Sunday, 25 August 2013

Centralized SON


I was going through the presentation by SKT that I blogged about here and came across this slide above. SKT is clearly promoting the benefits of their C-SON (centralized SON) here.


The old 4G Americas whitepaper (here) explained the differences between the three approaches; Centralized (C-SON), Distributed (D-SON) and Hybrid (H-SON). An extract from that paper here:

In a centralized architecture, SON algorithms for one or more use cases reside on the Element Management System (EMS) or a separate SON server that manages the eNB's. The output of the SON algorithms namely, the values of specific parameters, are then passed to the eNB's either on a periodic basis or when needed. A centralized approach allows for more manageable implementation of the SON algorithms. It allows for use case interactions between SON algorithms to be considered before modifying SON parameters. However, active updates to the use case parameters are delayed since KPIs and UE measurement information must be forwarded to a centralized location for processing. Filtered and condensed information are passed from the eNB to the centralized SON server to preserve the scalability of the solution in terms of the volume of information transported. Less information is available at the SON server compared to that which would be available at the eNB. Higher latency due to the time taken to collect UE information restricts the applicability of a purely centralized SON architecture to those algorithms that require slower response time. Furthermore, since the centralized SON server presents a single point of failure, an outage in the centralized server or backhaul could result in stale and outdated parameters being used at the eNB due to likely less frequent updates of SON parameters at the eNB compared to that is possible in a distributed solution.

In a distributed approach, SON algorithms reside within the eNB’s, thus allowing autonomous decision making at the eNB's based on UE measurements received on the eNB's and additional information from other eNB's being received via the X2 interface. A distributed architecture allows for ease of deployment in multi-vendor networks and optimization on faster time scales. Optimization could be done for different times of the day. However, due to the inability to ensure standard and identical implementation of algorithms in a multi-vendor network, careful monitoring of KPIs is needed to minimize potential network instabilities and ensure overall optimal operation.

In practical deployments, these architecture alternatives are not mutually exclusive and could coexist for different purposes, as is realized in a hybrid SON approach. In a hybrid approach, part of a given SON optimization algorithm are executed in the NMS while another part of the same SON algorithm could be executed in the eNB. For example, the values of the initial parameters could be done in a centralized server and updates and refinement to those parameters in response to the actual UE measurements could be done on the eNB's. Each implementation has its own advantages and disadvantages. The choice of centralized, distributed or hybrid architecture needs to be decided on a use-case by use case basis depending on the information availability, processing and speed of response requirements of that use case. In the case of a hybrid or centralized solution, a practical deployment would require specific partnership between the infrastructure vendor, the operator and possibly a third party tool company. Operators can choose the most suitable approach depending upon the current infrastructure deployment.

Finally, Celcite CMO recently recently gave an interview on this topic on Thinksmallcell here. An extract below:

SON software tunes and optimises mobile network performance by setting configuration parameters in cellsites (both large and small), such as the maximum RF power levels, neighbour lists and frequency allocation. In some cases, even the antenna tilt angles are updated to adjust the coverage of individual cells.

Centralised SON (C-SON) software co-ordinates all the small and macrocells, across multiple radio technologies and multiple vendors in a geographic region - autonomously updating parameters via closed loop algorithms. Changes can be as frequent as every 15 minutes– this is partly limited by the bottlenecks of how rapidly measurement data is reported by RAN equipment and also the capacity to handle large numbers of parameter changes. Different RAN vendor equipment is driven from the same SON software. A variety of data feeds from the live network are continuously monitored and used to update system performance, allowing it to adapt automatically to changes throughout the day including outages, population movement and changes in services being used.

Distributed SON (D-SON) software is autonomous within each small cell (or macrocell) determining for itself the RF power level, neighbour lists etc. based on signals it can detect itself (RF sniffing) or by communicating directly with other small cells.

LTE has many SON features already designed in from the outset, with the X.2 interface specifically used to co-ordinate between small and macrocell layers whereas 3G lacks SON standards and requires proprietary solutions.
C-SON software is available from a relatively small number of mostly independent software vendors, while D-SON is built-in to each small cell or macro node provided by the vendor. Both C-SON and D-SON will be needed if network operators are to roll out substantial numbers of small cells quickly and efficiently, especially when more tightly integrated into the network with residential femtocells.

Celcite is one of the handful of C-SON software solution vendors. Founded some 10 years ago, it has grown organically by 35% annually to 450 employees. With major customers in both North and South America, the company is expanding from 3G UMTS SON technology and is actively running trials with LTE C-SON.

Quite a few companies are claiming to be in the SON space, but Celcite would argue that there are perhaps only half a dozen with the capabilities for credible C-SON solutions today. Few companies can point to live deployments. As with most software systems, 90% of the issues arise when something goes wrong and it's those "corner cases" which take time to learn about and deal with from real-world deployment experience.

A major concern is termed "Runaway SON" where the system goes out of control and causes tremendous negative impact on the network. It's important to understand when to trigger SON command and when not to. This ability to orchestrate and issue configuration commands is critical for a safe, secure and effective solution.

Let me know your opinions via comments below.

Friday, 23 August 2013

How Cyber-Attacks Can Impact M2M Infrastructure


An Interesting presentation from Deutsche Telekom in the Network Security Conference which highlights some of the issues faced by the M2M infrastructure. With 500 Billion devices being predicted, security will have to be stepped up for the M2M infrastructures to work as expected. Complete presentation embedded below:


Wednesday, 21 August 2013

eIMTA: Enhanced Interference Mitigation & Traffic Adaptation


eIMTA is one of the features being discussed in 3GPP Rel-12. The pictures above and below provide the details.
As can be seen, at the moment all the eNodeB's associated with a network has to transmit the same UL/DL pattern throughout out the system. With eIMTA, each eNodeB can decide the UL/DL pattern itself depending on the load.
The main challenge would be interference management while using this scheme.

See also, this slideshare presentation for details:

Monday, 12 August 2013

C-RAN Architecture and Challenges


I have blogged about Cloud RAN or C-RAN in the Metrocells blog here and am looking forward to more discussions on this topic in the SON conference later this year.


I came across this interesting presentation from Orange in the LTE World Summit this year where the authors have detailed the C-RAN architecture and also discussing the fronthaul challenges faced by C-RAN. The presentation is embedded as follows. Please feel free to add your comments with your opinions.




Thursday, 8 August 2013

2 Factor and 3 Factor Authentication (2FA / 3FA)

Found an interesting slide showing 2 Factor Authentication in picture from a presentation in LTE World Summit


You can also read more about this and Multi-factor Authentication (MFA) on Wikipedia here.

Tuesday, 6 August 2013

M2M, Cellular and Small Cells

I have written a post on this topic in the Cisco Service Provide Mobility blog here. The article is embedded as follows:



Feel free to add any comments you may have on the blog post here.

Friday, 2 August 2013

Mobile Relay Nodes (MRN) in Rel-12


Interesting article in IEEE Comms Magazine (embedded below) about the Moving Relay Node (MRN). 3GPP has done a study on a similar topic available in 3GPP TR 36.836. To make the case for the MRN they provide a reference scenario of high speed train

The TGV Eurostar in Europe is 393 m long, moves at speed reaching 300 km/h. The Shinkansen in Japan has similar characteristics, with 480 m long, 300 km/h of commercial speed. The high speed train in China is 432 m long moving at speed reaching 350 km/h.

Due to fast moving and well shield carriage, the network in high speed train scenario faces severe Doppler frequency shift and high penetration loss, reduced handover success rate and increased power consumption of UEs.


To improve the coverage of the train deployment, access devices can be mounted on the high speed train, providing a wireless backhaul connection via the eNBs along the railway by outer antenna e.g. installed on top of the train, and wireless connectivity to the UEs inside carriages by inner antenna installed inside.

MRN is a good solution but when it has to operate alongside with many other technologies can pose challenges. The IEEE article summarises it as follows:

Furthermore, new challenges regarding interference management arise due to the use of MRNs. As the distance between an MRN and the vehicular UE served by it is very short, the MRN and the vehicular UE can communicate with each other using very low power. In addition, the VPL can further help to dampen the signal of the MRN access link that propagates out from the vehicle. Thus, compared to direct transmission, the use of MRNs generates less interference from the access link, for both downlink and uplink, to UE outside the vehicles. This is appreciated in a densely deployed urban scenario where link availabilities are usually dependent on interference rather than coverage. For the backhaul link, however, the problem becomes complicated, as interference is expected both between different MRN backhaul links, and between MRN backhaul links and macro UE. The use of predictor antennas can improve CSI accuracy to enable the use of advanced interference avoidance and cancellation schemes for the backhaul links. Nevertheless, whether enhancements on the current intercell interference coordination (ICIC) framework in LTE are needed to support the use of MRNs still requires further investigation.

I have been thinking of possible use of 8x8 MIMO, this can be one possible scenario where the network may use 8x8 or even 4x4. Anyway, the complete article is embedded below:




Wednesday, 31 July 2013

Making LTE fit for the IoT

Another presentation from the #FWIC2013. This presentation by Vodafone covers some of the areas where the LTE standards are being tweaked for making M2M work with them without issues.


Another area is the access barring that I have blogged about before here. This will become important when we have loads of devices trying to access the network at the same time.

The presentation is embedded below and you can also listen to the audio here.


Monday, 29 July 2013

Big Data and Vulnerability of Cellular Systems

I am sure most of you are aware of Big Data, if not watch this video on my old post here. Moray Rumney from Agilent recently gave a talk in #FWIC on how Big Data techniques can be used to exploit the vulnerabilities in a cellular system. Though the talk focussed on GSM and 3G, it is always a good intro. The presentation embedded below:



You can also listen to the audio of his presentation here.