Menu
Is free
check in
the main  /  Advice / Recommendations on network planning and optimization. How is the online service of optimization of mobile communication costs Mobile optimization service

Recommendations for network planning and optimization. How is the online service of optimization of mobile communication costs Mobile optimization service

When designing cellular network The following basic operations must be met: assessing the value of the projected network; network capacity assessment; Evaluation of the radioculation and location of cellular network elements; Assessment of the maximum permissible density (degree of services); Assessment of the number of calls; Assessment of the future development of the cellular network. According to Nokia specialists, the main stages of the network planning process are the following:

1. Selection of information on the following sections:

Rules and laws;

Key information regarding demographics, income level, forecast of the expansion of the territory of service, support for services, marketing research, etc.;

The presence of leased communication lines, the presence of microwave frequencies, the requirements of compounds with other systems;

Licenseable, address principles and routing principles;

Topographic maps;

Existing infrastructure, such as transmitting networks and transmitting medium.

2. Determination of the required basic parameters of the network on radiocryment and capacity.

The main problem of this stage of planning is the network optimization on the criterion cost-effectiveness. In order to implement this task in practice, detailed information about the cellular network (the cost of the stage of the plan, the defense that is available, the necessary information infrastructure), as well as the wording of the tasks of the network and its requirements for its quality is necessary. The result of the second stage is the project of the Topology of the Integrated Network, in which various services must be shown and the instrument required for its implementation. In addition, the initial detailed network implementation plan should be presented. The main objective of this stage is to illustrate the complex process of cellular planning. Other types of planning should also be noted:

FTP (Fixed Transmission Planning) - Fixed Transmission Planning;

NAP (Network Access Planning) - Network Access Planning;

DCN (Data Communication Network Planning) - Planning a data network;

INP (Intelligent Network Planning) - planning of the intellectual network;

3G and IP Network Planning - planning the development of the third generation cellular system (3G), using IP network protocols, etc., which should be included in the full process of designing a cellular network.

3. Selection of MSC, BSC and location of base stations.

4. The location for the specified MSC, BSC and base stations, in other words, evaluation of the location of MSC, BSC and BTS, taking into account the environment surrounding these systems.

5. Details of cellular network planning. This stage includes the following operations:

Computer design of the network and tools for creating the necessary radiocry of the territory;

Analysis of interference (co-channel, external, noise);

Frequency planning;

Planning microwave channels;

Documentation, etc.

Nokia prepared a set of a totem comprising required tools for cellular planning. Below are three areas in cellular planning:

SNP (Switching Network Planning) - network switching planning;

CTNP (Cellular Transmission Network Planning) - Planning a cellular transmission network;

RNP (Radio Network Planning) - Planning of the radio network.


Features of the network switching system.

In the process of this planning phase, the following tasks must be solved:

By measuring and taking into account the required network capacity (mid-time conversations, numbers handovers, transmissions of short messages, etc.) is evaluated;

Installed the level of network execution in accordance with the specified network switching capacity;

The implementation of the switching and network signaling systems is considered;

Rules are being implemented for routing, protection, synchronization and switching management;

Speech and signal traffic matrices are determined;

The necessary equipment is estimated to implement the above tasks.

After the cellular network is marked (Fig. 7.9, 7.10), a detailed plan is performed with

Selected number of inputs (for example, network scheme, routing plan, digital analysis, control details, numbering plan, download plan, etc.). In addition, a specialist planning a network switching system must, in addition to the fulfillment of the above tasks, consider the possible future advanced network plan.


Planning the transfer network.

When planning a cellular network transfer, the main problem is to use microwave communication lines (or fiber-optic communication lines) in gSM networksproviding, for example, interaction between BTS and BSC. Several planning paths are possible:

Installing electronic communication lines of microwave (Radio relay links of microwave communication lines);

Rent of already existing radio relay lines that fit on the location and conditions of a sustainable radio communications into a developed cellular network;

Laying fiber optic communication lines.

When performing this network planning item, it is necessary to take into account the problem of the connection and coordination of large threads of various information. On the this stage It is necessary to develop a diagram of the main transmission network for access BTS and network nodes, which will allow you to get a clear image. network connections. It is also necessary to determine the required capacitance of the network.

Both the principles of synchronization and gateway and commuting connections must be identified. When planning microwave channels it is necessary to choose highly reliable broadband channels, allowing to ensure a reliable connection between BTS and BSC. In addition, fiber optic channels can be used in the cellular network instead of radio relay.


Planning a radio network.

BTS Type and location depend on environmental characteristics. In the conditions of the city of cells, usually less in size than in rural areas. In addition, the volume of traffic also affects the number of radio channels in the usual cell. Since in the GSM standard, the maximum theoretical distance from BTS to the edge of the macro is 35 km, then the ability of MS to send packets to it should arrive in BTS in the correct slot.

Factors limiting the sizes of cells:

1) with an increase in working frequency, that is, with a decrease in the working wavelength, the cell size decreases (the size of the GSM 900 cell is greater than the sizes for GSM 1800 and 1900);

2) External conditions: For open aquatic spaces, attenuation of radio signals is less than in forests or in urban conditions.

Thus, when planning a radio network in cellular system Communications need:

Implement the selection of radio channels by creating their own Radio-relay microwave lines, or by leaseing already existing ones, or laying fiber-optic communication lines;

Make a detailed network plan, including results on the previous item, as well as the results of measurements and testing of the radiotype of the territory.

Defining traffic and numbers of channels in honeycombs

Honeycomb is a basic "constructive block" of the GSM network. One cell is essentially a geographical area surrounding one BTS, while the sizes of the cell depend on the following factors:

From the environment;

From the number of users;

From operating frequency range;

From the power of BTS transmitters, etc.

The cells are grouped around the BSC base station controller. The average sizes sizes are from a response to two fundamental questions: how is the traffic traffic (TSN - Traffic Channel), which should be controlled within the cell? What many traffic traffic is needed honey? To respond to these questions, you need to determine the volume of traffic in the cell.


where (k) (call / hour) is the average number of calls per hour; (T) - average conversation time (hour). Quantitative traffic does not depend on the duration of observation. For example, if the study is carried out for 15 minutes, then in the formula for traffic A denominator instead of 3600 s, will be 900 seconds.

Consider a numerical example. Let 540 calls be implemented in the cell per hour, and the average duration of the conversations is 100 s (100/60 \u003d 1.66 min), then the volume of traffic consists:

If you use the table. 7.1 (Erlan C) model of the maximum traffic density, then we get: the number of channels nk_c \u003d 20, with probabilities of the reference of the PB \u003d 5%. Thus, in this case, the value of GOS \u003d 5% (GRADE OF SERVICE-quality service), determined by the probability of failure, indicates that at the time of observation of 1 hour, 5 out of 100 calls is denied due to a lack of honeycomb resources At the same time, the number of channels will be 20. Since the GSM standard, each radio channel supports 8 (speech) channels, you can make a rough estimate of the configuration with BTS equipment: if you use three transceivers in BTS (transceivers), then NK-C \u003d 3x8 \u003d 24 speech channels, which is greater than the calculated value of 20 channels. This provides some stock in terms of traffic, since with nk_r \u003d 24 and ry \u003d 5% the magnitude of the traffic will be l \u003d 19 ERL (from Table 7.1).

Repeated frequency.

Each subsystem of BSS base stations has a limited number of highlighted frequencies. These frequencies must be distributed between each cell so that the required capacity of the network satisfies various parts of the BSS.

Consider the following example. In fig. 7.11 shows a cellular network.


Fig. 7.11. Cellular network scheme.


Fig. 7.12. An example of uniform radiocrying of the territory with the selected frequency plan.

Let the network designer chose a cluster of about 9, that is, the number of highlighted frequencies is 9 (for BSS). In fig. 7.12 The cluster frequency distribution is shown using the principle of frequency repetition. The next step is the estimate La (Local Area) - the local area of \u200b\u200bthe network, which is performed in accordance with the characteristics of the traffic of each region. The final phase when planning a fixed network consists in assessing the required traffic and radio network.

Optimization and development of the network.

The network planning described above is only the first part of the long process of improving the cellular network being created. With further improvement of the designed cellular network, the following factors should be considered.

1. Enlarging the number of subscribers requires the network expansion in this place and during the period of time.

2. Network costs for any operator is a competitive-generating parameter in the mobile service market.

3. The capacity of the network, on the one hand, it is necessary to minimize (provide the necessary traffic), and on the other, it should not be a small value, as it will worsen the quality of service (Grade of Service) subscribers.

That is, there are contradictory requirements:

The network must have high quality and have a wide radiocry;

EDGE (Enhanced Date Rates for Global Evolution) - Improved data transfer for the global evolution of communication systems (384 kbps);

SDH (Synchronous Digital Hierarchy) is a synchronous digital hierarchy (using fiber-optic communication lines between nodes in a cellular network), etc.

The main reason for the implementation of high-speed data transmission systems is the increase in the number of users and related traffic and the volume of diverse services in cellular mobile systems.

Therefore, to optimize and develop a cellular network:

1) conduct field tests of the created network (quite expensive), which would refine not only the quality of information transfer, but also hardware problems, as well as compression capabilities (gathering) information, increasing the number of users with a constant structure and hardware Networks, etc.

2) Use the information that is obtained in NMS (Fig. 7.13), according to the conditions of geographic radio stations (Station Tar), in terms of BTS power levels (SERVING BTS), by the levels of adjacent stations (Neighbor Stations) for three network messages.

This information allows you to implement the operational characteristics of the network from NMS (Network Management), get important information about the performance of various parts of the cellular network, which ultimately determines the possible possible alternative solutions For network operator.


Fig. 7.13. An example of assessing the conditions of geographic radiocrying, BTS power levels and the level of radiation of neighboring stations.

Alexey Ukolov - about what tricks use cellular operators and how to save money on telephone conversations

Cellular operators constantly bring new tariffs to the market. And it is quite difficult to figure them out. With the help of the Tarifer service, subscribers can compare their current tariff with other market suggestions and choose the optimal option for themselves. If for individuals the benefit from the transition to another tariff can be several hundred rubles per month, then the savings of large companies can be calculated by hundreds of thousands of rubles. About what tricks exist cellular operators and how to track real-time communication costs, the site portal told the founder of the tariff service Alexey Ukolov.

35 years old, an entrepreneur from Samara, founder and general director of service "Tarifer" (Selection of optimal tariff plans cellular communication). Education: International Market Institute (Faculty of Economics and Management). Tarifer service has been launched in 2007. In 2008, the service received the Best Soft Prize, in 2009 - Microsoft Business Start Prize.


In search of a better offer

The idea of \u200b\u200bthe Tarifer service appeared at Brother Alexey Ukolov, Dmitry, in 2007. At that time, he worked as a programmer in one of the Samara companies. Alexey himself took the experience of various projects in the field of trade - far from always successful. Discussed the idea, the brothers decided to do trial version The service that would analyze the details of calls and selected the most suitable tariff for a particular person.

"The idea lay on the surface. Many people had problems with the choice of tariff. At that time, the market was quite wild. Then there was a real case with tariffs. There were also commemorative tariffs, and perceivers. Some rates included some packages. There was another connection fee. In general, there were many nuances that it was necessary to take into account in which many people were difficult to figure out, "says Alexey Ukolov.

In the new project, Dmitry took over programming, and Alexey - all other questions. In 2008, another partner was joined by another partner - Cyril Naswkin. He had his own web design studio, and he took over the development of the site.

Creating a test version of the service took several months. And for several months spent on the manufacture of the site. In 2008, a year and a half after the start of the project, the first version of Tarifer.ru was launched. And at the end of the same year, the site was redone, and came to an option like this.


In Russia, the company has competitors, but they are a bit. They are in manual or half-hearth mode help customers analyze their costs and pick up new tariffplan. "Our advantage in front of them is in technological, in this regard, we are much stronger," says Alexey Ukolov.

We live on your own

Founders Fathers launched and develop their project solely on their own funds - they did not attract the borrowed money. About a million rubles were spent on the development of the prototype site. The first revenue of the service brought in 2009, and in 2010, Tarifer was released.

The growth of the project contributed to the victory in the competition for Russian startups of Microsoft Business Start in 2009. For the victory of Tarifer received a grant in the amount of 1 million rubles. He allowed, among other things, hire the first employees. The company came a programmer and technical support specialist for working with the base plans.

The emergence of new employees in the team accelerated the development of the service. At that time, the company's founders decided to focus on the corporate market, as more promising for their type of activity. By the end of 2009, the first corporate clients appeared at the tariffs.

It was easy to find them, since the company has established a rather low price to its corporate product - several thousand rubles, regardless of the size of the client's company and the number of "calculated" SIM cards. But soon the founders of the project became clear that with such a pricing policy, it was simply unprofitable to work with large companies, and the price list was revised. Naturally, it became more complicated to sell, and in 2011 the company hired sales manager. Previously, these functions performed by Alexey Ukolov himself, and, as he himself recognizes, he did not always have enough time. With the arrival of a new sales manager seriously rose.

"Tarifer" for individuals

Private customers can independently choose the most favorable mobile communications tariff. The client must enter your phone number and password from personal Cabinet cellular operator. If a person does not know this password, the program will help him "enter the office" - you just need to follow the instructions. The service "unloads" the detail of calls for the month and analyzes it. Based on the analysis, the client recommends the most favorable tariffs - both "their" and "other people" operators.

The base plans base is complemented and updated daily. It includes both federal and all regional tariffs of the "big fourth" operators: Beeline, MTS, MegaFon and Tele2.

"New tariffs from operators appear constantly. And we regularly make refinement in the algorithm of the calculation, all the time we change something. Now the main trend is related to the transition to batch tariffs. In addition to telephone communications, the Internet on certain conditions is included in them. And we "sharpened" all our tools to work effectively with batch tariffs, "says Alexey.

Corporate program

Corporate clients "Tipaper" can choose one of the two programs of use of the service. The first is the cost analysis. The program determines which directions of communication costs more than on average by the company. The company's telephone expenditures are announced by employees, divisions, as well as on sources of costs.

The second program is directly optimizing expenses, that is, the selection is the most favorable tariffs. The program analyzes all client numbers, and for each number it picks up the most advantageous offer.

When working with Tarifer companies uses two schemes. The company can acquire the necessary software from the "taxis", and then do everything on its own. A company employee working with this program will have to download calls to it, to build reports and select tariff plans. For example, this option is used if the data to the side does not allow corporate safety rules.

But the most convenient cooperation option for corporate clients is to delegate all functions to analyze the costs of communication and the selection of tariffs service "Tarifer". In this case, the client simply sends all the bills for communication, and then the company's specialists work with them.

The program can work with individual tariff plans that many corporate clients have. These tariffs are "non-public", that is, they are not represented on the sites of operators. The client provides a description of its tariff plan, and the conditions of this tariff are added to the program of this particular client. The customer can see this option in its program and use it when calculating.

One of the main difficulties when working with corporations is the need to download the details of calls from the personal account of your telecom operator. Specialists of the tariffs work now to take all the data from the personal accounts of operators automatically. Then the client will only need to provide its username and password from a personal account on the operator's website.

Online monitoring

Until recently, the selection schemes of the tariff were aimed at analyzing the already considerable communication costs over the past month. But in the near future, Tarifer launches another work technology for corporate clients - monitoring. It allows the client to track and adjust real-time costs.

New technology allows you to see how many employees spent on mobile communications and the Internet in the current month to this minute, and how much they spend in this moment. If the program "notes" that communication costs increased dramatically, it sends an SMS alert client.

The service is needed primarily in order to prevent unscheduled communication costs, especially in roaming. For example, a person forgot to turn off the Internet. In roaming, the subscriber may even not use the Internet or communication. But thanks to the rules of rounding and a certain tricks of the operator, he will come at the end of the month unexpectedly. And since the company has a common balance on all numbers, it can be found late. And the invoice for communication will be an unpleasant surprise for the company.

Transfer these costs to the employee is not always possible under legislation. Therefore, companies often "fall" for hundreds of thousands of rubles due to the fact that someone forgot to turn off the Internet in roaming or incorrectly used some kind of services.

"The company that serves now in our monitoring program, the director went abroad. And there took advantage of the Internet, after which the score for 160,000 rubles came to this number. The company is not very big, and this amount is substantial for them. Unfortunately, then this client has no monitoring program is connected. And they did not understand where such a sum was knitted. Now they can have been able to see the cause of increased expenses in real time and prevent them in time, "Alexey cites.

Data on sharply increased spending enroll in the "taxis" system 15 minutes after the client began overrudes. About 10 minutes goes to react to the situation and inform the client about it. The cost message can be sent both to the "raster" and its company. Thus, the client can see and discontinue unscheduled communication costs for half an hour after they started.

In test mode, the service began to work two months ago. Now for this program at the taxer, "about 50 companies are serviced, and the first reviews about the service are the most positive.

Customers

As corporate clients "Tarifer" considers companies from 30 people. If there are no more than 15-20 numbers in the company, then all calculations can be done manually in a few hours. With quantity from 30 numbers, the amount of data is already quite serious. And companies already need to make a decision: either it allocates a specialist to work with them, or attracts the contractor "from the side".

In total, the "taxis" is about 400 corporate users. Each company is from 50 to 5,000 people. From the top 10 largest Russian companies, four use the services of the "tariffs".

The number of private clients who used the services of the service from the date of its foundation is about two hundred thousand people. Now the service of the service comes about 200-300 orders per day from individuals.

If we are talking about the average company from 100 people, spending 500 rubles per month per telephone number, then its savings after the calculations of the tariff can be about 10-15 thousand rubles per month.

But the size of savings largely depends on the structure and type of activity of the company. If this is a trading company, whose representatives are spent a lot of time in the regions and use roaming, then it is several times higher. And then it saves it from working with the decisions of the tariffs several times more than other companies.


Employees of the tariffs periodically call their customers to learn their opinions about the service. "I myself take a random list of customers from time to time, I call and ask them what can be improved and fixed in the work of the service. In particular, thanks to such communication, we have a real-time monitoring service, "says Alexey Ukolov.

Prices for services

For individuals, the service has been free for a long time. But now the board has been introduced for the service - and to calculate the optimal tariff of anyone maybe for 140 rubles. The site has a calculator of tariff plans, in which all the parameters of its use can be driven. The average savings for private clients after the use of the service and the transition to the new tariff is 37%.

Payment occurs after all calculations and preparation of the report. However, if when calculating it turns out that the current tariff of the client is the most profitable, "Tarifer" does not take a fee from it and the whole analytics is provided to the client as a bonus.

Users who themselves are well-focused on the diversity of tariff plans, may choose the tariff for free. On the site posted in open access The full base of all applications of the "big fourth" operators (including regional tariffs).

The cost of servicing companies depends on the number of their employees and the necessary functional. The price varies from 10 to 20 rubles per month for each SIM card of the company, depending on the services included in the service (just analysis of expenses or analysis + selection of new tariff plans).

"Underwater rocks"

Any business built at work with the corporate sector faces the problem of approvals within customer companies. In large structures, the decision-making system is usually multistage. It happens that negotiations with some large companies Tighten up to several years.

In addition, not all companies are experiencing an acute need for "tariff" savings. The cost of communication in many companies is small compared to the overall budget. And many managers simply do not want to spend time on a serious study of the issue of corporate tariffs.

But even in those companies where the issue of reducing the cost of communication is sharp, not all are pleased with the proposals of the "tariff". Not always an employee responsible for corporate mobile communications, is interested in saving the money of the company. Therefore, the task of the tariff managers is as far as possible to enter the first individuals interested in savings.

Some valid tariff customers almost never use the tariff feature. It is important for them to corporate communications were ordered. And the service helps them store information about all the calls that were made from corporate numbers. Among such clients a lot of branches of Western corporations.

Tricks operators

"Tarifer" seeks his customers to pay for the connection less. The task of cellular operators is directly opposite - increase fees from customers. To do this, the "Big Fourth" has many tricks and tricks, one of the main - "Archive tariff plans".

The meaning of the trick is quite simple. The client chooses a tariff plan, connects and uses it. After some time cellular company Sends this plan "to the archive". Moreover, the operator may remain the current tariff with exactly the same name. For example, three years ago, the client connected to the "July" tariff. Now the operator has a tariff with exactly the same name, but with other conditions. And the tariff with which the client has been enjoyed for 3 years has long been archival, and now it is called "July-2013".

The benefit for the operator is that the "archive" tariff is usually made more expensive than the current tariff plan. In any contract, subscription service is written that the operator has the right to change the conditions of the tariff without informing the client about this. The subscriber can see among the proposals of the operator's company the target with the same name as its own. But in fact, this is no longer its tariff, and it is serviced on the archive version, which is most likely less profitable.

"We just recently understood with such a case. The client said that we recommended him with his own tariff, and at the same time promised savings. We began to understand, and it turned out that he "sits" on the archival version of the same tariff, which includes a much smaller service package. There are missing services there - and the client overpays decent money, because the tariff is actually not the one. So if the subscriber has been serviced on the same tariff for several years - it makes sense to check whether there is no more profitable option now, "Alexey recommends.

When a new operator comes to the market, it often attracts users in low prices. At the same time, other operators are forced to adapt, reduce prices, and thus the situation in the cellular market changes. But, fixing in the market, newcomers are usually beginning to gradually raise prices, and the overall market situation returns to the initial one.

Now the output strategy for new markets can be observed on the example of Tele2. At about the moment when this operator began to conquer Moscow by low tariffs, the prices in the regions began to rise.

"Another feature of Tele2 is that they are actually low" frontal "tariffs, that is, the numbers to which the client pays attention to. But on the various kind of "Doplug" (Intercity, Roaming, etc.), they are already far from the most profitable, "Alexey secrets reveals.

Promotion

Since the "taxis" has two different audiences - private and corporate, then sites are also two. Only services for individuals - tariff calculator and all-Russian tariff base. And is the main website of the project, on which there are corporate solutions, and links to Tarifer.net.

Over time, Tarifer.ru will only become a site for corporate users, and Tarifer.net - for private ones. Now the site Tarifer.ru is in the redesign stage. His new version It is planned to run at the end of August.

The main way of promoting its services founders of the tariffs chose direct sales. Managers are associated with potential customers through a cold call. In the company "Duplex" sales department. Managers of the "first level" work on the principle of a call center. Their task is calling and primary communication with the client. If the client shows interest, he is transferred to a more professional sales manager.

Team

In total, about 30 people work in the Tarifer company. The "head" office and developers are located in Samara, and in Moscow the company has a sales office. 10 people make up the sales department, the rest are developers, administrative staff and technical support staff.


Technical support accepts customer calls. In addition, she has a big front of work related to the actualization of data. This support and replenishment of the tariff plane base, support for the database of phone numbers and recognition of all formats of detailing accounts that are only possible from operators.

Despite the impressive experience, the project has not yet acquired its own mobile application. It is planned to be made in two versions: for individuals and for corporate clients.

The most relevant plan for the coming months is further development Monitoring services (tracking and adjustment of real-time spending). While she can be used in the test version, its "commercial" launch starts in the fall.

"We are planning a serious development of this service so that it keeps track and remnants of current service packages. Gradually, we will all our services to reduce to one interface, everything will be built on the basis of the monitoring, "will summarize Alexey Ukolov.

Analysis and optimization of the digital communication system


1.3 Selecting a modulation type and calculation of the characteristics of the quality of the transfer

application

Introduction

The life of modern society is unthinkable without widespread information transmission systems. Without it, the industry cannot function, transport.

The further development of all parties to the activities of our society is unthinkable without the broadest implementation of automated control systems, the most important part of which is a communication system for sharing information, as well as its storage and processing devices.

Transfer, storage and processing of information take place not only when using technical devices. The usual conversation is an exchange of information. There are many all kinds of forms of presentation and storage of information, such as: books, floppy disks, hard drives, etc.

The technology of information transmission is possible to a greater extent than any other technologies affects the formation of the structure of the world community. The last decade was accompanied by revolutionary changes in the Internet and together with this radical and often unpredictable changes in the methods of doing business on a global scale. From here it is necessary to concurrently that without knowledge of the theory of signaling theory, the creation of new committed communication systems and their operation is impossible. Therefore, its study is an integral part of the theoretical training of students.

The transfer of the message from one point to another is the basis of the theory and communication technology. In the course "Telecommunication theory" study uniform methods of solving a variety of tasks arising from transmitting information from its source to the recipient.


1.1 Structural scheme digital System Communication

In a number of cases of practice, the problem of transmitting continuous messages to the discrete communication channel arises. This problem is solved when using a digital communication system. One such system has a system of transmission of continuous messages by the method of pulse-code modulation (ICM) and manipulating the harmonious media. The structural diagram of such a system is shown in Fig. 1. It consists of a message source (IP), analog-to-digital converter (ADC), a binary discrete communication channel (DKS), part of which is a continuous communication channel (NCC), a digital analog converter (DAC) and recipient of messages (PS ). Each of the listed parts of the system contains a number of elements in itself. Let us dwell on them.

The message source is some object or system, information about the status or behavior of which must be transmitted for a certain distance. Information that is transmitted from the IP is an unforeseen for the recipient. Therefore, its quantitative measure in telecommunication theory is expressed through statistical (probabilistic) message characteristics (signals). The message is the physical form of information presentation. Often messages are fed as a current or voltage variant, which displays the transmitted information.


Figure 1.1 - Structural diagram of digital communication system

In the transmitter (IP) of the messages, first filtered in order to limit its spectrum to some upper frequency F. This is necessary to effectively represent the FNC X (T) response as a sequence of samples xk \u003d x (kt), k \u003d 0, 1, 2 ,. .., which are observed at the output of the discretizer. Note that the filtering is associated with the introduction of the error E F (T), which displays the part of the message that weakens the FGH. Further counts (x k) quantized behind the level. The quantization process is associated with nonlinear conversion of continuous references (x k) to discrete-marked (x K L), which also bring the error, which is called the error (noise) of the quantization Eq (t). Quantized levels (y k \u003d x k L) are then encoded by binary unjust (primitive) or noise-resistant code.

The sequence of code combinations (B K L) is formed by the ICM signal, which is sent to the modulator - a device that is intended to coordinate the source of messages with the communication line. The modulator generates a linear signal S (T, B I), which is an electrical or electromagnetic oscillation, capable of distributing over the communication line and uniquely associated with the message that is transmitted (in this case with an IRM signal). The signal S (T, B I) is created as a result of discrete modulation (manipulation) - the process of changing one or more carrier parameters, respectively, the ICM signal. When using a harmonious media U H (T) \u003d U M COS (2PF H T + J 0), signals are distinguished: amplitude, frequency and phase manipulations (AM, FM and FM).

To prevent uncomplicated emissions in a single-channel connection or in the organization of multichannel communications, as well as to establish the desired ratio of Sigal / Noise at the receiver input, the linear signal is filtered and amplified at the output cascade of the IP.

The S (T) signal from the exit of IP enters the communication line where the interference N (T) affects it. At the receiver entrance (PR), a mixture of Z (T) \u003d S (T) + N (T) of the transmitted signal and interference, which is filtered in the input cascade of the PR and is fed to the demodulator (detector).

When demodulating from the received signal, the law of changing the information parameter, which in our case the proportional signal of IRM is distinguished. At the same time, a decisive device (VP) is connected to recognize the transmitted binary signals to the demodulator output. When transferring binary signals B i, i \u003d 0, 1 to DKC, the presence of interference in the NKC leads to ambiguous solutions (errors), which in turn causes the inconsistency of the transmitted and accepted code combinations.

Finally, to restore the transmitted continuous message A (T), i.e. Obtaining its assessment, adopted code combinations are subject to decoding, interpolation and low-frequency filtering. At the same time, in the decoder on binary code combinations, L-e levels are restored, M \u003d 1 ... L-1.

The presence of errors in binary DCC leads to the transmission errors in the L-M DCS and the emergence of the noise of the transmission E P (T). The total action of filtering errors, quantization and transmission noise leads to ambiguity between transmitted and received messages.

1.2 Determination of the parameters of the ADC and DAC

The sampling interval in time T D is selected based on the Kotelnikov Theorem. Return to T D value - the sampling rate f d \u003d 1 / t d is selected from the condition

f d ≥ 2F m, (1.1)

where f m is the maximum frequency of the primary signal (messages).

Increasing the frequency of discretization makes it possible to simplify the input filter of the lower frequency (FNH) of the ADC, which limits the spectrum of the primary signal, and the output of the DAC, which restores the continuous signal by counting. But an increase in the discretization frequency leads to a decrease in the duration of binary characters at the ADC output, which requires unwanted expansion of the communication channel frequency band for transmitting these characters. Usually the parameters of the ADC input FNH and the output of the DAC is selected the same.

In fig. 1.2 Presents: S (F) - spectrum of samples, which are displayed by narrow pulses, S A (F) - the spectrum of the continuous message A (T), A (F) is a working attenuation of the FGH.

In order for the FNC to make linear distortions into a continuous signal, the limit frequencies of the PNH pass bands must satisfy the condition

f 1 ≥ F M (1.2)

In order to eliminate the imposition of spectra S A (F) and S (F - F D), as well as to reduce the reinforcement of the component S A (F-F D) the limit frequencies of the RFC strokes must satisfy the condition

f 2 ≤ (F d - f m) (1.3)

Figure 1.2 - Spectrum of samples and response of the attenuation of the ADC and DAC filters

So that the FNH is not too complicated, the ratio of limit frequencies is chosen from the condition

f 2 / F 1 \u003d 1.3 ... 1.1. (1.4)


After substitution of relations (1.2) and (1.3) in (1.4), you can choose the sampling frequency F D.

In the system of digital transmission by the ICM method, the power of interference at the exit of the DAC is defined as

,(1.5)

where - the average power of quantization noise;

The average noise of measurement errors.

(1.6)

The power of quantization noise is expressed through the quantization step DX:

.(1.7)

Quantization step depends on the number of quantization levels N:

DX \u003d U Max / (N-1) (1.8)

From the expression (1.8), we define the minimum possible number of quantization levels:


(1.9)

The length of the binary primitive code at the ADC output is an integer:

m \u003d log 2 n. (1.10)

Therefore, the number of quantization levels is nichered as a whole degree of number 2, in which

N ≥ n m i n. (1.11)

The duration of the binary symbol (bit) at the output of the ADC is defined as

T B \u003d T d / m. (1.12)

The average amount of information transmitted via the communication channel per unit of time is the rate of transmission of H T information Determine by the formula

,(1.13)

where - the speed of samples;

- entropy.

, (1.14)

where - the law of distribution of the signal level, is the number of quantization levels.

Sample transfer rate is equal to the sampling frequency:

.(1.15)

1.3 Modulation

The modulation type is chosen so that the information transfer rate after the modulation was no less than the performance of the source, i.e.

,

where is the modulation speed,

The number of signal positions.

For AM, FM, AM, Kam

Channel bandwidth.


,

where is the number of subchannels.

then ,

After determining the number of positions of the signal m calculated the probabilities of the error

The probability of error at AM-M:

,

FM-M error probability:

The probability of error at the AMM-M:

The probability of error at Kam-M:


M \u003d 2 K, K is an even number.

OFDM error probability:

where η is the number of amplitude levels;

M \u003d 2 K, K is an even number.

The choice of modulation method is carried out in accordance with the criterion of the minimum of the probability of an error.

1.4 Selection of the type of noise-resistant code and the definition of the length of the code combination

Noise-resistant, or excessive, encoding is used to detect and (or) correct errors that occur when transmitted by discrete channel. The distinctive feature of the noise-resistant coding is that the redundancy of the source formed by the output of the encoder is greater than the redundancy of the source at the input of the encoder. Noise-resistant encoding is used in various communication systems, when storing and transferring data in computer networks, in household and professional audio and video equipment based on digital recording.

If economical encoding reduces the redundancy of the message source, then noise-resistant coding, on the contrary, is a targeted redundancy in order to appear to detect and (or) correct errors that occur when transmitted over the communication channel.

n \u003d m + k - code combination length;

m is the number of information symbols (discharges);

k - the number of verification symbols (discharges);

Of particular importance for the corrective properties of the code has the minimum code distance D min, determined by pairwise comparison of all code combinations, which is called the hemming distance.

In the unjustal code, all combinations are permitted, and, therefore, its minimum code distance is one - D min \u003d 1. Therefore, it is enough to distort one character so that instead of the transmitted combination, another permitted combination was adopted. In order for the code to have corrective properties, it is necessary to introduce some redundancy into it, which would provide a minimum distance between any two permitted combinations of at least two - D min\u003e 2.

The minimum code distance is the most important characteristic of noise-resistant codes indicating the guaranteed number of errors detectable or fixed by the specified code.

When applying binary codes, only discrete distortions take into account, at which the unit goes to zero (1 → 0) or zero moves into one (0 → 1). Transition 1 → 0 or 0 → 1 Only in one element of the code combination is called a single error (single distortion). In the general case, the number of positions of the code combination implies, under the action of interference, some characters were replaced by others. Two (T \u003d 2) and multiple (T\u003e 2) distortion of elements in a code combination in the range of 0< t < n.

The minimum code distance is the primary parameter characterizing the corrective abilities of this code. If the code is used only to detect errors with multiplicity T 0, it is necessary and enough for the minimum code distance to be

d min\u003e t 0 + 1. (1.29)

In this case, no combination of T 0 errors cannot translate one permitted code combination into another permitted. Thus, the condition for detecting all errors with multiplicity T 0 can be written in the form:

t 0 ≤ D MIN - 1. (1.30)

In order to correct all errors with multiplicity T and less, it is necessary to have a minimum distance satisfying condition:

In this case, any code combination with the number of errors t and differs from each allowed combination of at least T and + 1 positions. If the condition (1.31) is not fulfilled, a case is possible when the errors of the multiplicity T are distorting the transmitted combination so that it will become closer to one of the allowed combinations than to the transmitted or even turn into another permitted combination. In accordance with this, the condition for the correction of all errors is not more than t and can be written as:

t and ≤ (D MIN - 1) / 2. (1.32)

From (1.29) and (1.31) it follows that if the code corrects all errors with multiplicity T and, then the number of errors that it can detect is equal to T 0 \u003d 2 ∙ T and. It should be noted that relations (1.29) and (1.31) establish only a guaranteed minimum number of detectable or corrected errors at a given D MIN and do not limit the ability to detect greater multiplicity errors. For example, the simplest code with read-toe check with D Mi n \u003d 2 allows you to detect not only single errors, but also any odd number of errors in the limits of T 0< n.

The length of the code combination N must be selected in such a way as to provide the greatest bandwidth of the communication channel. When using a corrective code, the code combination contains n discharges, of which the units are informational, and K discharges are verification.

The redundancy of the corrective code is called the amount

,(1.33)

where follows

.(1.34)

This value shows what part of the total number of code combination characters is informational symbols. In the theory of coding, the value of B M is called the relative speed of the code. If the information source performance is equal to h t characters per second, then the transmission rate after the encoding of this information will be equal to

since in the encoded sequence of each N symbols, only M characters are informational.

If binary signals are used in the communication system ("1" and "0" signals) and each single element carries no more than one bit of information, then there is a ratio between the speed of transmitting information and the modulation rate

where V is the speed of information transfer, bit / s; B - modulation speed, baud.

It is obvious that the less k, the greater the ratio M / N is approaching to 1, the less V from B differs, i.e. The higher the bandwidth of the communication system.

It is also said that for cyclic codes with the minimum code distance D MIN \u003d 3, the ratio is true

k³Log 2 (N + 1). (1.37)

It can be seen that the larger n, the closer the ratio M / n to 1. So, for example, at n \u003d 7, k \u003d 3, m \u003d 4, m / n \u003d 0.571; at n \u003d 255, k \u003d 8, m \u003d 247, m / n \u003d 0.964; at n \u003d 1023, k \u003d 10, m \u003d 1013, m / n \u003d 0.990.

The approval is also true for large D min, although there is no accurate relations for connections between M and N. There are only the upper and lower estimates that establish the connection between the maximum minimum distance of the corrective code and its redundancy.

Thus, the Plotkin border gives the upper boundary of the code distance D MI N at a given number of discharges N in the code combination and the number of information discharges M, and for binary codes:

(1.38)

For .(1.39)

The upper border of the chemming sets the maximum possible number of allowed code combinations (2 m) of any noise-resistant code when specified values N and D Min:

,(1.40)

where - the number of combinations from N elements according to I elements.

From here you can get an expression to estimate the number of verification symbols:


.(1.41)

For values \u200b\u200b(D min / n) ≤ 0.3, the difference between the hemming boundary and the boundary of the Plotkin is relatively small.

The border of Warshamov-Hilbert for large values \u200b\u200bn determines the lower limit for the number of verification discharges required to ensure the specified code distance:

All the above estimates give an idea of \u200b\u200bthe upper boundary of the number D MIN at fixed values \u200b\u200bof N and M or estimate from the bottom of the number of verification symbols K at a given m and d min.

From the above, it can be concluded that in terms of making a constant redundancy into the code combination, it is advantageous to choose long code combinations, since with increasing N relative bandwidth

R \u003d V / B \u003d M / N (1.43)

increases, striving to limit equal to 1.

In real communication channels, there are interference, resulting in errors in code combinations. When the error is detected, the system of code combinations are asked in systems with grew. During the aspects, useful information is not transmitted, so the information transfer rate is reduced.

It can be shown that in this case


,(1.44)

where P oo is the likelihood of an error detection with a decoder (the probability of aspiration):

;(1.45)

PP is the likelihood of proper reception (errorless reception) of the code combination;

M - Capacity of the drive of the transmitter among the code combinations

,(1.46)

where T p is the time distribution time on the communication channel, C;

t to - the transmission time of the code combination from n discharges, p.

Sign< > This means that when calculating M should take a greater nearest value.

The distribution time of the communication channel and the code combination time is calculated in accordance with the expressions.

where L is the distance between the terminal stations, km;

c is the speed of signal propagation over the communication channel, km / s (C \u003d 3x10 5);

B - modulation speed, baud.

If there are errors in the communication channel, the value of R is a function P 0, N, K, B, L, C. Therefore, there is an optimal N (with a given P 0, B, L, C), in which the relative bandwidth will be maximum.

To calculate the optimal values \u200b\u200bof N, K, M items the most convenient to use the software package of mathematical modeling, such as Mathlab or Mathcad, building a graph of R (N) in it. The optimal value will be in the case when R (n) is the maximum. When determining the values \u200b\u200bof N, K, M, it is also necessary to ensure the implementation of the condition:

where - the equivalent probability of an error of receiving a single discharge when applying noise-resistant coding with grew.

The value can be determined by using the relation that when transmitting without the use of noise-resistant encoding, the probability of erroneous registration of the code combination P 0 kC length n is equal to

.(1.48)

At the same time when applying noiseless coding

,(1.49)

where is the likelihood of undetected errors


;(1.50)

The likelihood of detected errors

.(1.51)

Additionally, the condition (1.47) must be provided

V ³ h t. (1.52)

From the above mentioned above, it follows that the search for values \u200b\u200bin, n, m, k is iterative and its most convenient to be issued in the form of a table, the sample is shown in Table. 1.2.

Table 1.2.

HT \u003d, PDOP \u003d.
to. n. m. K. IN V.
1
2
3

Select to detect errors cyclic code. Of all known noise-resistant codes, cyclic codes are the most simple and efficient. These codes can be used both to detect and correct independent errors and, in particular, to detect and correct serial errors. The main property is that each code combination can be obtained by cyclic permutation of the symbols of combinations belonging to the same code.

Cyclic codes greatly simplify the description of the linear code, since for them, instead of the setting of the elements of the binary matrix ρ, it is necessary to specify (N - K + 1) the binary coefficients of the polynomial G (D). In addition, they simplify the encoding and decoding procedure to detect errors. Indeed, it suffices to multiply polynomials to perform coding, which is implemented using a linear register containing k memory cells and having feedbacks corresponding to the polynomial H (D).

The cyclic code is guaranteed to detect errors with multiplicity and corrects. Therefore, in solid feedback systems, coding is applied by cyclic code.

When an error is detected on the receiving side, a request to the block is sent to the block in which it was detected, and then this unit is transmitted again. So continues until this block is accepted without a detected error. Such a system is called a system with a decisive feedback (RUSS), since the decision on the receiving block or its retransmission is made on the reception side. The system with grews are effective way Enhance the noise immunity of information transfer.

When describing the encoding and decoding procedure by cyclic code, it is convenient to use a mathematical apparatus based on a comparison of a set of code words with a plurality of power polynomials. This machine allows you to identify simpler coding and decoding operations for cyclic code.

Among all polynomials corresponding to the code words of the cyclic code, there is a nonzero polynomial P (x) of the smallest. This polynomial fully defines the appropriate code and is therefore called generating.

The degree of generating polynomial P (x) is N - M, the free member is always equal to one.

The generating polynomial is a divider of all polynomials corresponding to the code words of the cyclic code.

The zero combination necessarily belongs to any linear cyclic code and can be recorded as (x n Å 1) mod (x n Å 1) \u003d 0. Therefore, the generating polynomial p (x) should be a binomine divider x n Å 1.

This gives the constructive possibility of constructing a cyclic code of a given length n: any polynomial, which is a binomine divider x n Å 1, can be used as an increase in.

When constructing cyclic codes, used tables of decomposition of benomes x n Å 1 to irreducible polynomials, i.e. polynomials that cannot be submitted in the form of the work of two other polynomials (see Appendix A).

Any irreducible polynomial included in the decomposition of the Binoma X n Å 1, as well as any product of irreducible polynomials can be selected as a generating polynomial, which gives the corresponding cyclic code.

To build a systematic cyclic code, the following rule of code word construct is used.

where R (x) is the residue from division M (x) × n - m on P (x).

The degree R (x) is obviously less (n - m), and therefore in the code word the first M, the characters will coincide with the information, and the last N - M characters will be verified.

The procedure for decoding cyclic codes may be the property of their division without a residue to the generating polynomial p (x).

In error detection mode, if the received sequence is divided without a residue on P (x), it is turned out that there is no error or it is not detected. Otherwise, the combination is brain.

In the error correction mode, the decoder calculates the residue R (x) from the division of the received sequence F ¢ (x) to P (x). This residue is called syndrome. The resulting polynomial F ¢ (x) is the sum of the module of two transmitted words F (x) and error vector E Osh (x):

Then syndrome s (x) \u003d f ¢ (x) modp (x), since to determine the cyclic code f (x) mod p (x) \u003d 0. A specific syndrome S (x) can be put in accordance with a certain error vector E Osh (x). Then the transmitted word f (x) find folding.

However, the same syndrome may correspond to 2 M different error vectors. We put the syndrome S 1 (x) corresponds to the error vector E 1 (X). But all the error vectors equal to the sum of E 1 (x) å F (x), where F (x) any code word will give the same syndrome. Therefore, by putting in accordance with the syndrome S 1 (x) error vector E 1 (x), we will carry out proper decoding in the case when the error vector is equal to E 1 (x), in all the remaining 2 m - 1 cases decoding will be erroneous.

To reduce the probability of decoding error from all possible error vectors that give the same syndrome, you should choose as the most likely the most likely in the specified channel.

For example, for DSC, in which the probability P 0 of erroneous reception of the binary symbol is much less likely (1 - p 0) of the correct reception, the probability of error vectors decreases with increasing weight I. In this case, the smaller error vector should be corrected.

If only all weights of I weight errors I and less can be corrected by the code, then any weight error vector from i + 1 to n will lead to erroneous decoding.

The probability of erroneous decoding will be equal to the probability P n (\u003e i) the appearance of I + 1 weight error vectors and more in the specified channel. For DSK this probability will be equal

.

The total number of different error vectors that can correct the cyclic code is equal to the number of non-zero syndromes - 2 n - M - 1.

In the course project, it is necessary on the basis of the value calculated in the previous paragraph. K select the polynomial forming on the table below in Appendix A. by the selected forming polynoma, it is necessary to develop a encoder and decoder diagram for an error detection.

1.5 Digital communication system performance indicators

Digital communication systems are characterized by qualitative indicators, one of which is loyalty (correctness) of transmission.

To estimate the efficiency of the communication system, the coefficient of use of the communication channel is introduced (energy efficiency) and the channel utilization ratio by the frequency band (frequency efficiency):

where V is the speed of information transfer;

Signal relations / noise at the demodulator entrance

; (1.55)

The frequency bandwidth that the signal occupies

, (1.56)

where M is the number of signal positions.

The generalized characteristic is the coefficient of use of the bandwidth channel (information efficiency):

For a continuous communication channel, taking into account the Shannon formula


we get the following expression

. (1.58)

Accordingly, the theorems of Shannon under H \u003d 1 can be obtained between B and G:

b \u003d G / (2 g - 1), (1.59)

which has the name of the border of Shannon, which displays the best exchange between B and G in the continuous channel. This dependence is conveniently portrayed in the form of a curve on the B - G plane (Fig.1.6).

Figure 1.6 - Shannon border

The efficiency of the system can be enhanced by increasing the rate of transmission of information (raise entropy of messages). Entropy of messages depends on the law of probability distribution. Consequently, to increase efficiency, it is necessary to redistribute the densities of the message elements.

If you eliminate or weaken the relationship between elements of messages, you can also achieve an increase in system efficiency.

Finally, improving the efficiency of systems can be obtained from the corresponding selection of encoding, providing savings in time when sending messages.

In the course project, it is necessary on the built schedule (Fig. 1.6) to note the effectiveness of the designed digital communication system.


1. Methodical instructions to the course design of the discipline "Theorem of the Electric Sv'yazka" Bidy Yu.M., Zolotarev V.A., Omelchenko A.V. - Kharkov: Khnure, 2008.

2. Omelchenko V.A. Sannikov V.G. Electrical communication theory. Part 1, 2, 3. - K.: ISDO, 2001.

3. Theory of electrical communication: a textbook for universities / A.G.Zyuko. D.D. Klovsky, V.I. Korzhik, M.V.Nazarov; Ed. D.D. Klokovsky. - M.: Radio and Communication. 1998.

4. Pieterson W., Weldon E. Codes, correcting errors / lane, from English. Ed. R.L. Dobrushina and S.I. Samolenko. - M-: Mir, 1999. - 596 p.

5. Andreev B.c. Nonlinear theory electrical chains. Studies. Handbook for universities. - M.: Radio and Communication, 1999. - 280 p.


ATTACHMENT

Table of irreducible generating polynomials

Power m. = 7

x 7 + x 4 + x 3 + x 2 + 1

x 7 + x 3 + x 2 + x + 1

Power M \u003d 13.

x 13 + x 4 + x 3 + x + 1

x 13 + x 12 + x 6 + x 5 + x 4 + x 3 + 1

x 13 + x 12 + x 8 + x 7 + x 6 + x 5 + 1

Power m \u003d 8.

x 8 + x 4 + x 3 + x + 1

x 8 + x 5 + x 4 + x 3 + 1

x 8 + x 7 + x 5 + x +1

Power M \u003d 14.

x 14 + x 8 + x 6 + x + 1

x 14 + x 10 + x 6 + 1

x 14 + x 12 + x 6 + x 5 + x 3 + x + 1

Power m \u003d 9.

x 9 + x 4 + x 2 + x + 1

x 9 + x 5 + x 3 + x 2 + 1

x 9 + x 6 + x 3 + x + 1

Power M \u003d 15.

x 15 + x 10 + x 5 + x + 1

x 15 + x 11 + x 7 + x 6 + x 2 + x + 1

x 15 + x 12 + x 3 + x + 1

Power M \u003d 10.

x 10 + x 3 + 1

x 10 + x 4 + x 3 + x + 1

x 10 + x 8 + x z + x 2 + 1

Power M \u003d 16.

x 16 + x 12 + x 3 + x + 1

x 16 + x 13 + x 12 + x 11 + x 7 + x 6 + x 3 + x + 1

x 16 + x 15 + x 11 + x 10 + x 9 + x 6 + x 2 + x + 1

Power M \u003d 11.

x 11 + x 2 + 1

x 11 + x 7 + x 3 + x 2 + 1

x 11 + x 8 + x 5 + x 2 + 1

Power M \u003d 17.

x 17 + x 3 + x 2 + x + 1

x 17 + x 8 + x 7 + x 6 + x 4 + x 3 + 1

x 17 + x 12 + x 6 + x 3 + x 2 + x + 1

Power M \u003d 12.

x 12 + x 4 + x + 1

x 12 + x 9 + x 3 + x 2 + 1

x 12 + x 11 + x 6 + x 4 + x 2 + x + 1

23.05.2016

The purpose of any operator is to provide its customers with coverage and services higher than that of competitors, quality. A stable signal anywhere in the city, high data transfer rate and a large service package - one of the main ways to attract new customers and increasing profits.

If you have a deeper analysis of the situation, other factors affect the increase in operator profitability can be detected. Among them is a significant reduction in network maintenance costs, minimizing risks and ensuring uninterrupted operation of the entire system.

But any, even a minor increase in the efficiency of the operator precedes long-term preparation. Optimization of communication networks begins with an audit and analysis of their current state, and for this, the operators attract outsourcing companies.

What includes an audit of communication services?

The exact list of works is determined by the final objectives that need to be achieved by the operator: to upgrade the network, improve the quality of the coating on a specific area, etc. As a rule, companies providing similar services Operators are capable of performing a study of any complexity.

We turned to the company "Modern communication technologies", having experience with federal operators. According to the leadership, the company has innovative equipment and a large complex. software For data analysis. Due to this, optimization of communication systems is performed as efficiently as possible, since the operator receives objective information on a huge number of parameters.

During network research, it can be performed:

    benchmarking, or a comparative assessment of several operators;

    analysis of customer statistics;

    configuration analysis (an audit of objects in sectors is carried out, heights, azimuths, inclination angles, etc.) are measured.

    checking frequency-territorial plans;

The last item involves a whole complex of field research. Based on the results obtained, measures are being developed to improve the quality of voice and data transfer. Among the main measured parameters:

  • availability parameters, retaining voice services;
  • radio channels;
  • Location update;
  • MeanOptionScore;
  • data transfer rate;
  • quality of radio flow in UMTS, LTE, GSM standards.

Cellular optimization

After receiving a large amount of measurement results, their processing is performed using specialized software. The company "Modern communication technology" uses Anite Nemo Analyzer, Actix, Ascom TemS Discovery products. All programs allow you to maximize the information in the report, so that the operator receives a visual picture of the network status.

Technical optimization of communication networks allows the operator to more effectively use the available resources, reduce system support costs, solve many internal problems. In addition, the quality of the services provided noticeably increases, and this allows you to attract new subscribers and keep available.

Optimization of any object involves the search and elimination of its "bottlenecks" in order to increase the efficiency of functioning. If we talk about optimizing communication networks, today, in a serious competition in the telecommunications market, it is a prerequisite for the successful operation of the operator and to receive competitive advantages.

What includes the service and why is it so important for each operator? We received answers to these questions from the leading system integrator of Moscow, the company "Modern communication technologies". Consider them below.

How to optimize communication

The whole range of works can be conditionally divided into two major stages: Audit and directly optimization.

At the first stage, the following works are carried out (comprehensively or selectively):

  • Analyzed the quality of data transfer.
  • The frequency-territorial plan is checked.
  • Comparative tests of selected operators (benchmarking networks) are carried out.
  • An operator statistics are analyzed.
  • Configuration audit is conducted: analysis of design, heights, tilt angles, azimuths.

Optimization of communication systems requires a large amount of objective information on the actual state of the operator's network. During field research, specially equipped cars are used, as well as portable technical means.

The information obtained is subject to careful analysis using high-precision software.

After making a report on the state of the network, the system integrator forms a list of recommendations to eliminate weak points. The customer operator gets a complete calculation of the problems and how to solve them.

What does the cellular optimization give the operator?

The above works are related to the technical component of the networks. We do not consider financial optimization in the article, which is aimed at improving the company's financial and economic indicators and reducing its material expenses.

The audit and elimination of technical "bottlenecks" does not have an explicit communication with increasing profits. In the short term, this is, first of all, the operator's costs for the payment of the contractor's services. But technical optimization of communication services allows you to solve more serious, often hidden, the problems of the operator. It is aimed at:

  • Improving the efficiency of the existing technical resources of the customer's company.
  • Improving the quality of services provided to end users.

Thus, the planning of networking and rationalization of resource use leads to a decrease in system maintenance costs. And the improvement of the quality of the operator's services contributes to detuning from competitors and attract new customers. Ultimately, these two factors in the aggregate allow the company-operator not only to receive additional profits, but also quickly recover the costs of system integrator services.