Abstract:
An example method is provided and includes monitoring a plurality of neighboring nodes to detect attempts to perform mobility load balancing by the neighboring nodes; detecting an attempt to perform mobility load balancing by at least one neighboring node; determining an identity of the at least one of the neighboring nodes; and setting an offset parameter for the identified neighboring node(s) to an optimal value. The monitoring may include monitoring a number of handover requests received within a predetermined time period. The detecting may include detecting that the number of handover requests received within the predetermined time period exceeds a predetermined number. The determining may include determining a source of each of the received handover requests, which may be accomplished by examining a user equipment history included in each of the received handover requests or by performing an iterative elimination process with respect to the neighboring nodes.
Abstract:
A method is provided in one example embodiment and includes gathering at a small cell base station information to populate a neighbor cell list of the small cell base station; gathering measurement reports from connected mode user equipment (“UE”) at the small cell base station; and determining whether uplink interference has exceeded a predetermined threshold and generating an alarm to a central node when the uplink interference has exceeded the predetermined threshold. Upon receipt of notification, the central node triggers an action on an aggressor node, wherein the aggressor node is a node servicing at least one aggressor user equipment (“UE”) that significantly contributes to the uplink interference as determined from the gathered information and reports.
Abstract:
An example method is provided and includes monitoring a plurality of neighboring nodes to detect attempts to perform mobility load balancing by the neighboring nodes; detecting an attempt to perform mobility load balancing by at least one neighboring node; determining an identity of the at least one of the neighboring nodes; and setting an offset parameter for the identified neighboring node(s) to an optimal value. The monitoring may include monitoring a number of handover requests received within a predetermined time period. The detecting may include detecting that the number of handover requests received within the predetermined time period exceeds a predetermined number. The determining may include determining a source of each of the received handover requests, which may be accomplished by examining a user equipment history included in each of the received handover requests or by performing an iterative elimination process with respect to the neighboring nodes.