PDA

View Full Version : Others Key Techniques of RACH Optimization in LTE



luis120387@hotmail.com
2015-08-08, 12:07 PM
Hello everyone, I'd like to share this doc related to Key Techniques of RACH Optimization in LTE.

One of the best parts is the chapter 6.

I hope you like it!


Engineering Guidelines ........................................................................................................... 6-1 6.1
When to Use RACH Optimization ................................................................................................. 6-1 6.2
Information to be Collected ........................................................................................................... 6-1 6.3
Network Planning .......................................................................................................................... 6-1 6.4
Overall Deployment Procedure ..................................................................................................... 6-1 6.5
Deploying RACH Optimization ...................................................................................................... 6-1 6.5.1
Deployment Procedure ......................................................................................................... 6-1 6.5.2
Deployment Requirements ................................................................................................... 6-1 6.5.3
Data Preparation................................................................................................................... 6-1 6.5.4
Activation .............................................................................................................................. 6-2 6.5.5
Commissioning ..................................................................................................................... 6-3 6.5.6
Activation Observation .......................................................................................................... 6-3 6.5.7
Reconfiguration .................................................................................................................... 6-4 6.5.8
Deactivation .......................................................................................................................... 6-4 6.6
Optimization .................................................................................................................................. 6-4 6.7
Troubleshooting ............................................................................................................................. 6-4