Optimization and Log File Analysis in GSM
Optimization and Log File Analysis in GSM
by Somer GOKSEL
January 26, 2003
Contents
1 INTRODUCTION
1.1
PURPOSE
and
SCOPE
of
OPTIMIZATION.............................................................................
041.2
OPTIMIZATION
PROCESS......................................................................................................
051.2.1
PROBLEM
ANALYSIS ........................................................................................... 051.2.2
CHECKS
PRIOR
TO
ACTION. ............................................................................... 051.2.3 DRIVE
TEST.............................................................................................................
051.2.4
SUBJECTS
to
INVESTIGATE.................................................................................
061.2.5
AFTER
the
TEST...................................................................................................... 071.2.6
RECOMMENDATIONS..........................................................................................
.
071.2.7
TRACKING..........................................................................................................
.....
081.2.8
OTHER
OPTIMIZATION
TOPICS..........................................................................
081.3
BEFORE
STARTING...........................................................................................................
...... 09
2
DRIVE
TEST .................................................................................................................
...............................10
2.1
TEMS
INFORMATION....................................................................................................
.........
112.2
BASIC
COUNTERS
of
NETWORK
PERFORMANCE...........................................................
132.2.1
ACCESSIBILITY.................................................................................................
132.2.2
RETAINABILITY...............................................................................................
132.2.3
ACCESS
FAILS...................................................................................................
132.3
IDLE
MODE
BEHAVIOR..........................................................................................................
142.4
LOCATION
UPDATE..............................................................................................................
..
162.5
CALL
SET
UP......................................................................................................................
......
172.6
CALL
SETUP
PROCESS
in
LAYER
3
MESSAGES.............................................................. 19
4 REPORTS of ANALYSIS
4.1 DOWNTOWN SEATTLE NETWORK PERFORMANCE RECOMMENDATION
4.2 LAKE SAMMAMISH AREA NETWORK PERFORMANCE RECOMMENDATION
5 CONCLUSION
1.2.6. Recommendations
Defining missing neighbor relationsProposing new sites or sector additions
with Before & After coverage plotsProposing antenna azimuth
changesProposing antenna tilt changesProposing antenna type changesBTS
Equipment/Filter
changeRetuning
of
interfered
frequenciesBSIC
changesAdjusting Handover margins (Power Budget, Level, Quality,
UmbrellaHOs)Adjusting accessibility parameters (RX Lev Acc Min,
etc..)Changing power parametersAttenuation Adds/RemovalsMHA/TMA adds
1.2.7. Tracking
Redriving areas after implementing recommendationsCreate a tracking file
to followup implementation of recommendations
This document was prepared with TEMS screen shots from live examples of
previousexperiences to guide RF Engineers on how to define/analyze
problems or cases and optimizenetwork. After each case/problem
demonstration, specific step to be taken will be defined andappropriate
recommendation will be given.The document will be focusing on Drive
Testing part of the Optimization Process and givedefinitions on basic GSM
principals, features and parameters when needed.The readers of this
document are considered to have basic knowledge of cell planning and
TEMSInvestigation usage. Only little information will be given just to
remember TEMS interface.
2. DRIVE TESTING
Drive testing is the most common and maybe the best way to analyze
Network performance bymeans of coverage evaluation, system availability,
network capacity, network retainibility andcall quality. Although it gives idea
only on downlink side of the process, it provides huge perspective to the
service provider about whats happening with a subscriber point of view.The
drive testing is basically collecting measurement data with a TEMS phone,
but the mainconcern is the analysis and evaluation part that is done after
completition of the test. Remember that you are always asked to perform a
drive test for not only showing the problems, but alsoexplaining them and
providing useful recommendations to correct them. Please note that
asuccessful analysis should be supported by handling of network statistics
from a statistics tool(Metrica/NetDocNMS/SRPOSS, etc..) and careful
evaluation of coverage predictions from acell planning tool (Planet, DB
Planner, TEMs Cell Planner, etc..). Please see
Figure 1
Figure 1 TEMs Screen: TEMs gives great presentation options to the user like
displaying multiple windows of different indicators on the map. Theme
properties will make you understand easier by showing the serving cell on
the map.
RxQual, C/A, TA, TX Power, TEMS SQI and FER of the serving cell andsignal
strength for two of the neighboring cells can also be displayed graphically in
a window.
Layer 2 Messages
Layer 3 Messages
Layer 2 and 3 messages and SMS cell broadcast messages are displayed in
separate scrollablewindows as can be seen in Figure 2. If desired, specific
Layer 3 messages can be displayed.By connecting an additional TEMS phone
to a vacant serial port of the PC, data from twonetworks can be monitored
and logged at the same time. In this case, the data from the secondmobile
phone is serving cell and neighboring cell data and radio environment
parameters.TEMS Investigation also can perform frequency scanning of all
2.2.1. Accessibility
Accessibility counter is one of the most important statistics and it is the
performance expression of the network at the first glance. Accessibility
iscalculated
by
multiplying
SDDCH
serviceability
by
TCH
accessibility.Accessibility = SDCCH Serviceability * TCH AccessibilityFor
accessibility performance of the network, repeated short call setupsmust be
performed by drive tests.
2.2.2. Retainability
Retainability is the clue to network continuity and targets TCH CallSuccess
rate of the network. It takes all type of drops into consideration.Retainability
= TCH Call Access Rate = 1 TCH Call Drop RateTCH Call Drop rate is
calculated by dividing total number of drop calls tonumber of total TCH
seizures and attempts. Total number of drop callscontains all types of TCH
drops including any radio related, user activated,network activated, ABIS fail,
A interface, LAPD, BTS failure or BSCUreset drops. Please note that any TCH
reestablishment should besubtracted from TCH call drop rate as call is
somehow able to continue.Total number of TCH attempts and seizures will
include any TCH seizuresfor new calls and TCH to TCH attempts during
Handover and number of intracell handovers as well.
The PLMN selection mechanism, the cell selection and reselection algorithms
in addition to thelocation updating procedure are the core of the idle mode
behavior. The purpose is to alwaysensure that the mobile is camped on the
(see Figure 4)
. This could be related to wrong Cell Reselection parameters like CRO Cell
Reselect Offset, Cell Reselect Hysteresis, Temporary Offset or Penalty Time
used in C1C2 criteria calculation.
Camping on a Bad
The cell selection algorithm tries to find the most suitable cell of the selected
PLMN according tovarious requirements. If no suitable cell is found and all
available and permitted PLMNs have been tried, the MS will try to camp on a
cell irrespective of PLMN identity and enter a limitedservice state. In this
state the MS will be able to make emergency calls only. If the MS
losescoverage it will return to the PLMN selection state and select another
PLMN.After a cell has been successfully selected, the MS will start the cell
reselection tasks. It willcontinuously make measurements on its neighboring
cells to initiate cell reselection if necessary.For multiband MSs the strongest
nonserving carriers may belong to different frequency bands.The MS
continuously monitors all neighboring BCCH carriers, as indicated by the BA
list, inaddition to the BCCH carrier of the serving cell, to detect if it is more
suitable to camp on another cell. At least five received signal level
measurement samples are required for each definedneighboring cell. A
running average of the received signal level will be maintained for
eachcarrier in the BA list. Provided that the MS is listening to the system
information in the cell andthat it is registered in the MSC/VLR handling this
cell, the MS can attempt to make a call.First, radio connection between MS
and network is established. Then MS indicates that it wantsto set up a call.
The identity of the MS, IMSI, is analyzed and the MS is marked as busy in
theVLR. Authentication is performed as described for location updating. Then
ciphering is initiated.MSC receives a setup message from the MS. This
information includes what kind of service theMS wants and the number
(called the B number) dialed by the mobile subscriber. MSC checksthat the
MS does not have services like barring of outgoing calls activated. Barring
can beactivated either by the subscriber or by the operator. If the MS is not
barred, the setup of the call proceeds. Between the MSC and the BSC a link is
established and a PCM TS is seized. The MSCsends a request to the BSC to
assign a traffic channel (TCH). The BSC checks if there is an idleTCH, assigns
it to the call and tells the BTS to activate the channel. The BTS sends
anacknowledgment when the activation is complete and then the BSC orders
the MS to transfer tothe TCH. The BSC informs the MSC when the assignment
is complete. The traffic controlsubsystem analyzes the digits and sets up the
connection to the called subscriber. The call isconnected through in the
group switch. An alert message is sent to the MS indicating that aringing
tone has been generated on the other side. The ringing tone generated in
the exchange onthe B subscriber side is sent to the MS via the group switch
in MSC. The ringing tone is sent over the air on the traffic channel.When the
B subscriber answers, the network sends a connect message to the MS
Figure 5
connect
Call Setup procedure starts with Channel Request Command and MS passes
to Dedicated Modewith this command. This channel request message is sent
in random mode on the RACH( Random access channel Uplink only, used to
request allocation of a SDCCH ) and the mostimportant part of the message
is Establishment cause. The cause for channel request could be; Answer to
paging Emergency call Call reestablishment Other services requested by
the mobile user (originating call, supplementary service shortmessage) All
Other casesBelow window dump in
Figure 6
Figure 8
Ciphering Mode Command message ( Figure 14) is sent on the main DCCH
from the network tothe mobile station to indicate that the network has
started deciphering and that enciphering anddeciphering shall be started in
the mobile station, or to indicate that ciphering will not be performed. This
message is followed by a Ciphering Mode complete message ( Figure 15).
Call Setup message ( Figure 16 ) is sent, from either the mobile station or
the network, to initiatecall establishment. It consists of below information
elements; Protocol discriminator Transaction identifier Message type
Repeat indicator: The repeat indicator information element is included
immediately before thefirst bearer capability information element when the
incall modification procedure is used. Bearer capabilities: In the mobile
station to network direction, at least one bearer capabilityinformation
element must always be present. In the network to mobile station direction,
the bearer capability information element may be omitted in the case where
the mobile subscriber isallocated only one directory number for all services.
Mobile identity: May be included by the calling mobile station to identify the
calling mobilestation. Facility: May be included for functional operation of
supplementary services. Progress indicator: Included in the event of
interworking
or
in
connection
with
the
provision
of
inband
information/patterns. Signal: Included if the network optionally provides
additional information describing tones. Calling party BCD number: May be
included by the network to identify the calling user. Calling party sub
address: Included in the Mobile Stationtonetwork direction when thecalling
user wants to indicate its sub address to the called user. Included in the
Figuere 16 Set Up
Call Proceeding message ( Figure 19) is sent by the network to the calling
mobile station toindicate that the requested call establishment information
has been received, and no morecall establishment information will be
accepted.
Assignment Command message ( Figure 20) is sent on the main DCCH by the
network to themobile station to change the channel configuration to another
independent dedicated channelconfiguration. Below are some definitions of
information given in this message. Channel mode information element
appears if the channel mode is changed for the channeldefined in the
mandatory part of the message. Channel description information element
Figure 22 Low Signal Level: In areas where there are few sites and too many
different types of terrain structures like hills or obstacles those stopping the
line of sight to the broadcasting signal, there might be a lot of coverage
(Figure 25)