Advertisement

A Cell Outage Detection Algorithm Using Neighbor Cell List Reports

  • Christian M. Mueller
  • Matthias Kaschub
  • Christian Blankenhorn
  • Stephan Wanke
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5343)

Abstract

Base stations experiencing hardware or software failures have negative impact on network performance and customer satisfaction. The timely detection of such so-called outage or sleeping cells can be a difficult and costly task, depending on the type of the error. As a first step towards self-healing capabilities of mobile communication networks, operators have formulated a need for an automated cell outage detection. This paper presents and evaluates a novel cell outage detection algorithm, which is based on the neighbor cell list reporting of mobile terminals. Using statistical classification techniques as well as a manually designed heuristic, the algorithm is able to detect most of the outage situations in our simulations.

Keywords

False Alarm Outage Detection Mobile Terminal Receive Signal Strength Indicator Visibility Graph 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lehser, F.: Self Organising LTE/SAE Network: Operator Requirements and Examples. In: 20th workshop of the ITG group 5.2.4, Ulm, Germany (September 2006), http://www.ikr.uni-stuttgart.de/Content/itg/fg524/
  2. 2.
    NGMN Alliance: Use cases related to self organising network: Overall description (April 2007), http://www.ngmn.org
  3. 3.
    NGMN Alliance: Annex A (informative) of use cases related to self organising network: Overall description (April 2007), http://www.ngmn.org
  4. 4.
    3GPP: Telecommunication management; Self-Organizing Networks (SON); Concepts and requirements. TS 32.500 (2008)Google Scholar
  5. 5.
    3GPP: Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Self-configuring and self-optimizing network (SON) use cases and solutions. TR 36.902 (2008)Google Scholar
  6. 6.
    FP7 Socrates: Self-optimisation & self-configuration in wireless networks, http://www.fp7-socrates.org/
  7. 7.
    FP7 E3: End-to-end efficiency (e3), http://ict-e3.eu
  8. 8.
    Cheung, B., Fishkin, S.G., Kumar, G.N., Rao, S.: Method of monitoring wireless network performance. USPTO Patent Application 20060063521 (March 2006)Google Scholar
  9. 9.
    Mueller, C.M., Kaschub, M., Blankenhorn, C., Wanke, S.: Design and evaluation of detection algorithms for base stations outages. In: 11th COST 290 MCM, TD(08)003, Tampere, Finland (2008)Google Scholar
  10. 10.
    Eberspächer, J., Vögel, H.J., Bettstetter, C.: GSM Global System for Mobile Communication. B.G. Teubner Stuttgart, Leipzig, Wiesbaden (2001)Google Scholar
  11. 11.
    Jain, A., Duin, R., Mao, J.: Statistical pattern recognition: a review. IEEE Transactions on Pattern Analysis and Machine Intelligence 22(1), 4–37 (2000)CrossRefGoogle Scholar
  12. 12.
    Breiman, L., Friedman, J., Stone, C.J., Olshen, R.: Classification and Regression Trees, 1st edn. Chapman & Hall/CRC (1984)Google Scholar
  13. 13.
    Duda, R.O., Hartr, P.E.: Pattern Classification and Scene Analysis. John Wiley and Sons Ltd., Chichester (1973)Google Scholar
  14. 14.
    Uhlich, S.: Classification Toolbox V1.2 (March 2008), http://www.lss.uni-stuttgart.de
  15. 15.
    IKR: Simulation library v2.6, http://www.ikr.uni-stuttgart.de
  16. 16.
    Forkel, I., Schinnenburg, M., Ang, M.: Generation of two-dimensional correlated shadowing for mobile radio network simulation. In: Proceedings of the Wireless Personal Multimedia Communications, WPMC (2004)Google Scholar
  17. 17.
    NGMN Alliance: Radio access performance evaluation methodology (June 2007), http://www.ngmn.org
  18. 18.
    Fawcett, T.: ROC Graphs: Notes and Practical Considerations for Researchers. Technical report, HP Laboratories, Palo Alto, USA (2004)Google Scholar
  19. 19.
    Wang, L. (ed.): Support Vector Machines: Theory and Applications. Studies in Fuzziness and Soft Computing. Springer, Berlin (2005)zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Christian M. Mueller
    • 1
  • Matthias Kaschub
    • 1
  • Christian Blankenhorn
    • 1
  • Stephan Wanke
    • 1
  1. 1.Institute of Communication Networks and Computer EngineeringUniversität StuttgartStuttgartGermany

Personalised recommendations