The document discusses drive testing using TEMS Investigation software. It provides an overview of the tools needed for drive testing including a laptop, dongle, mobile set, modem, GPS, and more. It outlines the steps to setup the software and ensure all tools are connected and functioning properly. These include attaching the required devices, loading cell files, and selecting the log collection location. The document also describes some key parameters that can be analyzed during drive testing like signal strength, interference, and throughput.
Drive Tests and Propagation Prediction software are the two methods that are used to check the coverage area of a particular wireless system. Generally prediction software is used in conjunction with the radio signal measurements in order to determine an accurate picture of signal propagation. In some cases, field measurements may be needed to be taken in order to calibrate the prediction software.
It is a handbook of UMTS/WCDMA call flows for Handovers.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
On completion of the module one should be clear about the parameters required during drive test what does it mean and how much it is important.
Parameters regarding in windows like :
a) Current Channel
b) Radio parameters
c) Serving + Neighbors
Time: It is system time of computer.
Cell name: It displays the name of the sector which is serving according to the cellfile that is loaded in TEMS.
CGI : It stands for the Cell Global Identity which is unique for every sector of the site. It consists of MCC,MNC,LAC,CI.
Cell GPRS Support: Tells sector is having GPRS or not. Values are Yes or No .
Band : It tells in which Freq. Band mobile is operating e.g. GSM 900/ 1800.
BCCH ARFCN: It tells by which BCCH is the mobile station getting served.
TCH ARFCN: On which Traffic Freq. call is going on.
BSIC (Base Station Identity Code) : It is combination of Network Color Code (NCC) (0 – 7) & Base Station Color Code (BCC) (0 – 7). e.g. 62. It is decoded by mobile on every Sync. Channel Message.
Mode: It is shows in which state is mobile operating, Idle, Dedicated & Packet.
Time slot: On which time slot of current TCH call is going on. Viz. time slot no. of TRX.
Drive Tests and Propagation Prediction software are the two methods that are used to check the coverage area of a particular wireless system. Generally prediction software is used in conjunction with the radio signal measurements in order to determine an accurate picture of signal propagation. In some cases, field measurements may be needed to be taken in order to calibrate the prediction software.
It is a handbook of UMTS/WCDMA call flows for Handovers.
This document is originally edited by Justin MA and it is free to share to everyone who are interested.
All reference/resource are from internet. If there is any copy-right issue, please kindly inform Justin by majachang@gmail.com.
Thanks for your reading!
On completion of the module one should be clear about the parameters required during drive test what does it mean and how much it is important.
Parameters regarding in windows like :
a) Current Channel
b) Radio parameters
c) Serving + Neighbors
Time: It is system time of computer.
Cell name: It displays the name of the sector which is serving according to the cellfile that is loaded in TEMS.
CGI : It stands for the Cell Global Identity which is unique for every sector of the site. It consists of MCC,MNC,LAC,CI.
Cell GPRS Support: Tells sector is having GPRS or not. Values are Yes or No .
Band : It tells in which Freq. Band mobile is operating e.g. GSM 900/ 1800.
BCCH ARFCN: It tells by which BCCH is the mobile station getting served.
TCH ARFCN: On which Traffic Freq. call is going on.
BSIC (Base Station Identity Code) : It is combination of Network Color Code (NCC) (0 – 7) & Base Station Color Code (BCC) (0 – 7). e.g. 62. It is decoded by mobile on every Sync. Channel Message.
Mode: It is shows in which state is mobile operating, Idle, Dedicated & Packet.
Time slot: On which time slot of current TCH call is going on. Viz. time slot no. of TRX.
This third webinar discusses the fundamentals of LTE Carriers and how LTE mobiles communicate with the network including what factors affect performance.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. TEMS Investigation
Used in more than 180 countries worldwide Data
Collection
TEMS Investigation is the industry standard tool for
troubleshooting, verification, optimization and
maintenance of wireless networks.
TEMS Investigation supports all major technologies,
making it the ideal testing tool at every stage of the
network’s life cycle.
TEMS Investigation has been the leading originator of
drive-testing features and functions for two decades.
TEMS Investigation is a complete, cost-effective and
conveniently compact solution for the active field
engineer.
4. DT Tools
Laptop
Dongle (Tems)
Mobile Set
Modem
Data Cable
SIM Card
GPS
Hub
Inverter
Vehicle
Mobile Charger
MS Office
laptop
dongle
Mobile set
huawei_e3276_4g_lte_modem_2_
gps
hub
inverter
data cable
5. Careful Before go Drive Test
Check Ur DT Tools (All Functionality )
Check SIM Card ( Have Valance, Data
Connectivity)
DT Route & other Necessary Map
Update Cell File
For Swap (Collect Parameter & Other
Information )
Check Inverter Before leave the office
6. Careful to Tems
First Connect Dongle ( Tems License)
Open Tems 16.1 from ur workspaces
Attached Mobile Set ( MS )
Attached Modem (DC)
Attached GPS
go layer control remove unnecessary Item &
Add DT Route, other if necessary.
Update Cell File
7. Connectivity
Make Sure That u Have Right Dongle
Attached Dongle
Open Tems Investigation Workspace
First Attached Required MS ( Mobile Set) if
more then one then attached one by one
Attached Modem (If Required)
At least Attached GPS
8. Cell File & DT Route
From Layer Control Remove unnecessary
Item & Add DT Route, other if necessary.
Add Cell File or F0llow The Procedure
Update Cell File
9. Step 1 Go file Menu Select
Configuration Menu Then General
Submenu
10. Step 2 Go file submenu Select General
then select Submenu Cell File Load
11. Step 3 Go file submenu Select Cell File
Load After Click There Open A new
Window
12. Step 4 new Window Click Add there
open a new window
16. Log Collection
Select Driver With out C Drive, Another Drive
Select location Prefer to with Site or Cluster or
Given Task name
Start Recording then Start Command
Sequence.
17. Log Collection
Select Driver With out C Drive, Another Drive
Select location Prefer to with Site or Cluster or
Given Task name
Start Recording then Start Command
Sequence.
19. Backup
Windows
Dotnet framework 4.5
Tems Investation 16.1
Mobile & GPS Driver
Office
Other Necessary Document
20. GSM Neighbors
This window is very helpful in case of 2G – 3G Handovers as we can see all
the 2G neighbors of that particular 3G cell in the compressed mode state.
21. Serving/Active Set + Neighbors
Cell I.D – This is the identity or name given to
a particular Node B and its cell by the
operator.
UARFCN – It is the frequency band allotted to
the operator. One spectrum bandwidth is of
5MHz in WCDMA or 3G.This window shows
us the centre frequency of the bandwidth
allotted to the operator.
22. Serving/Active Set + Neighbors
Cell Name – It is the name given to particular
Node B’s by the operator generally along the
lines of the name of the area the Node B is
located in.
Scrambling Code – Scrambling code is a
code assigned to a particular cell. There are
512 such codes for the network to differentiate
among different Node B’s and these codes
can be repetitive. They are of two types
primary and secondary.
23. Serving/Active Set + Neighbors
AS – This stands for Active Set. Active Set is the
set of Scrambling Code which the U.E is currently
latched on and there can be a maximum of 3
Scrambling codes in Active Set.
MN – MN Stands for monitored neighbor i.e. the
neighbor cell that is detected by the U.E as a
neighbor and is also defined as a neighbor in the
network. U.E will initiate a Handover onto the
monitored neighbor in case the monitored
neighbor has a stronger RSCP or EcNo than the
AS.
24. Serving/Active Set + Neighbors
DN - DN stands for Detected Neighbor and as the
name suggests it is the neighbor detected by the
UE but, is not defined in our network . Hence, the
U.E does not handover to the detected neighbor.
It can be because of Overshooting of a site,
incomplete neighbor list or in case of a new site. It
is very important to optimize and have no DN’s as
they are one of the major reasons of Call drops in
3G.
25. Radio Parameters
CPICH Ec/No – Common Pilot channel Ec/No
is the ratio of energy of the chip and the
combined power of all the signals including
the pilot itself received by the UE at that
particular point. It is a very important factor for
call quality.
CPICH RSCP – Received Signal Code Power
is the level of the signal received by the U.E
from a particular pilot.
26. Radio Parameters
Radio parameters are the parameters of a Mobile
equipment –
Tx Power – As the name suggests it is the transmitting
power of a Mobile Station. Its value can vary from
-50 to 50. The minimum the Tx power of the Mobile
station the better it is for call quality.
UTRA Carrier RSSI - It is the Received Signal Strength
Indicator of the Mobile Station or the U.E. It tells us the
total Power Received by the Mobile Station from all the
Pilots including itself at that particular location.
27. Radio Parameters
SIR – It is the signal to interference Ratio is
the ratio of Energy in the DPCC(Dedicated
Physical Control Channel) to that of the
interference and noise received by the U.E.
Target SIR – It is the target Signal to
Interference ratio that Mobile Equipment is
supposed to achieve by increasing or
decreasing its power. It is set by the use of
Power Control procedure.
28. Radio Parameters
SQI - It is the speech Quality Index which is a
parameter to rate the voice Quality on that
particular call. It ranges from 0 – 30 with 30
being the best quality.
RRC State – It tells the current state and
channel as in Idle or dedicated.
Mode – It is the mode that we are using GSM
or WCDMA.
29. HSPA/GSM Line Chart
This window gives us the data speed for both
3G and 2G modes depending on which mode
the mobile equipment is.
RLC DL Throughput – This is the total
throughput on the downlink at that particular
point.
The speed shown in this window as
throughput is in Kilobits/sec.