Transcript
Page 1: RF344 EVDO RF Optimization

6-2007 344 - 1Course 344 v1.1 (c)2007 Scott Baxter

1xEV-DORF Performance Optimization

1xEV-DORF Performance Optimization

Course 344

This course can be downloaded free from our website:

www.howcdmaworks.com/344.pdf

Page 2: RF344 EVDO RF Optimization

6-2007 344 - 2Course 344 v1.1 (c)2007 Scott Baxter

344 Contents

1xEV-DO Key Performance Indicators• Bad Packet Rate, Serving Data Rate, Reverse Link Statistics• Receive Power, Composite C/I• Mobile Transmit Power at Given Rate• Reverse Link Closed Loop Power Control• Latency and Throughput

Air Interface Review from Optimization PerspectiveBackhaul ConsiderationsOptimizing the Air Interface

• Coverage, Neighbor List, Search Windows and OffsetsDrive-Test Tools Summary and ExamplesSetup issuesForward Link Throughput Optimization

• Detecting IP and RF issues• The role of RF interference in determining requested burst rate

Page 3: RF344 EVDO RF Optimization

6-2007 344 - 3Course 344 v1.1 (c)2007 Scott Baxter

1xEV-DO Key Performance Indicators

1xEV-DO Key Performance Indicators

Page 4: RF344 EVDO RF Optimization

6-2007 344 - 4Course 344 v1.1 (c)2007 Scott Baxter

Bad Packet Rate

Packet error rates in both directions should be comparable to packet retransmission rates in 1xRTT5% is a typical target value; this chart shows excellent results

Page 5: RF344 EVDO RF Optimization

6-2007 344 - 5Course 344 v1.1 (c)2007 Scott Baxter

Data Speed When Served

The average data rate received depends on:

• “dilution” of sector capacity by multiple users

• Reduction of speed due to poor RF channel conditions

The distribution of packet rates of one user show the effects of RF impairments only

Page 6: RF344 EVDO RF Optimization

6-2007 344 - 6Course 344 v1.1 (c)2007 Scott Baxter

Reverse Link Traffic Statistics

This summary shows reverse link transmit power, PER, and average PERBoth Forward and Reverse link retransmitted bytes are shown, along with the total data KB transmitter

Page 7: RF344 EVDO RF Optimization

6-2007 344 - 7Course 344 v1.1 (c)2007 Scott Baxter

Receive Power

As in 1xRTT, receive power is not the primary quality indicatorIt should be well above -100 dbm (“coverage hole” conditions) and not higher than -40 dbm (“intermod” conditions)Receive power is the “I” in C/I. C/I is more important than I aloneReceive power remains a vital clue to some types of interferencetroubleshooting

Page 8: RF344 EVDO RF Optimization

6-2007 344 - 8Course 344 v1.1 (c)2007 Scott Baxter

I0, Total AT Receive Power

AT Receive Power• usually expressed in dBm• measured derived from

handset IF AGC voltage• broadband, “unintelligent”

measurement: includes all RF in the carrier bandwidth regardless of source, notjust RF from serving BTS

-40

-90

-105

<<to

o w

eak

ove

rload

>>

I0

≈ x

LO

RX Level(from AGC)

IFLNA

BW~30

MHz.

BW1.25MHz.

AT Receiver

R

R

R

S

Rake

AT power is important, but it’s exact value isn’t critical• too much received signal (-35 dbm or higher) could drive the

AT’s sensitive first amplifier into overload, causing intermod and code distortion on received CDMA signals

• too little received signal (-105 or weaker) would leave too much noise in the signal after de-spreading, resulting in symbol errors, bit errors, packet errors, and other problems

Page 9: RF344 EVDO RF Optimization

6-2007 344 - 9Course 344 v1.1 (c)2007 Scott Baxter

Mobile Transmit Power at Given Rate

When mobile transmit power is significantly higher than expectedfor the location of the mobile and its vicinity, reverse link interference may existInspect the receive level indications from the base station, looking for high receive power warnings

• Both peak and average RF receive levels are useful, indicating whether the problem is constant or intermittent

• If the problem appears to be real RF interference, special weak-signal detection techniques may be necessary to track it down, just as in IS-95 CDMA

Page 10: RF344 EVDO RF Optimization

6-2007 344 - 10Course 344 v1.1 (c)2007 Scott Baxter

Reverse Link Closed Loop Power Control

As in 1xRTT, Reverse Link Closed Loop Power Control is an indication of general interference on either linkInterference on the uplink of the serving sector will make the sector request higher power from each served mobileInterference on the forward link at the mobile will raise the mobile’s receive power, causing it to want to transmit at lower power andthereby forcing the serving sector to request the mobile to transmit at higher power.If higher-than-normal closed loop power control is observed, inspect the other forward and reverse link RF parameters to identify whether the interference is forward link or reverse link.

Page 11: RF344 EVDO RF Optimization

6-2007 344 - 11Course 344 v1.1 (c)2007 Scott Baxter

Latency

Latency can occur because of RF channel congestion or from IP network causes

• RF overload can delay availability of supplemental channels• IP network congestion can delay availability of packets

Ping and loopback tests with local PDSN and servers can identify whether problem is in backbone networkDoes latency correlate with independent evidence of RF congestion?

IP D

ata

Envir

onm

entEVDO RF Environment

EVDO IOS PPP

IP Data Environment

EVMSEL

t1

R-P Interface

PDSN/Foreign Agent

PDSNHome Agent

BackboneNetworkInternet

VPNs T TSECURE TUNNELS

AuthenticationAuthorization

Accounting AAA

AP

DO RNC or FMS WirelessMobile Device

•Coverage Holes•Pilot Pollution•Missing Neighbors•Fwd Pwr Ovld•Rev Pwr Ovld•Search Windows•Island Cells•Slow Handoff

Page 12: RF344 EVDO RF Optimization

6-2007 344 - 12Course 344 v1.1 (c)2007 Scott Baxter

Throughput

Throughput can be limited by RF and IP causes• Traditional RF problems limit capacity of the channel• Congestion in the IP network can limit speed of data available

Does low throughput correlate with independent RF indicators?Does low throughput correlate with independent IP pings and tests?

IP D

ata

Envir

onm

entCDMA RF Environment

EVDO IOS PPP

IP Data Environment

EVMSEL

t1

R-P Interface

PDSN/Foreign Agent

PDSNHome Agent

BackboneNetworkInternet

VPNs T TSECURE TUNNELS

AuthenticationAuthorization

Accounting AAA

AP

DO RNC / FMS WirelessMobile Device

•Coverage Holes•Pilot Pollution•Missing Neighbors•Fwd Pwr Ovld•Rev Pwr Ovld•Search Windows•Island Cells•Slow Handoff

Page 13: RF344 EVDO RF Optimization

6-2007 344 - 13Course 344 v1.1 (c)2007 Scott Baxter

Composite C/I

Composite C/I is the primary indication of forward link quality• C/I drives the rate of the mobile’s DRC requests for packets

Poor C/I can be the result of• “pilot pollution” caused by too many comparable signals being

present at the mobile’s location• Interference from external RF sources on the forward link

Page 14: RF344 EVDO RF Optimization

6-2007 344 - 14Course 344 v1.1 (c)2007 Scott Baxter

Ec/Io and C/I

There are two main ways of expressing signal quality in 1xEV-DOC/I is the ratio of serving sector power to everything else

• C/I determines the forward data rate• mobiles measure C/I during the pilot

burst period, then from it decide what data rate to request on the DRC

Ec/Io is the ratio of one sector’s pilot power to the total received powerEc/Io and C/I are related, and one can be calculated from the otherEVDO Ec/Io is close to 0 db near a sector, and ranges down to -10 at a cell’s edgeEVDO C/I can be above +10 db near a sector, and -20 or lower at the edge

AP

Relationship ofC/I and Ec/IoFor EV-DO Signals

Io

Power fromServing Sector

I Interference Powerfrom other cells

EcC

0

mobile receive power

C/I, db-30 -20 -10 0 +10 +20

Ec/Io

, db

-30

-20

-10

0

Page 15: RF344 EVDO RF Optimization

6-2007 344 - 15Course 344 v1.1 (c)2007 Scott Baxter

-30

-25

-20

-15

-10

-5

0-30 -25 -20 -15 -10 -5 0 5 10 15 20

C/I, db

Ec/Io

, db

Relationship of Ec/Io and C/I in 1xEV-DO SystemsEc

/Io,

db C/I,

db

-0.04 20-0.14 15-0.17 14-0.21 13-0.27 12-0.33 11-0.41 10-0.51 9-0.64 8-0.79 7-0.97 6-1.19 5-1.46 4-1.76 3-2.12 2-2.54 1-3.01 0-3.54 -1-4.12 -2-4.76 -3-5.46 -4-6.97 -6-8.64 -8

-10.41 -10-12.27 -12

Page 16: RF344 EVDO RF Optimization

6-2007 344 - 16Course 344 v1.1 (c)2007 Scott Baxter

Statistical EVDO Indications

RF Connection failures• Mobile does not reach an assigned traffic channel

RF Connection Losses• Existing connection is lost due to failure of forward or reverse

linkRF Blocking

• Due to MAC index, backhaul, or other congestion

Page 17: RF344 EVDO RF Optimization

6-2007 344 - 17Course 344 v1.1 (c)2007 Scott Baxter

1xEV-DO Air Interface Review1xEV-DO Air Interface Review

Page 18: RF344 EVDO RF Optimization

6-2007 344 - 18Course 344 v1.1 (c)2007 Scott Baxter

Forward Link Frame and Slot Structure:“Big Picture” Summary

Slots make Frames and Frames make Control Channel Cycles!

SLOT

FRAME1 Frame = 16 slots – 32k chips – 26-2/3 ms

16 Frames – 524k chips – 426-2/3 ms

CONTROLCHANNEL USER(S) DATA CHANNEL

16-FRAMECONTROL CHANNEL

CYCLE

DATA

MA

CPI

LOT

MA

C

DATA DATA

MA

CPI

LOT

MA

C

DATA

400 chips 64 96 64 400 chips 400 chips 64 96 64 400 chips

½ Slot – 1024 chips ½ Slot – 1024 chips

Page 19: RF344 EVDO RF Optimization

6-2007 344 - 19Course 344 v1.1 (c)2007 Scott Baxter

Reverse Link Frame and Slot Structure:“Big Picture” Summary

Reverse Link frames are the same length as forward link framesThe mobile does not include separate MAC and Pilot bursts

• Its MAC and pilot functions are carried inside its signal by simultaneous walsh codes

There is no need for slots for dedicated control purposes since the mobile can transmit on the access channel whenever it needs

SLOT

FRAME1 Frame = 16 slots – 32k chips – 26-2/3 ms

DATA

½ Slot – 1024 chips ½ Slot – 1024 chips

1 Subframeholds

1 SubpacketSubframe Subframe Subframe

Page 20: RF344 EVDO RF Optimization

6-2007 344 - 20Course 344 v1.1 (c)2007 Scott Baxter

Rev. A Reverse Channel Sub-Frame Structure

The mobile transmits sub-packets occupying four reverse link slots, called a reverse link “sub-frame”.If multiple subpackets are required to deliver a packet, the additional subpackets are spaced in every third subframe until done

RRI

ACK DSC ACK DSC ACK DSC ACK DSC

DATA CHANNEL

DRC CHANNEL

AUXILIARY PILOT CHANNELPILOT CHANNEL

1 Sub-Frame

1 Slot 1 Slot 1 Slot 1 Slot

Page 21: RF344 EVDO RF Optimization

6-2007 344 - 21Course 344 v1.1 (c)2007 Scott Baxter

The 1xEV-DO Rev. 0 Channels

These channels are NOT CONTINUOUS like IS-95 or 1xRTT!• They are made up of SLOTS carrying data subpackets to individual

users or control channel subpackets for everyone to monitor• Regardless of who “owns” a SLOT, the slot also carries two small

generic bursts containing PILOT and MAC information everyone canmonitor

IN THE WORLD OF CODES

Sect

or h

as a

Sho

rt P

N O

ffset

just

like

IS-9

5A

ccessLong PN

offsetPublic or Private

Long PN offset

ACCESS

FORWARD CHANNELS

AccessPoint(AP)

REVERSE CHANNELS

TRAFFIC

Pilot

Data

Pilot

DataACK

Pilot

ControlTraffic

MAC

MAC FORWARD

Rev ActivityDRCLockRPC

DRC

RRI

W 64

W264

W064

Wx16

Wx16

W48

W24

W816

W016

W24

W016

MA

C

W0 W4W1 W5W2 W6W3 W7

AccessTerminal

(UserTerminal)

Walshcode

Walshcode

Access Channelfor session setup

from Idle Mode

Traffic Channelas used duringa data session

Page 22: RF344 EVDO RF Optimization

6-2007 344 - 22Course 344 v1.1 (c)2007 Scott Baxter

EV-DO Rev. A Channels

The channels are not continuous like ordinary 1xRTT CDMANotice the differences between the MAC channels and the Rev. 0 MAC channels – these are the heart of the Rev. 0/A differences

IN THE WORLD OF CODES

Sect

or h

as a

Sho

rt P

N O

ffset

just

like

IS-9

5A

ccessLong PN

offsetPublic or Private

Long PN offset

ACCESS

FORWARD CHANNELS

AccessPoint(AP)

REVERSE CHANNELS

TRAFFIC

Pilot

Data

Primary Pilot

DataACK

Pilot

Control

Traffic

MAC

MAC

FORWARD

Rev ActivityDRCLockRPC

RRI

W 64

W264

W064

Wx16

Wx16

W1232

W12

W416

W016

W24

W016

MA

C

AccessTerminal

(UserTerminal)

Walshcode

Walshcode

Access Channelfor session setup

from Idle Mode

Traffic Channelas used duringa data session

ARQ Auxiliary Pilot

DRCDSC

W2832

W816

W1232

Page 23: RF344 EVDO RF Optimization

6-2007 344 - 23Course 344 v1.1 (c)2007 Scott Baxter

Transmission of a Packet over EV-DOData from PDSN for the Mobile

MP3, web page, or other content AP

Data Ready

DRC: 5

2048 bits

1 2 3 4

Interleaver

+ D+

+D D

++ +

+

+ D+

+D D

++ +

+

Turbo Coder

Block Interleaver

PACKET

SLOTS

Symbols

Interleaved Symbols

When the AP is ready, the first subpacket is actually transmitted in a slot.

The first subpacket begins with a preamble carrying the user’s MAC index, so the user knows this is the start of its sequence of subpackets, and how many subpackets are in the sequence..

The user keeps collecting subpackets until either:

1) it has been able to reverse-turbo decode the packet contents early, or

2) the whole schedule of subpackets has been transmitted.

Subpackets

DRCIndex Slots Preamble

ChipsPayload

BitsRawkb/s

0x0 n/a n/a 0 null rate0x1 16 1024 1024 38.40x2 8 512 1024 76.80x3 4 256 1024 153.60x4 2 128 1024 307.20x5 4 128 2048 307.20x6 1 64 1024 614.40x7 2 64 2048 614.40x8 2 64 3072 921.60x9 1 64 2048 1,228.80xa 2 64 4096 1,228.80xb 1 64 3072 1,843.20xc 1 64 4096 2,457.60xd 2 64 5120 1,536.00xe 1 64 5120 3,072.0

C/Idbn/a

-11.5-9.2-6.5-3.5-3.5-0.6-0.5+2.2+3.9+4.0+8.0+10.3

in Rev. Ain Rev. A

Modu-lationQPSKQPSKQPSKQPSKQPSKQPSKQPSKQPSKQPSKQPSK

16QAM8PSK

16QAM16QAM16QAM

Page 24: RF344 EVDO RF Optimization

6-2007 344 - 24Course 344 v1.1 (c)2007 Scott Baxter

Backhaul and Related Considerations

Backhaul and Related Considerations

Page 25: RF344 EVDO RF Optimization

6-2007 344 - 25Course 344 v1.1 (c)2007 Scott Baxter

Rate Limitations from Backhaul

Wireless sites are commonly connected using T-1s or E-1s, depending on local availability

• In the case of T-1s, the raw rate is 1.544 megabits/second.– Accounting for overhead, this translates into a maximum

steady throughput of roughly 400 to 450 kb/s per sector on a 3-sector, 1-carrier EV-DO site.

– If one sector is busy while the other two are only lightly loaded, throughput of roughly 1 mb/s can be obtained on one sector

– However, early 1xEV-DO cards without support for multiple ARQ instances can only achieve about 400 kb/s throughput even without backhaul limitations

Solutions under study to relieve backhaul congestion include fiber-based ATM to the sites; multiple-T1s; sites linked by Cable Modems, and other methods

Page 26: RF344 EVDO RF Optimization

6-2007 344 - 26Course 344 v1.1 (c)2007 Scott Baxter

Optimizing the RF Air InterfaceOptimizing the RF Air Interface

Page 27: RF344 EVDO RF Optimization

6-2007 344 - 27Course 344 v1.1 (c)2007 Scott Baxter

Dealing With RF Coverage Anomalies

It is difficult to build a system without encountering a few coverage holes and without having some sectors that cover more than planned

• The techniques for identifying and resolving these problems are similar to IS-95 and 1xRTT, with a few modifications

Detection methods: Area sweeps with EV-DO PN scanners and EV-DO terminals

• If a sector is in the active set of mobiles in places beyond theline joining its surrounding tier of sites, reduce its coverage

– Site RF parameters, antenna downtilt, or antenna height• If a sector fails to cover its intended area, look for obvious

hardware or environmental reasons– Repair or correct any such impairments, and if

unsuccessful, look for other serving sectors– Reradiators are feasible for EV-DO, but setup is tricky

Page 28: RF344 EVDO RF Optimization

6-2007 344 - 28Course 344 v1.1 (c)2007 Scott Baxter

Generating and Optimizing Neighbor Lists

After coverage of each sector has been studied and adjusted if necessary, neighbor relationships are now stableInitial neighbor lists can be generated from propagation prediction modeling or even from drive-test results with AT or PN scannersThe most reliable way to groom neighbor lists is to use system tools to collect route update requests from each sector. These results can be analyzed in matrix form to determine the frequency of requests for each surrounding sector

• Sectors with more than 5% of requests are usually added• Sectors with less than 1% of requests are usually unnecessary• Watch out for sectors that are already neighbors of neighbors

and would be unnecessary• Watch out for special specific cases where unusual

relationships exist because of terrain and busy roadways

Page 29: RF344 EVDO RF Optimization

6-2007 344 - 29Course 344 v1.1 (c)2007 Scott Baxter

Optimizing Search Windows

The pilot searcher of a mobile must be able to see the pilots of any sectors it may encounter – otherwise route update is impossibleTiming errors affect pilot searching. Sources include:

• Timing delay from reference sector to mobile– This delay is unknown to the mobile, but it goes into the mobile’s

reference timing without the mobile’s knowledge• Timing delay from needed neighbor signal to the mobile

– This delay is also unknown to the mobile, but it can shift the apparent timing of the desired neighbor either ahead or behind the timing the mobile expects

• The worst-case error in timing is the propagation delay of a straight line between reference sector and desired sector

• Neighbor search window can be set to this level initially and possibly reduced if accumulated data later allows

Active search windows “float” on their individual pilots and do not need to be large enough to handle propagation delay. They only need to accommodate delay spread, which is better measured than calculated.

Page 30: RF344 EVDO RF Optimization

6-2007 344 - 30Course 344 v1.1 (c)2007 Scott Baxter

Search Window Offset

Search window offsets make it possible to individually compensate for the great distance of certain sectors from the service area of another

• The range of adjustment can effectively shift the center of the search window by up to 1.5 times earlier or later than the actual search window width

Search Window Offset01234567

Offset (PN chips)0

+0.5 x WindowSize

reserved

+1.0 x WindowSize+1.5 x WindowSize- 0.5 x WindowSize-1.0 x WindowSize-1.5 x WindowSize

-1.5 -1.0 -0.5 0.0 +0.5 +1.0 +1.5

Page 31: RF344 EVDO RF Optimization

6-2007 344 - 31Course 344 v1.1 (c)2007 Scott Baxter

Andrew’s Invex3G Tool

100 MB ethernet connection to PCthe eight card slots can hold receivers or dual-phone cardsthere’s also room for two internal PN scannersMultiple Invex units can be cascaded for multi-phone load-test applicationsCards are field-swappable -Users can reconfigure the unit in the field for different tasks without factory assistance

Page 32: RF344 EVDO RF Optimization

6-2007 344 - 32Course 344 v1.1 (c)2007 Scott Baxter

Overview of Field Tool IP Test Capabilities

Application Description Purpose

Raw Upload Uploads data with no overhead (no headers, no handshaking beyond the normal TCP handshaking)

Testing uplink throughput

Raw Download Downloads data with no overhead (no headers, no handshaking beyond the normal TCP handshaking.)

Testing downlink throughput

Raw Loopback A loopback (data is sent to the remote server which returns the same data) application with no overhead (no headers, no handshaking beyond the normal TCP handshaking.)

Simultaneous exercise of the uplink and downlink

Ping (ICMP ECHO) Ping does not use the TCP protocol, but rather uses the connectionless and “unreliable” ICMP protocol. Sends small echo request packets to a remote server, which responds with an echo reply.

Determining round-trip-time between the user and the remote server, as well as general link integrity (by counting the number of missing echo reply packets).

HTTP GET A standard web page “browse” request. If Raw Download is unavailable, testing downlink throughput; modeling typical customer use.

HTTP POST A web-based upload (similar to how web-based email sites allow users to upload files as “attachments”).

If Raw Upload is unavailable, testing uplink throughput.

FTP GET A standard FTP file download. Many file downloads on the Internet use FTP.

If Raw Download and HTTP GET are unavailable, testing downlink throughput; modeling typical customer use.

FTP PUT A FTP file upload. The file is generated by the Invex3G platform and sent to the server.

If Raw Upload and HTTP POST are unavailable, testing uplink throughput

Mail GET (POP3) Retrieves all the mail for a given mailbox (e-mail address) from an e-mail server. Note: does not delete the e-mail messages from the mailbox.

Modeling typical customer use.

Wait Waits a specified amount of time. Testing idle timers, timeouts, etc.

Page 33: RF344 EVDO RF Optimization

6-2007 344 - 33Course 344 v1.1 (c)2007 Scott Baxter

Agilent Drive-Test Tools

Agilent offers Drive-Test tools• Serial interfaces for up to four

CDMA phones or cards• A very flexible digital receiver

with several modesPN Scanner

• Fast, GPS-locked, can scan two carrier frequencies

Spectrum Analyzer• Can scan entire 800 or 1900

mHz. BandsBase-Station Over-Air Tester (BOAT)

• Can display all walsh channel activity on a specific sector

• Useful for identifying hardware problems, monitoring instantaneous traffic levels, etc.

Post-Processing tool: OPAS32

Page 34: RF344 EVDO RF Optimization

6-2007 344 - 34Course 344 v1.1 (c)2007 Scott Baxter

1xEV-DO Setup Performance:Sessions and Connections

1xEV-DO Setup Performance:Sessions and Connections

Page 35: RF344 EVDO RF Optimization

6-2007 344 - 35Course 344 v1.1 (c)2007 Scott Baxter

Session Configuration Parameters

In initial Session and Connection setup, the access channel and control channel carry the messages

• If L3 messages and RF indications are available, problems usually can be identified

Check the access parameters• The range of powers should step through a range from the idle-

mode noise floor up to about 20 db above it– A smaller power range can result in missed probes– Check AP/BTS reverse receive levels, peak and average

looking for indications of interference• Ensure sector size and acquisition search windows are

adequate

Page 36: RF344 EVDO RF Optimization

6-2007 344 - 36Course 344 v1.1 (c)2007 Scott Baxter

Long Setup Times and RF Failures

Long setup times, often seen as bad latency in VOIP and PTT applications, can result when extensive probing occurs. This can be the result of:

• RF reverse link interference– External interference or rogue terminals

• Incorrect Access Parameters, having mobiles start probing at low RF levels

Page 37: RF344 EVDO RF Optimization

6-2007 344 - 37Course 344 v1.1 (c)2007 Scott Baxter

Forward Link Throughput Optimization

Forward Link Throughput Optimization

Page 38: RF344 EVDO RF Optimization

6-2007 344 - 38Course 344 v1.1 (c)2007 Scott Baxter

Forward Link Scheduler

The main bottleneck is forward link available C/I and timeslotsEach connected data User has a buffer in the PDSN/PCF complex

• When data is in the buffer, a “Data Ready” message is sent to the mobile• The mobile then requests data from the desired sector on DRC/DSC• The scheduler fairly divides slots among the active users• “Proportional Fairness” applies, always trying to give slots to each user

when that user’s link is better than average• This substantially improves (40%+) both user and overall sector

throughput• QOS (Quality of Service) rules also may be implemented, giving

preference to some users and some types of traffic

EVMSELt1

R-PInterface

PDSN/Foreign Agent

AP

DO-RNC or FMSEVDO device

data

Buffer

UserData Rate

PCF

Page 39: RF344 EVDO RF Optimization

6-2007 344 - 39Course 344 v1.1 (c)2007 Scott Baxter

So S L O W ! ! Where’s My Data?!!

Some sessions have long latency and slow throughputWhere is the problem? Anywhere between user and distant host:

• Is the mobile user’s data device mis-configured and/or congested?• Is the AP congested, with few timeslots available?• Poor RF environment, causing low rates and packet retransmission?• Congestion in the local IP network (PCU, R-P, PDSN FA)?• Congestion in the wireless operator’s backbone (‘OSSN’) network?• Congestion in the PDSN HA?• Congestion in the outside-world internet or Private IP network?• Is the distant host congested, with long response times?

IP D

ata

Envir

onm

entEVDO RF Environment

EVDO IOS PPP

IP Data Environment

EVMSEL

t1

R-P Interface

PDSN/Foreign Agent

PDSNHome Agent

BackboneNetworkInternet

VPNs T TSECURE TUNNELS

AuthenticationAuthorization

AccountingAAA

AP

DO-RNC / FMS WirelessMobile Device

•Coverage Holes•Pilot Pollution•Missing Neighbors•Fwd Pwr Ovld•Rev Pwr Ovld•Search Windows•Island Cells•Slow Handoff

Page 40: RF344 EVDO RF Optimization

6-2007 344 - 40Course 344 v1.1 (c)2007 Scott Baxter

Finding Causes of Latency and Low Throughput

IP network performance can be measured using test serversProblems between mobile a local test server? The problem is local

• check RF conditions, stats: poor environment, SCH blocking?• if the RF is clean, investigate BSC/PCU/R-P/PDSN-FA

Local results OK, problems accessing test server at PDSN-HA?• problem is narrowed to backbone network, or PDSN-HA

Results OK even through test server at PDSN-HA• then the problem is in the public layers beyond.

IP D

ata

Envir

onm

entEVDO RF Environment

EVDO IOS PPP

IP Data Environment

v CESEL

t1

R-P Interface

PDSN/Foreign Agent

PDSNHome Agent

BackboneNetworkInternet

VPNs T TSECURE TUNNELS

AuthenticationAuthorization

AccountingAAA

BTS

DO-RNC or FMS WirelessMobile Device

•Coverage Holes•Pilot Pollution•Missing Neighbors•Fwd Pwr Ovld•Rev Pwr Ovld•Search Windows•Island Cells•Slow Handoff

TestServer

TestServer

TestServer

Page 41: RF344 EVDO RF Optimization

6-2007 344 - 41Course 344 v1.1 (c)2007 Scott Baxter

Pinging Network Nodes to test Latency

Simple “ping” commands from a command prompt line can detect latency to and from particular serversNotice in the example, the first ping in the second attempt is delayed more than others because the user was in dormant state immediately prior, and a new connection had to be established

Page 42: RF344 EVDO RF Optimization

6-2007 344 - 42Course 344 v1.1 (c)2007 Scott Baxter

Using Tracert to Identify Delays

The command “Tracert” at the command prompt will show the identification and timing details of all non-firewalled nodes in the network.

Page 43: RF344 EVDO RF Optimization

6-2007 344 - 43Course 344 v1.1 (c)2007 Scott Baxter

Forward Link Speed – No Dominant Server

When there are many equal servers, the C/I values of each serverare very poor and the forward link data speed from any of the servers is very lowThis is the equivalent of “pilot pollution” in 1xRTT CDMA

Page 44: RF344 EVDO RF Optimization

6-2007 344 - 44Course 344 v1.1 (c)2007 Scott Baxter

Forward Link Speed – Very Dominant Server

When one server stands head and shoulders above the other sectors, its C/I is excellent and it can deliver very fast dataHowever, if this server is overloaded with traffic, the mobile has no alternative sector and the blocking will have a large impact

Page 45: RF344 EVDO RF Optimization

6-2007 344 - 45Course 344 v1.1 (c)2007 Scott Baxter

Forward Link Speed – Three Equal Servers

When three sectors are approximately equally strong, their C/I values are medium-to-poor. Any of these sectors could deliver data to the mobile at 307 Kb/sIf one of these sectors becomes saturated and puts up its “DRC Lock” bit against our mobile, the mobile could choose another sector and avoid most blocking

Page 46: RF344 EVDO RF Optimization

6-2007 344 - 46Course 344 v1.1 (c)2007 Scott Baxter

Single User Traffic Statistics from Invex

The average bit speed obtained by a mobile on downlink is affected by:• RF conditions (this determines the instantaneous bit speed when a

slot is being sent to the mobile)• Fraction of time during which the mobile “owns” the sector

The above tabulation from the Andrew Invex tool shows the bit speed for all slots to the mobile, allowing independent identification of RF problems and traffic congestion effects due to others

Page 47: RF344 EVDO RF Optimization

6-2007 344 - 47Course 344 v1.1 (c)2007 Scott Baxter

Reverse LinkThroughput Optimization

Reverse LinkThroughput Optimization

Page 48: RF344 EVDO RF Optimization

6-2007 344 - 48Course 344 v1.1 (c)2007 Scott Baxter

Reverse Link Throughput Considerations

Reverse Link throughput is influenced by• Instantaneous RF conditions, dictating selected packet speed

and Hybrid-ARQ speedup, if any• Congestion on the reverse link, as indicated by the sector

limiting the available slots from the mobile• T-1 or other backhaul limitation, imposing ceilings on the

number of reverse packets which can be uploaded from an AP to the AN

Page 49: RF344 EVDO RF Optimization

6-2007 344 - 49Course 344 v1.1 (c)2007 Scott Baxter

Reverse Link Rate Control in Rev. A

Discussion of Reverse Link rate control algorithm• Dependence on Observed C/I of serving sector• Bucket control mechanism

Available packet scheduling parameters vary by manufacturerExtreme sensitivity to reverse link interference, like 1xRTT


Top Related