME) 1 5.
  • MME mobility management entity
  • the MME 135 is a control-node for the LTE access network and the MME 135 is responsible for idle mode user equipment (UE) tracking and paging procedure including retransmissions.
  • the MME 135 may also support bearer activation/deactivation processes and may be responsible for choosing the SGW 1 15 for a UE at the initial attach and at time of intra-LTE handover.
  • Non Access Stratum (NAS) signaling terminates at the MME 135 and the MME 135 may be responsible for generation and allocation of temporary identities to UEs.
  • the MME 135 may also be responsible for other authorization, authentication, and mobility functions.
  • the MME 135 can authenticate the user by interacting with a home subscriber server (HSS) 140.
  • HSS home subscriber server
  • the HSS 140 is a central database that contains user-related and subscription-related information.
  • the functions of the HSS 140 may include functionalities such as mobility management, call and session establishment support, user authentication, and access authorization.
  • One or more of the access nodes 1 10 may be identified as a sleeping cell when the access node
  • the sleeping cell condition may be detected on one carrier, on a subset of carriers, on a particular radio access technology (RAT), or on the entire cell 105.
  • the wireless communication system 100 implements an LTE Cell Outage Detection and Compensation (COC) procedure that allows neighboring access nodes 1 10 to detect a sleeping cell and compensate for the resulting loss of coverage, e.g., by adjusting the tilt of one or more antennas to modify the antenna radiation pattern and provide coverage to a portion of the coverage area of the sleeping cell 105.
  • COC LTE Cell Outage Detection and Compensation
  • the illustrated embodiment of the wireless communication system 100 also supports an interaction mechanism between the CoC algorithm and other algorithms that may operate concurrently with the modifications triggered by detection of the sleeping cell.
  • Exemplary algorithms that may be operating concurrently with the modifications include algorithms for allocating physical cell identifiers to the access nodes 1 10 and resource allocation algorithms such as call admission control algorithms, load-balancing algorithms, and the like.
  • the wireless communication system 100 may therefore define one or more actions to be taken by the other algorithms in response to detecting a sleeping cell, e.g., actions that can be taken to maintain the QoE of existing users and'or increase the number of users with a required QoE.
  • FIG. 2 conceptually illustrates a second exemplary embodiment of a wireless communication system 200.
  • the illustrated embodiment of the wireless communication system 200 includes a network of access nodes 205 that provide wireless connectivity within a corresponding network of cells 210.
  • the cells 210 are depicted as perfect non-overlapping hexagons. However, persons of ordinary skill in the art should appreciate that actual cells 210 may have irregular and time -varying shapes that may overlap in part or entirely with other cells 210.
  • the cell 210(1) is a sleeping cell, as indicated by the dashed lines of the hexagon.
  • One or more of the other cells 210(2-4) may therefore adjust their coverage patterns to compensate for the lost coverage, or hole in the coverage area, that results from the sleeping cell.
  • modifying the coverage area e.g., by modifying an antenna tilt to provide coverage in the sleeping cell 210(1), could degrade the QoE of existing users such as users that are being served by the cells 210(2-4).
  • the degradation may be particularly acute if there are a large number of guaranteed bit rate (GBR) users being served by the compensating cells 210(2-4).
  • GBR services include voice calls, video conferencing, realtime gaming, and the like. Continuing to admit new users to the compensating cells 210(2-4) may further degrade the QoE of the existing users.
  • FIG. 3 conceptually illustrates a third exemplary embodiment of a wireless communication system 300.
  • the wireless communication system 300 includes an access node 305 that provides wireless connectivity using one or more antennas 10.
  • the access node 305 also implements functionality including an outage detection algorithm 315, a physical cell identifier algorithm 320, a call admission control algorithm 325, and a load-balancing algorithm 330.
  • the outage detection algorithm 315 is configured to detect sleeping cells by monitoring and comparing statistics for events such as handovers during a selected period of time. Alternatively, the outage detection algorithm 315 may receive information indicating outages of one or more cells from the network.
  • Outages can be detected on a single earner, a subset of carriers, a particular RAT, or for the entire sleeping cell.
  • the physical cell identifier algorithm 320 is configured to negotiate with other access nodes to allocate identifiers so that the identifiers are collision-free (e.g. , neighboring access nodes do not have the same identifier) and confusion- free (e.g., a neighbor's neighbor of an access node does not have the same identifier).
  • the call admission control algoritlmi 325 is configured to determine whether to admit requested calls or call sessions, e.g., based on the current loading of one or more carriers, sectors, and ⁇ 'or cells.
  • the load-balancing algoritlmi 330 is configured to shift calls or call sessions between different carriers, sectors, and/or cells to redistribute or balance the load over the carriers, sectors, and/or cells.
  • the access node 305 is initially providing wireless connectivity to mobile nodes or other user equipment or access terminals 335 that fall within a coverage area defined by the radiation pattern 340 of the antenna 310.
  • the outage detection algorithm 315 determines that a neighboring cell 345 is a sleeping cell.
  • the cell 345 may have been providing wireless connectivity to one or more mobile units 350.
  • the mobile units 350 may not have an active session with the cell 345 but may be located in the geographical area previously served by the sleeping cell 345 and may later attempt to access the wireless communication system 300.
  • the access node 305 may decide to compensate for the sleeping cell 345 by modifying its antenna tilt to provide coverage over at least a portion of the coverage hole created by the sleeping cell 345. Modifying the antenna tilt may modify the antenna radiation pattern 340 to generate a different antenna radiation pattern 355.
  • FIG. 3 shows a single access node 3 10 compensating for the lost coverage, in alternative embodiments more than one neighboring cell may decide to modify its antenna tilt to compensate for the lost coverage of the sleeping cell 345.
  • the outage detection algorithm 315 may notify other algorithms that are concurrently operating in the access node 305 when the outage detection algorithm 315 detects the sleeping cell 345.
  • the notifications make the other algorithms aware of the failure conditions in the sleeping cell 345 so that these algorithms can take appropriate action to mitigate the QoE impact on existing users such as the access terminals 335.
  • the QoE of the users may be indicated by measured uplink bit rates, downlink bit rates, estimated air interface delays, packet loss, and the like.
  • notiiications and the corresponding actions taken by the algorithms may occur in each of the neighboring cells that detect the sleeping cell 345 and decide to compensate for the lost coverage.
  • the notifications may include triggers that are sent to algorithms operating on the cell 305 that is compensating for the nearby cell outage.
  • these algorithms include the Physical Cell-ID algorithm 320, the call admission control algorithm 325, and the load-balancing algorithm 330, which may implement intra-carrier, inter-carrier and/or inter-radio access technology (RAT) load balancing algorithms.
  • RAT inter-radio access technology
  • the triggers may instruct one or more algorithms to utilize different sets of thresholds.
  • the algorithms may download different sets of thresholds from a network source such as the OAM server depending on information obtained from incoming UE measurements of various QoE parameters. If the measurements indicate that the QoE of existing GBR users are being met, then one set of thresholds can be downloaded and used to configure the corresponding algorithm. However, if the measurements indicate that the QoE of existing GBR users are not being met as the compensation is being performed, then a different set of thresholds are downloaded and used to configure the corresponding algorithm.
  • the access node 305 may use individual measurements or statistical combinations of measurements to determine whether the QoE requirements are being met within specified tolerances.
  • the algorithms may then take the predetermined actions based on the new threshold values to meet the QoE of existing users while also attempting to maximize the number of users being served.
  • the PCID algorithm 320 may execute itself to ensure collision free and confusion free PCIs have been allocated. In some cases this may result in new identifiers being assigned to one or more access nodes including the access node 305, its neighbors, and/or its neighbor's neighbors.
  • the call admission control algorithm 325 may implement a first threshold that allows only certain new GBR users 350 (e.g., non-voice users) when the QoE requirements of existing GBR users 335 are being met.
  • the algorithm 325 may also implement a second threshold that indicates that the algorithm 325 may not admit any new GBR users 350 when the QoE requirements of existing GBR users 335 are not being met.
  • the load balancing algorithm 330 may be configured using a set of thresholds to indicate that GBR traffic should be load balanced away from the carrier, subset of carriers, cell, and/or RATs that are compensating for the failure of the sleeping cell 345.
  • the new thresholds may also indicate that new GBR traffic onto should not be allowed onto the compensating carrier, cell, or RAT.
  • the type and the level of load balancing may depend on whether the sleeping cell condition is detected only on one carrier or RAT, or on all the carriers/RATs of the cell 345.
  • the predetermined actions of the algorithms supported by the access node 305 are selected to attempt to reduce the effects of the compensation on the QoE of the users 335 on the cell 305.
  • more than one cell may compensate for the sleeping cell 345 and in that case the predetermined actions can be executed on each of the compensating cells.
  • the neighboring cells may also coordinate their actions.
  • the neighboring cells may participate in the physical cell allocation process so that collision-free and confusion-free identifiers are assigned to the cells.
  • the outage detection, compensation, notification, and predetermined actions may take place concurrently and/or substantially continuously.
  • the access node 305 may slowly tilt its antenna 310 to compensate for the detected sleeping ceil 345, e.g.
  • Notifications may therefore be sent at predetermined intervals or substantially continuously during the tilting process, e.g. , every tenth or hundredth of a second, and the algorithms may modify their configuration/operation in response to each notification.
  • This process may continue until a convergence criterion is met. For example, the process may continue until the antenna tilt has finished, collision-free and confusion-free identifiers have been allocated, call admission control according to the new thresholds has reached a relatively steady state, and the load-balancing algorithm has finished balancing the new and existing loads according to the new thresholds.
  • Embodiments of these techniques may therefore reduce the impact of CoC on existing GBR users and provide tight coordination between Cell Outage Compensation and other mechanisms operating on the access node 305.
  • FIG. 4 conceptually illustrates one exemplary embodiment of a method 400 of coordinating access nodes when a sleeping cell is detected in a wireless communication network.
  • a cell outage is detected (at 405) by one or more cells in the wireless communication network.
  • a cell eNB_A
  • eNB_B a nearby cell
  • Neighboring cells such as eNB_A can detect (at 405) a sleeping cell through the comparison of statistics of certain events, like handovers over a period of time.
  • the neighboring cell eNB_A decides (at 410) to compensate for the sleeping cell through modification of its antenna tilt to provide coverage over the coverage hole detected for the sleeping cell eNB_B.
  • the level of tilt may be determined or gauged using UE measurement feedback such as measurements of radio link failures (RLFs).
  • the neighboring cell eNB_A may then tilt its antenna until the measured values of the RLFs are less than a threshold value.
  • the choice of antenna tilt is a tradeoff between providing adequate coverage while meeting the capacity and QoE requirements of individual UEs within the cell for the various carriers, e.g. , as indicated by a packet delay budget and/or a measured packet loss error rate.
  • the cell eNB_A may start receiving measurement values for the various users concurrently with the changing coverage caused by the compensation.
  • the users may include users previously being served by the neighboring cell eNB_A and new users that request access in response to the changing coverage from the neighboring cell eNB_A.
  • the UE measurements may include measured uplink and/or downlink loads or bit rates.
  • the neighboring cell eNB_A can deduce other parameters such as the air interface delay and over-the-air packet loss for communications with the various users. Some of these UE measurements may be for users with guaranteed bit rate (GBR) services and other UE measurements may be collected for users with non- GBR services and/or best effort services.
  • GBR guaranteed bit rate
  • Triggers may then be sent to one or more of the algorithms operating on the neighbor cell eNB_A so that these algorithms can be operated and'or configured consistently with the outage compensation.
  • triggers are sent (at 415, 420, 425) to at least three different algorithms operating on the neighboring cell concurrently with the actions that the neighboring cell is taking to compensate for the nearby cell outage.
  • the algorithms implemented by the neighboring cell in the illustrated embodiment include a physical cell identifier algorithm, a call admission control algorithm, and a load balancing algorithm that can perform inter-carrier and/or inter- RAT load balancing.
  • Instructions and/or thresholds may be downloaded or executed in response to receiving the triggers (at 415, 420, 425).
  • two different sets of thresholds may be downloaded from the OAM based on the information obtained from the incoming UE measurements. For example, one set of thresholds can be downloaded if the QoE of existing GBR users are being met.
  • a different set of thresholds can be downloaded if the QoE of existing GBR users are not met.
  • the QoE metrics considered may include measured uplink and/or downlink bit rates, estimated air interface delay, packet losses, or combinations thereof.
  • the algorithms may use the new threshold values to configure and/or carry out predetermined actions in an attempt to meet the QoE of existing users while maximizing the number of users being served.
  • one of the triggers is sent (at 415) to the physical cell identifier algorithm.
  • Changing the antenna radiation pattern to compensate for the coverage hole caused by the sleeping cell may change the list of neighbors to the neighboring cell eNB_A and the list of each neighbor's neighbors.
  • the physical cell identiiier algorithm therefore executes (at 430) in response to the trigger and determines whether any physical cell identifiers need to be modified to ensure collision- free and confusion-free identifiers. Changes in one cell identifier may ripple throughout the system and so physical cell identifier algorithms on other cells may also need to be executed response to the coverage compensation procedure.
  • the physical cell identifier algorithm on the neighboring cell eNB_A may communicate and/or negotiate with similar functionality on other cells to allocate the appropriate physical cell identifiers to ensure collision-free and confusion-free identifiers are allocated throughout the system.
  • a trigger may also be sent (at 420) to the call admission control algorithm, in the illustrated embodiment, the call admission control algorithm can then be reconfigured to admit or deny new users based upon a new set of thresholds.
  • the call admission control algorithm may either allow only certain new GBR users (such as non-voice users) or to deny any new GBR users depending on whether the QoE of existing GBR users are being met.
  • the trigger sent to the call admission control module may serve as an indication to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider or account for failure scenarios in other cells, such as the sleeping cell e B B.
  • the new triggers may be different from existing triggers because the new triggers are selected to account for changes that are likely to occur in response to failure of the sleeping cell eNB_B and the resulting compensation performed by the neighbor cell eNB_A. For example, even though the QoE of existing users are currently being met by the neighbor cell, the failure event that happened on the sleeping cell may trigger compensation that can degrade the QoE of the existing users.
  • the call admission control algorithm on eNB A requests (at 435) the appropriate thresholds from the OAM server and then modifies (at 435) its internal thresholds.
  • the neighbor cell may have a predetermined set of thresholds stored internally and the neighbor cell may modify (at 435) the thresholds that it is using to control call admission by switching between the different sets of internally stored thresholds. These thresholds may have been previously downloaded from the OAM server. In one embodiment, the thresholds may be selected so that once they take effect the call admission control module only admits Best Effort users and in some cases certain non-voice GBR users, since admitting GBR users could result in the possibility that the QoE of new or existing users may not be met.
  • the trigger received (at 420) by the call admission control module may indicate that new thresholds should be downloaded if the QoE of existing best effort users (e.g. , as indicated by measured values of bit rates, delay, packet loss) are not being met because their values fall below a threshold.
  • the trigger sent (at 420) to the Call Admission Control module may indicate to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider failure scenarios in other cells. This trigger may indicate that the QoE of existing users are not being met because of the failure event that happened on the sleeping cell, which caused the neighbor cell eNB_A to compensate.
  • the call admission control algorithm on the neighbor cell eNB_A can request the appropriate thresholds, which may be determined or selected based on the UE measurement reports coming in to the neighbor cell.
  • the call admission control algorithm may then modify (at 435) its internal thresholds.
  • the new thresholds may be selected so that the call admission control module does not admit any new GBR users and only admits Best Effort users, since admitting GBR users may result in their QoEs not being met.
  • the sleeping cell eNB_B may return to normal operation, perhaps because the cell has been repaired, replaced, or reconfigured so that it can operate normally.
  • the neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled.
  • the neighbor cell eNB_A may then resume (at 440) normal operation. For example, the neighbor cell eNB_A may tilt its antenna back to the original configuration.
  • the neighbor cell eNB_A may also trigger the call admission control algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the call admission control algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
  • Another trigger may be sent (at 425) to the load balancing algorithm.
  • a trigger may be sent (at 425) to a load balancing algorithm that can perform intra-c airier, inter-carrier, and/or inter-RAT load balancing algorithms.
  • the type of load balancing performed by the algorithm may depend on whether the sleeping cell condition is detected on one carrier only, on multiple carriers, or on the entire cell including all carriers and RATs.
  • the trigger tells the load balancing algorithm that new traffic is expected as a consequence of the compensation for the detected sleeping cell.
  • the load balancing algorithm may then modify (at 445) one or more internal thresholds so that traffic is preferentially load balanced away from carriers or RATs that are expected to receive new traffic.
  • the intra- carrier LTE load balancing algorithm is notified so that it can load balance GBR traffic away from the cell eNB_A that is compensating for the failure.
  • the load balancing algorithm may also be instructed to deny any requested new GBR traffic onto the neighbor cell eNB_A.
  • GBR users on other eNBs may not be load balanced to eNB A because eNB A is serving nearby sleeping cell eNB_B, which is in outage.
  • the sleeping cell condition may only be detected on a specific earner and/or RAT.
  • the trigger may therefore instruct the inter-carrier and/or inter-RAT load balancing algorithm to load balance GBR traffic away from the carrier and/or RAT on which sleeping cell condition is detected.
  • the trigger may also instruct the load balancing algorithm to deny requested new GBR traffic for the carrier and/or RAT.
  • internal thresholds in the inter-carrier RAT load balancing algorithms may be modified (at 445) so that the load balancing algorithms perform the indicated load balancing operations.
  • various thresholds may be modified (at 445) so that the load balancing algorithm shifts existing GBR users on eNB_A to other carriers and/or to other RATs, perhaps on other cells.
  • the target carriers and/or RATs for the load balancing operation may be selected so that the QoE of the load balanced user equipment has a higher likelihood of being met.
  • the type and level of load balancing may depend on the severity of the QoE degradation experienced by the user equipment. In one embodiment, higher levels of QoE degradation result in more GBR users being load balanced to other carriers and/or RATs. Lower levels of QoE degradation may result in fewer ⁇ e.g., only voice) GBR users being load balanced away from the eNB A. If sleeping cell eNB_B returns to normal operation, the neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled.
  • the neighbor cell eNB_A may then resume (at 450) normal operation. Tor example, the neighbor cell eNB_A may begin to tilt its antenna back to the original configuration.
  • the neighbor cell eNB_A may also trigger the load balancing algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the load balancing algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
  • Embodiments of the techniques described herein may have a number of advantages over conventional practice. For example, providing triggers to other algorithms in response to detecting a sleeping cell condition may allow the base station that compensates for the sleeping cell to maintain the QoE of the GBR users that are already being served by the base station that is compensating for one or more sleeping cells. Coordination of the different cell identifier and/or resource allocation algorithms may result in better QoE for all users and/or better optimization of resources to ensure that the QoE requirements of the users are being met with minimal resources. Furthermore, existing sleeping cell compensation techniques do not consider the impact of execution of the compensation algorithm on the other algorithms that are also in operation on the same base station. As a result, unexpected interactions may occur and lower the QoE of the users served on those base stations. Embodiments of the techniques described herein consider an account for these interactions so that any degradation in the QoE of the users may be reduced or avoided. Consequently, embodiments of the techniques described herein support a higher and more consistent level of QoE and improve performance for users.
  • these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated, it has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
  • the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium.
  • the program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access.
  • the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a method of coordinating access nodes when a sleeping cell is detected. The method may include modifying a coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node. The access node implements resource allocation algorithms and a cell identification algorithm. The method may also include instructing the resource allocation algorithms and/or the cell identification algorithm to perform a predetermined action concurrently with the modification.

Description

METHOD OF COORDINATING FAULT DETECTION RESPONSES BY ACCESS NODES
OF A NETWORK
BACKGROUND
This invention relates generally to communication systems, and, more particularly, to wireless communication systems.
Wireless communication systems use a network of access nodes to provide wireless connectivity to associated geographical areas that are typically referred to as cells or sectors. The access nodes in relatively advanced systems such as systems that implement the Long Term Evolution
(LTE) standards and/or protocols are referred to as evolved node Bs (eNodeBs). However, the access nodes used in wireless communication systems may also be referred to using terms including base stations, base station routers, macrocells, access points, femtocells, pico-cells, and the like. Users access the wireless communication system using access terminals that communicate with one or more of the access nodes over an air interface. The access terminals may be mobile devices such as mobile phones, smart phones, notepad computers, network computers, and the like. The access terminals may also include comparatively immobile or fixed devices such as desktop computers, wireless interface cards or radios installed in other devices, and the like.
The access nodes may be configured as elements of a self-organizing network (SON). For example, eNodeBs in a wireless communication system that operates according to LTE may be self- organizing nodes of the network. Self-organizing eNodeBs should be capable of self-configuration, self-optimization, and self-healing. Self-configuration is executed automatically after the eNodeB is deployed and includes allocating an IP address to the eNodeB, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server, establishing links over interfaces between the eNodeB and other eNodeBs in the self-organizing network, and the like. Self- optimization includes optimizing the configuration of the eNodeB based upon the location of the eNodeB and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the eNodeB to mitigate some detected faults by automatically triggering appropriate recovery actions.
One example of self-healing occurs when one or more access nodes in the network detect a sleeping cell. For example, in LTE, a sleeping cell is defined as an eNodeB that is no longer functioning and yet has not triggered an alarm at a corresponding OAM server. Sleeping cell conditions can be detected on a single earner, on a subset of earners, or for the entire cell. The neighboring access nodes can then take predetermined actions to compensate for the potential loss of coverage resulting from the detected sleeping cell. For example, the LTE standards and/or protocols define a cell outage detection and compensation (COC) procedure that allows eNodeBs to tilt one or more antennas to provide additional wireless coverage in the geographical area served by the sleeping cell. However, the sleeping cell compensation algorithms are defined in isolation of other algorithms that are being performed by the neighboring access nodes concurrently with the sleeping cell compensation algorithm.
SUMMARY OF EMBODIMENTS
The disclosed subject matter is directed to addressing the effects of one or more of the problems set forth above. The following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the disclosed subject matter. This summary is not an exhaustive overview of the disclosed subject matter. It is not intended to identify key or critical elements of the disclosed subject matter or to delineate the scope of the disclosed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
In one embodiment, a method is provided for coordinating access nodes when a sleeping cell is detected. The method may include modifying a coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node. The access node implements resource allocation algorithms and a cell identification algorithm. The method may also include instructing the resource allocation algorithms and/or the cell identification algorithm to perform a predetermined action concurrently with the modification. BRIEF DESCRIPTION OF THE DRAWINGS
The disclosed subject matter may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements, and in which:
Figure 1 conceptually illustrates a first exemplary embodiment of a wireless communication system;
Figure 2 conceptually illustrates a second exemplary embodiment of a wireless communication system:
Figure 3 conceptually illustrates a third exemplary embodiment of a wireless communication system; and
Figure 4 conceptually illustrates one exemplary embodiment of a method of coordinating access nodes when a sleeping cell is detected in a wireless communication network.
While the disclosed subject matter is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the description herein of specific embodiments is not intended to limit the disclosed subject matter to the particular forms disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the appended claims.
DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS
Illustrative embodiments are described below. In the interest of clarity, not all features of an actual implementation are described in this specification. It will of course be appreciated that in the development of any such actual embodiment, numerous implementation-specific decisions should be made to achieve the developers' specific goals, such as compliance with system-related and business- related constraints, which will vary from one implementation to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine undertaking for those of ordinary skill in the art having the benefit of this disclosure.
The disclosed subject matter will now be described with reference to the attached figures. Various structures, systems and devices are schematically depicted in the drawings for purposes of explanation only and so as to not obscure the description with details that are well known to those skilled in the art. Nevertheless, the attached drawings are included to describe and explain illustrative examples of the disclosed subject matter. The words and phrases used herein should be understood and interpreted to have a meaning consistent with the understanding of those words and phrases by those skilled in the relevant art. No special definition of a term or phrase, i.e., a definition that is different from the ordinary and customary meaning as understood by those skilled in the art, is intended to be implied by consistent usage of the term or phrase herein. To the extent that a term or phrase is intended to have a special meaning, i.e... a meaning other than that understood by skilled artisans, such a special definition will be expressly set forth in the specification in a definitional manner that directly and unequivocally provides the special definition for the term or phrase.
Generally, the present application describes embodiments of techniques for coordinating actions and/or responses of access nodes in a network when a sleeping cell is detected in the network. When an access node detects a sleeping cell, either by performing measurements or being informed by the network, the access node can compensate for the loss of coverage caused by the sleeping cell, e.g., by tilting one or more antennas to provide additional coverage in the area served by the sleeping cell. However, the corrective actions are taken independently of other functions and/or algorithms that may be affected by the changing antenna radiation pattern. Tor example, shifting the antenna to improve coverage in areas served by the sleeping cell can degrade the quality of experience (QoE) for existing users being served by the access node, thereby decreasing their quality of experience. For another example, tilting the antenna may change the access nodes that are neighbors (or neighbor's neighbors) of the compensating access node. Shifting the antenna radiation pattern to compensate for lost sleeping cell coverage may therefore impact the algorithms that allocate physical cell identifiers to the access nodes and other resource allocation algorithms such as the call admission control algorithm and the load balancing algorithm. At least in part to address these drawbacks in the conventional practice, the present application describes embodiments of access nodes that generate notifications to other algorithms when an access node modifies its antenna radiation pattern to compensate for lost coverage resulting from a sleeping cell. For example, notifications can be transmitted to physical cell identifier algorithms and/or resource allocation algorithms so that the operation or configuration of these algorithms can be modified to maintain a quality of experience for users served by the access node prior to modification of the antenna radiation pattern. Examples of algorithms that can be modified include the physical cell ID algorithm (which may be modified by running the algorithm to verify or change the current allocation of physical cell identifiers), the call admission control algorithm (which may be modified to allow new users only if the quality of experience of existing users is being met), and load-balancing algorithms
(which may be modified to load balance traffic away from the access node in anticipation of new traffic from the coverage area of the sleeping cell).
Figure 1 conceptually illustrates a first exemplary embodiment of a wireless communication system 100. in the illustrated embodiment, the wireless communication system 100 supports wireless connectivity in a plurality of cells or sectors 105 that are served by a corresponding plurality of access nodes 1 10. Wireless connectivity may be provided according to the Long Term Evolution (LTE) of the standards and/or protocols defined by the Third Generation Partnership Project (3GPP). However, persons of ordinary skill in the art having benefit of the present disclosure should appreciate that embodiments of the techniques described herein may be used in networks that operate according to other standards and/or protocols. For example, embodiments of these techniques may be used in second-generation (2G) and/or third generation (3G) networks that operate according to the corresponding standards and/or protocols.
In the illustrated embodiment, the access nodes 1 10 form a self-organizing network (SON) that operates according to LTE. The access nodes 1 10 may therefore be configured to self-configure, self-optimize and self-heal. Self-configuration is executed automatically after the access node 100 is deployed and includes allocating an IP address to the access node 100, authenticating and/or downloading configuration software from an operations and maintenance (OAM) server 1 12, establishing links over interfaces between each access node 100 and other access nodes 100 in the self- organizing network, and the like. Self-optimization includes optimizing the configuration of the access node 100 based upon the location of the access node 100 and measurements of the actual air interface conditions and/or channel qualities. Self-healing allows the access node 100 to mitigate some detected faults by automatically triggering appropriate recovery actions.
Access nodes 110 in the illustrated embodiment of the wireless communication system 100 are electronically and/or communicatively connected to one or more serving gateways (SGWs) 1 15 that route and forward user data packets. The serving gateways 115 may also act as the mobility anchor for the user plane during handovers and may be the anchor for mobility between LTE and other 3GPP technologies. Serving gateways may be electronically and'or communicatively coupled to one or more public data network (PDN) gateways (PGWs) 120 that provide connectivity to external packet data networks. The PGW 120 may perform policy enforcement, packet filtering for different users, charging support, and the like. For example, the PGW 120 may implement rules or policies provided by a policy and charging rules function (PCRF) 125, which may be electronically and/or communicatively coupled to one or more operators 130 for providing IP services. In the illustrated embodiment, the PGW 120 may also be electronically and/or communicatively coupled to the operator
130.
The SGWT 1 15 may also be electronically and/or communicatively coupled to a mobility management entity (MME) 1 5. In the illustrated embodiment, the MME 135 is a control-node for the LTE access network and the MME 135 is responsible for idle mode user equipment (UE) tracking and paging procedure including retransmissions. The MME 135 may also support bearer activation/deactivation processes and may be responsible for choosing the SGW 1 15 for a UE at the initial attach and at time of intra-LTE handover. Non Access Stratum (NAS) signaling terminates at the MME 135 and the MME 135 may be responsible for generation and allocation of temporary identities to UEs. The MME 135 may also be responsible for other authorization, authentication, and mobility functions. In the illustrated embodiment, the MME 135 can authenticate the user by interacting with a home subscriber server (HSS) 140. In the illustrated embodiment, the HSS 140 is a central database that contains user-related and subscription-related information. The functions of the HSS 140 may include functionalities such as mobility management, call and session establishment support, user authentication, and access authorization.
One or more of the access nodes 1 10 may be identified as a sleeping cell when the access node
110 is no longer functioning but no alarm has been sent to or received by the OAM server 112. Depending on the circumstances, the sleeping cell condition may be detected on one carrier, on a subset of carriers, on a particular radio access technology (RAT), or on the entire cell 105. In the illustrated embodiment, the wireless communication system 100 implements an LTE Cell Outage Detection and Compensation (COC) procedure that allows neighboring access nodes 1 10 to detect a sleeping cell and compensate for the resulting loss of coverage, e.g., by adjusting the tilt of one or more antennas to modify the antenna radiation pattern and provide coverage to a portion of the coverage area of the sleeping cell 105. The illustrated embodiment of the wireless communication system 100 also supports an interaction mechanism between the CoC algorithm and other algorithms that may operate concurrently with the modifications triggered by detection of the sleeping cell. Exemplary algorithms that may be operating concurrently with the modifications include algorithms for allocating physical cell identifiers to the access nodes 1 10 and resource allocation algorithms such as call admission control algorithms, load-balancing algorithms, and the like. The wireless communication system 100 may therefore define one or more actions to be taken by the other algorithms in response to detecting a sleeping cell, e.g., actions that can be taken to maintain the QoE of existing users and'or increase the number of users with a required QoE.
Figure 2 conceptually illustrates a second exemplary embodiment of a wireless communication system 200. The illustrated embodiment of the wireless communication system 200 includes a network of access nodes 205 that provide wireless connectivity within a corresponding network of cells 210. In the interest of clarity, the cells 210 are depicted as perfect non-overlapping hexagons. However, persons of ordinary skill in the art should appreciate that actual cells 210 may have irregular and time -varying shapes that may overlap in part or entirely with other cells 210. The cell 210(1) is a sleeping cell, as indicated by the dashed lines of the hexagon. One or more of the other cells 210(2-4) may therefore adjust their coverage patterns to compensate for the lost coverage, or hole in the coverage area, that results from the sleeping cell. However, modifying the coverage area, e.g., by modifying an antenna tilt to provide coverage in the sleeping cell 210(1), could degrade the QoE of existing users such as users that are being served by the cells 210(2-4). The degradation may be particularly acute if there are a large number of guaranteed bit rate (GBR) users being served by the compensating cells 210(2-4). Exemplary GBR services include voice calls, video conferencing, realtime gaming, and the like. Continuing to admit new users to the compensating cells 210(2-4) may further degrade the QoE of the existing users. Failing to account for interactions between the cell compensation algorithm and other SON mechanisms (such as allocating cell identifiers, call admission control, and load-balancing) could lead to poor QoE for users who should not be affected by events happening on other access nodes. Ignoring these potential interactions may also result in less-than- optimal use of network resources.
Figure 3 conceptually illustrates a third exemplary embodiment of a wireless communication system 300. In the illustrated embodiment, the wireless communication system 300 includes an access node 305 that provides wireless connectivity using one or more antennas 10. The access node 305 also implements functionality including an outage detection algorithm 315, a physical cell identifier algorithm 320, a call admission control algorithm 325, and a load-balancing algorithm 330. The outage detection algorithm 315 is configured to detect sleeping cells by monitoring and comparing statistics for events such as handovers during a selected period of time. Alternatively, the outage detection algorithm 315 may receive information indicating outages of one or more cells from the network.
Outages can be detected on a single earner, a subset of carriers, a particular RAT, or for the entire sleeping cell. The physical cell identifier algorithm 320 is configured to negotiate with other access nodes to allocate identifiers so that the identifiers are collision-free (e.g. , neighboring access nodes do not have the same identifier) and confusion- free (e.g., a neighbor's neighbor of an access node does not have the same identifier). The call admission control algoritlmi 325 is configured to determine whether to admit requested calls or call sessions, e.g., based on the current loading of one or more carriers, sectors, and<'or cells. The load-balancing algoritlmi 330 is configured to shift calls or call sessions between different carriers, sectors, and/or cells to redistribute or balance the load over the carriers, sectors, and/or cells.
The access node 305 is initially providing wireless connectivity to mobile nodes or other user equipment or access terminals 335 that fall within a coverage area defined by the radiation pattern 340 of the antenna 310. In the illustrated embodiment, the outage detection algorithm 315 determines that a neighboring cell 345 is a sleeping cell. The cell 345 may have been providing wireless connectivity to one or more mobile units 350. Alternatively, the mobile units 350 may not have an active session with the cell 345 but may be located in the geographical area previously served by the sleeping cell 345 and may later attempt to access the wireless communication system 300. The access node 305 may decide to compensate for the sleeping cell 345 by modifying its antenna tilt to provide coverage over at least a portion of the coverage hole created by the sleeping cell 345. Modifying the antenna tilt may modify the antenna radiation pattern 340 to generate a different antenna radiation pattern 355. Although Figure
3 shows a single access node 3 10 compensating for the lost coverage, in alternative embodiments more than one neighboring cell may decide to modify its antenna tilt to compensate for the lost coverage of the sleeping cell 345.
The outage detection algorithm 315 may notify other algorithms that are concurrently operating in the access node 305 when the outage detection algorithm 315 detects the sleeping cell 345.
The notifications make the other algorithms aware of the failure conditions in the sleeping cell 345 so that these algorithms can take appropriate action to mitigate the QoE impact on existing users such as the access terminals 335. The QoE of the users may be indicated by measured uplink bit rates, downlink bit rates, estimated air interface delays, packet loss, and the like. In various alternative embodiments, notiiications and the corresponding actions taken by the algorithms may occur in each of the neighboring cells that detect the sleeping cell 345 and decide to compensate for the lost coverage. The notifications may include triggers that are sent to algorithms operating on the cell 305 that is compensating for the nearby cell outage. In one embodiment, these algorithms include the Physical Cell-ID algorithm 320, the call admission control algorithm 325, and the load-balancing algorithm 330, which may implement intra-carrier, inter-carrier and/or inter-radio access technology (RAT) load balancing algorithms.
In one embodiment, the triggers may instruct one or more algorithms to utilize different sets of thresholds. For example, the algorithms may download different sets of thresholds from a network source such as the OAM server depending on information obtained from incoming UE measurements of various QoE parameters. If the measurements indicate that the QoE of existing GBR users are being met, then one set of thresholds can be downloaded and used to configure the corresponding algorithm. However, if the measurements indicate that the QoE of existing GBR users are not being met as the compensation is being performed, then a different set of thresholds are downloaded and used to configure the corresponding algorithm. Persons of ordinary skill in the art should appreciate that the access node 305 may use individual measurements or statistical combinations of measurements to determine whether the QoE requirements are being met within specified tolerances.
The algorithms may then take the predetermined actions based on the new threshold values to meet the QoE of existing users while also attempting to maximize the number of users being served. For example, the PCID algorithm 320 may execute itself to ensure collision free and confusion free PCIs have been allocated. In some cases this may result in new identifiers being assigned to one or more access nodes including the access node 305, its neighbors, and/or its neighbor's neighbors. The call admission control algorithm 325 may implement a first threshold that allows only certain new GBR users 350 (e.g., non-voice users) when the QoE requirements of existing GBR users 335 are being met. The algorithm 325 may also implement a second threshold that indicates that the algorithm 325 may not admit any new GBR users 350 when the QoE requirements of existing GBR users 335 are not being met. The load balancing algorithm 330 may be configured using a set of thresholds to indicate that GBR traffic should be load balanced away from the carrier, subset of carriers, cell, and/or RATs that are compensating for the failure of the sleeping cell 345. The new thresholds may also indicate that new GBR traffic onto should not be allowed onto the compensating carrier, cell, or RAT. The type and the level of load balancing may depend on whether the sleeping cell condition is detected only on one carrier or RAT, or on all the carriers/RATs of the cell 345.
The predetermined actions of the algorithms supported by the access node 305 are selected to attempt to reduce the effects of the compensation on the QoE of the users 335 on the cell 305. in one embodiment, more than one cell may compensate for the sleeping cell 345 and in that case the predetermined actions can be executed on each of the compensating cells. The neighboring cells may also coordinate their actions. For example, the neighboring cells may participate in the physical cell allocation process so that collision-free and confusion-free identifiers are assigned to the cells. In one embodiment, the outage detection, compensation, notification, and predetermined actions may take place concurrently and/or substantially continuously. For example, the access node 305 may slowly tilt its antenna 310 to compensate for the detected sleeping ceil 345, e.g. , over a period of up to a few seconds. Notifications may therefore be sent at predetermined intervals or substantially continuously during the tilting process, e.g. , every tenth or hundredth of a second, and the algorithms may modify their configuration/operation in response to each notification. This process may continue until a convergence criterion is met. For example, the process may continue until the antenna tilt has finished, collision-free and confusion-free identifiers have been allocated, call admission control according to the new thresholds has reached a relatively steady state, and the load-balancing algorithm has finished balancing the new and existing loads according to the new thresholds. Embodiments of these techniques may therefore reduce the impact of CoC on existing GBR users and provide tight coordination between Cell Outage Compensation and other mechanisms operating on the access node 305.
Figure 4 conceptually illustrates one exemplary embodiment of a method 400 of coordinating access nodes when a sleeping cell is detected in a wireless communication network. In the illustrated embodiment, a cell outage is detected (at 405) by one or more cells in the wireless communication network. For example, a cell (eNB_A) may detect that a nearby cell (eNB_B) has gone into outage on a specific carrier, subset of earners, radio access technology, or combination thereof. Neighboring cells such as eNB_A can detect (at 405) a sleeping cell through the comparison of statistics of certain events, like handovers over a period of time. The neighboring cell eNB_A decides (at 410) to compensate for the sleeping cell through modification of its antenna tilt to provide coverage over the coverage hole detected for the sleeping cell eNB_B. In one embodiment, the level of tilt may be determined or gauged using UE measurement feedback such as measurements of radio link failures (RLFs). The neighboring cell eNB_A may then tilt its antenna until the measured values of the RLFs are less than a threshold value. For example, in embodiments of the wireless communication system that implement 3G and 4G base stations, the choice of antenna tilt is a tradeoff between providing adequate coverage while meeting the capacity and QoE requirements of individual UEs within the cell for the various carriers, e.g. , as indicated by a packet delay budget and/or a measured packet loss error rate.
As the neighboring cell eNB_A performs the compensation process by tilting its antenna, the cell eNB_A may start receiving measurement values for the various users concurrently with the changing coverage caused by the compensation. The users may include users previously being served by the neighboring cell eNB_A and new users that request access in response to the changing coverage from the neighboring cell eNB_A. In various embodiments, the UE measurements may include measured uplink and/or downlink loads or bit rates. In one embodiment, the neighboring cell eNB_A can deduce other parameters such as the air interface delay and over-the-air packet loss for communications with the various users. Some of these UE measurements may be for users with guaranteed bit rate (GBR) services and other UE measurements may be collected for users with non- GBR services and/or best effort services.
Triggers may then be sent to one or more of the algorithms operating on the neighbor cell eNB_A so that these algorithms can be operated and'or configured consistently with the outage compensation. In the illustrated embodiment, triggers are sent (at 415, 420, 425) to at least three different algorithms operating on the neighboring cell concurrently with the actions that the neighboring cell is taking to compensate for the nearby cell outage. The algorithms implemented by the neighboring cell in the illustrated embodiment include a physical cell identifier algorithm, a call admission control algorithm, and a load balancing algorithm that can perform inter-carrier and/or inter- RAT load balancing. Instructions and/or thresholds may be downloaded or executed in response to receiving the triggers (at 415, 420, 425). In one embodiment, two different sets of thresholds may be downloaded from the OAM based on the information obtained from the incoming UE measurements. For example, one set of thresholds can be downloaded if the QoE of existing GBR users are being met.
A different set of thresholds can be downloaded if the QoE of existing GBR users are not met. The QoE metrics considered may include measured uplink and/or downlink bit rates, estimated air interface delay, packet losses, or combinations thereof. The algorithms may use the new threshold values to configure and/or carry out predetermined actions in an attempt to meet the QoE of existing users while maximizing the number of users being served.
In the illustrated embodiment, one of the triggers is sent (at 415) to the physical cell identifier algorithm. Changing the antenna radiation pattern to compensate for the coverage hole caused by the sleeping cell may change the list of neighbors to the neighboring cell eNB_A and the list of each neighbor's neighbors. The physical cell identiiier algorithm therefore executes (at 430) in response to the trigger and determines whether any physical cell identifiers need to be modified to ensure collision- free and confusion-free identifiers. Changes in one cell identifier may ripple throughout the system and so physical cell identifier algorithms on other cells may also need to be executed response to the coverage compensation procedure. For example, the physical cell identifier algorithm on the neighboring cell eNB_A may communicate and/or negotiate with similar functionality on other cells to allocate the appropriate physical cell identifiers to ensure collision-free and confusion-free identifiers are allocated throughout the system.
A trigger may also be sent (at 420) to the call admission control algorithm, in the illustrated embodiment, the call admission control algorithm can then be reconfigured to admit or deny new users based upon a new set of thresholds. For example, the call admission control algorithm may either allow only certain new GBR users (such as non-voice users) or to deny any new GBR users depending on whether the QoE of existing GBR users are being met. In one embodiment, if the QoE of existing GBR users are being met, the trigger sent to the call admission control module may serve as an indication to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider or account for failure scenarios in other cells, such as the sleeping cell e B B. The new triggers may be different from existing triggers because the new triggers are selected to account for changes that are likely to occur in response to failure of the sleeping cell eNB_B and the resulting compensation performed by the neighbor cell eNB_A. For example, even though the QoE of existing users are currently being met by the neighbor cell, the failure event that happened on the sleeping cell may trigger compensation that can degrade the QoE of the existing users. After receiving (at 420) this trigger, the call admission control algorithm on eNB A requests (at 435) the appropriate thresholds from the OAM server and then modifies (at 435) its internal thresholds. Alternatively, the neighbor cell may have a predetermined set of thresholds stored internally and the neighbor cell may modify (at 435) the thresholds that it is using to control call admission by switching between the different sets of internally stored thresholds. These thresholds may have been previously downloaded from the OAM server. In one embodiment, the thresholds may be selected so that once they take effect the call admission control module only admits Best Effort users and in some cases certain non-voice GBR users, since admitting GBR users could result in the possibility that the QoE of new or existing users may not be met.
In one embodiment, the trigger received (at 420) by the call admission control module may indicate that new thresholds should be downloaded if the QoE of existing best effort users (e.g. , as indicated by measured values of bit rates, delay, packet loss) are not being met because their values fall below a threshold. For example, the trigger sent (at 420) to the Call Admission Control module may indicate to the neighbor cell eNB_A that the current tlireshold values should be replaced with predetermined values that consider failure scenarios in other cells. This trigger may indicate that the QoE of existing users are not being met because of the failure event that happened on the sleeping cell, which caused the neighbor cell eNB_A to compensate. After receiving this trigger, the call admission control algorithm on the neighbor cell eNB_A can request the appropriate thresholds, which may be determined or selected based on the UE measurement reports coming in to the neighbor cell. The call admission control algorithm may then modify (at 435) its internal thresholds. In one embodiment, the new thresholds may be selected so that the call admission control module does not admit any new GBR users and only admits Best Effort users, since admitting GBR users may result in their QoEs not being met. In some cases, the sleeping cell eNB_B may return to normal operation, perhaps because the cell has been repaired, replaced, or reconfigured so that it can operate normally. The neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled. The neighbor cell eNB_A may then resume (at 440) normal operation. For example, the neighbor cell eNB_A may tilt its antenna back to the original configuration. The neighbor cell eNB_A may also trigger the call admission control algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the call admission control algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
Another trigger may be sent (at 425) to the load balancing algorithm. For example, a trigger may be sent (at 425) to a load balancing algorithm that can perform intra-c airier, inter-carrier, and/or inter-RAT load balancing algorithms. The type of load balancing performed by the algorithm may depend on whether the sleeping cell condition is detected on one carrier only, on multiple carriers, or on the entire cell including all carriers and RATs. In one embodiment, the trigger tells the load balancing algorithm that new traffic is expected as a consequence of the compensation for the detected sleeping cell. The load balancing algorithm may then modify (at 445) one or more internal thresholds so that traffic is preferentially load balanced away from carriers or RATs that are expected to receive new traffic. For example, if the sleeping cell condition is detected on all carriers and RATs, the intra- carrier LTE load balancing algorithm is notified so that it can load balance GBR traffic away from the cell eNB_A that is compensating for the failure. The load balancing algorithm may also be instructed to deny any requested new GBR traffic onto the neighbor cell eNB_A. Furthermore, in some cases GBR users on other eNBs may not be load balanced to eNB A because eNB A is serving nearby sleeping cell eNB_B, which is in outage.
In some cases, the sleeping cell condition may only be detected on a specific earner and/or RAT. The trigger may therefore instruct the inter-carrier and/or inter-RAT load balancing algorithm to load balance GBR traffic away from the carrier and/or RAT on which sleeping cell condition is detected. The trigger may also instruct the load balancing algorithm to deny requested new GBR traffic for the carrier and/or RAT. Accordingly, internal thresholds in the inter-carrier RAT load balancing algorithms may be modified (at 445) so that the load balancing algorithms perform the indicated load balancing operations. For example, various thresholds may be modified (at 445) so that the load balancing algorithm shifts existing GBR users on eNB_A to other carriers and/or to other RATs, perhaps on other cells. The target carriers and/or RATs for the load balancing operation may be selected so that the QoE of the load balanced user equipment has a higher likelihood of being met. The type and level of load balancing may depend on the severity of the QoE degradation experienced by the user equipment. In one embodiment, higher levels of QoE degradation result in more GBR users being load balanced to other carriers and/or RATs. Lower levels of QoE degradation may result in fewer {e.g., only voice) GBR users being load balanced away from the eNB A. If sleeping cell eNB_B returns to normal operation, the neighbor cells may then detect the presence of the reactivated cell eNB_B and determine that the coverage hole has now been filled. The neighbor cell eNB_A may then resume (at 450) normal operation. Tor example, the neighbor cell eNB_A may begin to tilt its antenna back to the original configuration. The neighbor cell eNB_A may also trigger the load balancing algorithm to reconfigure itself for normal operation, e.g., by downloading the appropriate thresholds. Reconfiguration of the load balancing algorithm may proceed iteratively and/or concurrently with the changing radiation pattern that results when the neighbor cell eNB_A resumes (at 440) normal operation.
Embodiments of the techniques described herein may have a number of advantages over conventional practice. For example, providing triggers to other algorithms in response to detecting a sleeping cell condition may allow the base station that compensates for the sleeping cell to maintain the QoE of the GBR users that are already being served by the base station that is compensating for one or more sleeping cells. Coordination of the different cell identifier and/or resource allocation algorithms may result in better QoE for all users and/or better optimization of resources to ensure that the QoE requirements of the users are being met with minimal resources. Furthermore, existing sleeping cell compensation techniques do not consider the impact of execution of the compensation algorithm on the other algorithms that are also in operation on the same base station. As a result, unexpected interactions may occur and lower the QoE of the users served on those base stations. Embodiments of the techniques described herein consider an account for these interactions so that any degradation in the QoE of the users may be reduced or avoided. Consequently, embodiments of the techniques described herein support a higher and more consistent level of QoE and improve performance for users.
Portions of the disclosed subject matter and corresponding detailed description are presented in terms of software, or algorithms and symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the ones by which those of ordinary skill in the art effectively convey the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it is used generally, is conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated, it has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, or as is apparent from the discussion, terms such as "processing" or "computing" or "calculating" or "determining" or "displaying" or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical, electronic quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Note also that the software implemented aspects of the disclosed subject matter are typically encoded on some form of program storage medium or implemented over some type of transmission medium. The program storage medium may be magnetic (e.g., a floppy disk or a hard drive) or optical (e.g., a compact disk read only memory, or "CD ROM"), and may be read only or random access. Similarly, the transmission medium may be twisted wire pairs, coaxial cable, optical fiber, or some other suitable transmission medium known to the art. The disclosed subject matter is not limited by these aspects of any given implementation.
The particular embodiments disclosed above are illustrative only, as the disclosed subject matter may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modiiied and all such variations are considered within the scope of the disclosed subject matter. Accordingly, the protection sought herein is as set forth in the claims below.

Claims

CLAIMS WHAT IS CLAIMED:
1. A method, comprising:
modifying at least one coverage area of an access node to compensate for lost coverage in a sleeping cell detected by the access node, wherein the access node implements resource allocation algorithms and a cell identification algorithm; and
instructing at least one of the resource allocation algorithms or the cell identification algorithm to perform a predetermined action concurrently with said modification.
2. The method of claim 1, wherein modifying said at least one coverage area comprises changing at least one tilt of at least one antenna used by the access node.
3. The method of claim 1 , wherein instructing said at least one of the resource algorithms or the cell identification algorithm comprises initiating a physical cell identifier algorithm to allocate collision-free and confusion-free physical cell identifiers to the access node and neighboring access nodes.
4. The method of claim 1 , comprising measuring at least one quality of experience (QoE) for at least one user being served by the access node concurrently with modifying said at least one coverage area, wherein measuring said at least one QoE comprises measuring at least one of an uplink bit rate, a downlink bit rate, an estimated air interface delay, or a packet loss rate for said at least one user.
5. The method of claim 4, wherein instructing said at least one of the resource allocation algorithms to perform the predetermined action comprises instructing a call admission control algoritlmi to admit new guaranteed bit rate users when said at least one QoE is being met for said at least one user and instructing the call admission control algorithm to deny new guaranteed bit rate users when said at least one QoE is not being met for said at least one user.
6. The method of claim 5, wherein instructing the call admission control algorithms to admit or deny new guaranteed bit rate users comprises reconfiguring the call admission control algorithm using a fust set of admission thresholds when said at least one QoE is being met for said at least one user and a second set of admission thresholds when said at least one QoE is not being met for said at least one user.
7. The method of claim 4, wherein instructing said at least one of the resource allocation algoritlmis to perform the predetermined action comprises instructing a load-balancing algoritlmi to load balance traffic away from the access node.
8. The method of claim 7, comprising detecting a sleeping cell condition on at least one carrier or radio access technology supported by the sleeping cell, and wherein instructing the load-balancing algoritlmi to load balance traffic away from the access node comprises instructing the load-balancing algoritlmi to load balance traffic away from said at least one carrier or radio access teclmology that is experiencing the sleeping cell condition.
9. The method of claim 1 , wherein the access node concurrently modifies said at least one coverage area and instructs said at least one of the resource allocation algorithms or the cell identifier algorithm to perform the predetermined action substantially continuously until a convergence criterion is satisfied.
10. The method of claim 1, comprising:
determining that the sleeping cell has awakened;
modifying said at least one coverage area of the access node to account for resumed coverage in the previously sleeping cell; and
instructing said at least one of the resource allocation algorithms or the cell identification algorithm to perform a predetermined action concurrently with said modification, wherein the access node concurrently modifies said at least one coverage area and instructs said at least one of the resource allocation algorithms or the cell identifier algorithm to perform the predetermined action substantially continuously until a convergence criterion is satisfied.
PCT/US2012/041845 2011-06-20 2012-06-11 Method of coordinating fault detection responses by access nodes of a network WO2012177430A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
KR1020137033757A KR101561483B1 (en) 2011-06-20 2012-06-11 Method of coordinating fault detection responses by access nodes of a network
EP12727096.5A EP2721860B1 (en) 2011-06-20 2012-06-11 Method of coordinating fault detection responses by access nodes of a network
JP2014517012A JP5734514B2 (en) 2011-06-20 2012-06-11 Method for coordinating failure detection responses by network access nodes
CN201280030284.8A CN103621134B (en) 2011-06-20 2012-06-11 The method coordinated is responded to fault detect by the access node of network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/163,814 US9204315B2 (en) 2011-06-20 2011-06-20 Method of coordinating fault detection responses by access nodes of a network
US13/163,814 2011-06-20

Publications (1)

Publication Number Publication Date
WO2012177430A1 true WO2012177430A1 (en) 2012-12-27

Family

ID=46246328

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2012/041845 WO2012177430A1 (en) 2011-06-20 2012-06-11 Method of coordinating fault detection responses by access nodes of a network

Country Status (6)

Country Link
US (1) US9204315B2 (en)
EP (1) EP2721860B1 (en)
JP (1) JP5734514B2 (en)
KR (1) KR101561483B1 (en)
CN (1) CN103621134B (en)
WO (1) WO2012177430A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020038544A1 (en) * 2018-08-20 2020-02-27 Telefonaktiebolaget Lm Ericsson (Publ) Methods, apparatus and computer-readable mediums relating to detection of sleeping cells in a cellular network

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101855523B1 (en) 2011-10-06 2018-05-04 삼성전자주식회사 Method and device of generating feedback in a communication system
US8971302B2 (en) * 2011-12-06 2015-03-03 At&T Mobility Ii Llc Cluster-based derivation of antenna tilts in a wireless network
CN105517024B (en) * 2012-01-30 2019-08-13 华为技术有限公司 Self-organizing network coordination approach, device and system
WO2013191600A1 (en) * 2012-06-19 2013-12-27 Telefonaktiebolaget L M Ericsson (Publ) Methods and radio access node for determining a cell state
EP2871889B1 (en) * 2012-07-31 2019-09-11 Huawei Technologies Co., Ltd. Terminal selection method, network entity, and system based on self-organizing networks
US10142242B2 (en) 2012-08-30 2018-11-27 T-Mobile Usa, Inc. Network support node traffic reduction for self-organizing networks
US10506558B2 (en) 2012-08-30 2019-12-10 T-Mobile Usa, Inc. Performance-based optimization of QoS factors
US10499259B2 (en) 2012-08-30 2019-12-03 T-Mobile Usa, Inc. Special events module for self-organizing networks
US10506460B2 (en) 2012-08-30 2019-12-10 T-Mobile Usa, Inc. Self-organizing network mechanism for energy saving during an outage
US10243794B2 (en) 2012-08-30 2019-03-26 T-Mobile Usa, Inc. Open architecture for self-organizing networks
US10491282B2 (en) * 2012-12-17 2019-11-26 Ethertronics, Inc. Communication load balancing using distributed antenna beam steering techniques
US10276921B2 (en) 2013-09-06 2019-04-30 Centurylink Intellectual Property Llc Radiating closures
CN104519475A (en) * 2013-09-30 2015-04-15 中兴通讯股份有限公司 Network element status information processing method and device, MME (mobility management entity) and HSS (home subscriber server)
CN105637925B (en) * 2013-10-16 2019-05-21 英派尔科技开发有限公司 Dynamic frequency and power resource allocation with refinement tactical management
US9491098B1 (en) * 2013-11-18 2016-11-08 Amazon Technologies, Inc. Transparent network multipath utilization through encapsulation
CN104754629B (en) * 2013-12-31 2020-01-07 中兴通讯股份有限公司 Method and device for realizing self-healing of base station equipment
IL234002A (en) * 2014-08-07 2016-06-30 Wireless Technologies Pte Ltd Cellwize Method of operating a self-organizing network and system thereof
WO2016048796A2 (en) 2014-09-25 2016-03-31 T-Mobile Usa, Inc. Self-organizing network mechanism for energy saving during an outage
WO2016068761A1 (en) * 2014-10-28 2016-05-06 Telefonaktiebolaget L M Ericsson (Publ) First network node, method therein, computer program and computer-readable medium comprising the computer program for detecting outage of a radio cell
US9509616B1 (en) 2014-11-24 2016-11-29 Amazon Technologies, Inc. Congestion sensitive path-balancing
US10038741B1 (en) 2014-11-24 2018-07-31 Amazon Technologies, Inc. Selective enabling of sequencing for encapsulated network traffic
CN104768164B (en) * 2015-04-08 2019-03-15 新华三技术有限公司 A kind of method and device of dynamic regulation wireless coverage
GB2539639A (en) * 2015-06-02 2016-12-28 Sparkl Ltd Interaction of devices in a networked environment
US10249103B2 (en) 2016-08-02 2019-04-02 Centurylink Intellectual Property Llc System and method for implementing added services for OBD2 smart vehicle connection
US10110272B2 (en) 2016-08-24 2018-10-23 Centurylink Intellectual Property Llc Wearable gesture control device and method
US9867112B1 (en) 2016-11-23 2018-01-09 Centurylink Intellectual Property Llc System and method for implementing combined broadband and wireless self-organizing network (SON)
US10222773B2 (en) 2016-12-23 2019-03-05 Centurylink Intellectual Property Llc System, apparatus, and method for implementing one or more internet of things (IoT) capable devices embedded within a roadway structure for performing various tasks
US10150471B2 (en) 2016-12-23 2018-12-11 Centurylink Intellectual Property Llc Smart vehicle apparatus, system, and method
US10193981B2 (en) 2016-12-23 2019-01-29 Centurylink Intellectual Property Llc Internet of things (IoT) self-organizing network
CN110944352B (en) * 2018-09-25 2022-11-01 维沃移动通信有限公司 Link failure detection method and terminal for sidelink
KR102634000B1 (en) 2019-01-15 2024-02-06 삼성전자 주식회사 A method and apparatus for analyzing performance degradation of a cell in a wireless communication system
US10945120B2 (en) * 2019-02-27 2021-03-09 Oracle International Corporation Methods, systems, and computer readable media for dynamically provisioning and using public land mobile network (PLMN) location mappings in service capability exposure function (SCEF) or network exposure function (NEF)
US10972368B2 (en) 2019-05-17 2021-04-06 Oracle International Corporation Methods, systems, and computer readable media for providing reduced signaling internet of things (IoT) device monitoring
CN111148142B (en) * 2019-12-31 2022-07-12 重庆大学 Dormant cell detection method based on anomaly detection and integrated learning
US11564130B2 (en) 2020-02-19 2023-01-24 Telefonaktiebolaget Lm Ericsson (Publ) Radio access technology aware cellular network inter-frequency coverage orchestrator
US11381955B2 (en) 2020-07-17 2022-07-05 Oracle International Corporation Methods, systems, and computer readable media for monitoring machine type communications (MTC) device related information
US11445421B2 (en) 2020-08-21 2022-09-13 Sprint Communications Company L.P. Load balancing wireless access node usage based on active users
WO2022183375A1 (en) * 2021-03-02 2022-09-09 Oppo广东移动通信有限公司 Wireless communication method, terminal device and network device
US11895080B2 (en) 2021-06-23 2024-02-06 Oracle International Corporation Methods, systems, and computer readable media for resolution of inter-network domain names
US12089069B1 (en) 2021-09-08 2024-09-10 T-Mobile Usa, Inc. Coverage improvement for 5G new radio wireless communication network to automatically adjust cell properties to improve coverage and capacity
US11800382B1 (en) 2021-09-08 2023-10-24 T-Mobile Usa, Inc. Coverage improvement for 5G new radio wireless communication network
US11606732B1 (en) 2021-09-08 2023-03-14 T-Mobile Usa, Inc. Coverage improvement for 5G new radio wireless communication network, such as for over-shooting cells
CN116112935A (en) * 2021-11-11 2023-05-12 中国移动通信集团设计院有限公司 Method, device and equipment for compensating coverage area of failure cell
WO2024068119A1 (en) * 2022-09-30 2024-04-04 British Telecommunications Public Limited Company Cellular telecommunications network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2154918A1 (en) * 2008-08-13 2010-02-17 Alcatel, Lucent Decentralised method of handling a cell outage in a radiocommunication network

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6496475B1 (en) * 1999-07-16 2002-12-17 Samsung Electronics Co., Ltd. System and method for selective recovery of a failed overhead channel in a wireless network
US20060063521A1 (en) * 2004-09-21 2006-03-23 Benjamin Cheung Method of monitoring wireless network performance
US7499700B2 (en) * 2004-12-10 2009-03-03 Motorola, Inc. Method and apparatus for mobile station management and system
US8369271B2 (en) * 2005-04-22 2013-02-05 Alcatel Lucent Method of configuring a cell of a wireless communication system for improved resource utilization
US8185726B2 (en) * 2006-04-27 2012-05-22 Qualcomm Incorporated Sleep optimization based on system information block scheduling
US7826820B2 (en) * 2006-09-08 2010-11-02 Telefonaktiebolaget Lm Ericsson (Publ) Non-homogenous telecommunications base stations
US7970585B2 (en) * 2007-06-29 2011-06-28 Hewlett-Packard Development Company, L.P. Method and system for remote monitoring and control of wireless cell-sites
FI122209B (en) * 2007-08-10 2011-10-14 7Signal Oy End-to-end quality of service monitoring system and system in radio network
CN101796864B (en) * 2007-09-05 2014-07-16 Lm爱立信电话有限公司 A method of monitoring cells in wireless communication systems
US8700028B2 (en) * 2008-03-14 2014-04-15 Motorola Solutions, Inc. Diagnostic management sessions in a communication network
US8498207B2 (en) * 2008-06-26 2013-07-30 Reverb Networks Dynamic load balancing
WO2010011084A2 (en) * 2008-07-23 2010-01-28 엘지전자 주식회사 Method for self-configuring a cellular infrastructure as desired, and a device therefor
US8682326B2 (en) * 2008-12-23 2014-03-25 Telefonaktiebolaget Lm Ericsson (Publ) Base station and method for vertical tilt antenna beam sweeping
US20100216453A1 (en) * 2009-02-20 2010-08-26 Telefonaktiebolaget Lm Ericsson Compensating for cell outage using priorities
US8095075B2 (en) * 2009-03-10 2012-01-10 Telefonaktiebolaget Lm Ericsson (Publ) System and method of detecting a sleeping cell and remedying detected conditions in a telecommunication network
US9538220B2 (en) * 2009-06-12 2017-01-03 Wi-Lan Labs, Inc. Video streaming quality of experience degradation control using a video quality metric
US8868725B2 (en) * 2009-06-12 2014-10-21 Kent State University Apparatus and methods for real-time multimedia network traffic management and control in wireless networks
US8750856B2 (en) * 2009-08-13 2014-06-10 Alcatel Lucent Distributed sleeping cell detection
US9826416B2 (en) * 2009-10-16 2017-11-21 Viavi Solutions, Inc. Self-optimizing wireless network
CN102056336B (en) * 2009-11-02 2013-01-09 华为技术有限公司 Method and device for cooperatively processing self-organizing operation, and communication system
TWM406324U (en) * 2009-11-19 2011-06-21 Interdigital Patent Holdings Wireless transmit/receive unit (WTRU)
US8385900B2 (en) * 2009-12-09 2013-02-26 Reverb Networks Self-optimizing networks for fixed wireless access
US8605684B2 (en) * 2010-01-08 2013-12-10 Blackberry Limited System and method for coordinated multi-point network operation to reduce radio link failure
US8694043B2 (en) * 2010-04-19 2014-04-08 Telefonaktiebolaget L M Ericsson (Publ) Interference-free neighbor cell measurements
US8768339B2 (en) * 2010-12-15 2014-07-01 At&T Intellectual Property I, L.P. Method and apparatus for providing long term evolution service outage and degradation management
US8509762B2 (en) * 2011-05-20 2013-08-13 ReVerb Networks, Inc. Methods and apparatus for underperforming cell detection and recovery in a wireless network
US8861494B2 (en) * 2011-06-03 2014-10-14 Alcatel Lucent Self-organizing communication networks

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2154918A1 (en) * 2008-08-13 2010-02-17 Alcatel, Lucent Decentralised method of handling a cell outage in a radiocommunication network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Self-Organizing Networks (SON) Policy Network Resource Model (NRM) Integration Reference Point (IRP); Information Service (IS) (Release 10)", 3GPP STANDARD; 3GPP TS 32.522, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG5, no. V10.2.0, 17 June 2011 (2011-06-17), pages 1 - 33, XP050553257 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020038544A1 (en) * 2018-08-20 2020-02-27 Telefonaktiebolaget Lm Ericsson (Publ) Methods, apparatus and computer-readable mediums relating to detection of sleeping cells in a cellular network

Also Published As

Publication number Publication date
US9204315B2 (en) 2015-12-01
KR20140023393A (en) 2014-02-26
EP2721860B1 (en) 2019-03-13
CN103621134B (en) 2017-08-25
JP5734514B2 (en) 2015-06-17
JP2014517657A (en) 2014-07-17
KR101561483B1 (en) 2015-10-19
EP2721860A1 (en) 2014-04-23
CN103621134A (en) 2014-03-05
US20120320766A1 (en) 2012-12-20

Similar Documents

Publication Publication Date Title
US9204315B2 (en) Method of coordinating fault detection responses by access nodes of a network
US9571336B2 (en) Method of improving coverage and optimisation in communication networks
US11503529B2 (en) System and method to provide small cell power control and load balancing for high mobility user equipment in a network environment
CN110545525B (en) System and method for assisting service removal using user equipment groups in a network environment
US20180263016A1 (en) Coordination of capacity and coverage optimization of self-organizing networks
EP3107330B1 (en) Method, system and computer program product to facilitate service hand-outs using user equipment groups in a network environment
EP2785108B1 (en) QoE Optimization in Wireless Networks
US20130286851A1 (en) Common radio element application manager for wireless small cells
US20120257544A1 (en) Configuration space feedback and optimization in a self-configuring communication system
US10165454B2 (en) Radio communication system, radio station, network operation management apparatus, and network optimization method
RU2741582C1 (en) Serving a radio link including a plurality of uplink carriers
US10091697B1 (en) Mitigation of uplink interference within heterogeneous wireless communications networks
Atayero et al. Self organizing networks for 3GPP LTE
CN106572491B (en) Access node management method, access net management entity, equipment and access node
Laine Performance Management of 3rd Generation Partnership Project Long Term Evolution
JP7097797B2 (en) Automatic connection switching in wireless communication network
Kakadia et al. Self organizing networks (SON)
Decarreau Self-Organization in Pre-5G Communication Networks
Naseer‐ul‐Islam et al. Self‐Organization in Pre‐5 G Communication Networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12727096

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 20137033757

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2014517012

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE