Abstract:
Methods are provided to prevent a potential conflict among first and second instances of SON functions. A first input impact time, first input scope and first objective of the first instance, and a second input impact time, second input scope and second objective of the second instance are obtained. If there is a first overlap among the first input impact time and the second input impact time, whether there is a second overlap among the first input scope and the second input scope is determined. If there is the second overlap, whether the first objective and the second objective are the same or substantially the same is determined. If so, it is determined that the potential conflict exists. If there is the second overlap, whether the first objective contradicts or substantially contradicts with the second objective is determined. If so, it is determined that the potential conflict exists.
Abstract:
Access technology priority lists and related access list identifiers are maintained in a radio access system such that at least one access list identifier is associated with a plurality of access technology priority lists. Behavior of at least one communication device in the radio access system is controlled by selecting one of the access technology selection priority lists based on information (such as load conditions or quality of service class) regarding an access list identifier and the radio access system.
Abstract:
A method and apparatus for detecting and determining the location of a coverage hole in a communications network such as a cellular communication system wherein the location is determined from operational parameters and/or by network elements themselves. Additionally is a method to reduce a hole by adjusting antennae parameters preferably remotely and automatically and this can be done in conjunction with hole location to optimise the system.
Abstract:
An apparatus for use by a communication network element or function configured to act as a management controller in a communication network, the apparatus comprising at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein the at least one memory and the instructions are configured to, with the at least one processing circuitry, cause the apparatus at least: to conduct a creation and activation of at least one data source function instance for configuring a data source being not standardized for usage in the communication network to provide data to a data consumer formed by a communication network element or function in a data format allowing the data consumer to process the data, wherein the creation and activation comprises associating the data source function instance to meta data describing either a non-communication network standardized data type or a proprietary data type using attributes defined to the respective data type, and associating the data source function instance to context data describing a generation time of data to be provided to the data consumer and a scope of data to be provided to the data consumer including a relation to a part of the communication network.
Abstract:
A process for applying operability experiences across different information domains includes receiving an event trigger for a first information domain specific to a first communications technology, searching stored experience data for an experience that matches network data associated with the event trigger in the first information domain, when no similar experiences are found in the first information domain, generating a similarity measure for the second information domain using mapping data that maps parameters of one or more managed object in the first information domain to parameters of the one or more managed object in the second information domain, determining at least one operational experience that matches the similarity measure for the second information domain, and responding to the event trigger with at least one conclusion based on the at least one operational experience.
Abstract:
A method comprises receiving at a training coordinator training information from a self-organizing network function and network related information and providing to a self-organizing network function coordinator a first training request comprising a training request for said self-organizing network function and one or more of network related information and training information about one or more other self-organizing network functions.
Abstract:
It is provided a method, comprising requesting a function model based on a received objective for a network; checking if a function model is received in response to the request for the function model; setting, if the function model is received, a policy function according to the received function model.
Abstract:
A method and apparatus for detecting and determining the location of a coverage hole in a communications network such as a cellular communication system wherein the location is determined from operational parameters and/or by network elements themselves. Additionally is a method to reduce a hole by adjusting antennae parameters preferably remotely and automatically and this can be done in conjunction with hole location to optimize the system.
Abstract:
A method of operating a communication network comprising a verification component is provided, wherein the method comprises achieving at the verification component a verification plan defining a verification process associated with a specific network operation; and executing the verification plan after deploying the specific network operation.