WO2021008393A1 - 一种无线小区的覆盖黑洞识别方法及系统 - Google Patents
一种无线小区的覆盖黑洞识别方法及系统 Download PDFInfo
- Publication number
- WO2021008393A1 WO2021008393A1 PCT/CN2020/100249 CN2020100249W WO2021008393A1 WO 2021008393 A1 WO2021008393 A1 WO 2021008393A1 CN 2020100249 W CN2020100249 W CN 2020100249W WO 2021008393 A1 WO2021008393 A1 WO 2021008393A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- event
- black hole
- cell
- coverage
- wireless cell
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
Definitions
- the embodiments of the present disclosure relate to, but are not limited to, the field of communication technologies, and in particular to a method and system for identifying coverage black holes of wireless cells.
- MR Measurement Report
- the MR method has a large amount of data and limited data collection time, resulting in poor real-time judgment results; secondly, the MR method is mainly based on network signal-related indicators for judgment, and good network signal-related indicators do not represent user perception.
- the wireless equipment of operators generally comes from multiple vendors, and multi-vendor systems are required to monitor the entire network through MR. It is difficult to implement the entire network monitoring by requiring all vendors to report data according to the same interface standard; in addition, , When there is no signal, it is basically impossible to report MR data, which makes it impossible to judge the cell coverage.
- the embodiments of the present disclosure provide a coverage black hole identification method and system for a wireless cell, which can detect the coverage black hole problem of the wireless cell in time and locate the coverage black hole position, thereby greatly reducing the operation and maintenance cost of the wireless network.
- the embodiments of the present disclosure provide a coverage black hole identification method for a wireless cell, which includes: collecting control plane data and user plane data in a detection area through a probe deployed between an access network and a core network; The obtained control plane data and user plane data identify the wireless cell covering the black hole in the detection area and the location information of the covering black hole in the wireless cell.
- an embodiment of the present disclosure provides a coverage black hole identification system for a wireless cell, which includes: a data acquisition module configured to collect control plane data in the detection area through a probe deployed between the access network and the core network And user plane data; a processing module configured to identify a wireless cell covering a black hole in the detection area and location information of the covering black hole in the wireless cell based on the collected control plane data and user plane data.
- embodiments of the present disclosure provide a computer-readable storage medium that stores a computer program that, when executed, implements the steps of the above-mentioned coverage black hole identification method for a wireless cell.
- a computer program that, when executed, implements the steps of the above-mentioned coverage black hole identification method for a wireless cell.
- FIG 1 is a networking diagram of part of the process of the Long Term Evolution (LTE) Core Network (Evolved Packet Core, EPC);
- LTE Long Term Evolution
- EPC Evolution Core Network
- FIG. 2 is a flowchart of a method for identifying a coverage black hole of a wireless cell provided by an embodiment of the disclosure
- FIG. 3 is an example diagram of a coverage black hole cell identification and a coverage black hole location identification process of a wireless cell provided by an embodiment of the disclosure
- Figure 4 is a schematic diagram of the OTT positioning principle
- FIG. 5 is an example diagram of an OTT location recognition method based on a time window in an embodiment of the disclosure
- FIG. 6 is an example diagram of a covered black hole position obtained by a covered black hole identification method provided by an embodiment of the present disclosure
- FIG. 7 is another example diagram of a covered black hole position obtained by the covered black hole identification method provided by an embodiment of the present disclosure.
- FIG. 8 is a schematic diagram of a coverage black hole identification system of a wireless cell provided by an embodiment of the disclosure.
- the embodiments of the present disclosure provide a wireless cell coverage black hole identification method and system.
- the wireless cell covering the black hole in the detection area and the location of the covering black hole in the wireless cell are identified Information to support the proactive and timely discovery of coverage black holes in wireless cells, thereby providing precise positioning for wireless network optimization, narrowing the test range, and greatly reducing the operation and maintenance costs of wireless networks.
- the coverage black hole identification method and system of a wireless cell provided by the embodiments of the present disclosure can be applied to an LTE system.
- the embodiment of the present disclosure does not limit this.
- the embodiments of the present disclosure can also be applied to other communication systems, such as a fifth-generation mobile communication technology (5G) new air interface communication system.
- 5G fifth-generation mobile communication technology
- FIG. 1 is a schematic diagram of the networking of part of the LTE EPC process. It should be noted that FIG. 1 only shows a part of the networking diagram related to the embodiment of the present disclosure.
- the LTE radio access network includes a radio base station (eNodeB), and LTE EPC includes a mobility management entity (Mobility Management Entity, referred to as MME), a serving gateway (Serving Gateway, referred to as SGW), and packet data.
- MME mobility management entity
- SGW serving gateway
- PDN Gateway PDN Gateway
- the MME is a network element responsible for processing signaling in the core network, and is a signaling entity, mainly responsible for functions such as mobility management, bearer management, user authentication and authentication, SGW and PGW selection.
- SGW is mainly responsible for user plane processing, responsible for data packet routing and forwarding functions, and supports the switching of different access technologies of the Third Generation Partnership Project (3GPP), and acts as the anchor point of the user plane when switching occurs For each user terminal (User Equipment, UE for short) related to the Evolved Packet System (EPS), at a time point, there is an SGW to serve it.
- 3GPP Third Generation Partnership Project
- S10 interface is an interface between any two MMEs
- S11 is an interface between MME and SGW
- S5 or S8 is an interface between SGW and PGW.
- S1-MME and S1-U are the two main interfaces of the EPC network
- S1-MME is the interface between eNodeB and MME
- S1-U is the interface between eNodeB and SGW.
- the user terminal accesses the SGW from the radio base station.
- the first probe is connected between the radio base station and the SGW to collect LTE data services S1-U interface user plane data.
- the user terminal accesses the MME from the wireless base station.
- the second probe is connected between the wireless base station and the MME to collect the control plane data of the S1-MME port of the LTE data service.
- the wireless cells with coverage black holes in the entire network can be preliminarily identified, and based on the spatial clustering machine learning model, the locations of the coverage black holes of the wireless cells can be further identified.
- the wireless network optimization department can be provided with a clear network optimization object, thereby greatly reducing the operation and maintenance cost of the wireless network.
- FIG. 2 is a flowchart of a method for identifying a coverage black hole of a wireless cell provided by an embodiment of the disclosure. As shown in FIG. 2, the covering black hole identification method provided in this embodiment includes:
- S202 According to the collected control plane data and user plane data, identify the wireless cell covering the black hole in the detection area and the location information of the covering black hole in the wireless cell.
- the coverage black hole can refer to the network coverage area where the user terminal cannot normally access the current network system, and it can also be called the coverage blind spot.
- a wireless cell with a covering black hole can be referred to as a covering black hole cell for short.
- the detection area can be determined according to the deployment range of the probe, for example, a city, a province, etc.
- the embodiment of the present disclosure does not limit this.
- S202 may include: filtering out the first event redirected from the first mobile communication system to the second mobile communication system within the first time period according to the collected control plane data, where the first event The network quality of the mobile communication system is higher than the network quality of the second mobile communication system; based on the first event in the first time period, identify the wireless cell covering the black hole in the detection area; according to the collected user plane data and the first time The first event in the segment determines the location information of the coverage black hole in the wireless cell.
- the first mobile communication system may be a fourth-generation mobile communication technology (4G) system
- the second mobile communication system may be a third-generation mobile communication technology (3G) system or a second-generation mobile communication technology (2G) system
- the first mobile communication system can be a fifth-generation mobile communication technology (5G) system
- the second mobile communication system can be a 2G system, a 3G system, or a 4G system.
- 5G fifth-generation mobile communication technology
- the embodiment of the present disclosure does not limit this.
- the first time period can be set according to actual needs, for example, one day or one week.
- the embodiment of the present disclosure does not limit this.
- identifying a wireless cell covering a black hole in the detection area may include:
- the single redirection duration corresponding to the first event can be obtained by subtracting the time point of the first event from the time point of the second event associated with the first event.
- the number of the first event that the user has occurred in a certain wireless cell during the first time period, or the number of occurrences of the first event and the redirection stay duration is used as a basic indicator for determining the coverage black hole cell to identify the coverage black hole cell.
- identify the wireless cell that covers the black hole in the detection area Can include:
- first threshold to the fourth threshold may be set according to actual requirements, which is not limited in the embodiment of the present disclosure.
- the first time period and the second time period can be set according to actual needs, for example, the first time period can be one week, and the second time period can be one day.
- the embodiment of the present disclosure does not limit this.
- identify the wireless cell that covers the black hole in the detection area Can include:
- the number of users whose number of times the first event is met in the first time period is greater than the fifth threshold and the redirection stay duration is greater than the sixth threshold, as the number of users who are not satisfied with cell coverage; According to the number of users who are not satisfied with the cell coverage and the total number of users in the first time period, the proportion of users who are not satisfied with the cell coverage in the first time period is calculated, and the proportion of users who are not satisfied with the cell coverage in the first time period is calculated.
- a cell larger than the seventh threshold is identified as a wireless cell covering a black hole.
- the fifth threshold to the seventh threshold may be set according to actual requirements, which is not limited in the embodiment of the present disclosure.
- determining the location information of the coverage black hole in the wireless cell based on the collected user plane data and the first event in the first time period may include: obtaining and reporting from the collected user plane data OTT location bill; for the wireless cell identified to have coverage black holes, based on the time window, associate the first event in the wireless cell within the first time period with the bill reporting the OTT location, and determine the OTT associated with the first event Location; the OTT location associated with the first event in the wireless cell is summarized and clustered to obtain the location information of the coverage black hole in the wireless cell.
- OTT Over The Top
- OTT refers to various services provided to users via the Internet.
- the services developed by Internet companies using operators' broadband networks can be called OTT applications.
- Some OTT service providers provide users with positioning and navigation services.
- Applications Apps, referred to as APPs
- APPs may report location information in plain text. Based on this, the latitude and longitude information can be extracted to describe the user's movement track. Since the latitude and longitude information obtained by this positioning method comes from OTT applications, it is called OTT positioning.
- the OTT associated with the first event is filtered from the user plane data.
- the location can provide a data basis for identifying the location of the coverage black hole, thereby further outputting the location of the coverage black hole of the wireless cell.
- the first event in the wireless cell in the first time period is associated with the bill for reporting the OTT location, and the first event is determined to be associated
- the OTT location may include: for any first event in the wireless cell in the first time period, searching for the time point closest to the first event within a time window determined by using the time point of the first event as a reference point
- the OTT location reported in the CDR is determined as the OTT location associated with the first event.
- the time window determined by using the time point of the first event as a reference point may include: a time window obtained by setting the time length forward with the time point of the first event as the end point, or the time point of the first event The time window obtained by the first set duration forward and the second set duration backward.
- the embodiment of the present disclosure does not limit this.
- the OTT locations associated with the first event in the wireless cell are summarized and clustered to obtain the location information of the coverage black hole in the wireless cell, which may include: In the cell, the OTT location associated with the first event in the wireless cell is subjected to coordinate system one, and then the machine learning model based on the clustering algorithm is input to obtain the location information of the covered black hole.
- the redirected OTT location information of all users in the cell during the first time period is summarized according to the latitude and longitude, and the spatial location correlation analysis is performed, and the adjacent location points
- the clustering algorithm-based machine learning model is clustered into one category. After removing outliers, multiple clustered locations are obtained as multiple covering black holes in the cell, and the center coordinates of each covering black hole are given. Assist network optimization personnel in optimization and positioning.
- the probes deployed between the access network and the core network include: the first probe deployed between the radio base station (eNodeB) and the mobility management entity (MME), the first probe deployed between the radio base station and The second probe between the service gateways (SGW); wherein the control plane data collected by the first probe includes: S1-MME port data; the user plane data collected by the second probe includes: S1-U port data.
- eNodeB radio base station
- MME mobility management entity
- SGW service gateways
- the first probe may transmit the collected control plane data to the covering black hole identification system
- the second probe may transmit the collected user plane data to the covering black hole identification system
- the black hole recognition system performs data processing to identify the coverage black hole cell and the location information of the coverage black hole in the detection area.
- the coverage black hole recognition system can be deployed on a server, or can be deployed in a server cluster.
- the embodiment of the present disclosure does not limit this.
- FIG. 3 is an exemplary diagram of a coverage black hole cell identification and a coverage black hole location identification process of a wireless cell provided by an exemplary embodiment of the present disclosure.
- the collected data of the first time period Q can be analyzed, and then the covering black hole cell can be identified according to the covering black hole cell determination rule.
- the first time period Q may be seven days, and the second time period may be one day.
- the coverage black hole cell determination rule may include: the coverage black hole cell requirement meets the coverage black hole problem on three or more days in the previous seven days, and the number of unsatisfied users on these days with problems is not less than R 4 (corresponding to The fourth threshold above); among them, the coverage hole problem in the cell on a certain day is defined as the proportion of users with unsatisfactory coverage in the cell that is greater than R 3 (corresponding to the third threshold above); users with unsatisfactory coverage in the cell on a certain day It is defined as a user whose number of occurrences of the first event in the cell that day is greater than R 1 (corresponding to the above-mentioned first threshold) and redirected stay longer than R 2 seconds (corresponding to the above-mentioned second threshold).
- the identification process of the covered black hole cell includes:
- the judgment condition of the first event may include: UE Context Release, and the reason is interrat-redirection.
- the judgment condition of the second event may include: Tracking Area Update (TAU) or ATTACH event that occurs for the first time after the first event (4G system is redirected to 2G system).
- TAU Tracking Area Update
- ATTACH event that occurs for the first time after the first event (4G system is redirected to 2G system).
- the first event may include: an event redirected from a 4G system to a 2G system, and an event redirected from a 4G system to a 3G system.
- the embodiment of the present disclosure does not limit this.
- the records associated with the first event and the second event include IMSI, cell ECI, time point time_src of the first event (4G system redirection to 2G system event), and time of the second event (2G system return to 4G system event) Click time_dst.
- the residence time of a single redirection of the first event can be obtained by subtracting time_src from time_dst.
- S303 Associating the results of S302, gather them according to the two dimensions of IMSI and cell ECI, and calculate the number of the first event (4G system redirection to 2G system event) of user IMSI j in a certain cell ECI i in a day and Redirection duration.
- the number of the first event can be obtained by counting the number of records in the dialog, and the redirection duration can be obtained by subtracting time_src from time_dst and then summing.
- the number of the first event of the user IMSI j and the redirection duration can be described by the following formula:
- the redirection residency duration of the user IMSI j SUM(time_dst i- time_src i ).
- the results obtained in S303 are aggregated according to the cell ECI dimension, and it can be obtained that the number of the first event (4G system redirection to 2G system event) occurring in any wireless cell in a day is greater than R 1 and the redirection stay duration
- the number of users greater than R 2 seconds that is, the number of users who are not satisfied with the coverage defined in the black hole cell determination rule
- the proportion of users with unsatisfactory coverage in the cell on the day is equal to the ratio of the number of users with unsatisfactory coverage in the cell currently and the total number of users in the cell that day.
- S305 Repeat the calculation of the number of users with dissatisfied coverage and the proportion of users with dissatisfied coverage in each wireless cell of the entire network for seven days according to the steps from S301 to S304.
- the analysis process in this example is as follows: read the control surface S1-MME port data collected by the probe on June 3, 2019 and the previous 6 days, and output June 3, 2019 according to the coverage black hole cell identification steps (S301 to S306) List of coverage black hole cells, and output the average of the percentage of unsatisfied users with coverage and the number of days with coverage black hole problems in each cell within seven days, sorted in descending order according to the average percentage of unsatisfied users with coverage, and take the top 50 Record, that is, get the list of Top50 covered black hole cells and corresponding indicators in the city, and then dispatch the order to solve it.
- the OTT location when the user occurs when the first event occurs may be calculated based on the time window.
- FIG. 4 is a schematic diagram of the OTT positioning principle. As shown in Figure 4, the OTT positioning principle is as follows:
- APP application for example, APP mobile phone terminal
- the APP application can access the map server through the Application Programming Interface (API for short).
- API Application Programming Interface
- the map server After receiving the encrypted positioning request, the map server sends the longitude and latitude information to the APP mobile phone in the form of a compressed packet in the downstream http 200OK response in the post mode of the http protocol after calculation; among them, the S1-U interface
- the latitude and longitude information is decoded in the payload of the http original code stream in.
- the APP application reports the longitude and latitude information to its own server in the form of clear text in the uplink Uniform Resource Location (URL) in the get mode of the http protocol. Server side); Among them, the latitude and longitude information can be directly extracted from the Uniform Resource Identifier (URI) field of the http type XDR file in the S1-U interface.
- URI Uniform Resource Identifier
- the longitude and latitude information of the APP mobile terminal can be obtained. Since the acquired longitude and latitude information comes from OTT applications, it can be called OTT positioning.
- obtaining the user redirection position based on the time window can provide a data basis for the coverage black hole position identification , So as to achieve coverage black hole recognition.
- FIG. 5 is an example diagram of an OTT location recognition method based on a time window in an embodiment of the disclosure. As shown in Figure 3 and Figure 5, based on the time window, the process of calculating the OTT location when the user is redirected from the 4G system to the 2G system is as follows:
- S501 Filter out the bills that report OTT location information (for example, information such as longitude, latitude, and coordinate system) from the XDR detailed list of the first time period of the S1-U port.
- OTT location information for example, information such as longitude, latitude, and coordinate system
- the TN before the time point of the bill of the first event is used as the time window to find the distance within the time window.
- the most recent bill of the OTT location is reported, and the found OTT location is determined as the OTT location of the first event.
- Fig. 5 shows an example of OTT locations corresponding to two first events.
- the time window of TN before the time point of the bill of the first event is used as the time window.
- the embodiment of the present disclosure does not limit this.
- the T N1 duration forward and the backward T N2 duration of the time point of the bill of the first event may be used as the time window.
- the location information of the covering black hole may be obtained based on the machine learning model of the clustering algorithm.
- the process of obtaining the location information of the covered black hole by the machine learning model based on the clustering algorithm may include:
- S601. Determine the OTT location (e.g., including the 4G system redirection to the 2G system event) of a user in a covered black hole cell during the first time period (for example, the first 7 days) when the first event (4G system is redirected to the 2G system event) by means of time window Information such as longitude, latitude and coordinate system).
- time window Information such as longitude, latitude and coordinate system
- S602. Convert the latitude and longitude of the different coordinate systems in the result of S601 to the latitude and longitude information under a unified coordinate system (such as unified conversion to the GCJ-02 Mars coordinate system). After the conversion, the latitude and longitude can be gathered according to the latitude and longitude, and different latitude and longitude can be calculated The number of redirects and the number of redirected users.
- a unified coordinate system such as unified conversion to the GCJ-02 Mars coordinate system.
- S603. Use the latitude and longitude information obtained in S601 and S602 for a certain covered black hole cell as input data and input the machine learning model to obtain a clustering result.
- the clustering result automatically divides different longitude and latitude coordinates into multiple groups.
- each set of latitude and longitude coordinates corresponds to a covering black hole in Figure 6.
- a density-based clustering algorithm is required for model training to obtain a machine learning model suitable for this example.
- the density-based clustering algorithm can use the latitude and longitude information obtained in the manner of S601 and S602 as the input features of the clustering algorithm, training and adjusting the input parameters, and the expected clustering algorithm model can be obtained as the machine of this example. Learning model.
- the number of redirects and the number of redirected users at different latitudes and longitudes can be calculated through S602, and the total number of redirects and the number of redirected users that occur under each coverage black hole can be calculated backward.
- the severity level of the coverage black hole Based on this judgment, the severity level of the coverage black hole.
- the judgment condition regarding the severity level can be set according to requirements, which is not limited in the embodiment of the present disclosure.
- an optimization solution may be determined.
- the operator’s network optimization staff can adjust the azimuth angle, antenna height, and increase base stations for targeted optimization.
- the location of the coverage black hole corresponding to the cell may be as shown in FIG. 6.
- the location of the coverage black hole corresponding to the cell may be as shown in FIG. 7.
- probes are deployed between the radio base station and the core network element MME, and the radio base station and the core network gateway SGW, respectively, to obtain the LTE data service entire network control plane S1-MME Port data and user plane S1-U port data, and then combine the number of times the 4G system is redirected to the 2G system in the S1-MME port data and the 4G system redirection residence time to identify the coverage black hole cell; for a coverage black hole cell .
- the clustering algorithm is used to obtain multiple coverage black hole cells.
- the embodiments of the present disclosure can actively discover the coverage black hole problem of the entire network's wireless cells that affect the user's real Internet perception, and can output the coverage black hole location of the problem cell and expose it to the operator to provide the operator with the wireless network Optimization provides precise positioning, reduces the scope of testing, thereby reducing maintenance costs.
- FIG. 8 is a schematic diagram of a coverage black hole identification system of a wireless cell provided by an embodiment of the disclosure.
- the covering black hole identification system provided by the embodiment of the present disclosure includes:
- the data acquisition module 801 is configured to collect control plane data and user plane data in the detection area through a probe deployed between the access network and the core network;
- the processing module 802 is configured to identify the wireless cell covering the black hole in the detection area and the location information of the covering black hole in the wireless cell based on the collected control plane data and user plane data.
- embodiments of the present disclosure also provide a computer-readable storage medium storing a computer program that, when executed, implements the steps of the above-mentioned covering black hole identification method, such as the steps shown in FIG. 2.
- Such software may be distributed on a computer-readable medium
- the computer-readable medium may include a computer storage medium (or non-transitory medium) and a communication medium (or transitory medium).
- the term computer storage medium includes volatile and non-volatile memory implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data).
- Computer storage media include but are not limited to RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassette, tape, magnetic disk storage or other magnetic storage device, or Any other medium used to store desired information and that can be accessed by a computer.
- communication media usually contain computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as carrier waves or other transmission mechanisms, and may include any information delivery media .
- the black hole problem provides precise positioning for wireless network optimization, reduces the test range, and greatly reduces the operation and maintenance costs of the wireless network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
小区ECI | 出现覆盖黑洞问题天数 | 覆盖不满意用户占比(%) |
208898564 | 6 | 66.9 |
208898565 | 5 | 64.9 |
215510273 | 7 | 63.3 |
215600899 | 6 | 61.7 |
208898563 | 5 | 59.6 |
215600898 | 6 | 56.9 |
215511297 | 7 | 55.6 |
215669250 | 6 | 52.9 |
215548933 | 5 | 52 |
203037185 | 7 | 49.6 |
74699584 | 6 | 49.6 |
208898306 | 5 | 49.6 |
215885826 | 7 | 49 |
215600901 | 3 | 48.6 |
74666049 | 4 | 45.5 |
215282435 | 6 | 43.5 |
202877962 | 7 | 39.9 |
203486723 | 4 | 39 |
203441158 | 6 | 38.6 |
208898308 | 5 | 38.6 |
74665281 | 7 | 37.7 |
215170315 | 7 | 37.4 |
215104517 | 7 | 37.3 |
208955649 | 7 | 37.3 |
215897089 | 7 | 36.8 |
185024093 | 7 | 35.6 |
185202795 | 7 | 35.4 |
203047425 | 5 | 34.9 |
208901892 | 4 | 34.2 |
202931460 | 5 | 34.1 |
74675779 | 5 | 34 |
215619075 | 3 | 33.5 |
209020173 | 3 | 33 |
215938308 | 7 | 32.6 |
203429377 | 4 | 32.2 |
91684616 | 7 | 31.8 |
203045890 | 7 | 31.7 |
215170312 | 7 | 31.5 |
214971139 | 7 | 31.3 |
203117314 | 7 | 31.2 |
74675776 | 5 | 31 |
215170310 | 5 | 30.8 |
91926795 | 6 | 30.2 |
203384833 | 4 | 29.4 |
215574805 | 7 | 29.1 |
215604747 | 7 | 28.4 |
91805207 | 6 | 28.4 |
75121235 | 4 | 28 |
91774217 | 7 | 27.9 |
209167620 | 7 | 27 |
覆盖黑洞ID | 黑洞中心点坐标 | 重定向次数 | 重定向用户数 |
1 | 117.080396,36.652073 | 205 | 47 |
2 | 117.07434,36.6517 | 60 | 28 |
3 | 117.07392,36.651162 | 6 | 3 |
4 | 117.074244,36.652567 | 2 | 1 |
5 | 117.079642,36.651982 | 2 | 2 |
6 | 117.081407,36.652095 | 2 | 1 |
7 | 117.073897,36.652026 | 1 | 1 |
8 | 117.079769,36.652214 | 1 | 1 |
9 | 117.079778,36.651824 | 1 | 1 |
12 | 117.081016,36.651886 | 1 | 1 |
10 | 117.08047,36.651157 | 1 | 1 |
11 | 117.080711,36.651696 | 1 | 1 |
黑洞ID | 中心点坐标 | 重定向次数 | 重定向用户数 |
1 | 117.085764,36.684346 | 33 | 20 |
2 | 117.079622,36.683853 | 26 | 18 |
5 | 117.086977,36.684721 | 3 | 2 |
4 | 117.086066,36.684213 | 3 | 1 |
3 | 117.074922,36.684714 | 3 | 1 |
7 | 117.084846,36.684033 | 2 | 2 |
10 | 117.085439,36.684483 | 2 | 2 |
8 | 117.085421,36.683849 | 2 | 1 |
6 | 117.084473,36.684532 | 2 | 1 |
9 | 117.085429,36.684253 | 2 | 1 |
11 | 117.079192,36.683429 | 1 | 1 |
12 | 117.0792,36.683789 | 1 | 1 |
16 | 117.078272,36.683944 | 1 | 1 |
14 | 117.08015,36.683797 | 1 | 1 |
15 | 117.080464,36.684534 | 1 | 1 |
17 | 117.084106,36.684041 | 1 | 1 |
21 | 117.083793,36.684236 | 1 | 1 |
18 | 117.085518,36.684054 | 1 | 1 |
19 | 117.078854,36.684017 | 1 | 1 |
20 | 117.07881,36.684266 | 1 | 1 |
13 | 117.078907,36.683803 | 1 | 1 |
Claims (11)
- 一种无线小区的覆盖黑洞识别方法,包括:通过部署在接入网与核心网之间的探针,采集检测区域内的控制面数据和用户面数据;根据采集到的控制面数据和用户面数据,识别所述检测区域内存在覆盖黑洞的无线小区以及所述无线小区内覆盖黑洞的位置信息。
- 根据权利要求1所述的方法,其中,所述根据采集到的控制面数据和用户面数据,识别所述检测区域内存在覆盖黑洞的无线小区以及所述无线小区内覆盖黑洞的位置信息,包括:根据采集到的控制面数据,筛选出第一时间段内从第一移动通信系统重定向到第二移动通信系统的第一事件,其中,所述第一移动通信系统的网络质量高于所述第二移动通信系统的网络质量;基于所述第一时间段内的第一事件,识别所述检测区域内存在覆盖黑洞的无线小区;根据采集到的用户面数据以及所述第一时间段内的第一事件,确定所述无线小区内覆盖黑洞的位置信息。
- 根据权利要求2所述的方法,其中,所述基于所述第一时间段内的第一事件,识别所述检测区域内存在覆盖黑洞的无线小区,包括:从采集到的控制面数据中,筛选出所述第一事件关联的从所述第二移动通信系统返回到所述第一移动通信系统的第二事件;根据所述第一事件的时间点以及所述第一事件关联的第二事件的时间点,确定所述第一事件对应的单次重定向驻留时长;根据所述第一时间段内所述检测区域内任一无线小区下每个用户对应的所述第一事件的次数和重定向驻留时长,识别所述检测区域内存在覆盖黑洞的无线小区;或者,根据所述第一时间段内所述检测区域内任一无线小区下每个用户对应的所述第一事件的次数,识别所述检测区域内存在覆盖黑洞的无线小区。
- 根据权利要求3所述的方法,其中,所述根据所述第一时间段内所述检测区域内任一无线小区下每个用户对应的所述第一事件的次数和重定向驻留时长,识别所述检测区域内存在覆盖黑洞的无线小区,包括:将所述第一时间段划分为至少N个第二时间段,N为大于1的整数;针对所述检测区域内的任一无线小区,在任一第二时间段内,确定在所述第二时间段内满足第一事件的次数大于第一阈值且重定向驻留时长大于第二阈值的用户数,作为所述第二时间段内不满意小区覆盖的用户数;并根据所述第二时间段内不满意小区覆盖的用户数与所述第二时间段内的总用户数,计算得到所述第二时间段内不满意小区覆盖的用户占比;将所述第二时间段内不满意小区覆盖的用户占比大于第三阈值的小区,记录为在所述第二时间段内出现覆盖黑洞问题的小区;筛选出满足以下条件的小区为存在覆盖黑洞的无线小区:在所述第一时间段中的至少M个第二时间段中出现覆盖黑洞问题,M为正整数,且M小于N;所述出现覆盖黑洞问题的小区在所述至少M个第二时间段内不满意小区覆盖的用户数的平均值大于或等于第四阈值;或者,针对检测区域内的任一无线小区,确定在所述第一时间段内满足第一事件的次数大于第五阈值且重定向驻留时长大于第六阈值的用户数,作为不满意小区覆盖的用户数;并根据不满意小区覆盖的用户数与所述第一时间段内的总用户数,计算得到所述第一时间段内不满意小区覆盖的用户占比;将所述第一时间段内不满意小区覆盖的用户占比大于第七阈值的小区,识别为存在覆盖黑洞的无线小区。
- 根据权利要求2所述的方法,其中,所述根据采集到的用户面数据以及所述第一时间段内的第一事件,确定所述无线小区内覆盖黑洞的位置信息,包括:从采集到的用户面数据中,获取上报OTT位置的话单;针对识别出存在覆盖黑洞的无线小区,基于时间窗,将所述第一时间 段内所述无线小区内的第一事件与所述上报OTT位置的话单进行关联,确定所述第一事件关联的OTT位置;对所述无线小区内的第一事件关联的OTT位置进行汇总和聚类分析,得到所述无线小区内的覆盖黑洞的位置信息。
- 根据权利要求5所述的方法,其中,所述针对识别出存在覆盖黑洞的无线小区,基于时间窗,将所述第一时间段内所述无线小区内的第一事件与所述上报OTT位置的话单进行关联,确定所述第一事件关联的OTT位置,包括:针对所述第一时间段内所述无线小区内的任一第一事件,在以所述第一事件的时间点为参考点确定的时间窗内,查找与所述第一事件的时间点最近的上报OTT位置的话单,将所述话单上报的OTT位置确定为所述第一事件关联的OTT位置。
- 根据权利要求5所述的方法,其中,所述对所述无线小区内的第一事件关联的OTT位置进行汇总和聚类分析,得到所述无线小区内的覆盖黑洞的位置信息,包括:针对识别出存在覆盖黑洞的无线小区,将所述无线小区内的第一事件关联的OTT位置进行坐标系统一后,输入基于聚类算法的机器学习模型,得到所述覆盖黑洞的位置信息。
- 根据权利要求3所述的方法,其中,在长期演进LTE系统中,所述第一事件的判别条件包括:事件类型为终端上下文释放,且原因为异系统重定向interrat-redirection;所述第一事件关联的第二事件的判别条件包括:在所述第一事件之后第一次发生的跟踪区更新TAU或附着ATTACH事件。
- 根据权利要求1至8中任一项所述的方法,其中,在长期演进LTE系统中,所述部署在接入网与核心网之间的探针包括:部署在无线基站和移动管理实体MME之间的第一探针、部署在所述无线基站和服务网关SGW之间的第二探针;其中,所述第一探针采集的控制面数据包括: S1-MME口数据;所述第二探针采集的用户面数据包括:S1-U口数据。
- 一种无线小区的覆盖黑洞识别系统,包括:数据获取模块,设置为通过部署在接入网与核心网之间的探针,采集检测区域内的控制面数据和用户面数据;处理模块,设置为根据采集到的控制面数据和用户面数据,识别所述检测区域内存在覆盖黑洞的无线小区以及所述无线小区内覆盖黑洞的位置信息。
- 一种计算机可读存储介质,存储有计算机程序,所述计算机程序被执行时实现如权利要求1至9中任一项所述的覆盖黑洞识别方法的步骤。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910647475.2A CN112243257B (zh) | 2019-07-17 | 2019-07-17 | 一种无线小区的覆盖黑洞识别方法及系统 |
CN201910647475.2 | 2019-07-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021008393A1 true WO2021008393A1 (zh) | 2021-01-21 |
Family
ID=74167639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/100249 WO2021008393A1 (zh) | 2019-07-17 | 2020-07-03 | 一种无线小区的覆盖黑洞识别方法及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112243257B (zh) |
WO (1) | WO2021008393A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113411825A (zh) * | 2021-06-17 | 2021-09-17 | 中国联合网络通信集团有限公司 | 5g小区定位方法、装置、电子设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231636A (zh) * | 2016-03-23 | 2017-10-03 | 中国移动通信集团四川有限公司 | 一种校准网络覆盖评估的方法和装置 |
CN108541011A (zh) * | 2017-03-03 | 2018-09-14 | 中国移动通信集团福建有限公司 | 无线网络信号覆盖区域的强度分析方法和装置 |
CN108990087A (zh) * | 2017-06-05 | 2018-12-11 | 中兴通讯股份有限公司 | 无线小区异常覆盖定位方法和装置 |
CN109996186A (zh) * | 2017-12-29 | 2019-07-09 | 中国移动通信集团陕西有限公司 | 一种网络覆盖问题识别方法及装置、可读取存储介质 |
CN109996278A (zh) * | 2017-12-30 | 2019-07-09 | 中国移动通信集团四川有限公司 | 道路网络质量评估方法、装置、设备及介质 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2484534B (en) * | 2010-10-15 | 2014-04-09 | Fujitsu Ltd | Cell edge coverage hole detection in cellular wireless networks |
CN103634824B (zh) * | 2012-08-21 | 2016-12-21 | 中国移动通信集团四川有限公司 | 一种定位无线网络中产生寻呼黑洞的小区的系统和方法 |
US20160295597A1 (en) * | 2013-07-26 | 2016-10-06 | Intel IP Corporation | Signaling interference information for user equipment assistance |
CN104394551A (zh) * | 2014-12-02 | 2015-03-04 | 长沙领新信息科技有限公司 | 一种基于海量用户信令的过覆盖小区识别方法及其系统 |
KR20170106989A (ko) * | 2015-01-08 | 2017-09-22 | 엘지전자 주식회사 | 무선 통신 시스템에서 페이징 전송 방법 및 이를 위한 장치 |
US9113353B1 (en) * | 2015-02-27 | 2015-08-18 | ReVerb Networks, Inc. | Methods and apparatus for improving coverage and capacity in a wireless network |
CN106572495B (zh) * | 2016-09-29 | 2019-12-10 | 普天信息工程设计服务有限公司 | 基于信令和mr数据的网络质量监测方法和覆盖评估方法 |
CN108271204A (zh) * | 2016-12-30 | 2018-07-10 | 中国移动通信集团山东有限公司 | 一种基于信令数据的lte网络盲区识别方法和装置 |
CN106535234B (zh) * | 2016-12-31 | 2019-09-17 | 中国移动通信集团江苏有限公司 | 用户上网问题的定位方法和装置 |
-
2019
- 2019-07-17 CN CN201910647475.2A patent/CN112243257B/zh active Active
-
2020
- 2020-07-03 WO PCT/CN2020/100249 patent/WO2021008393A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231636A (zh) * | 2016-03-23 | 2017-10-03 | 中国移动通信集团四川有限公司 | 一种校准网络覆盖评估的方法和装置 |
CN108541011A (zh) * | 2017-03-03 | 2018-09-14 | 中国移动通信集团福建有限公司 | 无线网络信号覆盖区域的强度分析方法和装置 |
CN108990087A (zh) * | 2017-06-05 | 2018-12-11 | 中兴通讯股份有限公司 | 无线小区异常覆盖定位方法和装置 |
CN109996186A (zh) * | 2017-12-29 | 2019-07-09 | 中国移动通信集团陕西有限公司 | 一种网络覆盖问题识别方法及装置、可读取存储介质 |
CN109996278A (zh) * | 2017-12-30 | 2019-07-09 | 中国移动通信集团四川有限公司 | 道路网络质量评估方法、装置、设备及介质 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113411825A (zh) * | 2021-06-17 | 2021-09-17 | 中国联合网络通信集团有限公司 | 5g小区定位方法、装置、电子设备及存储介质 |
CN113411825B (zh) * | 2021-06-17 | 2022-11-22 | 中国联合网络通信集团有限公司 | 5g小区定位方法、装置、电子设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN112243257B (zh) | 2024-01-26 |
CN112243257A (zh) | 2021-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11490348B2 (en) | Signal quality database | |
CN106572495B (zh) | 基于信令和mr数据的网络质量监测方法和覆盖评估方法 | |
US8180365B2 (en) | Method and apparatus for identifying a geographic area having undesirable wireless service | |
CN108156626B (zh) | 轨道交通无线网络质量评估方法、装置及介质 | |
CN102860062B (zh) | 执行测量的方法和设备 | |
KR102172122B1 (ko) | 무선통신 시스템에서 mbsfn 영역에 대해 mbms 측정을 수행하는 방법 및 장치 | |
US9532180B2 (en) | Method of analysing data collected in a cellular network and system thereof | |
JP2015517260A (ja) | モバイル・ネットワークのパフォーマンス問題の根本原因分析のためのシステムおよび方法 | |
CN107580337B (zh) | 一种热点区域识别方法和装置 | |
CN105357699A (zh) | 无线网络质量监测系统及方法 | |
US20160294639A1 (en) | Method of Operating a Self Organizing Network and System Thereof | |
GB2478049A (en) | Detecting locations of poor network coverage in a mobile communications network | |
US9271175B2 (en) | Wireless quality collecting device, wireless quality collecting method, and computer-readable recording medium | |
WO2021008393A1 (zh) | 一种无线小区的覆盖黑洞识别方法及系统 | |
CN108235335B (zh) | 一种室内网络弱覆盖区域的确定方法及装置 | |
CN106973397B (zh) | 覆盖空洞判定方法及系统 | |
CN110120883B (zh) | 一种评估网络性能的方法、装置和计算机可读存储介质 | |
US10721707B2 (en) | Characterization of a geographical location in a wireless network | |
US9578528B2 (en) | Method and device for handover statistics | |
WO2022183729A1 (zh) | 用户感知评估方法、装置、终端及存储介质 | |
CN109348490A (zh) | 一种识别干扰铁路lte网络的邻接载波的方法及装置 | |
Mangla et al. | A Tale of Three Datasets: Towards Characterizing Mobile Broadband Access in the United States | |
CN111935769B (zh) | 质差小区识别方法、装置和设备 | |
CN105744557A (zh) | 一种http页面下载速率低的分析定界算法、装置 | |
CN106851604B (zh) | 一种移动通信网络的业务量预测方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20839881 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20839881 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20839881 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28.09.22) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20839881 Country of ref document: EP Kind code of ref document: A1 |