Академический Документы
Профессиональный Документы
Культура Документы
SON Auto/Self-Configuration
73 3.1.4
Requirements
SON Auto/Self-Configuration
74 3.1.4
Requirements
SON Auto/Self-Configuration
75 3.1.4
Requirements
SON Auto/Self-Configuration
76 3.1.4
Requirements
SON Auto/Self-Configuration
77 3.1.4
Requirements
SON Auto/Self-Configuration
78 3.1.4
Requirements
SON Auto/Self-Configuration
79 3.1.4
Requirements
SON Auto/Self-Configuration
80 3.1.4
Requirements
SON Auto/Self-Configuration
81 3.1.4
Requirements
SON Auto/Self-Configuration
82 3.1.4
Requirements
SON Auto/Self-Configuration
83 3.1.4
Requirements
SON Auto/Self-Configuration
84 3.1.4
Requirements
SON Auto/Self-Configuration
85 3.1.4
Requirements
SON Auto/Self-Optimization & Use
86 3.1.5
Cases Requirements
SON Auto/Self-Optimization & Use
87 3.1.5
Cases Requirements
SON Auto/Self-Optimization & Use
88 3.1.5
Cases Requirements
The solution shall support open loop SON functionality for technologies 2G, 3G and 4G.
The solution shall support at least the functionalities:
The Vendor is required to explicitly state and describe in detail on the availability of each of these
capabilities.
The solution shall support Centralized SON and interoperability with Distributed SON according to
NGMN and 3GPP Recommendations. The Vendor is required to explicitly state and describe in detail
the architecture that is supported.
The solution shall support the major vendors in the market and will offer continued support for future
version upgrades.: Ericsson; Huawei; NSN; ZTE; ALU 3G/4G Femto
The solution shall always support the latest version of network SW releases, as well as being
backwards compatible.
The solution shall support multiple versions of vendors simultaneously.
The vendor shall provide list of Tier 1 customers having a Commercial, Close loop SON solution and
specify operator name, network size, RAN vendor, applications deployed and deployment date.
SON solution shall have easy extensibility to support large scale network management, UMTS 120,000
Cell or LTE 180,000 Cell or GSM 600,000 TRX
The solution shall be able to handle SIB11 considerations automatically.
The solution shall have user-definable trigger criteria.
The solution shall be able to run in real time with minimum 15 minutes interval
The solution shall support multiple data source: import external signature database , performance data,
MDT, MR
The SON solution should have a replay functionality / Overview to see in a map and in a table what kind
of Changes and how many changes were executed in a specific time frame
The solution must be capable of automated 24x7 call data loading (with at least 15 minutes
interval/rop), processing and storage without any detrimental impact on the solution performance.
The solution must be capable of automated 24x7 call data loading (with at least 15 minutes interval/rop)
without any detrimental impact on existing the Telefnica OSS and network.
The solution should provide flexibility to accept naming formats and deployment variations of the
managed objects in the Telefnica Germany network. [The term "managed objects" here explicitly
refers to sites, cell, neighbours, iurs, etc.]
The solution shall clearly distinguish which of the elements are in service and which are in the different
stages of planning and build.
The Vendor shall provide a solution that can be configured to be fully resilient in the event of hardware
failures.
The solution shall be able to draw terrain profiles based on its own cartography, not needing any DTM
provided by Telefnica
The solution shall be able to perform consistency and integrity checks prior to implementation of
changes to ensure that design and system rules are not compromised;
The supplier must be able to demonstrate a proven track record of this kind of work and be able to give
examples of reference networks and the ability to work between network vendors Ericsson, NSN and
other vendors;
Patches on OS level as a solution for discovered errors must not overwrite or disturb the tuned and
working functionality of the SON application.
OS upgrades within the same major OS release as a solution for discovered errors must not overwrite
or disturb the tuned and working functionality of the SON application.
The SON system shall provide tools to enable automatic data consistency checking to ensure the
integrity of input data supplied to the SON system using its Input Interface of the SON system, is being
maintained. Problems with the consistency should reported in a logfile for further analysis.
The SON multi-vendor solution shall support the border in between two different technology vendors
(cross-RAN vendors). The borders should be supported in between any combination of the 2 vendors
from TGE vendor portfolio.
A rollback for all configuration changes in the access network done by SON should be possible for a
minimum time period of 7 days.
The solution shall support closed loop SON functionality with no manual intervention for technologies
2G, 3G and 4G, but with a possibility to stop the SON System if the users have a problem with the
SONs operations.
All SON functionalities must be able to run in fully closed loop as well as in supervised mode whereby
the user has to accept the actions before being implemented in the network.
The solution shall be able to handle HetNet (small cells) layers and scenarios.
SON solution shall provide the security management of user and right.
SON solution shall record all key actions in system logs whenever a SON algorithm is executed.
The solution shall detect new sites coming on air automatically.
The solution shall differentiate sites that were temporarily turned off manually and then back on.
If deployed in closed loop solution shall be able to provision and implement changes in the network
within 12 hours, depending on the application;
Open loop solution shall be able to complete optimization cycle within 24 hours, depending on the
application.
The solution shall support GIS (Geography Information System) visualization including SON result and
network performance (KPIs).
The solution shall take into account network elements such as Femto cells in its analysis and in
displaying data on maps.
The SON solution shall create automatically network clusters based on user configuration
The solution shall be able to detect and take into consideration inaccurate or missing any of the inputs
required preventing ineffective optimization results.
The SON solution shall be open to changes and specific optimization demands, from the customer,
including but not limited to: thresholds, RF policies, cluster definitions, black lists, white lists etc.
Vendor shall provide a separate document detailing the architecture of the offered C-SON solution
The vendor can assume that Telefnica can provide access to 2G/3G/LTE/Femto CM, PM and FM data
sources. However Telefnica cannot guarantee the availability of all possible data sources from all
vendors especially propriety interfaces. If a feature requires a specific data source for a feature then the
vendor shall clearly state this in the Roadmap TAB (i.e. found in the Excel file/Tab C-SON SW
Roadmaps) , e.g. Layer 3 data, Radio Probe data, Measurement Reports, Call Traces, MME traces
etc.
Close integration is required between the C-SON platform and the RAN/Femto vendors' OSS and other
interfaces. The C-SON vendor shall outline the process used for ensuring compatibility between the C-
SON RAN vendors' OSS and all interfaces needed as a data source. For example working directly with
the RAN vendor, using the operator as a middle-man for information exchange, or following the new
OSSii process with NSN/Huawei and Ericsson ( http://www.ossii.info/about-ossii/ ). Any solutions based
on reverse engineering of any RAN vendors' interfaces which are found to breach any contractual
agreements between Telefnica and our RAN vendors will be rejected.
Vendor shall provide information that indicates how quick the C-SON vendor can adapt their solutions
to address the situation whereby Telefnica introduces new systems such as:
New RAN vendor for equipment (base stations, BSC, transmission, etc.)
New PM Tool (currently MyCom, etc)
New Planning Tool (currently ATOLL and EPOS / ASSET / Trans Tool, etc.)
New Configuration Tool supplier (currently there are many and different tools at O2 and Eplus)
New supplier for the Multi-Vendor alarm monitoring (at operational side of Eplus - ZTES, TeMIP)
Other types of new products that may be introduced
If the trace data is used as a source then the system should anonymize or drop any sensitive subscriber
relevant information as IMSI, MSISDN or IMEI. The cell ID can be used but never in connection with the
subscriber relevant information. The vendor should clarify which anonymization processing is used in
the solution.
The SON solution shall include the flexibility for a second party (for example Telefnica) to develop own
SON modules & algorithms and incorporate/integrate them into the vendors SON system (adding to
those the vendor provides), or to use an interface the SON system can provide for second party SON
modules & algorithms development & integration. Such flexibility shall include for example APIs or any
other means that enable a second party to incorporate own SON algorithmic modules.
The solution shall be able to store raw PM (Performance Management) data for at least 15 days, hourly
data for at least a month, and daily data for at least 15 months
The solution shall be capable of storing parameter history for at least one year, for all network
parameters.
The SON solution shall support the inter PLMN and inter vendor handover.
The supplier should refer to an operator where the ability to perform National Roaming optimization was
successfully demonstrated. Please name the RAN vendors. Please add contact details.
The solution shall support National Roaming scenarios within different RAN vendors.
The solution shall support separated infrastructure National Roaming scenarios. Please explain your
methodology.
The solution shall support shared infrastructure (co-located) National Roaming scenarios. Please
explain your methodology.
The solution shall be capable of sending commands to the OSS automatically without requiring manual
intervention.
The solution shall allow for manual intervention and validation before sending commands to the OSS.
The solution shall be capable of retrieving data from the OSS automatically, with no manual
intervention.
Continued support for version upgrades of third party vendors log files (such as Huawei, Ericsson,
Alcatel-Lucent and NSN) and other necessary OSS data (PM and CM) must be part of the basic scope
of this proposal. The term "log files" here explicitly refers to control-plane messages from the BSC, RNC
and eNode saved in files.
The solution should be able to work alongside with conventional open loop OSS processes to eliminate
implementation collision and discrepancies.
It should be possible to limit the number of plans and/or the number of actions per plan to avoid
potential OSS (NMS) overload.
The Vendor shall provide a dedicated Project Manager as OSS Spoc for all OSS Project Management
issues.
The Vendor shall provide a project specific Installation Guideline Document for the SON Solution.
The Vendor shall support the initial implementation of the solution with the provision of suitable trained
and skilled staff.
The Vendor shall ensure the quality of the created documents with the provision of suitable trained and
skilled staff.
The solution shall support automatic NE status check in the deployment process.
The C-SON solution shall be able to monitor, compare and correct parameters and settings in a
centralized manner and independently of RAN vendor.
All configuration parameters and settings of a BS shall be automatically discovered, read and sorted in
a common database by the SON solution.
Parameters (defined by the operator) shall be monitored, audited and checked against planning
(repeating consistency check task).
The repeating consistency check interval shall be with minimum 1hour.
Inconsistencies shall be reported by the SON solution (file report or online report).
According to definable policies (scope, limits, network element white- and black-list) discovered
inconsistencies shall automatically be configured to the network by the SON solution. The target
configuration shall be taken from planning database or be a pre-defined value configurable in the SON
system.
Auto-Configuration tasks shall be able to be scheduled at a certain date (for instance at Saturday, 02:00
a.m.).
Auto-Configuration shall be done automatically or with explicit confirmation by an operator
(configurable).
All configuration changes made by the SON system shall be documented and logged (history, error
protocol, version control based).
A rollback/undo function of completed configuration changes should be able to be triggered by the
operator or automatically when KPI fall off after the changes.
The SONs user access control system should be able to create and administrate users with different
configurable access levels (administrator, operator, read-only).
The solution shall rectify any discrepancies in the parameter settings of new sites coming on air
automatically.
The solution shall automatically generate and provide an initial configuration/commissioning data file
from planning data.
The solution shall ensure the automatic integration of a new cell to existing network according to layer
management strategy operator.
The solution shall configure the neighbour relationship of the new cell automatically directly after the
new cell is on air.
Use Case 1: - LTE eNodeB initial optimisation: The solution shall plan the neighbours related to the
environment of the eNB (see ANR requirements) and implement the correct tilts via RET based on
network data etc..
Use Case 2: 3G NodeB initial optimisation: The solution shall plan all relevant neighbours related to the
environment of the NodeB and shall optimise optionally the CPICH power etc..
Use Case 3: 2G site initial optimisation: The solution shall plan all relevant neighbours related to the
environment of the site.
The solution shall have user-definable periodicity criteria.
The solution shall automatically identify missing neighbours based on network/UE measurements
and/or network performance KPIs.
Delete neighbours which have a negative impact on network performance based on network
performance.
When adding or deleting neighbours the solution shall rank all neighbours to ensure that the best
alternatives are in the neighbour list.
When adding new neighbours to a full neighbour list the solution shall rank all neighbours to be sure the
best alternatives are in the neighbour list.
When adding new neighbours the solution must consider the average distance between the evaluated
sector and their actual neighbours.
Rollbacks of ANR actions which are not performing as expected, degrading the network performance,
must be done based on network performance measurements (KPIs) in a closed loop cycle.
The solution shall optimize & update the neighbour Priority parameter automatically based on a rank of
neighbours.
The solution must consider the impact on the Primary Scrambling Code and Physical-layer cell identity
before making any changes.
The solution shall allow for the blacklisting of sectors that can never be added to a relationship.
The solution shall allow for the whitelisting of sectors that can never be removed from a relationship.
The solution shall allow for the whitelisting of Femto Sectors from other vendors that can never be
removed from a relationship.
The solution shall support intra-carrier neighbour relationships.
The solution shall support following intra-RAT and inter-RAT neighbour relationships, such as:
2G to 2G
2G to 3G
2G to 4G
3G to 2G
3G to 3G
3G to 4G
3G to Femto
3G to Small Cells
4G to 2G
4G to 3G
4G to 4G
4G to Femto
4G to Small Cells
And for each Inter-RAT relationship the vendor shall provide supplementary information on whether
vendor can handle at least the following:
a. Handover (HO)
b. Redirection: - via measurements; - blind
c. Reselection
d. CSFB:- via HO ; - via measurements; - via HO
e. SrVCC
The solution must allow for the definition of the maximum number of total neighbours.
The solution must allow for the definition of the maximum number of inter-carrier neighbours.
The solution must allow for the definition of the maximum number of intra-carrier neighbours.
The solution must allow for the definition of the maximum number of iRAT neighbours.
The solution shall detect and list overshooting sectors that were not added to neighbours.
The solution shall support use good neighbouring cells to replace bad neighbouring celling
automatically when the NRT is full.
The solution should be able to off load traffic to neighbours without degrading the performance of the
selected neighbour and the network.
The solution shall be able to balance the traffic by adjusting: Admission thresholds; CS Power Settings;
PS Power Settings; Handover hysteresis; Reselection thresholds; Idle access/admission thresholds.
The solution will make changes to triggered sector as well as selected neighbours.
Rollbacks/Reverts of load balance changes which are not performing as expected, degrading the
network performance, must be done based on network performance measurements (KPIs) in a closed
loop cycle.
The solution shall allow for the definition of the evaluation time period before rollback.
Solution shall contain accelerated load balancing mechanisms to enable faster reactivity to severe
congestion issues.
High traffic event Handler: To handle high traffic events like music festivals, soccer matches, carnival
parades, etc., the solution must support the use of real time PMs (less than 5 minutes periodicity)
reacting to severe congestion issues and balancing the traffic in a closed loop cycle.
The solution shall support RACH parameter optimization to achieve optimal performance when traffic
load is heavy.
The solution shall support long term congestion, tidal effect, traffic burst load problem.
The solution shall support interference reduction by optimization of parameter including power control,
HARQ or CPICH Power or RET.
The solution must consider the impact on network performance before making any changes on Primary
Scrambling Codes.
The solution must not introduce any Primary Scrambling Code conflict when making changes.
The solution must consider the impact on the Primary Scrambling Code before making any changes.
Rollbacks/Reverts of Primary Scrambling Code changes which are not performing as expected,
degrading the network performance, must be done based on network performance measurements
(KPIs) in a closed loop cycle.
The solution shall allow automatic Physical-layer cell identity planning and optimization taking into
account different network layers, such as Macro, Small Cells and in-building.
The solution shall automatically detect and correct any Physical-layer cell identity conflict.
The solution shall allow user-definable Physical-layer cell identity working ranges.
The solution must consider the impact on network performance before making any changes on Physical-
layer cell identities.
Rollbacks/Reverts of Physical-layer cell identity changes which are not performing as expected,
degrading the network performance, must be done based on network performance measurements
(KPIs) in a closed loop cycle.
The new candidate neighbour shall not be added if its distance from the evaluated sector exceeds the
average distance, defined by the solution, between the evaluated sector and their actual neighbours,
and maybe also trigger as an over-shooter.
The solution must not introduce any Primary Scrambling Code / Physical-layer cell identity conflict when
making changes, and should also highlight (indicate/communicate) this conflict.
The solution shall detect sites out of service to prevent unnecessary neighbour deletions, and it should
be possible for the operator to use a logical NBR weight calculation with a sliding time window to avoid
making many changes during a short site outage.
The solution shall support fast ANR with trace data less than 10 minutes.
The solution shall automatically detect and correct any Primary Scrambling Code conflict. NOTE: at
least detection is necessary
The SON solution shall support Frequency optimization (2G). Please explain the methodology used and
how many frequencies can be changed. Is it really SON or the old Double BA list rotation algorithm?
Please explain in details.
The solution shall respect the allowed distance in scenarios where one sector faces urban area while
the other one is facing rural/ low density area.
The solution shall support deletion of unutilized neighbours and neighbours with negative contribution to
the KPIs.
When adding or deleting neighbours the solution shall rank all neighbours to ensure optimized
neighbour list.
The supplier shall refer and show track record in handling a multi thousands people Mass Event within
a tier 1 operator. Please provide the methodology used in details.
The supplier shall support unplanned Mass Event optimization.
The supplier shall refer to a live example. Please state the country and the operator details. Please
provide the methodology used in details.
The module shall not create coverage holes (more than before).
Minimum and maximum ranges CPICH shall be set at the cell, cluster, group of cells or RNC level.
The load balancing mechanism shall have the ability to foresee congestion build-up and react before
critical KPIs are affected.
The SON solution shall consider interference assessment in its algorithm.
The solution shall support MLB in HetNet.
The solution shall be able to balance the traffic by evaluating:
Traffic Usage of the source and target sectors/carriers;
Power Consumption of the source and target sectors/carriers;
Code Usage of the source and target sectors/carriers;
Channel Usage (Hardware) of the source and target sectors/carriers;
The distance between the source and target sectors/carriers.
NOTE: The solution must take into account: (1) that Telefnica has DC activated; (2) HSPA User
balanced.
The solution shall allow for the blacklisting of sectors that can never be used for load balancing. E.g. as
can be necessary for indoor optical system sites.
The Solution shall be able to provide recommendations on physical tilt antenna changes in case no
RET available. Please explain the methodology.
The solution shall have a mechanism to protect against "Ping-Pong" RET toggling.
The solution shall provide a security mechanism that checks the input data, and does not allow for
optimization of neighbourhoods if the necessary information is not available.
The solution shall support optimization of UL interference. Please state which parameters can be
changed.
The solution shall track and display changes in KPI as a result of RET Optimization.
The SON solution shall support PCI setting policy ranging between free policy to operators strict
policy.
The SON solution shall consider the effect on the overheads on other channels planning.
The SON solution shall consider vendor specific limitations. Please elaborate per specific vendor.
The SON solution shall consider local and general PCI setting constrains.
The SON solution shall perform pre-provisioning analysis (evaluate optimization results, resolved and
new conflicts before implementation).
The solution shall support detect and solve weak coverage, pilot pollution, overlapping coverage
problem.
The solution shall support MRO taking into account different network layer, such Marco, small cell,
indoor coverage and etc.
The solution shall enable power-down of the eNB for energy savings.
The solution shall support switching off a cell or network element or restrict the usage of physical
resources for energy saving purposes (GUL, including Macro and small cell).
The solution shall support switching on a cell or network element or resume the usage of physical
resources which have been Energy Saving activated before(GUL, including Macro and small cell).
The solution shall support ES parameter policy adjustment based on network traffic model. (GUL,
including Macro and small cell).
The solution shall support NE energy saving on RF channel level, carrier level, site level.
The solution shall support result evaluation and display for GUL ES.
The solution shall compensate for a cell experiencing the outage by changing parameters of the
surrounding cells.
The solution shall revert changes once the cell outage is over.
The solution shall revert changes that are determined to not be beneficial to the network performance
KPIs.
The solution shall monitor health the cells status and identify faulty cells. The minimum cycle of
monitoring shall be 15 minutes.
Trigger threshold shall be user-definable.
The solution shall allow user-definable parameter ranges (min/max).
The solution shall allow parameter changes by user-definable steps within its range.
In the case of inter-frequency load balancing, the solution shall allow for the definition of separate
parameter ranges for different band carriers.
The solution shall support the definition of different optimization profiles depending on KPIs degradation
levels.
The solution shall allow for the definition of separate parameters and guidelines for different network
layers, such as Macro, Small Cells and in-building.
The solution shall allow the user to select which sectors can be changed and which cannot, with
possibility of exclusion of Border-Cells.
The solution shall allow user-definable Primary Scrambling Code working ranges.
Any return to TOC data (CPM) and maybe to CCM is needed to include SON changes in the planning
process and do not overwrite with new TOC export or CCM deltas.
By adding new adjacencies for 2G the solution must consider the impact on the frequency before
making any changes. The solution
must not introduce any adjacencies if there are any frequency conflicts (e.g. same frequency for both
cells). If SON in this case will find a
new frequency or an Optimizer makes the decision in consultation with the Frequency Planner has to be
defined.
By adding new adjacencies for 3G the solution must consider the impact on the primary scrambling
codes before making any changes. The solution must not
introduce any adjacencies if there are any code conflicts (e.g. same Code for both cells).
If SON in this case will find a new code or an Optimizer makes the decision in consultation with the
Code Planner has to be defined.
If SON will change codes or frequencies in border areas a delimited spectrum has to be respected.
There is an allowed frequency/code list for every cell (supply by Radio Parameter Planning).
The solution shall be able to consider neighbour optimisation of network elements still not on air but in
the planning stage.
The solution shall provide an interface with existing Telefnica tools/network (tools include CPM), in
order to get the network physical data (coord, azimuths, cell ID's, etc) as part of the basic scope of this
proposal.
The Vendor shall dimension and provide the overall system solution and architecture design to meet
Telefnicas deployment scenario/architecture (layer 3).
The Vendor shall implement their solution to interface with the existing Telefnica systems as part of
the basic scope of this proposal. The Vendor shall bear all costs involved to interface their tool with
Telefnicas existing systems.
The solution shall provide output (snapshot) of changes to backfill legacy data build tools (IPD).
The solution shall provide an interface with existing Telefnica planning databases.
The SON solution shall provide an integration interface that enables second-party systems to read data
or events exported by the SON solution. The integration interface shall include an SQL-interface (SQL-
protocol) to access data the SON solution can make accessible to second party tools.
Vendor shall provide a description of the integration interface(s), detailing the following:
Parameters of the SON system or its individual SON modules a second party tool (e.g. CPCM) can
Read or Write (change value), and any limitations on the Read/Write frequency permissible.
Types of data or logs the SON system can export for use by some second party tools, and export
frequency permissible and configurable
Protocols or methods that can be used by a second party tool to interact with the SON system (e.g. by
SQL, file dump in some formats such as XML, or other methods),
A list of second party tools the vendor thinks could make use of data exported by the SON system,
provide input into SON, or read or write SON interface parameters made accessible by the SON
system.
The SON solution shall provide an interface through which a second party Tool like CPCM can poll the
SON system, using SQL, to provide it with data/information about the cells SON is operating on (i.e.
cells under the scope of SON w.r.t. parameters configurations and optimization) at any given time
during the operation of SON. Also, it shall be possible to do the polling of the data/information by the
second party tool by scheduling the polling task or manually initiating the polling at any moment.
In case the whole network (i.e. all necessary network elements and topology) can be imported into the
SON solution's Database, it shall be possible for the SON solution to complementarily interwork with a
second party configuration tool (normally used for traditional non-SON based configurations), e.g.
CPCM, such that given a differentiating factor, the tool (like CPCM) could actually decide which MOCs
(managed objects) it can configure (the old way)while it leaves the other MOCs to be solely configured
and handled by SON (because they are solely managed by SON).
Considering the Tools/Systems on Figure 3 and the associated Table that describes the Tools
(below the figure), vendor shall describe the SON solution capability (at present or in the future) to
integrate with the Tools for planning, configuration, processing, data bases, etc, shown on the figure
and its associated table below it, giving details on what it would take for the SON solution to be able to
work with those Tools.
Any potential or actual impairment of the functionality or traffic handling capability of the Vendors SON
solution or any Services provided shall be detected and raised as alarm.
Any failure of redundant capacities or units shall be raised as an alarm.
Every system component shall be covered by alarms.
Every network component shall be covered by alarms.
Every network connection shall be covered by alarms.
Detailed alarms shall be generated on application failure.
Detailed alarms shall be generated on communication failure.
Detailed alarms shall be generated on process failure.
Detailed alarms shall be generated on connectivity loss.
Detailed alarms shall be generated on quality of service failure.
Detailed alarms shall be generated on hardware error.
Detailed alarms shall be generated on overload situations (capacity alarm).
It shall be possible to suppress a single type of event or alarm on the SON solution in a way that these
events or alarms are not forwarded to the upper Fault-management System.
The Vendors Solution shall be able to provide Alarms via SNMP trap and syslog protocol.
On request by Purchaser (Telefnica) the Vendor shall support Purchaser (Telefnica) in the effort to
integrate the SON Client Applications to the existing Purchasers clients infrastructure.
The Vendor shall provide and support all SON Client Applications for current Citrix version.
The Vendor shall support the integration to Purchaser (Telefnica) internal Citrix environment Solution.
The Vendor shall provide a brief description, not exceeding one page on, how all traffic between the
SON, the Network Elements and the SON Client can be monitored either with a standard stateful packet
inspection firewall or an application gateway. If this description is provided in a separate file please state
a reference here.
The Vendor shall provide a complete Communication Matrix with an detailed description of all relevant
IP connections, ports and protocols.
The Vendors SON Solution shall support North-Bound-Interfaces for Fault management.
Vendor shall be compliant to standards for each Northbound interface delivered as part of the solution.
No Northbound interface shall be proprietary.
The Vendor shall provide documentation about Northbound Interfaces 3 months before the official
release date of a new software or hardware release. The regulations as laid out in the chapter
Documentation of this RFQ Document shall apply.
The Vendors SON Solution shall support n-2 backward compatibility for all North-Bound Interfaces
without any additional cost.
The Vendors SON Solution shall support the compatibility for all North-Bound Interfaces without any
additional cost, as long as no additional NE features are ordered. (NE meaning a network component
that is part of the SON solution).
For each CORBA interface delivered as part of the solution and declared an open interface for third
party solutions, the Vendor shall support Telefnica and its operational partners in achieving a working
and interoperable solution across the Vendors CORBA interface. In difficult cases, this may require
interoperability testing.
Telefnicas and its operational partners have different Integrated Network Management System (INMS)
for Fault-Management. In General, Operation agents will be installed on managed systems, in this case
the SON Platform Components. The agent monitors file system, CPU occupancy, processes, log files
and interfaces. In addition the agent shall intercept SNMP traps provided by the applications running on
the NMS.
The Vendor shall use the Telefnica IP based DCN for all communication toward the Network
Elements, NMS, SON and Client access.
NOTE: Purchaser (Telefnica) uses an IP based DCN (Data Communication Network) to provide the
Connection to the Network Elements as well as to access the SON Solutions IP connected
elements/components being subject of this RFQ.
All communication between the NMS, SON, the Network Elements and Client Access shall be based on
the Internet Protocol (IP RFC 791).
The SON provided by the Vendor shall connect to the Telefnica DCN using Ethernet Interfaces.
NOTE: In general, operation agents will be installed on managed systems, in this case the SON
Platform components. The agent monitors file systems, CPU occupancy, processes, log files and
interfaces. In addition the agent shall intercept SNMP traps provided by the applications running on the
NMS.
The server components of the Vendors SON shall consist of standard server hardware running
standard operating systems in such a way that agents can be installed on them.
The Vendor shall accept and support the installation of agents and other required 3rd party software
needed for alarm integration purposes (e.g. SSH packages) by the Purchaser (Telefnica) on any
server of the Vendors SON Solution (depending on The Vendors system architecture). The required
licenses will be provided by the Purchaser (Telefnica).
The evolution of the INMS (and other) third party software is following its own roadmap and cannot
always be synchronized with the evolution of The Vendors system as it is deployed at Telefnica. Also
experience over time shows, that the quality of the third party Software releases is sometimes below
expectation, making an unplanned upgrade mandatory in order to retain the overall system function,
stability and maintainability. The Vendor shall accept upgrade of the agent
software by Telefnica. Following the normal procedure, Telefnica will test
changes to the agent (and other third party) software (first) in the Testlab and (second) in the live
network before making any permanent changes to the system.
In order to help the Vendor understand the main operational states, that an agent can have, the concept
is described in a high level way:
The agent is installed, but not running.
The agent is running, but without configuration (instrumentation). The impact to the host system is
negligible.
The agent is running with a configuration. The configuration and hence the functions performed by the
agent are defined through: templates, plugins, etc.. Depending on the type of configuration the impact
can be substantial.
The servers on which agents shall be installed shall get operating patch level as required by agents.
The Vendor is obliged to ensure, that the additional system load (drivers, hardware, etc.) can be
handled by Vendors system and does not violate intended system application, warranty, or similar.
The network connectivity shall be described in all detail including (but not limited to): network
architecture
LAN cards
IO Bus (expansion slot) usage
Disk capacity (current, future trend)
etc.
In order to ensure a small backup window, to avoid congestion of production networks and to ensure
saturation of backup tape devices a dedicated backup data path (Backup-LAN) shall be provided
(implemented) for each BC. The following choices exist:
1 Gbit/s Ethernet connection
The management of the backup system is done via Ethernet (min. 1 Gbit/s).
Telefnica Germanys automated and centralised backup solution is based on the HP Storage Data
Protector system. The version actually in use by Telefnica Germany is A.6.21.
The server components of the Vendors SON system shall comprise of standard server hardware
running standard operating systems in such a way that HP Storage Data Protector components can be
installed on them.
The Vendor shall be obliged to allow installation of HP Storage Data Protector client components (Disk
Agent and Media Agent) and if needed for backup purposes other 3rd party software (e.g. Data Base
Online Integration) by Telefnica Germany on any server of Vendors system (depending on Vendors
system architecture). Installation of the client components must be done with super user rights. The
needed licenses will be provided by Telefnica Germany.
The servers on which HP Storage Data Protector clients shall be installed shall get operating patch level
as required by HP Storage Data Protector clients. For details see HP Homepage.
The Vendor shall provide a Disaster-Recovery-Procedure (DRP).
The description shall cover every aspect of the DRP, including but not limit to:
How to create remotely a Backup (Image per Server) of each delivered System.
Where the Image-Backup is stored (DVD; USB-Stick or Image/Install-Server)?
How to recover remote every delivered system after a complete loss of OS (Harddisk failure)
How to enable/synchronise remotely Node/Cluster/Rac/DataGuard after a DR, if used on the system
Installed physical disk devices (hardware) and their capacity (including future trends)
Mapping of physical disk devices into the operating system (device level view)
File system and/or data base use of devices including mirror disk and LVM software, etc.
Application level utilisation of available file system / data base capacity, dependencies, future growth
The requested information may be provided in tabular format for each Backup Client (BC) and shall
include at a minimum:
Volume of Data
Distribution of Data across Media and file systems
Type / Function / Category / Volatility of data (i.e. database; operating system, ...)
It has to be determined, if an extension of functionality has to be implemented for online backup of
databases.
If the system utilises a data base, the Vendor shall allow that a Data Base Online Integration is installed
in order to facilitate online backup of various types of data base systems. If the Database is not
supported by HP Data Protector, then the Vendor must deliver a solution for online backup that
supports backup to file system. This file system must be backed up with DP after the online part is done
from the Vendors solution.
The Vendor is obliged to provide the data path including hardware and software modules needed to
realise the data path.
The Vendor is obliged to ensure, that the additional system load (drivers, hardware, etc.) can be
handled by Vendors system and does not violate intended system application, warranty, or similar.
The network connectivity shall be described in all detail including (but not limited to) network
architecture:
LAN cards
IO Bus (expansion slot) usage
Disk capacity (current, future trend)
etc.
In order to ensure a small backup window, to avoid congestion of production networks and to ensure
saturation of backup tape devices a dedicated backup data path (Backup-LAN) shall be provided
(implemented) for each BC. The following choices exist:
1 Gbit/s Ethernet connection;
For environments with greater datasets (more than 1TB) is a higher network bandwidth required 4 x
1 Gbit/s Bond or 10 Gbits/s Ethernet connection
For blade center a higher network bandwidth (10 Gbits/s Ethernet connection) is required, if the
backup destination is outside of the blade center.
The management of the backup system is done via Ethernet (min. 100Mbit/s).
The Vendors SON Solution shall include all Hardware, Software and Licences to ensure the Disaster-
Recovery-Procedure (DRP) can be executed.
Including, but not limited to:
in the case of multiple systems (>=2): an Image/Install-Server shall be used
in the case of a single system (=1): Image-DVD, Image-USB-Stick or an Image/Install-Server shall be
used
The description shall cover every aspect of the DRP, including but not limit to:
How to create remotely a Backup (Image per Server) of each delivered System.
Where the Image-Backup is stored (DVD; USB-Stick or Image/Install-Server)?
How to recover remote every delivered system after a complete loss of OS (Harddisk failure)
How to enable/synchronise remotely Node/Cluster/Rac/DataGuard after a DR, if used on the system.
The vendor shall provide a documentation that explains how to achieve DRP, and shall provide the
required resources to achieve this.
The previous two procedures are required to support the HP Storage Data Protector solution in the
following way, whereby the Vendor shall deliver a solution up to Second step (3rd bullet):
Loss of system disk (i.e. system cannot be booted automatically; HP Storage Data Protector backup
and (tested) disaster recovery procedure exist)
First step: repair all hardware faults, install new disk(s)
Second step : enter disaster recovery procedure, i.e. boot the system into a state in which the HP
Storage Data Protector client software can operate and interact with the HP Storage Data Protector
server
Third step: restore all required parts of the system from the latest backup available on the HP Data
Protector server
The Vendor shall successfully demonstrate and test the Disaster/Recovery Procedure according the
delivered Step-by-Step Documentation.
DRP is subject to Telefnica Germanys acceptance procedure.
The solutions user interface shall be accessible from any computer, on a web-based support from
standard web browsers.
SON system shall support single user interface to manage multiple RAN vendor SON features from the
same platform.
The solution shall feature a map display supporting web-based mapping data.
The solution shall support the definition of regions subject to changes.
The solution shall support the definition of blacklisted cells.
The solution shall support the definition of whitelisted cells.
The solution shall display a log of all changes at the RNC level.
The solution shall display a log of all changes at the area level.
The solution shall display a log of all changes at the sector level.
The solution shall display a KPIs view.
The solution shall display any changes within the KPIs view.
The solution shall provide the user with the ability to perform KPIs trending on any of the available KPIs
and visually display performance information.
The solution shall provide the user with the ability to perform aggregated KPIs trending on any of the
available KPIs and visually display performance information.
The solution shall support the definitions of various user types.
The solution shall support different permissions and access for each user type.
The solution shall assign logins for individual users.
The solution shall support a web based Graphical User Interface (GUI) to monitor and operate.
The solution shall support definition of optimisation areas/regions.
The solution shall provide geographic display of optimization process and result based on Google map,
Open Street map.
The UI shall be running on common browsers (e.g. Chrome, IE, Firefox).
The solution shall support to export optimization report, the report shall include:
Basic information (Configuration parameter, mission status, etc.)
Optimization suggestion ( including executing suggestion and executed suggestions)
Mission detail historic processing record
Mission exception record
The SON system shall report all configuration activities to a third party system. The report / interface
shall provide information about each single configuration activity. It is not sufficient to provide only a
statistic report. The vendor shall provide detailed information about the content and the technical
implementation of the report / interface.
It shall be possible to interwork Centralized SON (C-SON) with Distributed SON (D-SON):
(1) Vendor can provide information on the Parameters of D-SON functions that are configurable by
Centralized SON or can be controlled using policies.
(2) And vendor can answer the question of whether a Centralized SON Solution from a non-RAN
vendor shall configure (or policy) the D-SON functions.
It shall be possible to de-activate D-SON or any SON functions in eNBs in order for the operator to rely
on Centralized SON (C-SON) functions from a centralized SON solution vendor.
SON vendor can demonstrate the extent to which they can address interoperability issues and the
recommended remedies in NGMN Alliances Recommended Practices for Multi-vendor SON
Deployment Deliverable D2, while taking into account the implementation options for SON and vendor
architecture combination options for which interoperability issues can be addressed. C-SON for LTE
features should work with the D-SON features enabled.
In general, vendor shall indicate the SON related 3GPP standards the vendor conforms to.
Vendor C-SON Solution shall "prohibit X2 HO related behavior for some policy cases the operator may
choose to enforce", as this is sometimes done by the operator using centralized automation tools for
controlling NR behavior.
Vendor shall indicate how the C-SON solution handles an interoperability aspect involving D-SON on a
small-cell that should interwork with a macro-cell, whereby the macro-cell vendor may not have
supported SON related X2 signalling and/or IEs.
If the vendor were to provide a SON solution, the solution provides an interface through which SON
functions can be activated or deactivated and be configured using SON policies and profiles in the
cases where it is possible. The SON Policy Definition Interface Specification document, with the
parameters that can be used in policy definition by the operator (on the fly) should be provided by the
vendor.
The SON solution should also provide a means for SON policies creation or generation and the means
for conflict detection and resolution on SON policies. The SON solution shall be able to communicate
back to the user if some policies cannot be implemented (enforced) and should include the reasons
why.
The Vendor shall provide a Network Architecture/Planning guideline document where DCN connectivity
and DCN Network requirements including traffic matrix and scaling aspects are explained in detail
(related RQ363-RQ365).
All elements of the Vendors SON-hosting system shall support 1GE Ethernet over copper (RJ45
connector) for the connection to the network.
a) Fibre interface to the network is optional
b) 10GE interfaces are also optional
The SON-hosting system must support the IP network protocol. No other network layer protocols will be
supported.
a) All protocol connections must use IPv4.
b) The System shall use only private IPv4 addresses (according to IANA) for the network
communication.
c) IP configuration (address and mask, routing) must be changeable and not hard-coded into the
system.
The SON-hosting system (and it IP connected elements/components) interfaces must support MTU
discovery. Explain the function including which RFC is supported.
For connection to remote NEs or devices in a less secure Zone, all standard IP protocols which use
well-known TCP or UDP ports must be encrypted. For example we shall use SSH and SCP/SFTP
instead of Telnet/FTP.
The SON system must be able to be distributed geographically over two or more sites for resiliency
reasons.
a) Explain this mechanism in detail (active/standby, load balanced, etc).
b) The combined bandwidth requirements of the network interconnection must be defined including the
calculation used.
Local systems must interface to the network in a redundant fashion.
a) Explain this mechanism in detail (cluster, L2 switch access/trunk, L3 routed port, Etherchannel,
active/standby or load balanced, miimon, arpmon, etc.).
b) Explain the L3 routing function between end system and the network.
The system must be scalable. Explain which protocol relations based on the defined traffic matrix
which grows with subscriber growth.
Remote maintenance and support of system must be served by a personalized VPN connection
(Telefnica internal system) from a jump server in the Telefnica Service Zone. No direct connection
from outside is possible.
While NGMN Alliances Recommended Practices for Multi-vendor SON Deployment Deliverable D2
defines a number of performance metrics that apply to each SON function, the vendor shall
demonstrate with figures all the Self-Configuration and Self-Optimization related performance metrics
(including any other types of performance metrics of relevance the vendor may have).
NOTE: The metrics convey the value SON brings in OPEX reduction, in enabling the operator to
improve their business operations and ability to innovate services based on the automation and error-
reduction in configurations that SON brings.
It shall be possible to install and operate the Vendors SON solution on a virtualized data center
infrastructure.
The Purchaser (Telefnica) may choose to integrate the Vendors SON solution into his existing
virtualized datacenter infrastructure. If the Purchaser (Telefnica) chooses to integrate the SON
Solution to his virtualized datacenter infrastructure, the Vendor shall support the integration.
The vendor shall support VM-Ware for the virtualization of his SON solution.
The Vendor shall fulfill the same functionalities for the virtualized SON solution as for his alternative
standalone (dedicated-hardware based) SON solution, according to the requirements in this Annex.
In case of virtualization ofthe Vendors SON solution, the virtualized SON solution shall have the same
maintenance service level as the Vendors alternative standalone (dedicated-hardware based) SON
solution.
The Vendor shall provide all necessary information, (e.g. CPU load, SW versions, database version )
which is needed to virtualize the Vendors SON solution on the Purchaser (Telefnica) environment.
The Vendor shall state, if the vendor has already installed virtualized SON solutions in other network
providers.
If the Vendors SON Solution does not yet support virtualization, the vendor shall clearly state the
availability of this functionality on his roadmap.
The Vendors SON shall comprise of standard IT Servers. The Purchaser (Telefnica) shall have the
possibility to choose the 3rd party Hardware for the SON System solution.
The Vendor shall provide all information necessary for the Integration in to the Telefnica Germanys
NMS. This includes the complete specification and description of the Interface(s) on all network and
protocol layers. The Information shall be provided in a well-structured and comprehensive way.
The Vendor shall provide information about all implemented Interfaces of the Network Elements (i.e.
network components of the SON solution). The NEs shall not have undocumented Interfaces.
The Vendor shall provide full specifications of all external interfaces for any 3rd party components
supplied as part of the Vendors solution.
Full operational maintenance procedure documentation should be available to allow the Purchaser
(Telefnica Germany) to rectify any problems with the Vendor's equipment.
Full technical documentation shall be provided. Technical documentation will cover all aspects of the
design, implementation and integration of the delivered solution.
Full User documentation shall be provided. User documentation will cover all aspects of the supplied
solution.
Full support documentation shall be provided. Support documentation will cover all aspects of the
support and maintenance of the delivered solution.
All documentation shall be provided in electronic format.
All documentation shall be managed via change control.
Each new edition of a Document shall contain a section describing the changes against the last
provided document edition.
All documentation shall be reproducible by the Purchaser (Telefnica) for internal use by both its own
employees and assigned agents.
All documentation shall be supplied in English.
The Vendor shall provide a complete description of the functions and features supported by its solution
including those which are not explicitly called for in this Annex. These shall be clearly identified and the
Vendor shall detail their relevance and benefits to the Purchaser (Telefnica).
The Vendor shall provide support for the distribution of all on-line support documentation.
All electronic documentation shall support web publication.
All documentation shall be provided 3 months in advance of any software or hardware delivery or
Upgrade or Update.
The Vendor's documentation shall clearly state which configuration parameters fall into the following
categories for his Network Elements:
Parameters that can be changed 'on the fly'
Parameters that require the locking of an object prior to change
Parameters which will lead to service disruption or performance reduction.
The Vendor shall provide detailed documentation about the SON Systems Hard- and Software
resilience.
The Vendor shall document in detail how redundancy is provided in the management of the SON
solution and the procedures to be followed in the event of a SON system failure.
Communication protocols utilized between client and server components of the Vendor's solution shall
be fully documented and disclosed.
The vendor shall provide to TGE detailed technical hardware and software documentation and
specifications, which fully describes all delivered equipment covered by the contract. All
features/functionality that are/is optional shall be clearly stated. Where the required technical
information is contained in another document, a reference to the relevant section of this document shall
be given and the document provided to TGE.
The vendor shall provide documentation for Operation & Support, in electronic format to TGE
operations personnel. The documentation shall include:
User, advanced user and administration manuals and guidelines: every configurable parameter of the
application shall be described in detail.
Backup and Recovery instructions for all the system components (probes and servers)
Detailed documentation about the systems IP infrastructure layout
The vendor shall provide a detailed dictionary for all network nodes configuration parameters. This shall
include at least the following:
Complete Functional Description of the parameter/features
Engineering Rules for the parameter
Parameter Range [from to] / where applicable
feature name and number,
commercially standard or optional,
hardware, software and firmware dependencies,
available in which network element
all core network requirements and dependencies
all O&M requirements and dependencies
The documentation shall be revised and reissued following every change made to the platform.
The vendor shall provide documentation for new releases which always shall include a fully specified
delta documentation that specifies all changes between the current and the new release. This
documentation shall be made available latest 6 months prior to first delivery of the new release to TGE.
The vendor shall provide access to complete draft or preliminary customer documentation prior to first
release specifically relating to feature roadmaps, high level designs and product specifications.
The vendor shall provide a complete set of feature notes (detailed description of how the feature works,
including all associated O&M interactions / counters / statistics / configuration information) for each
feature contained in the vendors Feature Planning Guide (list of all features in the release).
The features notes shall also be provide in draft/preliminary versions. The feature notes shall be
provided not later than the release when the feature content is first fixed.
The vendor shall provide a complete and detailed upgrade strategy (MOP - method of procedure)
including a detailed timeline of each upgrade step.
The vendor shall identify each individual feature by a code that is unique to the feature and its version.
The vendor shall provide detailed specifications of all the external O&M interfaces available on the
platform.
The vendor shall deliver for each bug fix a detailed description and documentation.
All user relevant documentation (e.g. guidelines, designs, system description) is stored and accessible
from the system. The vendor shall describe what documentation is available and accessible for the
users.
The solution shall provide a generic housekeeping process as follows:
The housekeeping process shall be able to archive or delete aged data
The retention period for the data shall be configurable.
The housekeeping process shall deal with all types of data files the system generates and stores
data files
log files
database tables
The log information shall be formatted in the same structure for all applications and processes.
It shall be possible to configure which log level categories are reported in the logs.
In case of system upgrades (HW, OS) the existing on-site configuration shall be archived and
automatically migrated /updated to the new software level by the vendors upgrade procedure.
The vendor`s SON solution shall be protected according to the security guidelines and policies of the
purchaser (Telefnica).
The vendor`s SON solution shall be protected against any unauthorized access.
The vendor shall provide means of protection against malicious code for SON Platform.
The vendor shall describe how the SON solution is protected against malicious code.
None of the Servers in the vendors SON solution shall accept remote logins for privileged accounts
(e.g. root or administrator).
The vendors SON shall be hardened using tools comparable to the CIS hardening suite see
www.cisecurity.org. A score of 75% or more shall be achieved in each section.
The SON vendor shall support/ fulfil the requirements described in the generic Security Annex included
along with the RFQ as a separate document [2].
No regular system or application access shall involve the use of shared accounts. No applications shall
use system, root, or otherwise privileged accounts.
The vendor shall provide a document description for the current security mechanism (of the offered
system).
Different levels of user accounts are required with different abilities to read or amend configuration
parameters and data. In all cases there should be a super user which enables the current status
protections to be over-ridden in emergencies or support for over-riding business reasons.
Login shall be secured by password, to provide access rights for multiple users and to support multiple
levels of user access rights for access to the application(s).
The vendor shall specify the user concept. (User Access Level, Users groups, how many users, facility,
security level) per node and central system does solution have.
The system, including but not limited to operating system and application(s), shall check each users
access privileges at login, and automatically disable or enable client functions (in real time) based upon
the users profile. This shall be configurable and available at the lowest level of the operating system
and application.
The system shall have component-level security, to be able to define security roles, assign users to
those roles and grant component-level security privileges to specific roles.
The system shall easily accommodate a mechanism to grant/revoke security privileges to the regulated
community who uses this system.
Each of the user group shall have a list of sub users. Each of the user shall have own login and
Password.
For every communication across system components and end clients it shall possible to adopt also an
encrypted communication protocol. (e.g. SSH, SFTP, HTTPS, etc.).
The vendor should provide the system network installation in a high security network LAN/WAN
environment (Protocols, Win-Domain, Antivirus, Patch, and Backup).
The Vendor shall co-operate in all security related testing and shall supply all information that may be
required by the Security team to complete testing.
The vendor shall confirm that the vendor is enforcing platform hardening, by implementing security
configuration benchmarks. Embedded required
CIS Benchmarks that are the only consensus-based, best-practice security configuration guides both
developed and accepted by government, business, industry, and academia. For this the vendor shall
consider the following references [3][4][5].
The vendor shall provide a detailed description of any Hardware and Software needed to implement the
solution including a system diagram.
The vendor shall provide the HW dimensioning for the C-SON solution related to TEF network size and
OSS layer (number of NEs & NMS systems in TEF network).
User names and passwords shall be stored encrypted.
All access shall be password protected.
Each user account should be characterized by a user ID, a password, and a user profile.
Access to SON functionality should be controlled by user profiles.
Different levels of user accounts are required with different abilities to use SON in open or closed loop
with different modules. In all cases there should be a super user which enables the current status
protections to be overridden in emergencies or support for business reasons.
It shall be possible to assign read-only access to a user or group profile for any combination of
application or system resource. Specific users
may have restricted access or a requirement to access only parts of the overall system and network
elements, which can be affected by SON.
Access restriction for users shall be possible on several levels:
Technology (e.g.2G, 3G, 4G)
Vendor of Technology
Region or network area
SON Module
It shall be possible to limit the number of parameter changes done by SON per user profile.
A system administrator shall be able to invoke and configure password ageing on a per user or account
basis.
A System administrator shall be able to modify a user or group profile to meet specific business or
operational needs. This shall include the ability to assign administrative and management capabilities
that exclude the ability to manage user accounts.
All unauthorized attempts to access the solution should be logged.
An audit trail of any security relevant activity (e.g. changing SON configuration for ANR) initiated by any
user should be logged and maintained on-line for rolling period of one month. It must be possible to
store these audit trails off line for an indefinite time period.
To keep an audit log of any changes to significant data inside the SON application.
The solution shall also provide functionality to use external LDAP platforms or Active Directory systems
for the user authentication procedure (e.g. to support single sign on).
The solution must have the possibility to deactivate and delete user accounts by a configurable period
of inactivity.
The Vendors SON shall comprise of standard IT Servers.
Please give a brief description of the SON Systems Hardware Architecture. Please consider that the
aim of this description is to give Purchaser (Telefnica) an overview, therefore the description shall not
exceed one page! If the description is provided in a separate file please state a reference here.
The Vendor shall provide a Hardware Upgrade Procedure for each SON Hardware Upgrade.
The Hardware Upgrade Procedure provided by the Vendor shall prevent any SON Outage Times during
Hardware Upgrade.
The Hardware Upgrade Procedure provided by the Vendor shall prevent the loss of any SON related
Data. This includes, but is not limited to, Fault Management Data, Hardware Management Data and
Inventory Management Data.
The Hardware Upgrade or Hardware Update Procedure shall not require additional Software Licences
for temporary Systems used during the Upgrade.
The Vendor shall provide a SON Recovery Procedure, describing the actions to be taken to recover
each Server of the SON after breakdown.
The Vendor shall state the Time the Recovery Procedure will take from start of the Procedure to full
availability of the SON Service.
The Vendor shall state the version and revision level of all software components of the SON solution,
including third Vendor software components.
The Vendor shall state all limits that originated in Software licenses, including also third Vendor
software licenses.
If the Vendor uses SW / Feature Licenses based on network growth, these licenses shall be only
adapted one year.
The Vendors SON solution shall include automatic clean-up procedures to prevent the NMS servers
from resource leaks.
The Vendors SON solutions clean-up procedures shall be configurable using the Systems GUI.
The Vendor shall supply tools and applications to support the administration and maintenance tasks on
the delivered SON.
The duration of downtime during software upgrade shall be kept to a minimum and during such a period
the Vendor shall propose temporary SON measures as appropriate.
Unavailability of the SON shall not affect the functionality of the Network Elements.
SON functions and actions shall in no way degrade the performance of the network elements.
The SON shall provide functionality to ensure that the operator is warned before actions that, in fact or
potentially, affect the performance or functionality of Network Elements are executed.
The Vendors SON shall provide a GUI supporting all OAM Tasks.
The Vendor shall ensure that all processes necessary for the SON functionality are automatically
started after Server reboot without manual activation.
The Vendor shall provide a Software Upgrade or Update Procedure for each SON Software Upgrade or
Update.
The Software Upgrade or Update Procedure provided by the Vendor shall prevent any SON Outage
Times during Software Upgrade or Software Update.
The Software Upgrade or Software Update Procedure provided by the Vendor shall prevent the loss of
any SON related Data. This includes, but is not limited to, Fault Management Data, Software
Management Data, etc..
The Software Upgrade or Software Update Procedure shall not require additional SON Hardware for
temporary Systems used during the Upgrade or Update.
The Software Upgrade or Software Update Procedure shall not require additional Software Licences for
temporary Systems used during the Upgrade or Update.
The Vendors SON Solution and its Interfaces shall comply to all appropriate SON-related as well as
Management-related 3GPP, IETF, ITU-T and ETSI standards like:
ITU-T, 1996, "M.3010 Principles for a telecommunications management network"
ITU-T, 1997, "M.3400 TMN management functions"
ITU-T, "M.3050 Enhanced Telecom Operations Map (eTOM) The business process framework"
ITU-T, X.700 : Management framework for Open Systems Interconnection (OSI) for CCITT
applications
The security architecture for systems providing end-to-end communications is provided in
Recommendation X.805. A comprehensive set of detailed security frameworks covering aspects of
security such as authentication, access control, non-repudiation, confidentiality, integrity, and security
audit and alarms has been established (X.810, X.811, X.812, X.813, X.814, X.815 and X.816)
But not limited to the above standards.
Each item in the Vendors feature guide and future roadmap shall be mapped to the appropriate
standard and version of that standard.
All interface stacks shall be implemented according to the stated standards and any other relevant
standards. Release details related to standards versions and implementation will be fully documented
by the Vendor.
The Vendors SON Architecture shall provide the option to implement multiple SON instances to provide
Geo-Redundancy.
Please state the maximum number of SON instances that might be integrated to a Geo-Redundancy
Solution.
Please state the maximum physical distance between the SON instances of the Geo-Redundancy
Solution.
In case of failure of one SON instance within a SON Geo-redundancy Solution the other SON
instance(s) within the SON Geo-Redundancy Solution shall provide the SON functionality managed by
the failed instance.
In case SON Functionality is taken over from a failed SON instance the SON functionality connected to
the active SON instance shall not be impaired.
Recovery from component or site failure shall not impact system availability.
Using the Matrix Tables provided in the Excel file/Tab C-SON SW Roadmaps, Vendor shall provide
information about SON Software Features, with a clear distinction of the Standardized SON Use Cases
(as part of the software features), using terminology from the relevant standards from 3GPP/NGMN,
and also those SON Use Cases that are proprietary to the vendor, and along with that the vendor shall
describe the following details for each feature (e.g. ANR, MRO, MLB, other features):
The Data Sources needed by the algorithms associated with the feature, with indications of the
mandatory data sources as well as the optional data sources that provide added value to SON
algorithms, as requested in the Tables
Any estimations of bandwidth requirements imposed on the underlying network and the data sources
by the individual SON features shall be indicated by the vendor (the features/SON Use Case that are
standardized are indicated with terminology from the standards while distinguishing them with
proprietary ones).
Roadmap for the availability of the feature as requested in the Tables
SON Performance metrics (using data or figures)associated with the feature, or a pointer to a
supplementary document that contains performance metrics for the feature.
Vendor shall complete all tables on this sheet. The roadmaps to be included are up to the end of 2015.
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The C-SON vendor shall only provide supported dates for when a feature will be commercially available
i.e. it will have been developed, tested with a specific RAN vendor and can be commercially deployed
with that vendor in a live network.
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
For the "Date Supported" field the Vendor shall use one of the following options:
1. The Vendor shall state the quarter and the year the feature will be supported e.g. 2Q 2015 for each of
Telefnicas RAN Vendors shown.
2. The Vendor shall state No Plan if a particular Vendor is not planned to be supported for a particular
feature.
3. The Vendor shall state Already Supported if a feature is already supported for a particular RAN
vendor.
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
Only features supporting Closed-Loop shall be listed. Closed-Loop means no manual intervention is
needed to execute commands on the OSS or to collect data.
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The vendor shall state all data sources required per vendor e.g. OSS PM/FM/CM data, Layer 3 data
(GPEH, MegaMon, CHR data, Measurement Reports, Analyser, Call trace, Probe data etc.).
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
Input data sources are split into Mandatory Data Sources and Optional Data Sources. Mandatory Data
Sources are the essential data sources that are needed for the feature to work. Optional data sources
are not essential for the feature to work, but if the data source is available it could be used to improve
the performance of the feature. For Example CM, PM and FM data sources may be Mandatory for a
specific feature and Layer 3 Data may be an optional data source that could be used to improve the
performance for the feature.
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
Border cell support (i.e. ability to support operation ACROSS vendor A and B as shown in Figure 1)
(located in the Tab mentioned in the Note below) is expected for all scenarios.
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
For the "RAN software supported" field this refers to the specific RAN vendors RAN software release
that is supported by the feature.
NOTE/Remark: The same requirement is found in the Tab C-SON SW Roadmaps of the Excel File
with all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The vendor shall respond to all areas in blue in this section based on the specification shown in the
Figure on the right (located in the Tab mentioned in the Note below).
NOTE/Remark: The same requirement is found in the Tab BOM Macro 2G SW of the Excel File with
all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The vendor shall list all 2G C-SON software features to support both Vendor A and B with the number
of cells shown in the Figure (located in the Tab mentioned in the Note below).
NOTE/Remark: The same requirement is found in the Tab BOM Macro 2G SW of the Excel File with
all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The vendor shall respond to all areas in blue in this section based on the specification shown in the
Figure on the right (located in the Tab mentioned in the Note below).
NOTE/Remark: The same requirement is found in the Tab BOM Macro 3G SW of the Excel File with
all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The vendor shall list all MACRO 3G C-SON software features to support both Vendor A and B with the
number of cells shown in the Figure (located in the Tab mentioned in the Note below).
NOTE/Remark: The same requirement is found in the Tab BOM Macro 3G SW of the Excel File with
all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The vendor shall respond to all areas in blue in this section based on the specification shown in the
Figure on the right (located in the Tab mentioned in the Note below).
NOTE/Remark: The same requirement is found in the Tab BOM Macro LTE SW of the Excel File with
all the Requirements. Vendor shall also complete the compliance checks in that Tab.
The vendor shall list all MACRO LTE C-SON software features to support both Vendor A and B with the
number of cells shown in the Figure (located in the Tab mentioned in the Note below).
NOTE/Remark: The same requirement is found in the Tab BOM Macro LTE SW of the Excel File with
all the Requirements. Vendor shall also complete the compliance checks in that Tab.
F
Ericsson supports this functionality with features "Inter-Frequency
Load Sharing" in 3G and "Inter-frequency Load Balancing" in LTE.
F Please refer to "Inter-Frequency Load Sharing.pdf" and "Inter-
frequency Load Balancing.pdf" for further details on this
functionality
Ericsson supports this functionality with features "Inter-Frequency
Load Sharing" in 3G and "Inter-frequency Load Balancing" in LTE.
F Please refer to "Inter-Frequency Load Sharing.pdf" and "Inter-
frequency Load Balancing.pdf" for further details on this
functionality
F
Ericsson would support tis functionality in WCDMA in future
P release with feature "Mobility with Scrambling Code Reuse"
planned in W16A
Ericsson would support tis functionality in WCDMA in future
P release with feature "Mobility with Scrambling Code Reuse"
planned in W16A
Ericsson suports "PCI Conflict Reporting" feature which detects
PCI conflicts and reports the same to OSS for correction purpose.
F
Please refer to "PCI Conflict Reporting.pdf" for further details on
this functionality
F
Ericsson supports this functionality in LTE RAN with features " UE
Level Oscillating Handover Minimization" and "Automated Mobility
F Optimization". Please refer to "UE Level Oscillating Handover
Minimization.pdf" and "Automated Mobility Optimization.pdf" for
further details on this functionality
P
Ericsson supports "Self-healing RAN" features in future releases
P
Ericsson supports "Self-healing RAN" features in future releases
P
Ericsson supports "Self-healing RAN" features in future releases
P
Ericsson supports "Self-healing RAN" features in future releases
Ericsson supports Cell outage for sleeping cells as part of feature
"Advanced Cell Supervision". The feature supports self-healing by
automatically trying to recover the suspected sleeping cells.
F Please refer to "Advanced Cell Supervision.pdf" for further details
on this functionality
Internal Comments
Region to support the response