Abstract: The present disclosure relates to a method and a system [300] for managing underperforming cells in a communication network. The present disclosure encompasses: a collection unit [304], to collect performance parameters for cells of the communication network, at network analysis and monitoring (NAM) system [302]. Further, an identification unit [306] at the NAM system [302], identifies the violator cells among the cells of the communication network, based on key performance indicators (KPIs) which are calculated based on performance parameters collected over pre-defined period of time. Further, a filtering unit [308] at the NAM system [302], filters the identified violator cells based on the performance parameters collected over the pre-defined period. Further, a monitoring unit [310] at the NAM system [302], monitors a second parameters of the violator cells. Further, a recommendation unit [312] at the NAM system [302], recommend multiple actions for the violator cells based on the second parameters. [FIG. 3]
FORM 2
THE PATENTS ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“METHOD AND SYSTEM FOR MANAGING UNDERPERFORMING CELLS IN A COMMUNICATION
NETWORK”
We, Jio Platforms Limited, an Indian National, of Office - 101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
METHOD AND SYSTEM FOR MANAGING UNDERPERFORMING CELLS IN A COMMUNICATION NETWORK
FIELD OF INVENTION
[0001] Embodiments of the present disclosure generally relate to wireless communication systems. More particularly, embodiments of the present disclosure relate to methods and systems for managing underperforming cells in a communication network.
BACKGROUND
[0002] The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of the prior art.
[0003] Wireless communication technology has rapidly evolved over the past few decades, with each generation bringing significant improvements and advancements. The first generation of wireless communication technology was based on analog technology and offered only voice services. However, with the advent of the second-generation (2G) technology, digital communication and data services became possible, and text messaging was introduced. Third generation (3G) technology marked the introduction of high-speed internet access, mobile video calling, and location-based services. The fourth generation (4G) technology revolutionized wireless communication with faster data speeds, better network coverage, and improved security. Currently, the fifth generation (5G) technology is being deployed, promising even faster data speeds, low latency, and the ability to connect multiple devices simultaneously. With each generation, wireless
communication technology has become more advanced, sophisticated, and capable of delivering more services to its users.
[0004] In the 5G communication system, there is provided a plurality of network functions (NFs), for example an Access and Mobility Management Function (AMF), a Session Management function (SMF), an Authentication Server function (AUSF), a Network Slice Selection Function (NSSF), a Policy control function (PCF), a Network Repository Function (NRF), a Network Data Analytics Function (NWDAF) and the like. One or more of the aforementioned NFs communicate with each other, to implement multiple activities on the 5G communication system. For example, for data transfer, the AMF communicates with the SMF, to initiate the communication. Accordingly, one or more connections are established between two peer NFs, to allow communication between them, and thus enable activities there between. For providing network functions and services, network operators make deployment plan of network elements, devices and resources along with monitoring the performance of network elements and try to figure out causes of problems and issues during service delivery, so that network can be optimized, and users may get better service experience.
[0005] In a telecommunication network deployment, cell level optimization plays an important role in improving customer experience. The quick resolution of issues pertaining to cells is essential for improving overall end-user experience. In traditional methods, degradation in the cell is identified using a Bursty busy hour (BBH) of the cell. However, with the increase in data traffic, concept of the BBH does not provide optimal solution for checking the cell degradation due to similar traffic across all hours.
[0006] Thus, there exists an imperative need in the art to provide an efficient system and method for identification and resolution to improve the performance of poor performing cells in the network.
SUMMARY
[0007] This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
[0008] An aspect of the present disclosure may relate to a method for managing underperforming cells in a communication network. The method comprises collecting continuously, by a collection unit, at a network analysis and monitoring (NAM) system, one or more performance parameters for one or more cells of the communication network. The method further comprises identifying, by an identification unit at the NAM system, one or more violator cells from among the one or more cells of the communication network, based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters collected for a pre-defined period of time. The method further comprises filtering, via a filtering unit at the NAM system, the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time. The method further comprises monitoring, by a monitoring unit at the NAM system, one or more second parameters of the one or more violator cells. The method further comprises recommending, by a recommendation unit at the NAM system, one or more actions for the one or more violator cells based on the one or more second parameters.
[0009] In an exemplary aspect of the present disclosure, the one or more performance parameters comprise of a consistency, a number of days of consistency, a block error rate, an average physical resource block utilization, an Internet Protocol (IP) throughput, an available physical resource block threshold, a perceived user throughput, and a carried traffic value.
[0010] In an exemplary aspect of the present disclosure, the one or more second parameters comprise at least the IP throughput and a physical resource block (PRB) utilization.
[0011] In an exemplary aspect of the present disclosure, the present disclosure further comprises generating, by a generation unit at the NAM system, a performance report comprising the one or more second parameters and the one or more actions for the one or more violator cells.
[0012] In an exemplary aspect of the present disclosure, the one or more actions comprises at least one of a prioritising action associated with the identified one or more violator cells for a pr-defined time period.
[0013] In an exemplary aspect of the present disclosure, the present disclosure further comprises providing, via a graphical user interface (GUI) at the NAM system, a visual representation of the performance report for one or more authorised users.
[0014] In an exemplary aspect of the present disclosure, the at least one of the one or more violator cells is identified as an overshooting cell.
[0015] In an exemplary aspect of the present disclosure, the one or more actions comprise at least a capacity addition recommendation, a load balancing recommendation, an optimization recommendation, and a voice centric resolution recommendation.
[0016] In an exemplary aspect of the present disclosure, the present disclosure further comprises modifying, by a modification unit at the NAM system, a set of tunable parameters of the one or more violator cells, based on a user input of the one or more authorised users.
[0017] Another aspect of the present disclosure may relate to a system for managing underperforming cells in a communication network. The system comprises a collection unit, configured to continuously collect one or more performance parameters for one or more cells of the communication network. Further, the system comprises an identification unit, connected to at least the collection unit. The identification unit configured to identify one or more violator cells from among the one or more cells of the communication network based on the one or more key performance indicators (KPIs) calculated based on the one or more performance parameters, collected for a pre-defined period of time. Further, the system comprises a filtering unit, connected to at least the identification unit. The filtering unit is configured to filter the identified one or more cells from among the one or more cells, based on the one or more performance parameters collected for a pre-defined period of time. Further, the system comprises a monitoring unit, connected to at least the identification unit, the monitoring unit configured to monitor one or more second parameters of the one or more violator cells. Further, the system comprises a recommendation unit, connected to at least the monitoring unit, the recommendation unit configured to recommend one or more actions for the one or more violator cells based on the one or more second parameters.
[0018] Another aspect of the present disclosure may relate to a User Equipment (UE) for managing underperforming cells in a communication network. The UE comprises a memory, and a processor coupled to the memory. The processor is configured to transmit to a system, a request to manage underperforming cells in the communication network, and receive, from the system, a response comprising a recommended one or more actions for one or more violator cells based on the request. Further, the recommended one or more actions for the one or more violator cells are received based on: collecting continuously, by the system, one or more performance parameters for one or more cells of the communication network, identifying, by the system, the one or more violator cells from among the one or more cells of the communication network, based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters
collected for a pre-defined period of time, and filtering, by the system, the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time, and furthermore monitoring, by the system, one or more second parameters of the one or more violator cells.
[0019] Yet another aspect of the present disclosure may relate to a non-transitory computer readable storage medium storing instructions for managing underperforming cells in a communication network, the instructions include executable code which, when executed by one or more units of a system, causes: a collection unit to of the system collect continuously, one or more performance parameters for one or more cells of the communication network. Further, the instructions include executable code, which when executed causes an identification unit of the system to identify, one or more violator cells from among the one or more cells of the communication network, based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters collected for a pre-defined period of time. Further, the instructions include executable code, which when executed causes a filtering unit of the system to filter, the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time. Further, the instructions include executable code, which when executed causes a monitoring unit of the system to monitor, one or more second parameters of the one or more violator cells; a recommendation unit of the system to recommend, one or more actions for the one or more violator cells based on the one or more second parameters.
OBJECTS OF THE DISCLOSURE
[0020] Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
[0021] It is an object of the present disclosure to provide a system and a method for managing underperforming cells and/or violator cells in a communication network to improve the customer experience.
[0022] It is another object of the present disclosure to provide a system and a method for detecting poor performance cell for a consistent time-period and providing curative actions based on the series of threshold check on various capacity and quality KPIs of the cell.
[0023] It is another object of the present disclosure to provide a system and a method for monitoring user experience every hour to improve the customer experience by consistent cell check.
DESCRIPTION OF THE DRAWINGS
[0024] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Also, the embodiments shown in the figures are not to be construed as limiting the disclosure, but the possible variants of the method and system according to the disclosure are illustrated herein to highlight the advantages of the disclosure. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components or circuitry commonly used to implement such components.
[0025] FIG. 1 illustrates an exemplary block diagram representation of 5th generation core (5GC) network architecture.
[0026] FIG. 2 illustrates an exemplary block diagram of a computing device upon which the features of the present disclosure may be implemented in accordance with exemplary implementation of the present disclosure.
5 [0027] FIG. 3 illustrates an exemplary block diagram of a system for managing
underperforming cells in a communication network, in accordance with exemplary implementations of the present disclosure.
[0028] FIG. 4 illustrates an exemplary flow diagram of method for managing
10 underperforming cells in a communication network, in accordance with exemplary
implementations of the present disclosure.
[0029] FIG. 5 illustrates an exemplary flowchart diagram of a method for managing
underperforming cells in a communication network, in accordance with exemplary
15 implementations of the present disclosure
[0030] The foregoing shall be more apparent from the following more detailed description of the disclosure.
20 DETAILED DESCRIPTION
[0031] In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that
25 embodiments of the present disclosure may be practiced without these specific
details. Several features described hereafter may each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above.
30
9
[0032] The ensuing description provides exemplary embodiments only, and is not
intended to limit the scope, applicability, or configuration of the disclosure. Rather,
the ensuing description of the exemplary embodiments will provide those skilled in
the art with an enabling description for implementing an exemplary embodiment.
5 It should be understood that various changes may be made in the function and
arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0033] Specific details are given in the following description to provide a thorough
10 understanding of the embodiments. However, it will be understood by one of
ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. 15
[0034] Also, it is noted that individual embodiments may be described as a process
which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure
diagram, or a block diagram. Although a flowchart may describe the operations as
a sequential process, many of the operations may be performed in parallel or
20 concurrently. In addition, the order of the operations may be re-arranged. A process
is terminated when its operations are completed but could have additional steps not included in a figure.
[0035] The word “exemplary” and/or “demonstrative” is used herein to mean
25 serving as an example, instance, or illustration. For the avoidance of doubt, the
subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
30 known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed
10
description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements.
5 [0036] As used herein, a “processing unit” or “processor” or “operating processor”
includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a Digital
10 Signal Processing (DSP) core, a controller, a microcontroller, Application Specific
Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or
15 processing unit is a hardware processor.
[0037] As used herein, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a
20 communication device” may be any electrical, electronic and/or computing device
or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, wearable device or any other computing device which is capable
25 of implementing the features of the present disclosure. Also, the user device may
contain at least one input means configured to receive an input from unit(s) which are required to implement the features of the present disclosure.
[0038] As used herein, “storage unit” or “memory unit” refers to a machine or
30 computer-readable medium including any mechanism for storing information in a
form readable by a computer or similar machine. For example, a computer-readable
11
medium includes read-only memory (“ROM”), random access memory (“RAM”),
magnetic disk storage media, optical storage media, flash memory devices or other
types of machine-accessible storage media. The storage unit stores at least the data
that may be required by one or more units of the system to perform their respective
5 functions.
[0039] As used herein “interface” or “user interface” refers to a shared boundary
across which two or more separate components of a system exchange information
or data. The interface may also be referred to a set of rules or protocols that define
10 communication or interaction of one or more modules or one or more units with
each other, which also includes the methods, functions, or procedures that may be called.
[0040] As used herein the transceiver unit includes at least one receiver and at least
15 one transmitter configured respectively for receiving and transmitting data, signals,
information or a combination thereof between units/components within the system and/or connected with the system.
[0041] All modules, units, components used herein, unless explicitly excluded
20 herein, may be software modules or hardware processors, the processors being a
general-purpose processor, a special purpose processor, a conventional processor,
a digital signal processor (DSP), a plurality of microprocessors, one or more
microprocessors in association with a DSP core, a controller, a microcontroller,
Application Specific Integrated Circuits (ASIC), Field Programmable Gate Array
25 circuits (FPGA), any other type of integrated circuits, et
[0042] As discussed in the background section, the current known solutions have
several shortcomings, such as in traditional methods, the concept of the bursty busy
hour (BBH) fails to provide an optimal solution for checking cell degradation due
30 to similar traffic across all hours. The present disclosure aims to overcome the
above-mentioned and other existing problems in this field of technology by
12
providing a solution for managing underperforming cells in a communication
network. The solution of the present disclosure, in order to accurately identify
underperforming cells, analyses Key Performance Indicators (KPIs) hourly. In the
solution of the present disclosure, cells are identified as underperforming cells in
5 the event they breach specific thresholds at least once daily till the latest day. These
underperforming cells are then screened for consistency over a broader timeframe:
at least 1 hour per day for 6 out of 9 days. The solution further allows for adjusting
KPI thresholds and consistency checks through a user-friendly interface and may
also further trigger detailed analysis and propose tailored actions such as increasing
10 capacity based on sector traffic, balancing loads by adjusting Internet Protocol (IP)
throughput and Physical Resource Block (PRB) availability, and addressing overshooting issues associated with the underperforming cells.
[0043] Further, in accordance with the present disclosure, it is to be acknowledged
15 that the functionality described for the various components/units can be
implemented interchangeably. While specific embodiments may disclose a
particular functionality of these units for clarity, it is recognized that various
configurations and combinations thereof are within the scope of the disclosure. The
functionality of specific units as disclosed in the disclosure should not be construed
20 as limiting the scope of the present disclosure. Consequently, alternative
arrangements and substitutions of units, provided they achieve the intended functionality described herein, are considered to be encompassed within the scope of the present disclosure.
25 [0044] FIG. 1 illustrates an exemplary block diagram representation of 5th
generation core (5GC) network architecture, in accordance with exemplary implementation of the present disclosure. As shown in FIG. 1, the 5GC network architecture [100] includes a user equipment (UE) [102], a radio access network (RAN) [104], an access and mobility management function (AMF) [106], a Session
30 Management Function (SMF) [108], a Service Communication Proxy (SCP) [110],
an Authentication Server Function (AUSF) [112], a Network Slice Specific
13
Authentication and Authorization Function (NSSAAF) [114], a Network Slice
Selection Function (NSSF) [116], a Network Exposure Function (NEF) [118], a
Network Repository Function (NRF) [120], a Policy Control Function (PCF) [122],
a Unified Data Management (UDM) [124], an application function (AF) [126], a
5 User Plane Function (UPF) [128], a data network (DN) [130], wherein all the
components are assumed to be connected to each other in a manner as obvious to the person skilled in the art for implementing features of the present disclosure.
[0045] Radio Access Network (RAN) [104] is the part of a mobile
10 telecommunications system that connects user equipment (UE) [102] to the core
network (CN) and provides access to different types of networks (e.g., 5G network). It consists of radio base stations and the radio access technologies that enable wireless communication.
15 [0046] Access and Mobility Management Function (AMF) [106] is a 5G core
network function responsible for managing access and mobility aspects, such as UE registration, connection, and reachability. It also handles mobility management procedures like handovers and paging.
20 [0047] Session Management Function (SMF) [108] is a 5G core network function
responsible for managing session-related aspects, such as establishing, modifying, and releasing sessions. It coordinates with the User Plane Function (UPF) for data forwarding and handles IP address allocation and QoS enforcement.
25 [0048] Service Communication Proxy (SCP) [110] is a network function in the 5G
core network that facilitates communication between other network functions by providing a secure and efficient messaging service. It acts as a mediator for service-based interfaces.
14
[0049] Authentication Server Function (AUSF) [112] is a network function in the 5G core responsible for authenticating UEs during registration and providing security services. It generates and verifies authentication vectors and tokens.
5 [0050] Network Slice Specific Authentication and Authorization Function
(NSSAAF) [114] is a network function that provides authentication and authorization services specific to network slices. It ensures that UEs can access only the slices for which they are authorized.
10 [0051] Network Slice Selection Function (NSSF) [116] is a network function
responsible for selecting the appropriate network slice for a UE based on factors such as subscription, requested services, and network policies.
[0052] Network Exposure Function (NEF) [118] is a network function that exposes
15 capabilities and services of the 5G network to external applications, enabling
integration with third-party services and applications.
[0053] Network Repository Function (NRF) [120] is a network function that acts
as a central repository for information about available network functions and
20 services. It facilitates the discovery and dynamic registration of network functions.
[0054] Policy Control Function (PCF) [122] is a network function responsible for policy control decisions, such as QoS, charging, and access control, based on subscriber information and network policies. 25
[0055] Unified Data Management (UDM) [124] is a network function that centralizes the management of subscriber data, including authentication, authorization, and subscription information.
15
[0056] Application Function (AF) [126] is a network function that represents external applications interfacing with the 5G core network to access network capabilities and services.
5 [0057] User Plane Function (UPF) [128] is a network function responsible for
handling user data traffic, including packet routing, forwarding, and QoS enforcement.
[0058] Data Network (DN) [130] refers to a network that provides data services to
10 user equipment (UE) in a telecommunications system. The data services may
include but are not limited to Internet services, private data network related services.
[0059] FIG. 2 illustrates an exemplary block diagram of a computing device [200] upon which the features of the present disclosure may be implemented in
15 accordance with exemplary implementation of the present disclosure. In an
implementation, the computing device [200] may also implement a method for message routing management utilising the system. In another implementation, the computing device [200] itself implements the method for message routing management using one or more units configured within the computing device [200],
20 wherein said one or more units are capable of implementing the features as
disclosed in the present disclosure.
[0060] The computing device [200] may include a bus [202] or other communication mechanism for communicating information, and a processor [204]
25 coupled with bus [202] for processing information. The processor [204] may be, for
example, a general-purpose microprocessor. The computing device [200] may also include a main memory [206], such as a random-access memory (RAM), or other dynamic storage device, coupled to the bus [202] for storing information and instructions to be executed by the processor [204]. The main memory [206] also
30 may be used for storing temporary variables or other intermediate information
during execution of the instructions to be executed by the processor [204]. Such
16
instructions, when stored in non-transitory storage media accessible to the processor
[204], render the computing device [200] into a special-purpose machine that is
customized to perform the operations specified in the instructions. The computing
device [200] further includes a read only memory (ROM) [208] or other static
5 storage device coupled to the bus [202] for storing static information and
instructions for the processor [204].
[0061] A storage device [210], such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to the bus [202] for storing information and
10 instructions. The computing device [200] may be coupled via the bus [202] to a
display [212], such as a cathode ray tube (CRT), Liquid crystal Display (LCD), Light Emitting Diode (LED) display, Organic LED (OLED) display, etc. for displaying information to a computer user. An input device [214], including alphanumeric and other keys, touch screen input means, etc. may be coupled to the
15 bus [202] for communicating information and command selections to the processor
[204]. Another type of user input device may be a cursor controller [216], such as a mouse, a trackball, or cursor direction keys, for communicating direction information and command selections to the processor [204], and for controlling cursor movement on the display [212]. This input device typically has two degrees
20 of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allow
the device to specify positions in a plane.
[0062] The computing device [200] may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware
25 and/or program logic which in combination with the computing device [200] causes
or programs the computing device [200] to be a special-purpose machine. According to one implementation, the techniques herein are performed by the computing device [200] in response to the processor [204] executing one or more sequences of one or more instructions contained in the main memory [206]. Such
30 instructions may be read into the main memory [206] from another storage medium,
such as the storage device [210]. Execution of the sequences of instructions
17
contained in the main memory [206] causes the processor [204] to perform the process steps described herein. In alternative implementations of the present disclosure, hard-wired circuitry may be used in place of or in combination with software instructions. 5
[0063] The computing device [200] also may include a communication interface [218] coupled to the bus [202]. The communication interface [218] provides a two-way data communication coupling to a network link [220] that is connected to a local network [222] and the local network [222] is further connected to the host
10 [224]. For example, the communication interface [218] may be an integrated
services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, the communication interface [218] may be a local area network (LAN) card to provide a data communication connection to a compatible
15 LAN. Wireless links may also be implemented. In any such implementation, the
communication interface [218] sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing several types of information.
20 [0064] The computing device [200] can send messages and receive data, including
program code, through the network(s), the network link [220] and the communication interface [218]. In the Internet example, a server [230] might transmit a requested code for an application program through the Internet [228], the ISP [226], the local network [222] and the communication interface [218]. The
25 received code may be executed by the processor [204] as it is received, and/or stored
in the storage device [210], or other non-volatile storage for later execution.
[0065] Referring to FIG. 3, an exemplary block diagram of a system [300] for
managing underperforming cells in a communication network, is shown, in
30 accordance with the exemplary implementations of the present disclosure. The
system [300] comprises at least one network analysis and monitoring (NAM)
18
system [302], wherein the NAM system [302] further comprises at least one
collection unit [304], at least one identification unit [306], at least one filtering unit
[308], at least one monitoring unit [310], at least one recommendation unit [312],
at least one generation unit [314], a graphical user interface (GUI) [316], at least
5 one modification unit [318], and at least one storage unit [320]. Also, all of the
components/ units of the system [300] are assumed to be connected to each other unless otherwise indicated below. As shown in the figures all units shown within the system [300] should also be assumed to be connected to each other. Also, in FIG. 3 only a few units are shown, however, the system [300] may comprise
10 multiple such units or the system [300] may comprise any such numbers of said
units, as required to implement the features of the present disclosure. Further, in an implementation, the system [300] may be present in a user device/ user equipment [102] to implement the features of the present disclosure. The system [300] may be a part of the user device [102]/ or may be independent of but in communication
15 with the user device [102] (may also referred herein as a UE). In another
implementation, the system [300] may reside in a server or a network entity. In yet another implementation, the system [300] may reside partly in the server/ network entity and partly in the user device.
20 [0066] The system [300] is configured for managing the underperforming cells in
the communication network, with the help of the interconnection between the components/units of the system [300]. The communication network mentioned here may refer to a cluster of interconnected cells across a geographical area, for providing a wireless network coverage to a plurality of users associated with said
25 communication network.
[0067] The term “Network Analysis and Monitoring” may determine a
performance and availability of a network entity (cells or base station) and may
accordingly assist (based on the performance and availability of the network entity)
30 in optimizing network efficiency of the network entity in real time.
19
[0068] Further, the NAM system [302] comprises the collection unit [304],
configured to continuously collect one or more performance parameters for one or
more cells of the communication network. Further, the one or more performance
parameters comprise a consistency, a number of days of consistency, a block error
5 rate, an average physical resource block utilization, an IP throughput, an available
physical resource block threshold, a perceived user throughput, and a carried traffic value.
[0069] The NAM system [302] may wirelessly collect the one or more performance
10 parameters for the one or more cells. The collection of the one or more performance
parameters by the collection unit [304] is performed at a frequent time interval. Herein, the frequent time interval may relate to a regular time span for a consecutive time period. For ease in understanding, consider an example in case the regular time span is at least one hour, and the consecutive time period is six days, then in such a
15 case, the collection unit [304] may collect the one or more performance parameters
for at least one hour per day for consecutively 6 days. It is to be noted that the frequent time interval may use a plurality of combination for said time span and said time period, that may be obvious to the person skilled in the art for implementing the solution as disclosed herein.
20
[0070] Further the one or more performance parameters comprise a consistency, a number of days of consistency, a block error rate, an average physical resource block utilization, an Internet Protocol (IP) throughput, an available physical resource block threshold, a perceived user throughput, and a carried traffic value.
25
[0071] The collection unit [304] mentioned herein may fetch the performance parameters for the one or more cells in real-time for determining the performance of the one or more cells that are present in the communication network.
30 [0072] As used herein “consistency” for the one or more cells of the
communication network refers to the reliability and uniformity of a service and/or
20
performance of the one or more cells in reference to a time-duration such as, for
example, 1 hour of a day. The consistency denotes an ability of the one or more
cells to maintain a stable level of service in the communication network without
fluctuations or interruptions. Further, as used herein “number of days of
5 consistency” refers to the reliability and uniformity of the service and/or
performance of the one or more cells in reference to number of days in a particular period such as a month or a week, for e.eg., 15 consecutive days in the month, 6 days out of 9 days, etc.
10 [0073] As used herein, the block error rate may refer to a probability of errors in a
data block to the total number of data blocks transmitted over a communication channel by the one or more cells of the communication network. Herein, the data blocks may refer to a fixed-size unit of data transferred by the one or more cells over the communication channel.
15
[0074] As used herein, the average physical resource block utilization may refer to the average number of resource blocks (such as frequency domain, time domain) that are utilized by the one or more cells in a particular time period.
20 [0075] As used herein, the IP throughput may refer to a data transmission rate for
IP (Internet Protocol) based services (such as internet surfing, web browsing) on one or more user devices. The IP throughput may further indicate an efficiency of a specific cell from the one or more cells in handing a data traffic at the communication network. Further, the IP throughput is measured in bits per second
25 (bps) to reflect an actual data transfer rate achieved by the IP based services.
[0076] As used herein, the perceived user throughput may refer to a measure of a
data transfer speed/rate of data transmission from the one or more cells of the
communication network which is experienced by a user operating said one or more
30 cells (which may include latency during calls, or a response of the Internet for one
or more users connected with each cell of one or more cells).
21
[0077] Furthermore, as used herein, the carried traffic value may refer to a total volume of the data traffic handled by each cell from the one or more cells over a specific time period. 5
[0078] The NAM system [302] further comprises an identification unit [306],
connected to at least the collection unit [304], the identification unit [306]
configured to identify one or more violator cells from among the one or more cells
of the communication network based on the one or more key performance
10 indicators (KPIs) calculated based on the one or more performance parameters,
collected for a time period. Further, the at least one of the one or more violator cells is identified as an overshooting cell.
[0079] It is to be noted that the Key Performance Indicators (KPIs) of the
15 communication network refers to measurable parameters used to assess a
performance and efficiency of the communication network and/or the one or more
cells of the communication network. The KPI are utilised for monitoring and
optimizing network quality and include metrics such as a signal strength metric, a
data throughput metric, a latency metric, a packet loss metric, and an overall service
20 availability metric.
[0080] In accordance with the present solution, the calculated one or more KPIs may help to determine a set of information associated with each cell from the one or more cells in the communication network such as cell quality information, a data
25 transfer rate information, and a resource utilization information, etc. Further, it is to
be noted that the pre-defined period herein may correspond to a specific time period such as hourly, daily, monthly or yearly and alike). Further, the one or more KPIs as mentioned are calculated based on the collected one or more parameters over the per-determined period of time, such a 1 hour of each day, a fixed time slot of each
30 day etc.
22
[0081] As used herein, “violator cell”, refers to a cell (base station) within the
communication network that is identified as causing interference or violating
certain quality criteria established by a communication network operator or a
regulatory body. Further, a cell from the one or more cells associated with the
5 communication network may be identified as the violator cell in an event it is
associated with an excessive interference, a poor signal quality, and/or a failure to adhere to prescribed operational parameters like power levels or frequency assignments.
10 [0082] As used herein, overshooting cell, refers to a neighbouring cell whose
coverage area extends significantly beyond what is intended or optimal for planning a network coverage area associated with the communication network. The overshooting cell may increase a probability of unnecessary handovers, interferences, and inefficient resource allocation within the communication
15 network. Further, the overshooting cell may cause a UE from neighbouring cell to
attempt attaching to the overshooting cell, leading to increased handover attempts and potential degradation in overall network performance. Thus, the overshooting cell mentioned herein may refer to a particular cell which may transmit signal beyond a basic coverage of that particular cell.
20
[0083] Furter, the underperforming cells as used herein, refers to the one or more cells having KPIs below a threshold, which may correspond to poor signal-to-noise (SNR) ratio, low handover success rate or excessive network latency.
25 [0084] For example, in an implementation of the present disclosure, considering a
scenario where the one or more parameters indicate that the signal strength of a particular cell is overlapping a coverage area of an adjacent cell, the identification unit [306] in such case may identify the particular cell as the violator cell.
30 [0085] The NAM system [302] further comprises a filtering unit [308], connected
to at least the identification unit [306], the filtering unit [308] is configured to filter
23
the identified one or more cells from among the one or more cells, that are identified by the identification unit [306], based on the one or more performance parameters collected for the pre-defined period.
5 [0086] For example, in an implementation of the present disclosure, considering a
scenario where the one or more KPIs of a set of cells may showcase a drop in a
perceived user throughput over a per-determined period of time (let us say over a
week). In such cases, the identification unit [306] may identify at least one cell from
the set of cells as a violator cell that is associated with the drop in the perceived
10 user throughput, thereafter, the filtering unit [308] at the NAM system [302] filters
out the violator cell from the set of cells that is associated with the perceived user throughput.
[0087] The NAM system [302] further comprises a monitoring unit [310],
15 connected to at least the identification unit [306], the monitoring unit [310]
configured to monitor one or more second parameters of the one or more violator cells. Further, the one or more second parameters comprise at least the IP throughput and physical resource block (PRB) utilization.
20 [0088] The solution of the present disclosure as disclosed herein monitors the one
or more second parameters i.e., the IP throughput and the physical resource block (PRB) utilization associated with the filtered one or more identified violator cells. It is to be noted that the one or more second parameter may include further parameters that are known in the art in view of monitoring the one or violator cells.
25 The one or more second parameters may further be implemented to further filter
out a target violator cell from the one or more violator cells based on a low IP throughput and a low PRB utilization associated with target violator cell.
[0089] Further, the PRB utilization as used herein may to a measure of how
30 efficiently an available resource associated with the communication network is
24
being utilized based on quantifying a percentage of a PRB allocated to users within a given time period.
[0090] For example, in an implementation of the present disclosure, considering a
5 scenario where the filtering unit [308] filters the one or more violator cells from the
one or more cells, the monitoring unit [310] may further monitor the IP throughput and the PRB utilization of the one or more violator cells.
[0091] The NAM system [302] further comprises a recommendation unit [312],
10 connected to at least the monitoring unit [310], the recommendation unit [312]
configured to recommend one or more actions for the one or more violator cells based on the one or more second parameters. Further, the one or more actions comprises at least a prioritising action associated with the identified one or more violator cells for a pre-defined time period. Furthermore, the one or more actions
15 comprise at least a capacity addition recommendation, a load balancing
recommendation, an optimization recommendation, and a voice centric resolution recommendation. Further, it is to be noted that the one or more actions may include any other recommendation associated with the identified one or more violator cells, that are known in the state of art.
20
[0092] In an implementation, the recommendation unit [312] may suggest one or more actions based on the monitored one or more second parameter of the identified one or more violator cells, wherein the one or more actions may be the prioritising action associated with the identified one or more violator cells for the pr-defined
25 time period such as prioritising the identified one or more violator cells for 3 hours.
[0093] In another implementation of the present solution, the one or more actions
may be one or more of the capacity addition recommendation, the load balancing
recommendation, the optimization recommendation, and the voice centric
30 resolution recommendation.
25
[0094] As used herein “capacity addition recommendation” refers to a predefined
set of rules for increasing the capacity of the one or more violator cells by deploying
additional resources such as base station sectors, increasing spectrum bandwidth,
or enhancing the cell's hardware to handle higher traffic volumes or subscriber
5 density.
[0095] As used herein “load balancing recommendation” refers to steps taken to
balance a traffic load among the one or more cells in the communication network.
Further, the one or more violator cells by using one or more load balancing
10 techniques such as a technique for adjusting coverage overlap, a technique for
adjusting cell parameters (like transmit power or antenna tilt), or a technique for implementing dynamic load balancing protocols, may redistribute traffic and maintain optimal performance across neighbouring cells.
15 [0096] As used herein “optimization recommendation” refers to a set of actions or
procedures to optimize the performance of the one or more violator cells by adjusting antenna parameters, configuring interference management techniques, optimizing handover parameters, or adjusting quality of service (QoS) settings to ensure efficient use of network resources and improved user experience.
20
[0097] As used herein “voice centric resolution recommendation” refers to a set of recommendations to resolve issues related to a voice service quality and a performance of the one or more violator cells by prioritizing voice traffic, adjusting codec settings, improving call setup and teardown procedures, or implementing
25 predefined specialized quality enhancement features for voice services in congested
cells.
[0098] For example, considering a scenario where the one or more parameters may
indicate a low IP throughput and high PRB utilization of a specific cell from the
30 one or more cells. In such case, the recommendation unit [312] may suggest,
26
distributing load of the specific cell across a set of cells that are close to the specific cell in order to balance an overall data traffic within the specific cell.
[0099] In another example, considering a scenario where the one or more
5 parameters may include an average downlink (DL) received channel quality
indicator (CQI) of a specific cell during low IP throughput hours (assuming
between 3AM-6AM of a day). In this case, the CQI may define low channel quality,
then the recommendation unit [312] may suggest to further improve the
configuration of the specific cell, in view of improving the signal quality and IP
10 throughputs.
[00100] The NAM system [302] further comprises a generation unit [314],
wherein the generation unit [314] is configured to generate a performance report comprising one or more second parameters and the one or more actions for the one
15 or more violator cells, as monitored via the monitoring unit [310]. The performance
report may present a detailed overview of the performance and the specific issues of each cell of the one or more cells, over the pre-defined period of time. Further, the performance report may present the one or more actions recommended by the recommendation unit [312] for providing further assistance in viewing the
20 performance and the specific issues of the one or more cells.
[00101] The NAM system [302] further comprises a graphical user interface
(GUI) [316], wherein the GUI [316] is configured to provide a visual representation of the performance report for one or more authorised users. Further, as used herein,
25 the one or more authorized users may refer to a person, or a team, having access to
the NAM system [302] and may be responsible for handling the one or more actions on the one or more violator cells. The visual representation of the performance report may incorporate one or more graphs, charts, and similar known in the art to highlight one or more network entity based on the suggestions provided by the
30 recommendation unit [312].
27
[00102] The NAM system [302] further comprises a modification unit [318],
wherein the modification unit [318] is configured to modify a set of tunable parameters of the one or more violator cells, based on a user input of the one or more authorized users. 5
[00103] In an implementation of the present solution, the one or more
authorized users may tune the set of tunable parameters associated with the violator cells based on the user input received from the one or more authorized users.
10 [00104] Herein the set of tuneable parameters associated with the one or
more violator cells are one or more similar parameters that is modified based on a requirement of the one or more authorized users. Further in an exemplary scenario, the user input may refer to further filter a parameter or a group of parameter, based on the requirements or operation needs of the one or more authorized users.
15
[00105] Referring to FIG. 4, an exemplary flow diagram of method [400]
for managing underperforming cells in a communication network, in accordance with exemplary implementations of the present disclosure is shown. In an implementation the method [400] is performed by the system [300]. Also, as shown
20 in FIG. 4, the method [400] starts at step [402] and proceeds to step [404].
[00106] At step 404, the method comprises collecting continuously, by a
collection unit [304], at a network analysis and monitoring (NAM) system [302], one or more performance parameters for one or more cells of the communication
25 network. Further, in a preferred implementation of the present disclosure as
disclosed herein, the one or more performance parameters comprise a consistency, a number of days of consistency, a block error rate, an average physical resource block utilization, an Internet Protocol (IP) throughput, an available physical resource block threshold, a perceived user throughput, and a carried traffic value.
30
28
[00107] The method [400] further explains that the one or more performance
parameters are collected for determining the performance of network of the one or
more cells. Herein, the term “Network Analysis and Monitoring” may determine
the performance and availability of a network entity (cell or base station) and may
5 accordingly assist (based on the performance and availability of the network entity)
in optimizing network efficiency of the network entity in real time.
[00108] The NAM system [302] comprises the collection unit [304],
configured to continuously collect one or more performance parameters for one or
10 more cells of the communication network. The NAM system [302] may wirelessly
collect the one or more performance parameters for the one or more cells. The collection of the one or more performance parameters by the collection unit [304] is performed at a frequent time interval. Herein, the frequent time interval may relate to a regular time span for a consecutive time period. For ease in
15 understanding, consider an example in case the regular time span is at least one
hour, and the consecutive time period is six days, then in such a case, the collection unit [304] may collect the one or more performance parameters for at least one hour per day for consecutively 6 days. It is to be noted that the frequent time interval may use a plurality of combination for said time span and said time period, that may
20 be obvious to the person skilled in the art for implementing the solution as disclosed
herein
[00109] Further, the consistency for the one or more cells of the
communication network refers to the reliability and uniformity of a service and/or
25 performance of the one or more cells in reference to a time-duration such as 1 hour
of a day. The consistency denotes an ability of the one or more cells to maintain a stable level of service in the communication network without fluctuations or interruptions. Further, as used herein “number of days of consistency” refers to the reliability and uniformity of the service and/or performance of the one or more cells
30 in reference to number of days in a particular period such as a month or a week, for
e.g., 15 consecutive days in the month, 6 days out of 9 days, etc.
29
[00110] Further, the block error rate may refer to a probability of errors in a
data block to the total number of data blocks transmitted over a communication
channel by the one or more cell of the communication network. Herein, the data
5 blocks may refer to a fixed-size unit of data transferred by the one or more cells
over the communication channel.
[00111] Further, the average physical resource block utilization may refer to
the average number of resources blocks (such as frequency domain, time domain)
10 that are utilized by the one or more cells in a period of time.
[00112] Further, the IP throughput may refer to a data transmission rate for
IP (Internet Protocol) based services (such as internet surfing, web browsing) on
one or more user devices. The IP throughput may further indicate an efficiency of
15 a specific cell from the one or more cells in handling a data traffic at the
communication network. Further, the IP throughput is measured in bits per second (bps) to reflect an actual data transfer rate achieved by the IP based services.
[00113] Further, the physical resource block (PRB) threshold may refer to a
20 minimum amount of a frequency spectrum in the communication network required
to maintain a certain level of the service and/or performance of the one or more cells in the communication network.
[00114] Further, the perceived user throughput may refer to a measure of a
25 data transfer speed/rate of data transmission from the one or more cells of the
communication network, which is experienced by one or more users associated with the one or more cells (which may include latency during calls, or a response of the internet for one or more users connected with each cell of one or more cells).
30 [00115] Furthermore, the carried traffic value may refer to a total volume of
the data traffic handled by each cell from the one or more cells over a time period.
30
[00116] At step 406, the method comprises identifying, by an identification
unit [306] at the NAM system [302], one or more violator cells from among the one
or more cells of the communication network, based on one or more key performance
5 indicators (KPIs) calculated based on the one or more performance parameters
collected for a pre-defined period of time. Further, in an implementation of the present disclosure as disclosed herein, at least one of the one or more violator cells is identified as an overshooting cell.
10 [00117] It is to be noted that the Key Performance Indicators (KPIs) of the
communication network refer to measurable parameters used to assess a performance and efficiency of the communication network and/or the one or more cells of the communication network. The KPI are utilised for monitoring and optimizing network quality and include metrics such as a signal strength metric, a
15 data throughput metric, a latency metric, a packet loss metric, and an overall service
availability metric.
[00118] In accordance with the present disclosure, the calculated one or more
KPIs may help to determine a set of information associated with each cell from the
20 one or more cells in the communication network such as cell quality information, a
data transfer rate information, and a resource utilization information, etc. Further, it is to be noted that the pre-determined period herein may correspond to a specific time period such as hourly, daily, monthly or yearly and alike). Further, the one or more KPIs as mentioned are calculated based on the collected one or more
25 parameters over the per-determined period of time, such a 1 hour of each day, a
fixed time slot of each day etc.
[00119] As used herein “violator cell” refers to a cell (base station) within
the communication network that is identified as causing interference or violating
30 certain quality criteria established by a communication network operator or a
regulatory body. Further, a cell from the one or more cells associated with the
31
communication network may be identified as the violator cell in an event it is associated with an excessive interference, a poor signal quality, and/or a failure to adhere to prescribed operational parameters like power levels or frequency assignments. 5
[00120] As used herein, overshooting cell refers to a neighbouring cell whose
coverage area extends significantly beyond what is intended or optimal for planning a network coverage area associated with the communication network. The overshooting cell may increase a probability of unnecessary handovers,
10 interferences, and inefficient resource allocation within the communication
network. Further, the overshooting cell may cause a UE from neighbouring cell to attempt attaching to the overshooting cell, leading to increased handover attempts and potentially degradation in overall network performance. Thus, the overshooting cell mentioned herein may refer to a particular cell which may transmit signal
15 beyond a basic coverage of that particular cell.
[00121] Further, the underperforming cells as used herein, refers to the one
or more cells having KPIs below a threshold, which may correspond to poor signal-to-noise (SNR) ratio, low handover success rate or excessive network latency.
20
[00122] For example, in an implementation of the present disclosure,
considering a scenario where the one or more parameters indicate that the signal strength of a particular cell is overlapping a coverage area of an adjacent cell, the identification unit [306] in such case may identify the particular cell as the violator
25 cell.
[00123] At step 408, the method comprises filtering, via a filtering unit [308]
at the NAM system [302], the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time. 30
32
[00124] For example, in an implementation of the present disclosure,
considering a scenario where the one or more KPIs of a set of cells may showcase
a drop in a perceived user throughput over a per-determined period of time (let us
say over a week). In such cases, the identification unit [306] may identify at least
5 one cell from the set of cells as a violator cell that is associated the drop in the
perceived user throughput, thereafter, the filtering unit [308] at the NAM system [302] filters out the violator cell from the set of cells that is associated the perceived user throughput.
10 [00125] At step 410, the method comprises monitoring, by a monitoring unit
[310] at the NAM system [302], one or more second parameters of the one or more violator cells. Further, an implementation of the present disclosure as disclosed herein, the one or more second parameters comprise at least the IP throughput and a physical resource block (PRB) utilization.
15
[00126] The present disclosure encompasses monitoring the one or more
second parameters i.e., the IP throughput and the physical resource block (PRB) utilization associated with the filtered one or more identified violator cells. It is to be noted that the one or more second parameter may include further parameters that
20 are known in the art in view of monitoring the one or violator cells. The one or more
second parameters may further be implemented to further filter out a target violator cell from the one or more violator cells based on a low IP throughput and a low PRB utilization associated with target violator cell.
25 [00127] Further, the PRB utilization as used herein may to a measure of how
efficiently an available resource associated with the communication network is being utilized based on quantifying a percentage of a PRB allocated to users within a given time period.
30 [00128] For example, in an implementation of the present disclosure,
considering a scenario where the filtering unit [308] filters the one or more violator
33
cells from the one or more cells, the monitoring unit [310] may further monitor the IP throughput and the PRB utilization of the one or more violator cells.
[00129] At step 412, the method comprises recommending, by a
5 recommendation unit [312] at the NAM system [302], one or more actions for the
one or more violator cells based on the one or more second parameters. Further, in an implementation of the present disclosure as disclosed herein, the one or more actions comprises at least a prioritising action associated with the identified one or more violator cells for a pr-defined time period. Furthermore, the one or more
10 actions comprise at least a capacity addition recommendation, a load balancing
recommendation, an optimization recommendation, and a voice centric resolution recommendation. Further, it is to be noted that the one or more actions may include any other recommendation associated with the identified one or more violator cells, that are known in the state of art.
15
[00130] The method further encompasses that the recommendation unit
[312] may suggest one or more actions based on the monitored one or more second
parameter of the identified one or more violator cells, wherein the one or more
20 actions may be the prioritising action associated with the identified one or more
violator cells for the pr-defined time period such as prioritising the identified one or more violator cells for 3 hours.
[00131] In another implementation of the present solution, the one or more
25 actions may be one or more of the capacity addition recommendation, the load
balancing recommendation, the optimization recommendation, and the voice centric resolution recommendation.
[00132] As used herein “capacity addition recommendation” refers to a
30 predefined set of rules for increasing the capacity of the one or more violator cells
by deploying additional resources such as base station sectors, increasing spectrum
34
bandwidth, or enhancing the cell's hardware to handle higher traffic volumes or subscriber density.
[00133] As used herein “load balancing recommendation” refers to steps
5 taken to balance a traffic load among the one or more cells in the communication
network. Further, the one or more violator cells by using one or more load balancing
techniques such as a technique for adjusting coverage overlap, a technique for
adjusting cell parameters (like transmit power or antenna tilt), or a technique for
implementing dynamic load balancing protocols may redistribute traffic and
10 maintain optimal performance across neighbouring cells.
[00134] As used herein “optimization recommendation” refers to a set of
actions or procedures to optimize the performance of the one or more violator cells
by adjusting antenna parameters, configuring interference management techniques,
15 optimizing handover parameters, or adjusting quality of service (QoS) settings to
ensure efficient use of network resources and improved user experience.
[00135] As used herein “voice centric resolution recommendation” refers to
a set of recommendations to resolve issues related to a voice service quality and a
20 performance of the one or more violator cells by prioritizing voice traffic, adjusting
codec settings, improving call setup and teardown procedures, or implementing predefined specialized quality enhancement features for voice services in congested cells.
25 [00136] For example, considering a scenario where the one or more
parameters may indicate a low IP throughput and high PRB utilization of a specific cell from the one or more cells. In such case, the recommendation unit [312] may suggest, distributing load of the specific cell across a set of cells that are close to the specific cell in order to balance an overall data traffic within the specific cell.
30
35
[00137] In another example, considering a scenario where the one or more
parameters may include an average downlink (DL) received channel quality
indicator (CQI) of a specific cell during low IP throughput hours (assuming
between 3AM-6AM of a day). In such case, the CQI may define low channel
5 quality, then the recommendation unit [312] may suggest to further improve the
configuration of the specific cell, in view of improving the signal quality and IP throughputs.
[00138] The method further encompasses the steps of generating, by a
10 generation unit [314] at the NAM system [302], a performance report comprising
the one or more second parameters and the one or more actions for the one or more
violator cells, as monitored via the monitoring unit [310]. The performance report
may present a detailed overview of the performance and the specific issues of each
cell of the one or more cells, over the pre-defined period of time. Further, the
15 performance report may present the one or more actions recommended by the
recommendation unit [312] for providing further assistance in viewing the performance and the specific issues of the one or more cells.
[00139] The method further comprises providing, via a graphical user
20 interface (GUI) [316] at the NAM system [302], a visual representation of the
performance report for one or more authorised users. Further, as used herein, the
one or more authorized users may refer to a person, or a team, having access to the
NAM system [302] and may be responsible for handling the one or more actions on
the one or more violator cells. The visual representation of the performance report
25 may incorporate one or more graphs, charts, and similar known in the art to
highlight one or more network entity based on the suggestions provided by the recommendation unit [312].
[00140] The method further comprises modifying, by a modification unit
30 [318] at the NAM system [302], a set of tunable parameters of the one or more
violator cells, based on a user input of the one or more authorized users.
36
[00141] In an implementation of the present solution, the one or more
authorized users may tune the set of tunable parameters associated with the violator cells based on the user input received from the one or more authorized users. 5
[00142] Herein the set of tuneable parameters associated with the one or
more violator cells are one or more similar parameters that is modified based on a
requirement of the one or more authorized users. Further in an exemplary scenario,
the user input may refer to further filter a parameter or a group of parameter, based
10 on the requirements or operation needs of the one or more authorized users.
[00143] The method further terminates at step 414.
[00144] Referring to FIG. 5, an exemplary method flow diagram [500] for
15 managing underperforming cells in a communication network, in accordance with
exemplary implementations of the present disclosure is shown. In an implementation the method flow [500] is performed by the system [300]. Also, as shown in FIG. 5, the method flow [500] starts at step [502] and proceeds to step [504].
20
[00145] At step [504], the method flow [500] identifies a parameter “P1” for
one or more cells present in the communication network. As used herein the parameter “P1 or similar terminology used in method flow [500] may represent one or more parameters for the one or more cells that are analysed for calculating a Key
25 Performance Indicators (KPI)s of the one or more cells. Further, the one or more
parameters are continuously collected for calculating the KPIs for the one or more cells. Further, the parameter “P1” may represent an Internet Protocol (IP) throughput for the cells and an average Down Link Physical Resource Block Utilization (DL PRB) for the one or more cells. It is to be noted that the one or more
30 parameters collected must be till the latest day at the time of analysing the one or
more parameters. For ease of understanding, if the one or more parameters are
37
analysed on 27th of June, then the one or more parameters should have been collected at least till 26th of June.
[00146] At step [506], the method [500] may identify a parameter “P2” for
5 the one or more cells. As used herein the parameter “P2” refers to a number of days
of consistency for the one or more parameters. Further, the “number of days of
consistency” refers to the reliability and uniformity of the service and/or
performance of the one or more cells in reference to number of days in a particular
period such as a month or a week, for e.g. 15 consecutive days in the month, 6 days
10 out of 9 days, etc.
[00147] At step [508], the method [500] may identify a parameter “P3” for
the one or more cells. As used herein the parameter “P3” refers to a Sector ID of one or more defaulter cells. The Sector ID mentioned herein may refer to an
15 identifier for a sector (a sub-division associated with a specific cell). Further, the
Sector ID of the one or more defaulter cells is identified based on measurement of throughput in a Standard Traffic, of each cells from the one or more cells. For ease in understanding, in case a sector for a particular cell has a low throughput for 10 hours on the latest day, then in such a case the method [500] may identify said sector
20 as a defaulter sector, thereby declaring said particular cell as a defaulter cell.
[00148] At step [510], the method [500] may identify a parameter “P4” for
the one or more defaulter cells, and further compare the parameter “P4” with a
parameter “P4d”. As used herein the parameter “P4” refers to a rank which is further
25 associated with each cell of the one or more cells to determine a territory (an urban
territory or a rural territory) of said cell. Further, the term parameter “P4d” may refer to a range (suppose 1-1458) which may define the territory of said cell.
[00149] At step [512] and step [514], the method [500] may categorize the
30 one or more defaulter cells based on the city rank (T1 or T2) of the one or more
defaulter cells. In an event, the city rank of the one or more defaulter cells lies
38
outside from the parameter “P4d” range, in such a case, the method [500] may
categorize the one or more defaulter cells in the rural territory (T1). Conversely, in
an event, the city rank of the one or more defaulter cells lies within the parameter
“P4d” range, in such a case, the method [500] may categorize the one or more
5 defaulter cells in the urban territory (T2). Further, based on the territory of the one
or more defaulter cells, the one or more defaulter cells are treated accordingly.
[00150] At step [516], the method [500] may identify a parameter “P5” for
the one or more defaulter cells. As used herein the parameter “P5” refers to a ratio
10 of the standard traffic for each defaulter cell to the expected traffic associated with
the said defaulter cell. The method [500] post comparing said ratio, may further compare said ratio with a parameter “P5d.” The parameter “P5d” may refer to a threshold (suppose 0.8) for comparison, which may be used for further classification of the one or more defaulter cells.
15
[00151] At step [518], the method [500] may perform an action A1 for the
one or more defaulter cells. As used herein the action A1 or similar terminology in the method [500] may refer to one or more actions to be performed on the one or more defaulter cells, based on the calculation of said KPIs. Further, the action A1
20 used herein may refer to an action to recommend a capacity addition action for the
one or more defaulter cells, only in case the value of parameter “P5” may exceed the value of parameter “P5d”.
[00152] At step [520], the method [500] may identify a parameter “P6” for
25 the one or more defaulter cells, in an event the value of parameter “P5” is less than
the value of parameter “P5d”. As used herein the parameter “P6” may refer to an average channel quality indicator (CQI) for the one or more defaulter cells in low IP throughput hours (assuming between 3AM-6AM of a day).
30 [00153] At step [522], the method [500] may compare the parameter “P6”
with the parameter “P6d”. As used herein, the parameter “P6d” may refer to a
39
threshold (suppose a CQI below 8 is threshold) for further categorizing the one or more defaulter cells.
[00154] At step [524], the method [500] may compute a parameter “P7” for
5 the one or more defaulter cells, in an event the value of parameter “P6” exceeds the
value of parameter “P6d”. As used herein, the parameter “P7” may refer to difference in the IP throughput for a defaulter cell from the one or more defaulter cells to the IP throughput for a regular carrier cell of the one or more cells, associated with the similar sector.
10
[00155] At step [526], the method [500] may compare the parameter “P7”
with a parameter “P7d”. As used herein, the parameter “P7d” may refer to a threshold (suppose 2Mbps) for further classification of the one or more defaulter cells.
15
[00156] At step [528], the method [500] may compute a parameter “P8” and
further compare the parameter “P8” with a parameter “P8d” in an event the value of parameter “P7” is less than the value of parameter “P7d”. As used herein, the parameter “P8” may refer to a calculation based on a formula “ (Sum of Active UE
20 QCI1 in Low Thpt Hours / (BW Low Thpt Hours)) / (Sum of Active UE QCI9 in
Low Thpt Hours / (BW Low Thpt Hour))”. Herein, an active UE may refer to an active user equipment connected to the cellular network. Further, the QCI1 is a specific QCI value that may refer to Quality of Service Class Identifier 1, which may be used for real-time, delay-sensitive services like VoIP (Voice over Internet
25 Protocol). Further, the QCI9 is a specific QCI value that may refer to Quality of
Service Class Identifier 9, which may be used for data services over IP. Further, the parameter P8d may refer to a threshold (suppose 0.3) for further classification of one or more threshold cells.
30 [00157] Further, the method [500] may perform the step [518] in case the
value of parameter “P8” is less than the value of parameter “P8d”. Further, in case
40
the value of parameter “P8” may exceed the value of parameter “P8d,”, then the method [500] may provide a remark “VoLTE Centric Cell”, implying that the one or more defaulter cells, of which the value of parameter “P8” exceeds the value of parameter “P8d”, are primarily focused on providing (Voice over LTE) services. 5
[00158] At step [530], the method [500] may identify a parameter “P9” for
the one or more defaulter cells and further compute a parameter P10 for the one or
more defaulter cells, in an event the value of parameter “P7” exceeds the value of
parameter “P7d”. As used herein, the parameter “P9” may refer to an identification
10 of the one or more defaulter cells having maximum IP throughput differences.
Further, the parameter “P10” may implicate a calculation of available PRB for the one or more defaulter cells identified via the parameter “P9”.
[00159] At step [532], the method [500] may further compare the parameter
15 “P10” with a parameter “P10d”. As used herein the parameter “P10d” may refer to
a threshold (suppose 5) for further classification of the one or more defaulter cells. In an event, the value of parameter “P10” is less than the value of parameter “P10d”, in such event the method [500] may repeat the step [528].
20 [00160] At step [534], the method [500] may perform an action A2 in an
event, the value of parameter “P10” exceeds the value of parameter “P10d”. As used herein the action A2 may refer to recommending a requirement of load balancing of the one or more defaulter cells.
25 [00161] At step [536], the method [500] may identify a parameter “P11” for
the one or more defaulter cells, in an event the value of parameter P6 recced with the value of parameter P6d. As used herein, the parameter “P11” may refer to identify an availability of a design radius for the one or more defaulter cells. The design radius mentioned herein may refer to a target coverage area for the one or
30 more defaulter cells.
41
[00162] At step [538], the method [500] may perform an action A3 in an
event, there is an unavailability of design radius. As used herein, the action A3 may refer to recommend that there is requirement for an optimization of the one or more defaulter cells. 5
[00163] At step [540], the method [500] may identify a parameter “P12” for
the one or more defaulter cells, in an event there is an availability of design radius. As used herein, the parameter “P12” may refer to consider Time Advance (TA) samples for the one or more low throughput cells. 10
[00164] At step [542], the method [500] may compare the values of
parameter “P12” with the parameter “P11”.
[00165] At step [544], the method [500] may perform an action A4, in an
15 event, the value of parameter “P12” exceed with the value of parameter “P11”. As
used herein, the action A4 may inform that the one or more defaulter cells are overshooting cells and further actions is to be taken.
[00166] At step [544], the method [500] may perform an action A5, in an
20 event, the value of parameter “P12” recced with the value of parameter “P11”. As
used herein, the action A5 may inform that there is the requirement for the optimization of the one or more defaulter cells.
[00167] The method [500] may terminate after the step [544].
25
[00168] The present disclosure further discloses a User Equipment (UE) for
managing underperforming cells in a communication network. The UE comprises a memory, and a processor coupled to the memory. The processor is configured to transmit to a system [300], a request to manage underperforming cells in the
30 communication network, and receive, from the system [300], a response comprising
a recommended one or more actions for one or more violator cells based on the
42
request. Further, the recommended one or more actions for the one or more violator cells are received from the system [300] based on: collecting continuously, by the system [300], one or more performance parameters for one or more cells of the communication network. Further, the recommended one or more actions are received based on identifying, by the system [300], the one or more violator cells from among the one or more cells of the communication network, based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters collected for a pre-defined period of time. Further, the recommended one or more actions are received based on filtering, by the system [300], the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time. Furthermore, the recommended one or more actions are received based on monitoring, by the system [300], one or more second parameters of the one or more violator cells.
[00169] Also, the present disclosure further discloses a non-transitory
computer readable storage medium storing instructions for managing underperforming cells in a communication network, the instructions include executable code which, when executed by one or more units of a system [300], causes: a collection unit [304] of the system [300] to collect continuously, one or more performance parameters for one or more cells of the communication network. Further, the instructions include executable code which, when executed by one or more units of a system [300], causes an identification unit [306] of the system [300] to identify, one or more violator cells from among the one or more cells of the communication network, based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters collected for a pre¬defined period of time. Further, the instructions include executable code which, when executed by one or more units of a system [300], causes a filtering unit [308] of the system [300] to filter, the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time. Further, the instructions include executable code which, when executed by one or more units of a system [300], causes a monitoring unit [310] of the system [300] to
monitor, one or more second parameters of the one or more violator cells Thereafter, the instructions include executable code which, when executed by one or more units of a system [300], causes a recommendation unit [312] of the system [300] to recommend, one or more actions for the one or more violator cells based on the one or more second parameters.
[00170] As is evident from the above, the present disclosure provides a
technically advanced solution for managing underperforming cells in a communication network. The present solution is applicable for all fifth-generation New Radio (5G NR) network along with 5G NR SA (Stand Alone) network Further, the presentation solution can be further applied to a Sixth-Generation Long Term Evolution (6G LTE) network. Further, the present solution provides a realistic picture of the underperforming cells i.e., graphical representation of the underperforming cells that are violating any particular threshold due to heavy traffic, considering real-time analysis of the KPIs of one or more cells. The presen solution may further provide a proactive and customer-centric approach to identify the underperforming cells affecting the customer experience based on monitoring the KPIs of each cell of the communication network with a configured performance threshold for each cell, respectively, and accordingly performing remedial actions to improve the same before the customer complains. The present solution may also allow the prioritization of actions on cells for capacity addition or optimization based on a series of threshold checks on various capacity and quality KPIs.
[00171] While considerable emphasis has been placed herein on the
disclosed implementations, it will be appreciated that many implementations can be made and that many changes can be made to the implementations withou departing from the principles of the present disclosure. These and other changes in the implementations of the present disclosure will be apparent to those skilled in the art, whereby it is to be understood that the foregoing descriptive matter to be implemented is illustrative and non-limiting.
We Claim:
1. A method for managing underperforming cells in a communication network, the
method comprising:
- collecting continuously, by a collection unit [304] at a network analysis and monitoring (NAM) system [302], one or more performance parameters for one or more cells of the communication network;
- identifying, by an identification unit [306] at the NAM system [302], one or more violator cells from among the one or more cells of the communication network, based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters collected for a pre-defined period of time;
- filtering, via a filtering unit [308] at the NAM system [302], the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time;
- monitoring, by a monitoring unit [310] at the NAM system [302], one or more second parameters of the one or more violator cells; and
- recommending, by a recommendation unit [312] at the NAM system [302], one or more actions for the one or more violator cells based on the one or more second parameters.
2. The method as claimed in claim 1, wherein the one or more performance parameters comprise of a consistency, a number of days of consistency, a block error rate, an average physical resource block utilization, an Internet Protocol (IP) throughput, an available physical resource block threshold, a perceived user throughput, and a carried traffic value.
3. The method as claimed in claim 1, wherein the one or more second parameters comprise at least an IP throughput and a physical resource block (PRB) utilization.
4. The method as claimed in claim 1, the method further comprising generating, by a generation unit [314] at the NAM system [302], a performance report comprising the one or more second parameters and the one or more actions for the one or more violator cells.
5. The method as claimed in claim 1, wherein the one or more actions comprises a prioritising action associated with the identified one or more violator cells for a pre-defined time period.
6. The method as claimed in claim 4, the method further comprising:
- providing, via a graphical user interface (GUI) [316] at the NAM system [302], a
visual representation of the performance report for one or more authorised users.
7. The method as claimed in claim 1, wherein at least one of the one or more violator cells is identified as an overshooting cell.
8. The method as claimed in claim 1, wherein the one or more actions includes at least a capacity addition recommendation, a load balancing recommendation, an optimization recommendation, and a voice centric resolution recommendation.
9. The method as claimed in claim 1, the method further comprising:
- modifying, by a modification unit [318] at the NAM system [302], a set of tunable
parameters of the one or more violator cells, based on a user input of one or more
authorised users.
10. A system [300] for managing underperforming cells in a communication network, the
system [300] comprising a network analysis and monitoring (NAM) system [302], the
NAM system [302] further comprising:
- a collection unit [304] configured to continuously collect one or more performance parameters for one or more cells of the communication network;
- an identification unit [306] connected to at least the collection unit [304], the identification unit [306] is configured to identify one or more violator cells from among the one or more cells of the communication network based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters, collected for a pre-defined period of time;
- a filtering unit [308] connected to at least the identification unit [306], the filtering unit [308] is configured to filter the identified one or more cells from among the
one or more cells, based on the one or more performance parameters collected for a pre-defined period of time;
- a monitoring unit [310] connected to at least the identification unit [306], the monitoring unit [310] is configured to monitor one or more second parameters of the one or more violator cells; and
- a recommendation unit [312] connected to at least the monitoring unit [310], the recommendation unit [312] is configured to recommend one or more actions for the one or more violator cells based on the one or more second parameters.
11. The system [300] as claimed in claim 10, wherein the one or more performance parameters comprise of a consistency, a number of days of consistency, a block error rate, an average physical resource block utilization, an IP throughput, an available physical resource block threshold, a perceived user throughput, and a carried traffic value.
12. The system [300] as claimed in claim 10, wherein the one or more second parameters comprise at least an IP throughput and physical resource block (PRB) utilization.
13. The system [300] as claimed in claim 10, wherein the NAM system [302] further comprises a generation unit [314], wherein the generation unit [314] is configured to generate a performance report comprising one or more second parameters and the one or more actions for the one or more violator cells.
14. The system [300] as claimed in claim 10, wherein the one or more actions comprises at least one of a prioritising action associated with the identified one or more violator cells for a pr-defined time period.
15. The system [300] as claimed in claim 13, wherein the NAM system [302] further comprises a graphical user interface (GUI) [316], wherein the GUI [316] is configured to provide a visual representation of the performance report for one or more authorised users.
16. The system [300] as claimed in claim 10, wherein at least one of the one or more violator cells is identified as an overshooting cell.
17. The system [300] as claimed in claim 10, wherein the one or more actions comprise at least a capacity addition recommendation, a load balancing recommendation, an optimization recommendation, and a voice centric resolution recommendation.
18. The system [300] as claimed in claim 10, wherein the NAM system [302] further comprises a modification unit [318], wherein the modification unit [318] is configured to modify a set of tunable parameters of the one or more violator cells, based on a user input of one or more authorised users.
19. A User equipment (UE) for managing underperforming cells in a communication network, the UE comprising:
- a memory; and
- a processor coupled to the memory, wherein the processor is configured to:
o transmit, to a system [300], a request to manage underperforming cells in
the communication network, and o receive, from the system [300], a response comprising a recommended one or more actions for one or more violator cells based on the request, wherein the recommended one or more actions for the one or more violator cells are received based on:
collecting continuously, by the system [300], one or more performance parameters for one or more cells of the communication network,
identifying, by the system [300], the one or more violator cells from among the one or more cells of the communication network, based on one or more key performance indicators (KPIs) calculated based on the one or more performance parameters collected for a pre-defined period of time,
filtering, by the system [300], the identified one or more violator cells based on the one or more performance parameters collected for the pre-defined period of time, and
monitoring, by the system [300], one or more second parameters of the one or more violator cells.
| # | Name | Date |
|---|---|---|
| 1 | 202321047111-STATEMENT OF UNDERTAKING (FORM 3) [13-07-2023(online)].pdf | 2023-07-13 |
| 2 | 202321047111-PROVISIONAL SPECIFICATION [13-07-2023(online)].pdf | 2023-07-13 |
| 3 | 202321047111-FORM 1 [13-07-2023(online)].pdf | 2023-07-13 |
| 4 | 202321047111-FIGURE OF ABSTRACT [13-07-2023(online)].pdf | 2023-07-13 |
| 5 | 202321047111-DRAWINGS [13-07-2023(online)].pdf | 2023-07-13 |
| 6 | 202321047111-FORM-26 [14-09-2023(online)].pdf | 2023-09-14 |
| 7 | 202321047111-Proof of Right [10-10-2023(online)].pdf | 2023-10-10 |
| 8 | 202321047111-ORIGINAL UR 6(1A) FORM 1 & 26)-261023.pdf | 2023-11-04 |
| 9 | 202321047111-FORM-5 [11-07-2024(online)].pdf | 2024-07-11 |
| 10 | 202321047111-ENDORSEMENT BY INVENTORS [11-07-2024(online)].pdf | 2024-07-11 |
| 11 | 202321047111-DRAWING [11-07-2024(online)].pdf | 2024-07-11 |
| 12 | 202321047111-CORRESPONDENCE-OTHERS [11-07-2024(online)].pdf | 2024-07-11 |
| 13 | 202321047111-COMPLETE SPECIFICATION [11-07-2024(online)].pdf | 2024-07-11 |
| 14 | 202321047111-FORM 3 [01-08-2024(online)].pdf | 2024-08-01 |
| 15 | Abstract-1.jpg | 2024-08-14 |
| 16 | 202321047111-Request Letter-Correspondence [16-08-2024(online)].pdf | 2024-08-16 |
| 17 | 202321047111-Power of Attorney [16-08-2024(online)].pdf | 2024-08-16 |
| 18 | 202321047111-Form 1 (Submitted on date of filing) [16-08-2024(online)].pdf | 2024-08-16 |
| 19 | 202321047111-Covering Letter [16-08-2024(online)].pdf | 2024-08-16 |
| 20 | 202321047111-CERTIFIED COPIES TRANSMISSION TO IB [16-08-2024(online)].pdf | 2024-08-16 |