Professional Documents
Culture Documents
Fulltext01 PDF
Fulltext01 PDF
Marky Egebäck
Sebastian Lindqvist
Norrköping 2010-06-10
Upphovsrätt
Copyright
The publishers will keep this document online on the Internet - or its possible
replacement - for a considerable time from the date of publication barring
exceptional circumstances.
The online availability of the document implies a permanent permission for
anyone to read, to download, to print out single copies for your own use and to
use it unchanged for any non-commercial research and educational purpose.
Subsequent transfers of copyright cannot revoke this permission. All other uses
of the document are conditional on the consent of the copyright owner. The
publisher has taken technical and administrative measures to assure authenticity,
security and accessibility.
According to intellectual property law the author has the right to be
mentioned when his/her work is accessed as described above and to be protected
against infringement.
For additional information about the Linköping University Electronic Press
and its procedures for publication and for assurance of document integrity,
please refer to its WWW home page: http://www.ep.liu.se/
The purpose of this master thesis was to construct a model which could capture and present
the utilization rate of test equipment at a telecom company in general. Since this field has
not been studied very much in the past, it was decided to study a model from the production
industry and try to reuse some of the basic ideas from this model.
From this generic model a recommendation is given as to how the model could be used by
implementing a Common Utilization Tool, which could be used to store, configure and present
utilization data from all types of equipment in Ericsson’s test environment. This common uti-
lization tool will use measurement modules that will both collect and classify the state of the
equipment and deliver the result to a common database.
To this Common Utilization Tool a measurement module has been implemented which samples
Base Station Controllers (BSC) in Ericsson’s test environment state; used, unused and down.
This implementation is also validated against real measured data from testers to conclude if
the results are accurate.
i
Acknowledgments
We would like to express our deepest gratitude to our supervisors Torbjörn Wickström at Er-
icsson AB, David Gundlegård and Di Yuan at the Department of Science and Technology in
Linkoping’s university. Without your knowledge, support and helping hand we would never
been able to complete this thesis.
A special thanks to Thomas Thunell, Anders Hollstedt, Jonas Madsen and the rest of the
ATD Team for answering all our LTE Util Tool and THC questions. Without you guys the
work with the BSC utilization module, which is a big part of our work, would not have been
preformed as smoothly.
We would also like to thank the rest of the people who helped us create the BSC utiliza-
tion module; Ulf Arkad, Tomi Ojala Carlbergh, Jens Lindberg and Samka Nyberg.
Another person that we would like to thank is Liz Foxbrook for greatly improving the lan-
guage in the report.
Last but not least we would like to thank the people at our section and department that
has given us so much support and encouragement during the work of this thesis.
iii
Contents
1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.6 Confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.7 Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.8 The GSM Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.9 Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.10 Ericsson test environment - BETE . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 Frame of reference 7
2.1 OEE - Overall equipment efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1 Availability Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.2 Operational Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.3 Rate Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.4 Quality Efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.5 Applications of OEE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.6 Limitations of OEE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2 Performance Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.3 Sampling theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.3.1 Sampling methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.2 Sampling period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.2.1 Normal distribution . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3.2.2 Binomial distribution . . . . . . . . . . . . . . . . . . . . . . . . 14
2.4 Measurement process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4.1 Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.4.2 Activities in the measurement process . . . . . . . . . . . . . . . . . . . . 15
2.4.2.1 Establish and sustain measurement commitment . . . . . . . . . 15
2.4.2.2 Plan the measurement process . . . . . . . . . . . . . . . . . . . 15
2.4.2.3 Perform the measurement process . . . . . . . . . . . . . . . . . 16
2.4.2.4 Evaluate measurement . . . . . . . . . . . . . . . . . . . . . . . 16
2.4.3 The measurement information model . . . . . . . . . . . . . . . . . . . . . 16
v
vi Contents
3 GSM 19
3.1 GSM specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.1.1 GSM Phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.1.2 Services in GSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.2 GSM Network Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.2.1 Radio Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.2.2 Mobile Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.2.3 Base Station Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.2.4 Network and Switching Subsystem . . . . . . . . . . . . . . . . . . . . . . 24
3.2.5 Mobile Switching Center (Mobile Services Switching Center) . . . . . . . 24
3.2.6 SMSC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.3 GSM Areas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.4 Databases and Registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.4.1 Home-location-register (HLR) . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.4.2 Visitor-location-register (VLR) . . . . . . . . . . . . . . . . . . . . . . . . 26
3.5 Operations Support Subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.5.1 Operations And Maintenance Center . . . . . . . . . . . . . . . . . . . . . 26
3.5.1.1 Telecommunications management network . . . . . . . . . . . . 26
3.5.2 Authentication Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.5.3 EIR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.6 Radio interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.6.1 Logical Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.6.1.1 Traffic Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.6.1.2 Control Channels . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.6.1.3 GSM Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.7 Protocols in GSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.8 Addressing and localization in GSM . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.8.1 International Mobile Subscriber Identity (IMSI) . . . . . . . . . . . . . . . 34
3.8.2 Temporary mobile subscriber identity (TMSI) . . . . . . . . . . . . . . . . 34
3.8.3 Local Mobile Subscriber Identity (LMSI) . . . . . . . . . . . . . . . . . . 34
3.8.4 Mobile Station (or Subscriber) ISDN Number (MSISDN) . . . . . . . . . 34
3.8.5 The Mobile Station Roaming Number (MSRN) . . . . . . . . . . . . . . . 34
3.8.6 International mobile station equipment identity (IMEI) . . . . . . . . . . 34
3.9 Data services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.9.1 GPRS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.9.1.1 SGSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.9.1.2 GGSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.9.1.3 Location managemnet . . . . . . . . . . . . . . . . . . . . . . . . 36
3.9.2 EDGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
4 GSM Evolutions 37
4.1 WCDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.1.1 System and network architecture of WCDMA . . . . . . . . . . . . . . . . 37
4.2 LTE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.2.1 System and network architecture of LTE/SAE . . . . . . . . . . . . . . . 39
Contents vii
5 Current Solutions 41
5.1 STP Utilization tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
5.1.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
5.1.2 Data collecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
5.1.3 Data presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
5.1.4 Evaluation of the tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
5.2 Utilization tool for the eNodeB in LTE . . . . . . . . . . . . . . . . . . . . . . . . 43
5.2.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
5.2.2 Data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.2.3 Data presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.2.4 Evaluation of the tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.3 Ericsson Real Utilization Measurement Solution (ERUMS) . . . . . . . . . . . . . 45
5.3.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
5.3.2 Data collecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
5.3.3 Data presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
5.3.4 Evaluation of the tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
5.4 ENSIEM adaption for node utilization . . . . . . . . . . . . . . . . . . . . . . . . 47
5.4.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
5.4.2 Data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
5.4.3 Presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
5.4.4 Evaluation of the tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
5.5 Booking degree as utilization measure . . . . . . . . . . . . . . . . . . . . . . . . 49
5.6 Other test efficiency indicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
5.6.1 Fault-slip-through . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
10 Discussion 85
10.1 Possibilities and potentials of equipment utilization measurements . . . . . . . . 85
10.2 The value of a Common Utilization Tool . . . . . . . . . . . . . . . . . . . . . . . 85
10.3 Weakness of the BSC Utilization Module . . . . . . . . . . . . . . . . . . . . . . . 86
10.4 Future work with the BSC Utilization Module . . . . . . . . . . . . . . . . . . . . 87
10.5 Future work with the Common Utilization Tool . . . . . . . . . . . . . . . . . . . 87
10.6 Future work on the utilization uodules for other equipment . . . . . . . . . . . . 88
10.7 Future work in the test environment . . . . . . . . . . . . . . . . . . . . . . . . . 88
11 Conclusion 89
Bibliography 91
5.1 The second page of the web-GUI that shows the utilization during a time period
of 6 hours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
5.2 The main page of the web-GUI that shows the utilization for one day . . . . . . 43
5.3 Diagram over data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.4 Screenshot of the presentation of utilization . . . . . . . . . . . . . . . . . . . . . 45
5.5 ERUMS schematic system description . . . . . . . . . . . . . . . . . . . . . . . . 46
5.6 Screenshot of the presentation using pChart . . . . . . . . . . . . . . . . . . . . . 46
5.7 Screenshot of the presentation of utilization . . . . . . . . . . . . . . . . . . . . . 49
5.8 Definition of fault-slip-through . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
A.1 Test Harness Core (THC) system components (used with permission by Jonas
Madsen, Ericsson AB) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
A.2 Resource Manager (used with permission by Jonas Madsen, Ericsson AB) . . . . 97
A.3 The ATE GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
A.4 Log Session View in THC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
A.5 Log Record View in THC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Contents xi
List of Tables
2.1 Performance metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2 Error for different number of samples when p=0.5 . . . . . . . . . . . . . . . . . 14
2.3 Measurment information model and example [14] . . . . . . . . . . . . . . . . . . 18
5.1 Example table over slip through data for each phase . . . . . . . . . . . . . . . . 50
Introduction
1.1 Background
Ericsson AB is a world leading company in telecommunications. The company develops mobile
telecommunication systems for Global System for Mobile Communications, Wideband Code
Division Multiple Access and Long Term Evolution and also provides services, features and
upgrades to these systems.
When a problem in a product occurs the cost of solving it is lower at an earlier stage in the
development. That is why Ericsson carries our comprehensive tests during the development
of a product. The tests have to be carried out in an environment which corresponds to the
environment where the products will be used, i.e. a configuration in the network that is similar
to the operator’s network, the operator being, in general, the customer of the product.
In the world mobile telecommunications new technologies are rapidly being released, while
previous technologies are still being developed and used. Ericsson’s range of products has there-
fore increased constantly. New products are required to function alongside previous technologies
since operators want to reuse the old systems in order to minimize the cost of new investments.
The process of detecting and correcting problems in products will require test equipment, and
the demand for equipment for the tests has therefore also grown constantly. This equipment is
very expensive and many of the products are the same ones that Ericsson sells to its customers.
Efficient use of the test equipment is very important to improve the quality of the products in
that more tests can be performed. Also, the costs can be reduced, since new investments may
not be needed.
To increase the efficiency, tools that can measure the utilization of the test equipment are
needed. At present Ericsson does not have a generic model for measuring the use of equipment
in the test environment. Such a tool can be of great help in the decision making process whether
new investments of test equipment are needed or whether existing equipment can be used more
efficiently. Today, there exist a few tools that can measure the utilization of the equipment, but
this applies only to a small part of the equipment. These tools are not consistent concerning
how they define and measure utilization. When the usage of equipment is evaluated it is often
carried out based on the degree of booking, since all equipment has to be booked, and is
defined in the same manner. The topic of creating a model to measure the utilization on the
test equipment in BUGS Ericsson Test Environment-lab has been discussed for a long time at
Ericsson. As we mentioned earlier, test equipment is very expensive and therefore a resource
that must be utilized as much as possible.
1
2 Introduction
Employees performing tests cannot report the utilization, since there is too much equipment
and too many test activities being carried out. Furthermore, it is not efficient to monitor usage
manually, and the measurements need to be performed automatically. A valid model that
presents the utilization of the equipment could allow better scheduling and planning of the test
activities.
1.2 Purpose
The purpose of this master’s thesis is to construct a model for measuring the utilization of test
equipment at Ericsson’s test plants, mainly at the test site in Linköping.
Since the utilization will not be useful without a clear definition as to what the term means
in general, the first part of the study will try to define a generic definition for all type of test
equipment. During this work the equipment will be studied in detail to find efficient and feasible
ways of conducting these utilization measurements. The study ends by creating a prototype
that can be used to measure and present the utilization rate of the devices that the master’s
thesis focuses on.
1.3 Objectives
A definition of utilization is needed for the model. The definition should be constructed to meet
the information requirements (needs) of the end users. The definition also needs to be suitable
for the different types of equipment, i.e. a model that is generic for all equipment. The term
generic also implies that the model presents a utilization rate that is comparable for all different
types of equipment. How the data is sampled and collected will have to be adjusted depending
on the equipment. The time period, which can correspond to the sampling rate, should be as
low as possible with respect to aspects minimizing the interference on the actual tests and the
limitations in data storage and representation.
The thesis will also suggest how the data should be transferred from the equipment, as well
as stored and presented in a safe and time efficient way. If software has to be installed in any
part of the equipment it has to be carried out while taking the safety issues into consideration.
1.4 Method
Articles, literature and other master’s thesis will first be studied to obtain a theoretical back-
ground for the thesis. The architecture and system overviews of GSM, WCDMA and LTE will
be studied and presented. The theoretical part will also contain theories about utilization and
sampling and capturing of data. If there is any previous work directly related to the subject of
this thesis, it will be studied.
It is important to understand how Ericsson have technically implemented the components
of the mobile systems technically, in order to get a view over the range of test equipment and a
deep knowledge in how the testing process is carried out. This has to be done within Ericsson,
mainly by interviewing the employees and surveying the test environment. Both formalized
interviews and discussions will be conducted with the individuals involved with the testing
and test equipment. The test environment and the equipment will also be studied in sufficient
detail.
1.5 Scope 3
The concept will be evaluated by implementing a prototype based on the general model.
The implementation will be validated against real, manually collected, utilization data from
the testers of the equipment.
1.5 Scope
Since time is limited for this master thesis the implementation part of the model for measuring
utilization will be limited to a subset of the equipment in the testing environment. We will
focus on one of the Linköping site’s most important pieces of equipment; the BSC. The study
will also investigate how measurements can be carried out on other types of equipment. The
main motivation why the BSC has been chosen is that it is based on older technology which
does not use ip for delivering user data, and that previous studies on this platform have proved
it difficult to determine the usage.
1.6 Confidentiality
Some parts of the thesis are considered to be of a confidential nature by Ericsson and have
therefore been edited to hide the sensitive details. The values of the resources utilization rate
have been change but since it is not the specific values that are of interest in the thesis but
rather how it is defined, collected and presented.
Also some of Ericsson suppliers and there tools that are used at Ericsson’s test plants has
been denoted supplier 1, 2 and simulator 1, 2.
1.7 Outline
After this introductory Chapter we will present the frame of reference that we have found in
this area. In this Chapter we will give a brief introduction to Overall Equipment Efficiency,
performance measures, sampling theory and a general measurement process. Since this report
will focus on GSM test equipment we will, in Chapter 3, present the basic concepts of the GSM
network and briefly describe the components in WCDMA and LTE. These chapters will provide
the necessary background that was used to create the general model on how Ericsson should
work with utilization data for their test equipment. The generic model will then be presented
in Chapter 6.
The next Chapter will present the authors’ recommendations at to how a common utilization
tool for storing, configuring and presenting utilization data from this test equipment should be
organized with the necessary collector modules.
The report will follow with a description of this implementation for a Base Station Controller
utilization measurement module. In this Chapter we will also present the working process of
this work and the analysis of the output from the module.
The last part of this report will focus on a discussion and conclusion of our study and we
will also present how the work with a common utilization tool could continue.
the organization and project structure is briefly described. The departments have different
functions in the GSM design projects or have support and maintenance functions. The test
equipment that is needed and the type of test cases that are carried out differs between the
departments.
Ericsson is organized into four main business areas; CDMA Mobile Systems, Global Services,
Multimedia and Networks. Within the business area Networks there is a development unit for
mobile radio network named DU Radio. The next level below in the organization hierarch is
the Product Development Unit (PDU) where GSM RAN is one unit. The PDU GSM RAN has
the following departments that use real Base Stations Controller (BSC) in their operations at
the test site in Linköping:
BSS & BSC System is technical responsible for BSS and BSC. BSS & BSC I&V is
responsible for BSS and BSC integration and verification. BSC Design contributes to the
development of new features and products in GSM/GPRS/EDGE. The department design,
implements, function tests and maintains the features and products. BSS & BSC PLM
has third line support at BSC software projects from due to its being General Available for
all customers until the maintenance responsibility of Ericsson expires. The department is also
responsible for packaging of software upgrades from design to customer.
1.9 Testing
Testing is a main part of the development of new products in mobile networks. It is important
that the product is tested in real networks that correspond to the networks of the customers
and that the product is tested under similar conditions as it will be used in. In this section
the test process within a product development project is described. When a problem with a
product is discovered during a test a TR(Trouble reports) is written to the person responsible
for the design of the code that caused the problem. There are four levels of TR; A, B, C and D.
The level of the TR specifies how severe the consequence of the fault is. If a fault is discovered
and a TR with the level A is written it denotes that the fault has to be solved before any test
work can continue.
BSC Design BSC&BSS I&V BSC&BSS System BSC&BSS I&V FOA customers
Figure1.9 shows a normal product software development project within DU RAN. The steps
is described below:
• Function Test. The function is tested independently. Almost all function testing that
is carried out in simulates or emulates hardware at BSC Design.
1.10 Ericsson test environment - BETE 5
• Feature Test. A specific feature is tested in a real environment at BSS I&V with the
focus on that the feature works as it was intended.
• System Verification Test. After the PIC approval, BSS I&V carries out a full scale
system verification test and after the System Verification Test the product obtains the
status RFA(Ready for acceptance).
• First Office Application. In this stage the product is released to FAO-customers, who
carry out validation tests and therefore receive a discount on the product. After the FAO
the product obtains the status GA (General Availability), which means that it is released
on the market. When a product obtains status GA, there cannot be a TR with level A
from earlier tests.
Frame of reference
Chapter Introduction
The Chapter contains the results of the study of literature, articles, books and other documen-
tation used in this thesis. The theories, concepts and methods is the foundation for the general
model are presented later in Chapter 6.
7
8 Frame of reference
To calculate OEE the status of the equipment has to be monitored over time. The status
of the equipment can be defined as in Figure 2.1 [23]. The Non-schedule state is when the
Non-schedule state
Productive state
equipment is not intended to be used. This can be due to weekends or holidays. The schedule
down state is when the equipment cannot be used because of maintenance and setup time.
The down time is also categorized into an unscheduled down time, which is all the down time
that occurs unexpectedly. The Engineering state is when experiments are performed on the
equipment to improve its performance. When the equipment is up but not operating it is in
the standby state. The reason for not operating can be due to missing operators or lack of raw
material. An operator can be missing because of breaks, lunches or meetings. The production
state is when the equipment is producing items as is intended.
The four underlying matrices for OEE are defined by SEMI, in document E79-0200 [8]:
unit, number of items started and accepted number of items. The theoretical production time
per unit is constant and needs therefore be set only once. This is the data needed for calculated
OEE according to the definitions above. Possible errors and bias in collecting and interpretation
of data in these variables will give errors in the OEE value.
KRI measures how well you have done in the past [20]. It is measured within a time period
of a month or quarter and there should not be more than ten to twenty KRIs. Examples of
KRIs are: customer satisfaction, market share and profit. However the measurement does not
show which actions that should be carried out in order to improve performance in the future.
That is the big difference compared to KPI which indicates what should be done to improve
performance. When the unit for a measure is in money it is likely that the measure is a KRI,
since the profit or return of an investment shows the outcome of an action and not the actions
that need to be initiated. A report including the KRI is suitable for a board or management
responsible for strategy decisions.
PI is a indicator that tells you what to do to increase performance [20]. Compared to KRI
it focuses on one particular area of performance and they can be both strategic and tactical.
Organizations can have up to 80 PIs and they should be well defined. Examples of PI can
be, for an airline company, be the percentage of lost luggage and for a hospital the percent of
infected patients after surgery. A PI gives a clear view over what needs to be done to increase
performance, but they are limited to one area and are not crucial for the overall strategy
decisions.
KPI show you what to do to increase performance dramatically [20]. They should be moni-
tored at a regular basis, since they are the most interesting indicators from a management point
of view. If a indicator is calculated every month or quarter it cannot be of such great interest
that it qualifies to be a KPI. Examples of KPIs are: number of patients waiting for treatment
at a hospital or number of minutes delay in average for an airline company. Both these example
show what should be done to improve performance. The hospital needs to lower the number
of patients in the queue waiting for treatment. It will give a domino effect in the performance
since the quality for the patient will increase because of lower waiting time. The patients will
also have less risk for complications since they can be treated earlier. For the airplane company
late planes means higher costs, lower customer satisfaction and higher fuel consumption. As
these two example shows a real KPI should affect several of the critical success factors (CSF)
2.3 Sampling theory 11
and give clear information regarding intervention. In literature authors have suggested up to
10 or 20 KPIs per organization [20]. It is rarely needed or not even possible to have more than
10 KPIs. Of course the number of PIs is much higher.
In Table 2.1 the performance indicators are shown together. When working with KPIs it is
important that they are introduced in a carefully way and that time is allowed for evaluation.
After some period of time and evaluations it is possible that the KPIs need to be modified.
Since the number of KPI should be small it is important to evaluate the use of them and if
they are not used the production of them should be stopped[17].
Equation 2.6 shows that if the average change of one variable over the interval tn − t0 shall
be calculated, it is enough to sample the counter at the beginning and at the end of the interval.
fs > 2B (2.7)
When sampling a time continuous signal into a time discreet signal the equation 2.7 states
that the sampling frequency required to capture all information in the signal, fs is the sampling
frequency and B is the bandwidth of the signal. The bandwidth of a signal is the highest
frequency in the signal.
X −µ
P (−λα/2 < √ < λα/2 ) = 1 − α (2.8)
σ/ n
2.3 Sampling theory 13
1
Pn
where X = n j=1 Xj . µ can then be described in the following way
λα/2 σ
µ=X± √ . (2.9)
n
The interval can be interpreted as a sampling error from the estimated expected value and
the error in percent, e%, is now introduced. Since an error is an absolute value and the interval
is symmetric, only one side has to be calculated.
λα/2 σ e%
X+ √ = X(1 + ). (2.10)
n 100
The quotient between the standard deviation, σ, and the estimate expected value, X, can
be expressed as a constant C = σµ since the error is a percent of uncertainty in estimating µ,
not the actual value. The number of samples can now be presented in terms of C, e% and λα
and e% in term of the others:
2
100λα/2 C
n= (2.11)
e%
√
100λα/2 nC
e% = (2.12)
n
Equation 2.12 shows that the error increases when the ratio between standard deviation and
the expected value, C, increases. If the number of samples increases the error will decrease as
shown in Figure 2.2.
For exponential distribution C = 1 since the standard deviation and the expected value is
equal for such distribution. If that is the case Figure 2.2 shows that about 400 samples are
needed to get a estimation of the expected value giving an error of less than 10 percent with a
confidence of 95 percent. If the ratio between the standard deviation and the expected value,
constant C, is larger, even more samples are needed to get an error less than 10 percent.
2.4.1 Measures
Three measurements are defined in the document.
• Base measure
• Derived Measure
• Indicator
The base measure is a quantity attribute of an entity that can be measured. The entity
can be a process, product, project or resource. For example a base measure can be the number
of worked hours, lines of code or defect products. A derived measure is a function of two or
more base measures. An indicator is a measure based on several derived measures and base
measures. It gives an estimation or evaluation of the information that is needed for answering
the question that initiated the measuring process. An indicator can for example be the average
productivity in a project or the average quality in a product.
Indicator
(analysis) Model
Derived Derived
Measure Measure
Measurement function
Base Base
Measure Measure
Measuring method
Entity Attribute Attribute
Description Examples
Information Insight necessary to man- Evaluating the efficiency in a
Needs age goals, risks and prob- project, estimating the quality of
lems. future projects or estimate the
status of a project
Measurable Con- An abstract relationship Project performance, risk, matu-
cept between attributes of rity and quality etc.
entities and information
needs.
Relevant Entities An object that has rele- Products(e.g Source code, test
vant attributes that can cases, design documents), pro-
be measured. cesses(e.g. design process,
testing process), project and
resources(e.g. programmers,
tester, equipment)
Attributes A property or characteris- Code blocks, data counter, list of
tic of an entity. fault in a project
Base Measures The measurement of an The total number of code lines,
attribute.Defines method the amount of data sent over
for carrying it out. one interface, the total fault in
a project
Measurement The definition of how an Count the number of lines in all
method attribute is quantified into code blocks, read the value of the
a specific scale. data counter, count the number
of faults
Type of Mea- The definition of how Subjective (human decision is in-
surement the quantification is per- volved), objective (only logical
Method formed. and numerical rules is used)
Scale Allowed values of the base Integer, discrete, continuous
measures.
Type of scale The relationship between Nominal, ordinal, interval and
the values on the scale. ratio
Unit of Measure- The unit of the measure- Hours, meters
ment ment.
Derived Measure A function of two or sev- Code line Productivity
eral base measurements.
Measurement Function for the derived Divide Lines of Code by Hours of
Function measurement. Effort
Indicator An indicator which is a Average productivity
measurement that gives
an estimation or evalu-
ation of the information
need.
Model The algorithm or calcula- Calculates the average mean and
tion that outputs the indi- standard deviation for all project
cators with base measures productivity values
and derived measures as
inputs.
Decision Criteria The threshold where ac- Indicator below a certain limit
tions should be taken if it requires further investigation
is exceeded.
Chapter 3
GSM
Chapter Introduction
In this chapter the basic components in a GSM network will be described. The reader will have
the possibility of getting an overall view of the components, the way they are used and how
they are connected to each other.
The Global System for Mobile Communications is a set of European Telecommunication Stan-
dards Institute standards that define the system components and infrastructure for a cellular
system. GSM is of today the world’s most used system for mobile communications. GSM
services are currently installed in over 218 countries and have approx. 3,450,410,548 users [5]
providing a coverage to more than 80% of the world’s population [6].
GSM is an evolution of the first generation systems, e.g. Nordic Mobile Telephone and
Advanced Mobile Phone Service, which were analog mobile systems and provided a limited set
of service. The second generation systems are digital and can therefore supply more services at
higher capacity and quality.
One major issue regarding the 1G-systems was that there existed several national analog
systems which were not compatible with each other, making mobility between different countries
impossible. Therefore an international standardization group was formed to avoid this situation
for the new 2G Public Land Mobile Network systems called Groupe Spéciale Mobile in 1982 at
the Conference of European Posts and Telegraphs. The introduction of a digital system also
gave rise to some other advantages like:
• Quality of services and security. Better quality than the 1G-system and better
security by enabling encryption of the networks traffic.
• Reduced cost for infrastructure and therefore cost per user. By standardizing
and limiting the number of system components the costs will be reduced.
• New services. New features such as data transmission, SMS and fax were developed.
19
20 GSM
The worldwide GSM standard was developed for implementation in different frequency bands to
provided better access to the network. Therefore different substandard were formed: the GSM
900 (GSM in the 900 MHz band) (GSM 800 in the US) and the DCS 1800 (Digital Cellular
System in the 1800 MHz band) (PCS 1900 in the US). The GSM 900 is used in Europe, Asia
and the Pacific Area and is designed to give good radio coverage even in the countryside outside
the urban areas. To achieve better capacity the DCS 1800 standard is used in crowded areas
which permits smaller cells and faster reuse of frequencies. DSC 1800 was renamed GSM 1800
in 1997.
• Bearer services
• Tele services
• Supplementary services
The bearer services are a telecommunication service that gives the user the possibility to
transmit signals at a certain capacity between the networks access points. GSM defines different
service types for data transmission where the original GSM standard used a circuit switched
method allowing data rates of up to 9600 bits/second. We will later discuss the enhancements
that have been carried out in later versions of GSM phases. The data services can be sub cat-
egorized into two parts, transparent and non-transparent. The transparent mode will interfere
as little as possible with the transmission and only forward error check. Non-transparent mode
also adds flow control. GSM is primarily aimed for voice communication and the goal was to
deliver high quality encrypted sound for security reasons. For this purpose the Teleservices are
used to give the user the functions needed to communicate with any other user inside and out-
side the network. The standard also includes other types of Teleservices such as an emergency
number that could be used in the whole of Europe, SMS, Enhanced Messaging Service and a
Group 3 fax service.
Supplementary services are, as in ISDN, included in order to enhance the tele and bearer ser-
vices. Examples of services are user identification, call waiting, call forwarding and multiparty
calls.
HLR
GMSC MSC/
VLR NSS
IWF SMSC
A A
BSC BSC
Um Um Um
MS MS MS
the MS a International Mobile Subscriber Identity number is stored and during the time that
the MS is connected to the network the SIM also stores some temporary information such as
the cipher key Kc and a Temporary mobile subscriber identity and the Location Area Identity
which are used to keep track of a mobile’s location in the network.
3. Speech encoding/decoding
6. Mobility management
Transmitter Reciever
Modulator Demodulator
Speech
Speech Coding Decoding
Segmentation
D/A Conversion
A/D Conversion
Microphone Speeker
kbps (enhanced full rate) or in some rare cases 5.6 kbps. These rates are clearly different from
the standard 64 kbps Pulse Code Modulation (PCM) and since the GSM network communicates
with the PSTN the TRAU is used to convert the GSM coded speech to 64 kbps or GSM coded
data transfer. The TRAU can be included in the BTS in the BSS but it is common to locate
the TRAU near the MSC in order to reduce the traffic load in the interface between the BSC
and the MSC. The interface is then known as the Ater interface. The Ater interface is vendor
specific which implies that the BSS and TRAU must be supplied by the same manufacturer.
The BTS can be located in the center of a cell or in the edges between multiple cells to
give coverage to more than one cell at a time using sectorized antennas. The connection to the
MS is called the Um interface (ISDN U interface for mobile) and the connection to the BSC
via the Abis ISDN interface. One part of the Abis interface is not standardized in the GSM
specifications, the Operations and Maintenance Link. This link is very vendor specific due to
the internal design of the BTS being proprietary, causing low compatibility between different
manufacturers.
In order to keep the BTS small, which helps deploying them in a crowded urban environ-
ment, as much intelligence and control as possible is located in the BSC. The BSC has therefore
responsibilities for reservations of radio resources, allocation and release, and Mobility Man-
agment functions like traffic measurements, location management of the MS and handover
management. A BSC is most often connected to many BTS making it a centralized control
unit for a large geographical area.
3.2.6 SMSC
The Short Message Service Center is the node in GSM which is responsible for storing and
forwarding SMS between two MS. When a SMS is sent from a MS the SMS is first routed to
the SMSC service center which stores the message. When the service center has stored the
message the SMS MSC tries to deliver the message to a MS within the network through the
MSC or to a different MS located in a different network. In the latter case the message is
delivered to a SMS interworking MSC located in the foreign network that is responsible for
storing and forwarding the SMS to the receiving MS.
• Cell The cells are the smallest geographical units of the network. This area is covered by
a BTS and is assigned a unique Cell Global Identity (CGI) which identifies the cells from
each other.
• Location Area The Location Area is a group of cells and defines an area where the
subscriber is located and is identified by Location Area Identity. The LA is introduced
in a GSM network to reduce the signaling load of updating and finding a subscriber’s
location within the network. Each time a user changes from one cell to another the ME
checks if the new cell belongs to a different LA. If the cell belongs to a new LA the user’s
new position is updated to the network. If a user is called, a paging request is broadcasted
to all the cells in the location area.
• MSC/VLR service area The MSC/VLR service area is a geographical area that con-
sists of several LA that are connected to one MSC. To route an incoming call to the ME
the users current MSC must be stored and retrieved.
• PLMN The PLMN service area is the operators’ entire network cells and is defined as the
total area of where the operator has coverage and is therefore the highest geographical area
in the GSM network architecture. The term international roaming is used for describing
when a user changes PLMN.
and authentication data. Stored in the HLR is also temporary information like the Mobile
Subscriber Roaming Number, Local Mobile Subscriber Identity and current MSC and VLR the
ME is connected to, if it is available. By using this information it is possible to easily route an
incoming service to the MEs closest MSC and BSC, more on this in section 3.8. The HLR is
also responsible for all the users in networks traffic information that is later used for accounting
and charging.
• Centralized
TMN contains five basic elements (blocks) that are defined by the TMNs functional model
[29].
Network Element. The NE are the actual nodes in the network, HLR, VLR, BSC etc. in
GSM. The functions that the NEs performs are called network element functions and are divided
3.5 Operations Support Subsystem 27
into two separate groups, primary and management functions. The primary functions are the
telecommunication functions and the management functions described by TMN.
Operations System. All the management in TMN is handled by OS through the OS function.
Separate OS functions cover the functions like billing, management, measurements. The OS is
most often a part of a OMC and if the network is large the network may have several OMCs.
Workstation. The WS acts as an interface to where the operator can communicate with the
TMN through WS functions. Through this interface the status and maintenance functions are
available.
Meditation device The MD acts as a bridge between the OS and the nodes’ various NE. The
communication is delivered through standardized interfaces.
Q-Adapter The QA is used to communicate with other non TMN compatible nodes. The QA
is therefore used as a translator between these nodes and the TMN. The TMN also includes a
data communications network between the NEs, OSs and other elements using a WAN or LAN
connections. In GSM the OMC often uses a X.25 connection to the MSC and BSC [29].
The TMN elements are shown in figure 3.3. Many of the connections and functions of the blocks
are not a part of TMN and are therefore placed in the border between the TMN and the rest
of the telecommunications network.
TO
OTHER OPERATOR
TMNs OSF WSF
INTERFACE
MD
TMN
QAF NEF
Figure 3.3. TMN elements and the connections in the TMN model.
To simplify the hierarchy of the TMN the functions has been divided into layers, like the
Open Systems Interconnect model, see table 3.1.
See GSM System Survey [3] for more information about OSS, particularly Ericsson’s OSS
implementation.
between the subscribers as confidential as possible. When the MS registers to the network the
SIM card information it is used to create a shared secret that is authenticated by the AuC.
After the authentication has passed encryption parameters are passed to the MS. The AuC is
often a part of the HLR since their tight integration.
3.5.3 EIR
The Equipment Identity Register is used to store information about all IMEIs of the MS that
are or have been registered to the network. This information is used to block connections to
MS that have been reported as stolen or have some kind of hardware or software defect. Since
many of these defects can affect the networks performance, by for example transmitting too
long sequences and therefore cause interference with other transmissions, they must be blocked.
Since the IMEI contains not only serial number information but also the make and model the
HLR block all ME constitute this black list.
In GSM each cell is given a range of RF channels, implying both uplink and downlink,
usually one to three but it could be more if the cell has a high demand. The cells are then
divided into sectors where one BTS is responsible for several cells. The carriers are further
divided into TDMA-frames consisting of eight so called time slots, numbered 0 to 7. Each time
slot provides a separate Time-division multiplexing channel available for a MS to use. Each
of these time slots occupies the medium for 576.9 µs giving a total frame length of 4.615 ms.
To prevent the MS transmitting and receiving at the same time the uplink is delayed three
timeslots. Though, when long transmitting delays occurs, due to long distances between the
MS and the BTS, a timing advance factor is introduced to assure that the uplink information
reaches the BTS at the exact instance of time. GSM supports a timing advance factor of 63
bits (23 ms) resulting in a maximum distance of 35 km between the BTS and the MS. This can
be extended by transmitting a full time slot plus the timing advance value earlier [26]. This
timing advance factor is calculated in the BTS by doing measurements of the traffic from the
MS. To avoid the need of a full duplex MS the uplink time slot numbering is delayed three
positions from downlink.
During one time slot, data is transmitted in radio bursts. GSM defines five different types
of burst in two categories, using the full duration and or a shorter duration of the time slot.
The short duration burst, the Access Burst uses a longer guard sequence and is used for the
initial setup between Random Access channel described later.
The full duration normal burst is for transmitting information for the traffic and control
channels. The burst has the length of 148 bits with 2*57 bits of actual data and 26 bits of
training information which is used to for example to calculate the timing advance value and
traffic measurements, see Figure 3.4.
3 57 1 26 1 57 3 8.25
The tail bits are all set to zero and are used to increase the performance of the receiver by
ramping the transmission power up or down. The (stealing) flags indicate if prior data portion
is carrying user data or signaling information. The training data is a predefined bit pattern in
the middle of the burst and helps the receiving part to adapt to current conditions of physical
medium, multipath propagation, fast fading etc. The four other full definition burst types are
as follows: frequency correction burst allows fine tuning of carrier frequency, synchronous burst
allows exact time synchronization between the MS and the BTS, dummy burst is used when
no data is to be transmitted and supports power measurements for quality monitoring.
The GSM standard also defines an optional slow frequency hopping sequence where the MS
and BTS can negotiate to change carrier frequency by a predefined sequence.
• Common control channels The CCCH handles the initial connection setup events.
• Dedicated Control Channels. The DCCH is primarily used for the MS to connect
with the network. The DCCH are bidirectional and are therefore used by both the MS
and the BSC.
• Broadcast Control Channel is used to carry broadcast information between the BTS
and the MSs in the cell. This information includes the cell identification number, the
frequencies that are available inside and the neighboring cells and special cell options
such as when frequency hopping is used.
The basic frames are grouped to form so called multiframes which can consist of either
traffic or control information:
• Traffic multiframe. The TCH are ordered into multiframes consisting of 26 normal
bursts. Of the 26 available bursts 24 are used for actual TCH, one for the associated
SACCH and one idle frame, see Figure 3.6. The sequence illustrated is repeated in the
32 GSM
time slot that is assigned to the MS, i.e. the slot marked 1, sending one of the 26 frames in
each TDMA channel. This makes the total length of the traffic multiframe (26*4.615 ms)
= 120ms. The idle period introduced at the end of the multiframe is often used by the
MS to scan other neighboring cells for handover purposes. If FACCH is used half of the
data portion of eight consecutive bursts is used, indicated by the Stealing flags described
above.
• Control multiframe. The control multiframe is used to carry the control signaling
channels BCCH, CCCH and the SDCCH. The multiframe consists of 51 bursts and is
therefore repeated each 235.4 ms.
T T T T T T T T T T T T A T T T T T T T T T T T T I
Above the multiframe a superfame is defined which takes up 6.12 s. The superframe consists
of either 51*26 multiframes or 26*51 depending on which type of multiframe is used giving a
total of 2048 frames. The superframe gives the MS the possibility to at least scan the all
different frame types once.
CM CM
MM MM
BSSMAP
RR RR BSSMAP
RR BTSM BTSM
SS7 SS7
LAPDm LAPDm LAPD LAPD
down. The MM sublayer is implemented on top of the RR sublayer between the MS and the
MSC to support registration, authentication and other mobility related functions.
The CM sublayer is responsible for sending SMS over a SDCCH and SACCH and the
supplementary services provided by GSM. CM also provides functions for call establishment,
selection of type of service and call release.
At the BTS the RR sublayer is changed to the Base Transceiver Station Management. The
main purpose of the RR at this point is to allocate and reallocate traffic channels, initial access,
paging and other radio resource and mobility management functions.
From the BSC to the MSC the signaling protocol is changed to the SS7 signaling system
that is used in the rest of the NSS. Here the RR functions are controlled through the Base
Transceiver Station Managment Application Part.
that belongs to a different VLR than before. Another term for the change of VLR roaming and
GSM supports three different types: within the network (LAU), national roaming (often not
supported due to regulations from the operators), and international roaming.
In the case of a circuit switch access is used the channel utilization would be very low. In
GPRS a varying number of timeslots can be used for both downlink and uplink. There is a
total of 8 timeslots that can be used and the channel coding per timeslot is 9.05, 13.4, 15.5
or 21.4 kbit/s depending on the radio link conditions [26]. In GPRS there are three classes of
MSs for simultaneous use of both packet switched and circuit switched services. Class A fully
supports the use of packet switched services and circuit switched services simultaneous. Class
B supports the use of both services but not at the same time and a MS of class C can only
support one type of service[9].
Internet
Gi
Gc HLR
GGSN
Gr GGSN
MSC/
VLR Gn
Other GPRS
Gp Networks
SGSN
Gs
Gb
Gf EIR
BSC
BTS BTS
MS MS
3.9.1.1 SGSN
The Serving GPRS Support Node is responsible for delivering packets from the Gateway GPRS
Support Node to the BSC, which forwards the packets to the BTS which sends them over the
air interface to the MS. One SGSN handles a set of nodes and keeps track of the location of
the MS. The current SGSN to which a MS belongs is stored in the HLR, which receives this
information over the Gr interface. The SGSN is also responsible for attach/detach of MSs and
their authentication and logical link management [9]. For authentication the SGSN can query
EIR the IMEI to make sure that the MS is allowed to be registered to the network. For the
circuit switched services in GSM a location management already exists. It can be reused in
GPRS, for example location updates for GSM and GPRS can be combined. In these cases the
Gs interface is used for communication between the SGSN and the MSC/VLR.
3.9.1.2 GGSN
The GGSN routes data packets out from the mobile network to Internet and other packet
switched data networks. The node converts the network address, ip address at Internet, into
a GSM address for incoming packets[9]. The packets are routed in the mobile network to the
36 GSM
SGSN responsible for the service area where the MS is located. The interface between the
SGSN and GGSN is called the Gn interface if the two nodes are in the same PLMN and Gp
if they are in separated PLMN. When the GGSN needs to know the location of a MS, it can
ask HLR about which SGSN the user belongs to. This is carried out over the logical interface
called Gc, as shown in Figure 3.8.
3.9.2 EDGE
The improvements made in GPRS were, as presented in the previous section, the possibility
of using several timelost for one user. In Enhanced Data Rates for GSM Evolution futher
improvements were carried out, by allowing a dynamic modulation which improves the data
rate. The main change in EDGE is in the air interface where MS with, good radio conditions,
can use a higher modulation scheme. In GPRS and GSM the modulation is Gaussian minimum-
shift keying which has one bit per symbol. In EDGE the MS can switch to 8-PSK that has
three bits per symbol [9]. The bit rate is up to 59.2 kbit/s for one timeslot compared to GPRS,
that could have up to 21.4 kbit/s for one timeslot The data rate is three times higher with
EDGE.
In EDGE more improvements are introduced in the air interface. Hybrid automatic repeat
request is used which makes retransmissions more efficient. Instead of retransmitting the whole
packet, more redundant data is sent, which increases the chances for the receiver to decode the
message correctly. However there are a few effects on the GSM system architecture when EDGE
is introduced. The interface between BTS and BSC, called Abis, only supports 16 kbit/s per
traffic channel [9]. Since edge supports higher data rates, several traffic channels in the Abis
interface are allocated for one EDGE channel.
Chapter 4
GSM Evolutions
Chapter Introduction
This thesis is mainly focused on GSM networks, although this Chapter presents the latest tech-
niques for mobile communication developed at Ericsson. The standardized techniques WCDMA
and LTE are described from a general perspective.
4.1 WCDMA
After GSM the next generation of mobile network is the third generation, mobile network 3G.
It is generally called UMTS (Universal Mobile Telecommunications System) and the first and
most widespread one is the release99, which was standardized by the 3GPP [16]. WCDMA is a
development of GSM and supports, in the release99, packet switch data rates of 0.384 mbit/s.
After release99 the development of WCDMA has continued and HSPA (High Speed Packet
Access) is one extension of WCDMA where speeds of up to 14 mbit/s are supported in the first
phase [12].
37
38 GSM Evolutions
PSTN Internet
Gi
GMSC GGSN
HSS
MSC/ SGSN
VLR Iu_cs Iu_ps
Iu_ps
Iu_cs
Iur
RNC RNC
Node B is the logical node in WCDMA that correspond to the BTS in GSM. The name
’Node B’ was a temporary name during the process of standardizing WCDMA but was never
changed [16]. It is responsible for coding, interleaving, modulation and other physical layer
function. Radio resource functions, such as power control, are also performed in NodeB.
RNC (Radio Network Controller) is responsible for several NodeB’s and is connected to the
core network and other RNC. A RNC is one anchor point in the network, which means that it
is a fixed point in the network from point of view of the core network, even though the user
switches cells. If the user moves to a cell controlled by a NodeB that belongs to another RNC
a concept of serving and drift RNC is introduced in order to maintain the original RNC as an
anchor. The first RNC remains the serving RNC even if the user moves to a NodeB controlled
by another RNC, which becomes drift RNC.
HLR stores the information about the subscriber in a database. It contains information about
which services that are allowed for the user and status about services such as call forwarding and
call waiting. It also stores information about where the user is located, e. g. which MSC/VLR
or SGSN.
Uu interface is the wireless radio connection between the UE and NodeB. In this thesis there
will be no focus on the wireless part. However a lot of research on mobile communication is
being carried out within this area. In WCDAM the multiple access is achieved by spreading
the signal into a wide signal of 5 MHz and separating the users by adding a unique code for
each user.
Iu is the interface between the UTRAN with the CN. It has one interface for circuit switched
(CN) traffic and one for packet switched (PS) traffic. In this interface information between
the RAN and the CN is exchanged for many functions. Some of these functions where the Iu
4.2 LTE 39
interface is used are paging, hard handover and location reporting. By having standardized
interfaces UTRAN and the CN from different manufactures can function together.
Iub interface connects NodeB with an RNC. In GSM this is not a standardized interface and in
LTE this interface does not exist, since NodeB and RNC are combined to one logical node. By
standardize this interface the possibility for manufactures to specify on creating NodeB opens.
Iur interface is used when two RNC need to communicate with each other. The interface was
mainly intended to be used for soft handovers. It can also be used for exchange information for
Global Resource Management.
4.2 LTE
After WCDMA the LTE (Long Term Evolution) is a development towards the fourth generation
mobile communication system. The operators call this technology 4G, however Ericsson, which
is a leading developer in this field, claim that LTE is a step towards 4G. It is likely that Ericsson
will call LTE advanced the "real" 4G. In LTE the allocated spectrum can vary from 5 MHz up
to 20 MHz. It uses OFDMA (Orthogonal Frequency Division Multiple Access) in the downlink
and has a flat IP-based structure [12]. Other targets, when designing LTE, were low round-trip
time, high mobility and high capacity. The peak data rate in LTE is from 100 mbit/s without
MIMO and 326.4 mbit/s with 4x4 MIMO in the downlink [25].
Internet
SGi
S6 EPC
HSS (Evoloved
Packet Core)
S1
S1 S1
X2 X2
eNodeB eNodeB eNodeB
Current Solutions
Chapter Introduction
The topic of measuring the utilization of the test equipment have been explored earlier at
Ericsson. This Chapter presents the previously used tools and methods for estimating the
usage of test equipment that were encountered during the work with the thesis.
5.1.1 Definitions
The utilization is calculated for a six hour period for each STP and up to four levels of utilization
are defined; none, low, medium and high usage. The level of usage is derived from several base
measures:
• The number of shell connections to the RNC. The shell connections are: telnet, moshell,
SSH, FTP, Serial and OSS.
These variables can then be combined into logical expressions that have to be true if a
certain level of utilization is considered to be reached. One example could be:
(number of shell connections > 3) AND (number of changed settings > 0) -> usage = high
41
42 Current Solutions
Figure 5.1. The second page of the web-GUI that shows the utilization during a time period of 6
hours
Figure 5.2. The main page of the web-GUI that shows the utilization for one day
The model has been verified, by testing whether the log files are correct and that they are
processed in the way it was intended. Whether the limits then gives correct results is not
validated. The limits are determined from experience. Although the tool is good at collecting
data and has an informative GUI, the weakness lies in how to specify the rules and limits.
Knowing how to interpret the base measures is essential for the quality of the output from the
tool.
The level of usage is calculated for a six-hour-period, even though the data is collected every
hour. There is no reason for not having the same time resolution for the base measures and
the derived measures. Data could be collected every sixth hour, which would minimize the
interference of the testing or the level of usage could be calculated every hour, which would
increase the accuracy of the measurements.
5.2.1 Definitions
The sampling period is 2 hours. The state of the equipment can be used, unused and that no
data was collected or that the collecting of data is disabled. The states are derived from the
following three base measures:
• The number of bytes transferred over the S1 interface.
• The number of datagram’s transferred over the O&M (Operation and Management) in-
terface. This interface is used by the operator to manage the eNodeB and is also used
during testing.
• The number of restarts is included since the two other counters are zeroed when a restart
occurs.
If one of the base measures exceeds a threshold the state is classified as used. The thresholds
for the variables are not fixed, although the default values of the thresholds are 125000 bytes
for S1 interface, 5000 datagram’s for O&M and two numbers of restarts during a period of two
hours.
44 Current Solutions
SHH/SFTP eNodeB
Testscript:
- Get data THC
- Process Server eNodeB
- Store in DB
eNodeB
Utilization
database
the node. The presentation is not clear on whether the non-use time was unused at the time, if
no data could be collected or that the node was disabled. The status no data is unclear in the
tool. It is in fact defined in the calculations as not used, which in this case is probably valid
but it is not motivated. It cannot obviously be used when it is down, however one may argue
that it should be withdrawn from the total time before calculating the utilization.
5.3.1 Definitions
The base measure is the number of filtered IP-packets to a node during a five minute period.
It is used for the derived measure that shows the utilization for the interval according to the
definitions below:
but only the number of packets per time interval. The received packets are stored in the main
memory, which is another reason for frequently calculating the statistics from the traffic data
and then deleting the data.
Backbone
Network
Node
ERUMS- Mirror
switch Node
Server
(Linux)
switch Node
Mirror
switch
Node
5.4.1 Definitions
The tool uses the same definition of utilization as the Utilization tool for STP in WCDMA, see
5.1.1, which are; no, low, medium and high usage. The base measures are also the same:
• The number of shell connections to the RBS. The shell connections are: telnet, moshell,
SSH, FTP, Serial and OSS.
In this tool the usage is measured per hour. The level of usage is classified depending of the
values of the three base measures. It is almost solely the number of registered UE´s that decide
the level of utilization for each hour. The default thresholds for the number of registered UE´s
is 1 - 99 for low usage, 100-499 for medium usage and > 500 for high usage.
5.4.3 Presentation
The user interface is the ENSIEM dashboard, which is a web based service which uses the
Business Objective reporting capabilities to create rapports and provide a GUI. Data for the
presentation is stored in the ENIQ database. The GUI over the utilization per day is shown
in Figure 5.7 where the usages is mapped into the four levels per day. The daily usage level is
determined by the number of hours the equipment is considered used that day, independent of
what the level of usage per hour low, medium and high is now considered the same. 0 -3 hours
is no usage, 4-6 hours are low usage, 7-10 hours are medium usage and 11-24 hours are high
usage.
Business Objective is a business intelligent solution production from SAP. It is used for
analytics, dashboards, visualization and reporting. For the utilization tool the dashboard func-
tionality is used which includes features like flexible report selection and the possibility to share,
save and schedule reports. In Business Objective access control is implemented, which is im-
portant since users only should be able to see and generate reports with information that they
are allowed to access.
which makes an indicator that only calculates the found faults misleading. Therefore fault-slip-
through measurements are more accurate in indicating the efficiency of software testing.
Fault-slip-through
BSC Design BSC I&V BSC System BSS I&V FOA customers
The later a fault is found the higher is the cost of fixing it [13]. To fix faults after delivery
can be a hundred times more expensive then to find and fix them in an early test process.
Fault-slip-through is measured by comparing in what phase the fault was found with the phase
in which it should have been found. One example is shown in Figure 5.8 where one fault that
should have been found in the FT-phase is instead found in the SV-phase. The phase where the
fault should have been found is defined as the phase where it is most cost efficient to find the
fault, which is almost always - the earlier the cheaper. However some faults cannot be detected
in early phases due to the complexity of the faults. Where the fault should have been found
is estimated by the person that reports the fault, the tester, or the person that corrects the
fault, the developer. It is important that a definition for these estimations is specified and that
the developers and testers are educated properly [18]. When all faults are categorized they can
be assembled in a Table that shows where the fault was found and where is should have been
found. Table 5.1 shows one example of how the fault-slip-through can be presented for the
test process. DIDDET (Did detect) means in what phase the fault was detected and SHODID
(Should detect) means in what phase the fault should have been detected.
Table 5.1. Example table over slip through data for each phase
Ericsson is today using fault-slip-through, or fault slippery, when test operation in a project
5.6 Other test efficiency indicator 51
is evaluated. Studies of the test operation at Ericsson have shown that, according to the fault-
slip-through measure, there is a possible improvement in the Function Test by 32 % and 39 %
and in design phase by 85 % and 86 % for two case studies of software project at Ericsson [18].
Chapter 6
Chapter Introduction
This Chapter presents a general model for measuring the utilization of test equipment. The
model is based on the theories from the Frame of reference in Chapter 2 and the analysis of
previous tools in Chapter 5.
Indicator Definition
Equipment Utilization Efficiency Shows the proportion of time the
equipment is used.
Test Performance and Quality Shows the efficiency of the test
Efficiency operation when the equipment is
used.
The two indicators can be combined into a theoretical indicator called Overall Test Equip-
ment Efficiency (OTEE) that captures the overall effective usage of test equipment. The
separation into these two indicators allows a distinct definition of utilization that only requires
a classification of the equipment usage into discrete states. To calculate the equipment uti-
lization only the states ”used” or ”idle” have to be classified, however if the metric is split
53
54 General model for utilization measurements
up into additional metrics other states of the equipment have to be monitored. In Figure 6.1
the concept of Overall Test Equipment Efficiency is illustrated graphically. The separation of
OTEE gives a context to the Equipment Utilization Efficiency which is the scope of this thesis.
If the Equipment Utilization Efficiency is low OTEE will also be low, however if Equipment Uti-
lization Efficiency increases, the Test Performance and Quality Efficiency can decrease which
leaves the OTEE unchanged. This can be exemplified with the following scenario. One teste-
quipment is used once every day for a test that lasts for twelve hours. The test performed
on the equipment has high Test Performance and Quality Efficiency which is estimated to 80
percent and the equipment is used for 50 percent of the time. It gives an OTEE of 40 percent.
One day the test fails when it is almost finished and the test is repeated. The equipment will
then be utilized for 100 percent. The Test Performance and Quality Efficiency is half of what
is was the previous day, 40 percent, since the utility of the test is equal although it last for twice
the time. The OTEE will be unchanged at 40 percent this day too. The example shows that
increase in Equipment Utilization Efficiencydoes not necessaryly have to increase the Overall
Test Equipment Efficiency, however it gives an upper limit of OTEE.
Figure 6.1. The OTEE concept, which put Equipment Utilization in a context
The concept of OTEE, shown in Figure 6.1, illustrates the fact that the definition of equip-
ment utilization exists in a context of other performance and quality measurements, which are
needed for the whole picture of how efficiently the equipment is being used. If only Equipment
Utilization Efficiency is used for this purpose it will give an over estimation of the overall equip-
ment efficiency. To get the real overall efficiency the Test Performance and Quality Efficiency
is needed. It is not the scope of the thesis, however here follows a few examples of ways to
estimate it:
• Comparison of the actual test result and the expected test result.
• Measuring the degree of utilization from the equipment, if it is possible to achieve this.
The performance efficiency is highly dependent on the equipment and the activities that are
conducted. No detailed description will be presented in the scope of this thesis.
6.2 Equipment Utilization Efficiency 55
1 if the equipment is available for time period i
ai =
0 otherwise
1 if the equipment is used for time period i
ui =
0 otherwise
i = 1,...,N
PN
i=1 ai
Availability Efficiency = (6.1)
N
PN
ui
Operation Efficiency = Pi=1
N
(6.2)
i=1 ai
PN
ui
Equipment Utilization = i=1 (6.3)
N
The Availability Efficiency shows the proportion of time that the equipment is available
for testing compared to the total time. If the value is low it can be due to the fact that the
equipment is down and maintenance has to be carried out or that the equipment is not booked
for testing. Operation Efficiency shows the proportion of time that tests are carried out on the
equipment compared to the time the equipment is available for testing. If the value is low it
means that less testing is carried out compared to what was planned or that the equipment
was booked up for a longer time than was needed for the tests which were planned. The reason
why fewer tests were carried out can be due to failure of other equipment needed for the tests
or that the testers have to prioritize other tasks.
At Ericsson test environment the projects and departments that uses test equipment have
to book it for usage. With the information about the equipment booking status other efficiency
measures are possible. Other interesting indicators can be; used time compared to booked time
and down time compared to total time. The down time indicator can be used in negotiations
with supplier in the case of non Ericsson manufacture equipment.
56 General model for utilization measurements
State Description
Unbooked Equipment is not available for test
Down
Booked Equipment is down when it is intended
to be used
Unbooked Equipment is not planned to be used
Idle
Booked Equipment is planned to be used but is
not
Unbooked Not allowed test in the equipment
Used
Booked Test or test related activities in the
equipment
No data The state of the equipment can not be
classified
The state Used is when the equipment carries out the activity it is intended for. For test
equipment it is obviously Used when a test is being carried out, but also for all the activities
necessary for the carrying out the test and for analyzing the results. The type of activities that
make the equipment considered to be used differs depending on the equipment. The state Idle
is when the equipment is available for test but it is not used. Equipment is considered to be in
state down if no tests can be carried out due to equipment failure or maintenance. In Ericsson
test environment almost all equipment has to be booked before the testers are allowed to use
it. The booking system is central in the asset management of Ericsson as described in Chapter
1.8 and unbooked can therefore be consider to be an additional state of the equipment which
makes the state a combination of usage status (used, idle or down) and the booking status
(booked or unbooked). If the equipment lacks booking status or that the information is not
possible to access it can be neglected. The booking status of the equipment mainly contributes
with information about when unbooked equipment is used and provides an explanation for why
equipment is idle in the case of it being unbooked.
The equipment utilization indicator equations 6.1 - 6.3 require information that specifies
whether the equipment is available and if it is being used. Depending on whether the booking
information exists the states mapping to this information differ.
• Equipment is available when it has state: (used, booked), (used, unbooked) and (idle,
booked).
• Equipment is used when it has state: (used, booked) and (used, unbooked).
Used
Idle
time
Equipment Equipment Equipment Equipment
classified as: classified as: classified as: classified as:
Used Used Used Used
Figure 6.2. Sampling a binary signal that describe the equipment state.
equipment states can be accepted the error of the indicator will be smaller the more states
that are used to calculate the indicator. In Table 6.3 the error in estimating the equipment
utilization is calculated using equation 2.16 where the equipment states (idle, used) are sampled
with different time periods and the utilization is calculated over different times. The calculation
requires an assumption that the state samples are considered to be binomially distributed. In
the Table α = 0.95 and p = 0.5 which is the value of p that gives the highest error (see 2.3.2.2).
The calculation in Table 6.3 shows that even a sampling period of 2 hours gives an error less
than 11 percent when estimating the Equipment Utilization over one week. The assumption
in the calculation that the state samples are binomially distributed is probably a worst case
scenario. The interpretation of the result is that when samples have to be used instead of
counters, sampling does not need to be carried out so often if the information requirement is
the utilization over a week or more.
The time resolution also determines the amount of data that needs to be stored. If the
equipment state is decided per hour there will be 8760 record per year for one piece of equipment.
The number of nodes or equipment in the whole test environment is several thousand and
the total number of records per year will be more than ten million. The size of the record
depends on the information that is stored. One record can be either the base measures, the
derived measures (Equipment states in this case) or both. If the amount of data becomes larger
than what is manageable it can by aggregated together and only the indicator can be saved.
Detailed historical information about the utilization is not needed but rather the indicators for
benchmarking and comparison are required.
Chapter 7
Chapter Introduction
In this Chapter there will be a discussion on how a common utilization tool, the Ericsson
Common Utilization Tool, chould be implemented with separated collector measurement mod-
ules but with a common storage, configuration, presentation and Key Performance Indicators
measurements.
59
60 Common Utilization Tool
Common utilization
Node
presentation
Node
Equipment
state (idle, Generic utilization
used, down) database
Equipment
state classifier
Equipment Equipment Equipment
Base measures A state B state Z state
sampling sampling sampling
module module module
Collect data
Equipment
attribute
7.2 Modules
The use of separated collector modules for determining the predefined states of the equipment is
needed to assure that the utilization is as accurate as possible. The use of the separated modules
will also make it easier to distribute the development of the collectors to different organizations.
This means that, for instance, the GSM part of Ericsson can, as we have done, implement a
BSC module and for example BETE to design a module for the RBS platform. This will also
permit the reuse of the Utilization tools that have already been developed throughout Ericsson
organizations. These tools could, at startup, deliver data to both the old location and to the
new common storage location.
The module should be constructed to first collect the base measures and with help from
these classify the state of the equipment into derived measures. This derived measures should
then finally be delivered to the utilization database in the format stated by common guidelines
that specifies the state of the tested resource. This should include information on equipment,
time-period, utilization state and a comment for the utilization record.
The implementation of a module could be carried out in a variety of ways but we support
the idea of using a pre-made system that communicates with resources such as Test Harness
Core. This will significantly reduce the development process and maintenance time needed to
measure utilization. Since a tool such as THC is developed to support "all" equipment that is
under test, and to support the testing of equipment, this tool will provide many of the features
needed to collect the data. Another important benefit of using THC is that sites that do not
already have THC implemented get an environment deployed that can be used to automate the
7.3 Database 61
The common utilization tool could provide a code structure that could be used to develop
the test case and the test code to the module. To support reuse of code written for the
individual utilization modules a common repository such as eForge should be used to store all
code developed for the modules.
7.3 Database
Since the overall aim of the Common Utilization Tool is to define a uniform base for the
utilization of test equipment, is it convenient to store the utilization data at one common
source. This will force the different developers and users of utilization measurements to think
of utilization for different types of equipment in the same way. This will also aid the use of the
same KPIs for all types of resources and to create a common presentation GUI.
The requirements for data storage of the utilization data for a common utilization tool are
quite high due to the large number of resources (entities in the database). Therefore it is
important to keep a simple structure and reduce the information needed to be stored. The
structure is very important because a poor database structure will reduce the performance
significantly. The number of operations the database has to perform during a transaction of
data will grow quickly, if the number of users, and therefore the load, grows fast and could
make the database overloaded and unusable. Since Ericsson today has approximately 71 sites
and say that each have 500 items that they would like to measure in 24/7, this would give 71 *
500 * 24 = 852 000 records/day. All these records will pretty soon require a large storage area.
A solution to this problem is to separate the information that is stored into distributed
databases. The central storage utility should, in this scenario, only have to store management
information on a daily or monthly basis to produce the required KPI measurements and pre-
sentation at a lower resolution. Together with this centralized storage regional site specific
databases where collector modules could send these data will be used. These local databases
will then consolidate on a daily basis to a central database. In the local database the module
specific data could also be stored like the dns-name if it should be measured etc. By doing this
the performance of the system will be higher and will keep the information needed for classi-
fication; limits, attributes and other previous state variables. This will also make it simpler
62 Common Utilization Tool
to design individual collector modules, because the designer can make the decision as to what
information to store independently and what other modules are needed.
The required data that has to be stored about a resource in the common utilization tool is:
• Unique identifier
• Site
• Type of equipment
Another important type of information to store is whether the resource is booked or not. This
information could either be stored in the database or fetched on demand by the presentation
GUI. Which solution that should be chosen depends on how this information is going to be
used. Since this information will be needed for accurate KPI measurements on the utilization
we recommend that this type of information is stored together with each utilization record.
Using the requirements above we propose the structure for the generic database model to be
as the model shown in Figure 7.3. In this model we store and collect data for resources, type,
groups and utilization. The design is flexible so that more features could be added if needed.
The resource table is show in Table 7.1. Resource utilization data is stored in the table
resource_utilization, see Table 7.2. This table will store the state, if the resource is booked
and a text comment for each utilization record. The booking state should be queried from
the BAMS database when the resource utilization is collected. This will limit the amount of
7.3 Database 63
information needed to be collected from this database. The resource type information is used
to filter the number of entities in the presentation of resources in the WebGUI. The type of
resource could be, for example, BSC, RNC or a protocol analyzer. Since each resource can
only be of one specific type the type_id is stored for each resource. The type table is shown in
Figure 7.4. Since this type of information would vary with time, it is not possible to change this
through the GUI. The site table stores information on which site a current resource belongs to,
see 7.3 To support the feature that resources could be related to each other, a group table is
introduced. This table could group the resource by project, domain or responsible department.
This information is set by the GUI. And since this information is changeable over time the
resource and groups are connected by a many-to-many relation, see Table 7.6 and 7.5.
that has been used to manage this problem is to use a static version of the page that could be
fetched instead of the on demand generated page. This approach works for this purpose but we
wanted to have a flexible structure where the resources could be combined in numerous ways
which would make this solution impractical. We also wanted to avoid using the outdated CGI
programming language of which we, furthermore, have no previous knowledge.
Therefore we decided to create a new presentation WebViewer for our BSC utilization mod-
ule that could be used as a presentation layer for the common utilization tool. We decided to
use the same base structure as the tool we evaluated since this way of showing utilization seems
to work quite well. We also added the requirement to make the tool fast so that many resources
could be show at once without a long response time. Since we have some previous knowledge
in JAVA and Servlet/JSP development we made the choice to use this technology as the base
for the presentation layer.
The main presentation of resource utilization, see Figure 7.6, shows the utilization on a
dayly basis combined with a set of KPI for a specified month. The utilization record for a
day shows the utilization as a percent value calculated by dividing the state used by the total
number of records for the specific day. This will, if the collector has been able to measure
during all hours of the day, be records with state used divided by 24. The KPI measures shown
are, see Section 6.2 for more details:
The choice of resources to be shown in the GUI can be set by updating the show parameter
in the resource table, see 7.1. In the standard view the resources are shown grouped by the
group to which they belong. If the user is only interested in a specific group the user can filter
the results by choosing a specific group and only show the included resources.
The second main view is the resource view, see Figure 7.6. This view shows the specified
resource, year and months utilization records. In this more detailed view the individual utiliza-
tion records states, are presented on an hourly basis. The utilization comment is also available
by hovering with the mouse pointer over a record.
Since one of the main motivations of construction was to construct a fast implementation,
designing the code used has been of most importance. This is done by limiting the amount
of traffic to the database and instead using the great indexing capabilities a modern relational
database provides. Therefore many of the calculations that are needed to produce the statistics
are produced by the database itself by creating smart Structured Query Language queries.
project level and with a variable time period. The generated report could consist of a table of
resource utilization, KPIs and could be further visualized by connecting a graph to show the
trend.
Chapter Introduction
This Chapter present the results of the work which has been carried out for implementing the
BSC utilization module that is developed for the common utilization tool, described in Chapter
7. Ericsson BSC see Appendix B.
8.1 Background
The work to construct a model to measure the utilization level on the BSC in the BETE lab
environment is a topic which is very important for the Linköping site. This is because a large
part of the site is developing the software and testing the software for it. The number of
BSCs available for test is huge and possibilities to lower the total spending for this resource is
significant. Ericsson has conducted previous studies and has concluded that it is hard to measure
the utilization on the BSC due to the internal structure and the way tests are performed. The
collector should be able to detect all the types of test cases that are used on the BSC.
The BSC has the modular structure with a Central Processor and several Regional Pro-
cessors that share the activities preformed in the node. This structure allows the CP to be
idle even when the Regional processors are under load. The CP can also perform maintenance
operations which gives some internal load, even if the node would be considered idle (unused).
Another big issue when implementing a utilization collector for the BSC is that the test
environment is very complex and many of the activities would generate a lot of load on the
node.
69
70 BSC Utilization Module
• Load tests. During this type of test a lot of Circut switched and Packet switched traffic
is generated. The generated traffic can either come from real nodes MS through the BTS
or through a TSS. This type also covers most System & Verification tests where test case
check if the new features introduces any faults on exist code.
• Function tests. These types of tests often only check a small part of the software.
During these test cases many statistical functions are disabled and the load on the BSC
is low. A high load is often not needed to test a single function and will probably make
it harder to test this small part.
• Feature tests. A specific feature is tested in a real environment at BSS I&V with the
focus on that the feature works as it was intended.
• Upgrading. Upgrading of CP, RP dumps and upgrading of the Adjunct Processor
Group. This type of test is mostly performed by the Product Line Maintenance depart-
ment.
8.2 Pre-study
The authors started the work for implementing the BSC utilization module by performing a
pre-study on how the BSC works and what types of measurement points exists. This was done
be reading documentations and discuss with our supervisor at Ericsson, Torbjörn Wikström
and with Greger Hultman, a representative from the BETE organization.
• Capture real user traffic (traffic that is generated by the users of the system)
power during normal load and the maximum thermal power. Measuring the actual thermal
power would therefore give a measure of how much load the node is under. The BSC consists of
several processors and other devices, such as switches, that would consume more energy during
higher loads.
The major problem with this measuring point is that the change in power consumption
will probably be dependent on how the BSC is configured. The configurations of the BSC in
the test environments are diverse and changing and will therefore make this kind of measuring
hard to calibrate. Another problem is also, as with the user traffic measuring point, that the
troubleshooting and configuring stages will be hard to determine and correctly classify as used.
The solution would also be expensive to scale up since it requires hardware for measuring the
energy consumption.
8.3 Implementation
The design choice of using a software implementation that connects directly to the node a new
study was started in order to find the appropriate base measures that will provide the derived
measure of utilization. This work was carried out by discussing the matter with the testers for
different departments in the GSM organization. The departments were chosen so that most
of the stages in the development stage of the software was represented. The departments that
8.3 Implementation 73
were included were BSC Design, BSS & BSC I&V and PLM forming a reference group for the
development of the BSC utilization module.
The typed commands are stored in an audit log at the APG which is the input/output
system for the BSC. Since MML command is the method for the tester to communicate with
the CP the audit log is an interesting attribute of the node. However OSS also types MML
command for checking if the node is up. These commands are filtered out and the reaming
commands are counted which gives the following base measure:
The BSC can store statistics internally. These counters are called Statistics and Traffic
Measurement and contains many different types of statistics and traffic measurement. The
problem with STS counters is that they do not have to be activated. A number of counters are
however activated at almost all BSC since they are used for test KPI. The counters are grouped
into object types and counters in the object types BSC, CELLQOSG and CELLQOSEG gives
the following base measures:
4. Resource manager returns and reserves the resources for test (this is a non blocking
reservation).
5. The Java Virtual Machine (JVM) schedules the test codes for execution with a Parallel-
TestScheduler.
CORBA SQL
Resource Manager JTEX 1.
GSMUtilTestCase 2.
3.
JVM BSCUtil
Database
4. BSCUtilTestCode 1 Database
BSCUtilTestCode 2
BSCUtilTestCode 3
...
...
BSCUtilTestCode n
3. Equipment initiation
4. Get data from database (if previous data is needed for calculating a change)
5. Get limits
7. Fetch data
8. Validate data
8.4 Collected data and classification of BSC state 75
If some sort of error occurs during the execution an equipment clean up method is available to
remove any temporary items or reset any state change on the node.
These steps could be considered general for measuring at all types of nodes. Not all of the
steps will be needed for all equipment and thus no code has to be included in this method. For
the BSC utilization module all the methods except equipment initiation and check setup are
used.
The THC test code for the BSC are connecting to the nodes using the MML resource
factory that is pre built in THC for communicating with, for example, a BSC using the MML
language. In this factory there are tools available for parsing the printout for MML commands.
This makes it easy to interpret the result from the function executed.
A parser for the STS counter values was not available in the MML factory or in the THC
repository and had to be developed. During the development the authors came across parser
implemented in the Perl script language which we converted to JAVA code which could be used
for this purpose.
8.3.2.3 Database
The BSC utilization module needs a database to store the resources that are included in the
utilization measurements. This database includes information about the address to the resource
(used to fetch the appropriate THC resource), whether the node is disabled for measurements
and a comment that is displayed in the common presentation layer if the resource is disabled.
The database also stores the different base measurements thresholds for indicating usage.
They are stored for each BSC including a description that could be used when the limits are
set.
Counters Samples
BSC Total Total kB Total Number Number Number
number number in up- number of con- of chan- of On
of con- link and of types nected nels demand
nected downlink MML calls last allocated channels
calls com- minute to the for PS
mands cells traffic
64 4190 0 0 109 336 0
48 12049 5666558 50 217 616 185
98 not active not active 225 0 316 0
81 7992 10420 0 139 239 14
90 not active not active 0 0 316 0
110 0 0 0 0 644 0
101 1714 354 0 27 37 0
120 3643 0 0 78 332 0
without CS traffic. That is why the classification will focus on the number of calls (CS traffic).
It is clear that if there is traffic the number of connected calls is high. In the interval between
10 and 1000 number of connected calls there are very few records. It means that the limit for
classifying the equipment as used, based on the number of connected calls, can be somewhere
in that interval. The Figure also shows groupings of records that represent different types of
test cases. Testers often use scripts for executing test cases which generate the same number of
MML commands. There are more records which are not shown in Figure 8.2 since they have
more then 10 000 calls or more then 200 MML commands during one hour.
For the records where STS is active about 20 percent of them have zero number of calls and
then it is the number of commands that has to decide the state of the equipment. In Figure
8.3 a histogram illustrates the number of MML commands when the CS traffic is zero. There
is no clear line in the histogram, which make it difficult to decide where the threshold should
be. There is a peak at 6 commands, which is difficult to interpret and further investigations
are needed before a threshold for these base measure can be decided.
The first hypothesis for classification rules is that the number of calls have to be higher than
10 and the number of MML commands have to be higher than 5 if the BSC is considered to
be used, otherwise is it classified as idle. The rule is shown in Equation 8.1. With this rule it
is possible to classify all BSCs that have the counter active. The BSCs that do not have this
counter active have to be classified with other base measures and will be discussed later. It is
often BSCs where Function Test is performed that do not have STS counters active.
With the classification rule that is presented above the operational efficiency is 87.0 percent
and the availability efficiency is 97.5 percent for the BSC that have the counters active (non
8.4 Collected data and classification of BSC state 77
Figure 8.3. Histogram with the number of typed MML commands when there are no traffic
8.4 Collected data and classification of BSC state 79
Feature Test BSC). This gives an equipment utilization efficiency of 84.5 percent.
Using the rule in Equation 8.1 there are three misclassified records in figure 8.4.
is the number of calls and the amount of data traffic. Almost three thousand records have been
collected and from them the following analysis regarding sampling the traffic has been carried
out:
• In 8.3 percent of the records the number of calls during one minute is zero when the
counter for the number of calls is greater than zero.
• In 22.2 percent of the records the number of on demand channels for PS traffic is zero
when the counter for PS traffic is greater than zero.
The bullets above indicated that if the number of calls is sampled, 8.3 percent of records
with PS traffic will be misclassified. For the data traffic the error will be 22.2 percent if the
counters for data traffic are not active. The reason for the large difference between the CS and
PS traffic depends on how the attribute is sampled. For CS traffic the sample is the number
of calls for the last minute. The sampling of PS traffic indirectly shows the data traffic by
counting the number of on demand channels that are used for PS traffic. These channels are
used when the PS traffic becomes more intense which means that this measurement may miss
low intensity PS traffic. However it was the best possible way to sample PS traffic that was
found.
In function testing there are specific commands that are used, for example the command
"Test System" is used for to activate a system in the BSC used in function test. Whether this
command has been typed can be filtered out from the audit log. The base measure that shows if
there are channels allocated to the cells can also be used to discover function test. The collected
data show that this variable changed more in a BSC that in a function test.
Chapter 9
Chapter Introduction
The Common Utilization Tool presented in Chapter 7 suggested various collector modules
depending on the type of equipment to be used. Possible ways of implementing collector
modules for some other pieces of test equipment is presented in this Chapter.
9.1 UE simulators
An investigation about the possibility to measure the utilization of UE simulators used in Long
Term Evolution has been recently conducted at the site in Linköping. The two tools used today
are, in the thesis, called UE simulator 1 from supplier 1 and UE simulator 2 from supplier 2.
In this section the conclusions from the report are presented for the two UE simulators.
9.1.1 UE simulator 1
UE simulator 1 simulates the 3GPP LTE mobile terminal but requires a traffic simulator of
third layer functionally called LTEsim. In the report no solutions were found where base
measures can be measured directly in the UE simulator. The interfaces of the LTEsim could
not give sufficiently accurate measures and the UE simulator 1 is difficult to access remotely.
Two approaches for measuring activates in the node where investigated. The first solution was
to implement counters in UE simulator 1 that counts the number of tests executed, the number
of data or packets sent to UE simulator 1 or the number of commands sent to UE simulator
1. The values of the counters will then be the base measures. The drawback of implementing
counters in UE simulator 1 is that it puts a load on the system, which can affect the test cases
carried out and there is a cost of implementing it.
81
82 Utilization modules for other equipment
The second solution explored in the report is to have a network tap or port mirroring that
filter and count the relevant packets in the network between the LTEsim and UE simulator
1. The solution is equivalent to one of the previous tools used for utilization measurements,
ERUMS see 5.3.
9.1.2 UE simulator 2
UE simulator 2 also simulates UEs in LTE. The equipment is controlled from a Windows
XP instance and external traffic generators are often used. In the test plant in Linköping an
instance of Windows XP runs on a VMware ESXi server. The traffic generators are in a virtual
Windows XP system, in a virtual Linux system or an external non-virtual data generator. There
are several entities that have attributes that can be measures, however no suitabled attributes
that could be measured were found.
The report proposes two solutions for utilization measurements. The first solution is to
implement utilization logging in the UE simulator 2. However the requirement for this feature
competes with other features required by Ericsson in the negotiations with the supplier. The
other solution is to have a network tap and traffic analyzer as described in the discussed solutions
for UE simulator 1. A drawback of such solution is the cost for switches that have a network
tap or port mirroring.
it can be carried out later, after the capturing is completed. This means that a user can login,
start the capturing of data, then log out and let the capturing of data continue. When enough
data is captured, which can take several hours, the user logs in again in the computer, stops the
capturing and analyzes the data. Through interviews with the staff responsible for Tektronix
K15 the following base measures are suggested:
1. Is the application for capturing and analyzing running?
2. Have any users logged in?
3. Is the data being written to the hard drive?
4. Are data transferred from Tektronix K15?
The base measure number one gives the most accurate measure of the packet analyzer
usage. Only one instance of the application can be running one at a time, which means that
it is important that the users quit the application when they are finished. As long as the
application is running no other tester can use the equipment and it can be considered to by
used. The base measure of checking if a remote login has occurred is a fairly good indicator of
usage, since users have to log in to start capturing the data. That measure will not capture
when data is being captured without any logged in users. That state of the equipment can be
determined by a combination of base measures three and four.
9.2.2 Nethawk M5
Nethawk protocol analyzer M5 is a protocol analyzer software that runs on a Windows Server
2000. It has similar functionality as Tektronix K18 and is used for the same purposes. The
servers are located in the test laboratory and the tester login to the server remote using software
from Citrix. The remote log in procedure in the Server will not allow the application to continue
to run if the user logs out. One experiment was carried out where the number of logged in
users were measured and whether the M5 application was running. It was carried out twice for
fifteen servers and the results are presented in Table 9.2.2. The measurements are carried out
by using PsTools, although they can be carried out with the Windows commands tasklist and
quser.
In Table 9.2.2 two samples of base measures are shown for fifteen of the Nethawk servers.
The samples demonstrate that it is a promising method for measuring the utilization of these
servers. As described earlier the application cannot run if a user is not logged in, which is shown
by the experiment result in Table 9.2.2. However a user can be logged in without running the
application and for that reason the straight forward way to classify the equipment state is to
declare that the equipment is used when the M5 application is running. From the result in
Table 9.2.2 the equipment utilization is 46 percent although too few samples are made in this
experiment for statistical confident results.
The measurement method is the mapping of the fact that the application is running or not
into a binary value that are the base measures. The measurement method can be of either
of pushed or of pulled nature. Whether the application is running or not can be pulled from
the equipment by running the windows command tasklist. The state in the equipment is then
sampled and this has to be done frequently in order to give confident results. Another approach
is to have an application running on the server that registers when the application is started
and closed or to implement a logging feature in the application itself. The last solution requires
that the feature is implemented by the suppliers of the tools. Only letting the logged in users
be the base measure is problematic. Tektronix K15 can be used even if no user is logged in
and for both Tektronix K15 and Nethawk M15 a user can be logged in without running the
application.
The proposed solution for Tektronix K15 and Nethawk M15 is to use the base measure
that show whether a special application is running or not. For the different equipment types,
different applications classify the equipment as used. The solution should be generic for the
Windows platform, hence it can be used for both Windows 2000 Server and Windows XP
Embedded.
Chapter 10
Discussion
85
86 Discussion
could be used for all types of equipment, i.e. ERUMS. But this will enable Ericsson to create
a utilization tool that will hopefully work for all types of equipment regardless of platform and
type of test they are used for. A tool that is used for this purpose has to give as a correct
picture of realty as possible or questions and excuses will be made.
The trustworthiness of this kind of tool depends to a great extent, on achieving an un-
derstanding of the users of the system. To achieve this understanding the users have to be
involved in the process. Then even if the tool is not perfect the users will know what the tool’s
information is actually presenting.
1. Talk to the experts of the equipment to get information about which possible base mea-
sures there are.
2. Talk to the users (often tester) that use the equipment for knowledge about how the
equipment is used.
3. Implement at data collecting application using THC or reuse existing scripts and tools.
The first step is very important and was a key factor for the implementation of BSC uti-
lization module. Since the experts of the BSC were available it was possible to identify the
base measures. Step number two is essential since the experts of the equipment do not have
to be the same people as those that carry out the tests. One type of equipment can often be
used in many different ways for different reasons and the main users of the equipment should
be interviewed. It is more time efficient to reuse previous work and therefore the THC should
be used for collecting data.
The process of implementing the utilization modules is mainly time consuming when it
comes to validation of the model and discussions and interviews with testers and experts. A
good idea is to initiate the work with a workshop where the topic is to discuss possible base
measures. Then a reference group can be put together, with people representing the main users
of the equipment. The reference group is important for steps three and five on the list above.
To counter the problem that occurs when a tester leaves a script or a traffic generator running
even after the test is fulfilled is something that we don’t have a good solution to. One way of
solving this problem is to increase the usage of an automated test environment, e.g. THC. By
scripting test case the generated traffic can automatically be taken down at the end test and
the "forgotten" traffic would not exist and therefore not detected as used.
Chapter 11
Conclusion
The objectives of the Master’s Thesis was to define utilization for test equipment, construct
a general model for measuring utilization of test equipment and implement at prototype for
measuring the utilization of the BSC in GSM. The definition of utilization was straightforward,
by classifying equipment into a discrete state per time period. The definition has the advantage
that it simple and that it is general for different equipment types. The drawback is that it
cannot capture the performance and quality of the tests carried out on the equipment. The
general definition was required for the general model for utilization measurements presented in
the thesis. The general model makes it possible to have a common presentation of the utilization
for different equipment and have equal equipment efficiency indicators. The collecting of data
and classification of equipment is however not considered to be general and that is why the
concept of utilization modules is presented in the chapter Common Utilization Tool where the
general model is realized.
One utilization module was implemented for the BSC. The implementation shows that it
is possible to measure the utilization of such equipment. It also shows that it is a winning
method to reuse current solutions for this purpose. In this case it was THC which was used for
making the measurements which are primarily used for test automation. Since THC already has
connections to the test equipment it can continue to be used for this purpose when utilization
measurements of additional test equipment are to be carried out. The BSC utilization module
have collected over 5000 records from nine BSCs and a suggestion of a way to classify the BSC
for each record is presented. Using that classification rule, the BSCs that had their STS-counters
active were used 84.5 percent of the time.
The Master´s Thesis gives great possibilities for the future of measuring the utilization
of test equipment. The BSC utilization module can be scaled up to be used for all BSCs in
the Ericsson test environment and it is possible to implement utilization modules for other
equipment using the methodology and concepts presented in this thesis.
89
Bibliography
[2] Ericsson Radio Systems AB. EN\LZT 101 1513 R4A, AXE Survey. Ericsson AB, 2004.
[3] Ericsson Radio Systems AB. GSM System Survey. Ericsson AB, 2004.
[8] A. J. de Ron and J. E. Rooda. Equipment effectiveness: Oee revisited. iee stransactions
on semiconductor manufacturing, vol. 18, NO. 1, February 2005.
[9] Jörg Eberspächer, Hans-Joerg Vögel, Christian Bettstetter, and Christian Hartmann. GSM
- Architecture, Protocols and Services. John Wiley & Sons, Ltd, 3rd edition edition, 2009.
[11] Ericsson. Apg43 description, 3/22102-fgb 101 413 uen. Ericsson, 05 2008.
[12] Erik Dahlman et al. 3G Evolution: HSPA and LTE for mobile broadband 2nd ed. Academic
Press, 2008.
[13] Shull F et al. What we have learned about fighting defects. Proceedings of the Eight IEEE
Symposiumon SoftwareMetrics, pages 249 – 258, 2002.
[15] Philip Godfrey. Overall equipment effectiveness. Manufacturing Engineer, June 2002.
[16] Harri Holma and Antti Toskala. WCDMA for UMTS. John Wiley & Sons, 2001.
91
92 Bibliography
[17] Catherine Jablonsky. Performance management. Plant Engineering Dec, 63 Issue 12:p26–
27, 2009.
[18] Lars Lundberg Lars-Ola Damm and Claes Wohlin. Faults-slip-through - a concept for
measuring the efficiency of the test process. SOFTWARE PROCESS IMPROVEMENT
AND PRACTICE, pages 47–59, 2006.
[19] Javier Muñoz and Yiping Ding. Sampling issues in the collection of performance data.
BMC Software, 2002.
[20] David Paramenter. Key Performance Indicators. John Wiley & Sons, 2007.
[21] Moe Rahnema. Overview of the gsm system and protocol architecture. IEEE Communi-
cations Magazine, 0163-6804/93/, 1993.
[22] Jonas Reinius. Cello - an atm transport and control platform. Ericsson Review No. 2,
pages 48–55, 1999.
[23] Örjan Ljungberg. Measurement of overall equipment effectiveness as a basis for tpm ac-
tivities. International Journal of Operations & Production Management, Vol. 18 No. 5,
1998.
[24] Graham Rong. A framework for real-time process control. Advanced Semiconductor Man-
ufacturing Conference and Workshop, IEEE/SEMI, pages 159–164, 1998.
[25] Moray Rumney. 3gpp lte: Introducing single-carrier fdma. Agilent Measurement Journal,
2008. URL: http://cp.literature.agilent.com/litweb/pdf/5989-7898EN.pdf.
[26] Jochen H. Schiller. Mobile Communications. Addion-Wesly, second edition edition, 2003.
[27] John Scourias. Overview of the global system for mobile communications. http://ccnga.
uwaterloo.ca/~jscouria/GSM/gsmreport.htm, October 1997. retrieved on 2010-01-27.
[28] Javier Romero Timo Halonen and Juan Melero. GSM, GPRS and EDGE Performance,
Evolution Towards 3G/UMTS. John Wiley & Sons, Ltd, second edition edition, 2003.
[29] Imrich Chlamtac Yi.Bing Lin. Wireless and Mobile Network Architectures. Wiley, 2001.
Appendix A
THC is a internal "framework for a unified test tool environment within Ericsson". The frame-
work is designed by Ericsson together with the external partner Cybercom Group. Cybercom is
responsible for implementing new requirements, carrying out maintenance and providing sup-
port on THC. The work with THC is based on previous experience from developing the first
generation of test tool framework the Test Tool Middle Ware (TTMW) back in 2001.
THC could and is recommended to be used for all Ericssons R&D organizations. It is
mostly used within System, Network and end-to-end verification of Telecom applications. The
main customers of THC is LTE RAN IoV (Kista and Linköping), CNIV in Aachen, GRAN
(GSM Radio Access Network) in Linköping and MGW in Jorvas, all using Java as test case
development language.
The main motivation for using a automated test environment is that the test plants often
consist of many different test tools, all with their own interface and platform. Therefore the
test code developer has to learn each tool’s Application Programmers Interface. When using
more than one of these tools, and the tools are located at different places (and platforms) the
situation gets even more complex. One other major driving force is that the test channels are
often booked for a long period of time but not used more than a fraction of this time due to
extensive reconfiguration of test scenarios. Also changing test environment from a simulated
environment to real equipment a tester often has to design a new test script. But since the two
cases verify the same feature, using different tools, it is more efficient to use a standardized API
which enables reuse of the first test script.
The use of THC has proved to be an efficient test case design, execution, test tool devel-
opment, maintenance, support building tool that therefore reduces the total cost of executing
test cases [10].
The basic idea behind the framework is to provide an easy conversion of test case specifica-
tions that a tester creates to verify a new feature to a executive code that carries out the actual
measurements.
93
94 Test Harness Core (THC)
Physical Resource is a hardware entity, for example a SUN workstation, an AXE node etc.
Test Case is a collection of one or more Test Codes and a Test Scheduler that decides how the
Test Code(s) are executed. A Test Case always has a specified purpose and is therefore
not suitable for reuse. A Test Case shall be freestanding and there shall be no dependency
on other Test Cases.
Test Code is the actual code written in the notation understood by the test executor to
perform some test task. JTEX understands Test Codes written in Java. Many testing
behaviours within a test case are similar, e.g. a mobile to mobile call. These general
testing behaviours should be implemented in reusable test codes. A test code could in its
turn reuse other test codes in order to make a more specific but still reusable test code.
Test Session is the time during one or several resources is allocated by a test case or test
campaign.
• Test Tool Middle Ware Subsystem (Middle Ware and Resource Manager)
• Logging Subsystem
• External systems
– A Test management system (i.e such as MARS, a TMS system used at Ericsson).
The TMS could be used to configure the resources involved in the test campaign.
– System under test (the actual node that test case covers)
LogViewer
Execution GUI Test Repository (web based)
Test
Test Client Test
Logging Service
Test Client Management
GUI or CLI Management
GUI or CLI System
System
Test
TestExecution
Execution
System
System
Interface
Interface
Tool #n
...
Tool #1
Tool #2
Factories
Database
Resource Manager
Examples:
• Load Generators
Tool #n
Tool #1
Tool #2
• Protcol Analyzers
... RESOURC ES
Test
Test
Test
------- --
TOOL TO OLIN STANC E R ESOUR CEID MA XALLO CATIO NS AVAI LABLE STATE OC CUPIE DSTA TE NUMBE ROFUS ERS
• Link Breaks
: ------- --
Msms TOOL TO OLIN STANC
C CN10 1_4x4 bas_1E R ESOUR CEID1 MA XALLO CATIO NS
AVA ILABL EAVAI LABLEFSTATE
REE OC CUPIE DSTA
0 TE NUMBE ROFUS ERS
Msms C CN10 1_4x4 bas_2 1 AVA ILABL E F REE 0
: OM M ML bsc10 5 AVA ILABL E F REE 0
NetHawk OMn etha wk8 M ML netha wk8 bsc14 1 5 AVA ILABL E AVA ILABLFEREE B USY 0 1
: :
RemoteC md Msms
r emot ecmd C CN10 1_4x4
sgsn gsn10bas_1
a 5 1 AVA ILABL E AVA ILABLFEREE F REE 0 0
Msms C CN10 1_4x4 bas_2 1 AVA ILABL E F REE 0
:
NetHawk n etha wk8 netha wk8 1 AVA ILABL E F REE 0
• Terminals
RESOURC E FAC
: TORI ES
------- ----- ---- --
RemoteC md r emot ecmd sgsn gsn10 a 5 AVA ILABL E F REE 0
TOOL T OOLIN STAN CE STATU S
OM M ML REGIS TERED
RESOURC E FAC TORI ES
Msms -------
C CN101 _4x4 -----REGIS
---- --
TERED
TOOL T OOLIN STAN CE STATU S
• Unix/Linux/Windows ws
OM M ML REGIS TERED
Msms C CN101 _4x4 REGIS TERED
System
System
Under
UnderTest
Test
Figure A.1. Test Harness Core (THC) system components (used with permission by Jonas Madsen,
Ericsson AB)
• Test Campaign Executors Responsible for the test campaigns and reports to the progress
to the TCE client. Also communicates with the TEXs and the Resource Manager
interface to the CLI but also helps the user with configuring the required configuration
on, for example, the resources needed to execute the test campaign.
• Test Executors, (e.g. Java Test Executor). The TEX carries out the test cases that have
been designed in java test case code. One main opportunity here is that the actual code
can easily be reused if a new test case uses similar components. The TEX supports two
types of schedulers, parallel or sequential execution of the test case.
• A MML Java Parsing Support. THC provides a very convenient way of working with
MML printout by converting them to Tables or using regular expression matching.
TCE
JTEX
Test
Test
Test
System
System
Log
SEA
Management
(SEA)
System
MW (Corba)
Telnet, SSH Remote
MW (Corba)
System
server command
Test
TestExecution
Execution
Test Repository
FTP, SFTP File
server Transfer
Client
OMAXE
IOG, APG
(MML)
MMLsim
MSMS MSMS
(CCN) (CCN)
System
NetHawk NetHawk
Tektronix Tektronix
SystemUnder
Spirent Spirent
UnderTest
Test
Rhode&Schw VISA
(SMU200A) (SMU200A)
PCMLIG PCMLIG
Mobitec Mobitec
TSS GRNS
(MTsim) (MTsim)
AIMS AIMS
Test Factories
Tools
Figure A.2. Resource Manager (used with permission by Jonas Madsen, Ericsson AB)
97
98 Test Harness Core (THC)
• Base Station Controller. The BSC is the main switching part of BSS and controls the
Base Station Transceiver Station and MS.
• Transcoder and Rate adapter Controller. Responsible for the rate adaptations between
the BSS and the NSS. The MS 33.8 kbit/s signal is to be adapted to the rate that is used
by MSC, 64 kbit/s.
The BSC is one of Ericsson’s most powerful and flexible systems and commonly controls
about 10 to 100 BTSs. The main functions are to control the MS, carry out measurements on
radio conditions, and to support the handover functions needed.
B.1.1 TRC
As mentioned before the TRC main task is to perform the rate adaptations that is need for a
MS to communicate with the NSS. The 33.6 kbit/s signal that is sent from the MS is removed
from the overhead that is introduced to support a reliable transfer over the air interface, Um ,
to a 16 kbit/s. This 16 kbit/s consists of 13 kbit/s data and 3 kbit/s of signaling traffic.
The 16 kbit/s signal is the sent to the TRC where the signal is adapted to a 64 kbit/s PCM
signal. The reason why the signal between the MS and NSS is first converted to a 16 kbit/s is
to reduce the number of links form the BSC to TRC by a quarter.
The PCM signal that is used in most PSTN networks and ISDN to the GSM codec’s does also
has to be converted. This function is also a task performed by TRC and is called transcoding.
100
B.2 BSC Products 101
BSC
Um
Abis A-ter A
BTS BSC TRC MSC
16 kbit/s 16 kbit/s 64 kbit/s
per call per call per call
(Full rate) (Full rate)
A
64 kbit/s
per call
BSC/TRC
A-ter BTS
Abis
BTS
BSC
16 kbit/s BTS
per call
(Full rate)
BTS
BTS
The BSC is based on the AXE platform first developed for the PSTN. The newer AXE 810
platform which is also used in other nodes like MSC, VLR, HLR. The AXE used in BSC with
the following components:
• APT. The APT is the switching part of the AXE. Includes the non-blocking switch and the
Ericsson Generic Magazine. The Generic Magazine gives the possibility to mix different
functions from different units in the same magazine instead of having to use separate
ones. The magazine supports 22 different devices which reduces both footprint and power
consumption of the BSC.
• APZ. The APZ is the control part. Runs the applications that controls the switches.
102 Ericssons Base Station Controller (BSC)
• Adjunct Processor Group. The APG is the I/O system connected to the BSC.
The AXE platform is designed as a modular concept which provides a platform that can
easily adapt to changes and new features. This leads to an open architecture with reduced time
to market. The AXE is a multi functionality platform which means that the same AXE system
can be used for many applications from a small exchange to a large mobile node. The software
that runs on the platform are programmed and deployed independently, and with standardized
interfaces to increase the level of software security [2].
• Common Channel Signaling Subsystem (CCS). Consists of both hardware and software
for signaling and routing etc. using the SS7 signaling standard.
• Group Switching Subsystem (GSS). Consists of Group Switch and is responsible for con-
nection setup and teardown. The group switch uses a Time-Space-Time architecture with
high speeds.
• Digital Link, DL. Is an interface between the Group Switch and the configured devices.
• Central Processor
• Regional Processors
The BSC is shown in Figure B.2. The Figure consists of 1. Cabinet, 2. Ericsson Generic
Magazine (GEM) and 3. The circuit boards. Examples of the circuit boards are switch-,
multiplexer-, transcoder and echo canceller boards.
1.
2.
3.
Figure B.2. The BSC components
The Regional processors are used for repetitive and routine operations and for process intensive
jobs. In the RPs C is used as programming language and is often used for PS traffic than the
CP. Activities in a RP can be executed independently of the CP and therefore the total system
load is distributed between the system entities.
Adjunct Processor (or Adjunct Processor Group) is used for maintenance, management and
logging. It is an evolved AXE I/O system with a focus on low cost, board size and is integrated
in the Ericsson General Magazine. The APG provides a an interface between the AXE node and
the OMC so that the node can be configured, traced for errors and record traffic information.
APG includes a terminal communications interface to the CP that could be used for exe-
cuting commands and to produce printouts. The CP file system is also managed by APG in
which files used by the CP are stored together with charging- and other statistical data.
The APG is based on a Microsoft Windows platform and is, like the CP, duplicated for
increased security. The charging data, Formating and Output Subsystem, is forwarded to
external billing nodes. The statistics from the CP are stored as STS files which are blocks of
related counters, i.e. the BSC block which records the number of connected calls.
The charging data is collected by the CP and sent to the APG where it is stored and
transferred to the billing system which is responsible for the AXE node.
104 Ericssons Base Station Controller (BSC)
B.4.3.1 STS
STS gives support for the collection, storage and presentation of the AXE-nodes statistical
data. STS consists of counter groups (blocks) that the supports functions like Authentication,
Local Number Portability, Traffic on Routes, Size Alteration Events, Multi-Exchange Paging,
and Subscriber Activities [11]. The information from the CP collected by the STS subsystem
within the APG is in a raw format so that it can be stored in the filesystem.
The STS system is constructed to produce output in the 3GGP ASN.1 but can also produce
terminal output and comma separated files. STS supports approx. 2.100.000 counters recorded
at a 15 minute interval (by default) [11]. All these counters can also be configured to be collected
directly from the BSC to the OSS through the Record Transfer (RTR) and Generic Output
Handler (GOH) where the data can permanently stored in OSS databases.
B.5 OM interfaces
The BSC provides many ways of connecting to the internal components to conduct maintenance.
An operator most often only uses the APG to connect to the BSC and then through the OSS.
The developers and tester of the BSC software often use the APG for manual control of the
CP through an application called WinFIOL but they also connects directly to the Regional
processors for faster access. See Figure B.3 for more details.
OM-Interface Telnet
SSH
FTP (APG only)
APZ
(CP) APG
RP RP ... RP
107
108 Acronyms and glossaries
LA Location Area
LAI Location area identity
LAPD Link Access Protocol for the ISDN D-channel
LAU Location Area Update consist of many Cells
LSMI Local Mobile Subscriber Identity
LTE Long Term Evolution. Proposed to be the 4G
cellular network system. Uses a all IP core net-
work
MD Meditation device
ME Mobile Equipment
MM Mobility Managment
MML Man-Machine-Language
MN Management Network
MS Mobile Station
MSC Gateway Mobile Switching Station
MSC Mobile Switching Station
MSISDN Mobile subscriber ISDN number
MSRN Mobile Subscriber Roaming Number
QA Q-Adapter
RA Routing Area
RACH Random Access Channel
RAN Radio Access Network
RBS Radio Base Station
RF Resource Factory. RF is controls a resource in
THC
RM Resource Manager
RNC Radio Network Controller
RP Regional Processor
RR Radio Resource Managment
RSS Radio Subsystem
UE User Equipment
112 Acronyms and glossaries
VLR Visitor-Location-Register