What Is a WLAN Optimizer?
GSM wireless network optimization is to find out the reasons that affect the network quality by means of traffic data analysis, field test data collection, parameter analysis, hardware inspection, etc. on the existing network, and through parameter modification and network structure adjustment 3. Adjust the equipment configuration and adopt certain technical means (using MRP planning methods, etc.) to ensure the high-quality operation of the system, to obtain the best benefits from the existing network resources, and to obtain the maximum benefits with the most economical investment.
Wireless network optimization
- With the rapid growth of mobile communication users, the end users have higher and higher requirements for network communication quality, and mobile operators have also launched large-scale efforts to improve user perception.
- GSM wireless network optimization is a closed-loop processing flow, which goes on and on and improves continuously. With the continuous deepening of optimization work in the past two years, the optimization work of each branch company has actually entered a deeper level of analysis and optimization.
- That is, on the basis of ensuring the full use of existing network resources, various measures are taken to resolve local defects in the network. In the end, comprehensive wireless coverage is seamless, the connection rate is high, the call is continuous, and the voice is clear and undistorted.
- Network optimization based on user perception will inevitably deal with user complaints. Generally, there are the following situations:
- Call not connected
- Signaling establishment process
- After the mobile phone receives the paging request (paging request) message sent via the PCH (paging channel), the call loss caused by the SDCCH congestion cannot send the paging response (paging response) message back.
- Countermeasures: SDCCH congestion can be reduced by adjusting the ratio of SDCCH to TCH, increasing the carrier frequency, and adjusting the BCC (base station color code).
- Call loss caused by the inability to allocate SDCCH due to mobile phone withdrawal from service.
- Countermeasures: For the off-network phenomenon caused by blind spots, you can increase the base station coverage by increasing the power of the base station and the antenna height; for the off-network phenomenon caused by interference at the BCCH frequency point, you can change the frequency, adjust network parameters, antenna tilt angle and other parameters To eliminate interference.
- Authentication process
- Call loss caused by authentication failure due to signaling problems between the MSC, HLR, and BSC, or failure of the MSC, HLR, BSC, and mobile phone during processing.
- Countermeasure: Since authentication is not necessary during the call, and from a security perspective, authentication is not required for each call. Therefore, you can increase the number of authentication parameters after how many calls.
- Encryption process
- Call loss due to failure of MSC, BSC or mobile phone during encryption processing.
- Countermeasure: At present, the call is generally not encrypted.
- After occupying the SDCCH from the mobile phone and then assigning the TCH
- Call loss caused by SDCCH dropped due to wireless reasons (such as RadioLinkFailure, hardware failure).
- Countermeasure: Through road test field strength analysis and actual dialing analysis, take corresponding measures to solve problems caused by wireless reasons such as poor signal and interference; for hardware failure, replace the corresponding unit module to solve.
- Voice channel assignment process
- Call loss caused by failure to assign TCH wirelessly (such as TCH congestion, or the mobile phone has been assigned to a certain TCH by the MSC, and the TCH cannot be occupied for some reason, resulting in a link interruption, etc.).
- Countermeasure: For TCH congestion problems, measures such as balancing traffic, adjusting related cell service range parameters, and enabling directional retry can be used to reduce TCH congestion. For cases where TCH is not occupied, it is usually a hardware failure. Test or analyze the CALLHOLDINGTIME parameter in traffic statistics
- Wireless network performance test method
- Built-in methods
- Whether it is an NMS, an enterprise wireless access point (AP), or the client device used, they can usually report us some very valuable knowledge, such as:
- Client devices: There are many different situations here. MacBook Pro can view the specific AP (MAC address) it is connected to, the data transmission speed of the AP, and the signal strength and quality of the signal received by the WLAN adapter. Windows PC or Android smartphone can only see the data transfer speed.
- · AP / Controller: On the management interface, we can view the connected clients in real time, the identifier of the service set they are in, the connection details and the number of traffic transmitted. However, traffic types are usually not seen here.
- NMS: There are many variants of network management systems, some are simple monitoring tools, and some are configuration frameworks with powerful reporting tools and analysis engines. Depending on the specific NMS vendor and authorization method we use, we may be able to view the applications used by each client centrally or individually, and the degree of "tidyness" of the overall situation, which can be measured by any AP in the system-including the current Measured and historical measurements. In addition, there may be some simple client-side troubleshooting tools that can report errors in authentication or related processes for a given client. [1]