2014 11th International Symposium on Wireless Communications Systems (ISWCS) 2014
DOI: 10.1109/iswcs.2014.6933382
|View full text |Cite
|
Sign up to set email alerts
|

A configuration management assessment method for SON verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Furthermore, areas of dense traffic, difficult environments and known trouble spots can be considered during the selection process as well [9]. Another possible solution is to consider the cell neighbor relations, e.g., by taking the first degree neighbors of the reconfigured cell [7]. In a mobile network two cells are neighbors when they have a common coverage area so that a handover of User Equipments (UEs) can be made.…”
Section: A Backgroundmentioning
confidence: 99%
See 3 more Smart Citations
“…Furthermore, areas of dense traffic, difficult environments and known trouble spots can be considered during the selection process as well [9]. Another possible solution is to consider the cell neighbor relations, e.g., by taking the first degree neighbors of the reconfigured cell [7]. In a mobile network two cells are neighbors when they have a common coverage area so that a handover of User Equipments (UEs) can be made.…”
Section: A Backgroundmentioning
confidence: 99%
“…For this purpose we require a SON coordinator to prevent other function instances from performing any changes for those areas. However, this might not be always a suitable solution for real world scenarios since the verification area may comprise of more than hundred cells if we just take the direct neighbors of a single cell [7].…”
Section: Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, pre-action coordination can only prevent potential conflicts that are known beforehand. As a consequence, the concept of SON verification has been developed [5,7,17]. It automatically verifies the impact of configuration changes and, in case a degradation is detected, returns the network to the last known stable configuration by performing a rollback of the changes.…”
Section: Introductionmentioning
confidence: 99%