SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Using Tools for
 getting Best Results
in Telecom Networks
  Hunter Methodology
Objective
• Presenting an Overview of how to work better with
  any cellular network.
      – Regardless of the technology, the use of appropriate tools
        and procedures result in greater productivity.
             • In general, involving all activities, since Planning, Design,
               Optimization, Maintenance & Operation, among others.
• Although there is no general rule to follow, the
  suggestions presented here can be exploited by any
  professional, or even by students and enthusiasts of
  the area.



Sunday, October 30, 2011               telecomHall.com                         2
What should be observed?
• Every wireless network has one thing in common:
  they have a huge amount of elements, and they must
  be continuously observed.
      – Any fault in any of these elements, results in degradation
        of quality, and consequently affects customers.




Sunday, October 30, 2011      telecomHall.com                        3
But how?
• In addition to the procedures, an important way to
  achieve best results is using all possible and available
  tools.
      – In this case, the development of customized tools becomes
        a key differentiator, with the possibility to achieve amazing
        results.

  • Developing Custom
    Tools is very common:
    almost everyone has
    made ​a 'macro' using
    Microsoft© Excel©.

Sunday, October 30, 2011       telecomHall.com                      4
Tools
• It is common to use Vendor’s Proprietary Tools,
  purchased for certain purposes, as well as
  Systems/Tools developed by Operators.
• However, 'local‘users can go further and develop
  their own local tools.
   – The most important thing is that they do follow
      some criteria, such as integrating with the existing
      tools, aiming only at what isn’t available for use. In
      other words, avoid reworking.



Sunday, October 30, 2011   telecomHall.com                 5
Hunter
• In this line of 'home‘ tools , we present a complete
  methodology, which ultimately ends up being not as homely
  as well.
      – We prefer to understand as a set of suggestions to be followed,
        including standardization and also tools to enable a better work and
        efficiency of each professional.

                               OME
                               SER
                               ETWORK
                               OOL FOR
                               ENHANCED
                               ESULTS
Sunday, October 30, 2011           telecomHall.com                             6
Modules
• Commercials Tools generally follow one important rule:
  modularization. This allows the use of parts of the system
  (modules), or the complete system (all modules).
      – This feature also allows for scalability, or you can go to evolve over
        time, always adding new modules to adapt to changing.
• And in Hunter Methodology it is not different.
      – Although Hunter is not specifically a tool, it has focus on standardized
        modules.
      – The goal is to allow any professional to create new modules, according
        to the availability of software & applications, and their specific needs.
          • The Hunter is a Methodology and its standardization is free, as
            well as the creativity of each one to create and / or extend their
            own modules.



Sunday, October 30, 2011            telecomHall.com                              7
Hunter Modules
• Following it’s free customization structure, Hunter allows the
  development of a very large number of modules.

       Drive Test                          GIS
                                                           • Speaking of all of
                                                             them would be
                             HUNTER                          virtually
                                                  Others     impossible.
 Physical
                                                           • At center figure,
                                                             we see some of
                                                             the standardized
                                                             modules.
                            OSS’s
                                                           • Following, we give
            KPI                         Others               examples of them.
                           Parameters

Sunday, October 30, 2011                telecomHall.com                      8
Software Used
• But before speaking of some modules, which
  software can be used to create Hunter
  Modules?
• All that we have available and licensed for
  use!
      – In particular, the Microsoft Office© Suite, especially
        Microsoft Access©, and VBA programming language - the
        same one used to write macros in Microsoft Excel©.
      – And other complementary Software.
             • Especially the one for geo-referenced analysis , as
               MapInfo©, from Pitney Bowes Business Insight © and
               Google Earth©, from Google©.

Sunday, October 30, 2011         telecomHall.com                     9
Structure
• The Hunter Methodology has its structure and standard pre-
  defined, facilitating the integration of different modules, by
  the definition of it’s default directories.
         •     The first, and main directory is 'C:Hunter '.

         •     From this directory, we create all the modules - the name of each
               directory is the name of the module.

         •     Each module, in turn, follows a standard nomenclature for its
               subdirectories, organizing the data. For example, the ‘database’
               directory contains an ‘.mdb’ file to store the tables and all code from this
               module.

         •     A major advantage of following a standardized structure like this, is that
               any module can access information from all others. For example, a
               macro can access the data from Network module (network physical
               data) and add to the information on KPI module, plotting indicators in
               Mapinfo and / or Google Earth.

Sunday, October 30, 2011                    telecomHall.com                                   10
Hunter Network
• Now we can speak of some modules, to exemplify.
      – One of the most important, of course, is the module that contains the
        information of the physical data network, such as latitude, longitude,
        antennas, azimuth, etc ...

• This module is very important, but it is quite simple. Basically,
  it gathers all the tables with information from physical data
  network.
       • Thereafter, the data is accessed by other modules.




                                                          Network_DB



Sunday, October 30, 2011           telecomHall.com                           11
Hunter Parameters
• The aim of the Parameters module is to gather all
  information from the network configuration parameters in
  a single database.
      – From this database, we can create several other useful modules.
        For example Hunter Audit (audit of the network configuration)
        and Hunter Journal (check what parameters have changed in the
        network).
 •    Brief Summary: raw files of the OSS's:
      dump configuration parameters - (txt,
      csv, xls, etc. ..) are downloaded, for
      example via FTP or client.
       • They are then processed (macro)
            and stored in a database.




                                                          Parameters_DB

Sunday, October 30, 2011               telecomHall.com                    12
Hunter KPI
    • Just as the Parameters, the KPI module gathers information
      in a database. This time, stores the key Performance
      Indicators, such as Call Drop Rate Falls, Overflows, Traffic
      and Handover.
          – From this module we have others: Hunter KPI Reports
            (generating automated reports), Hunter Chart and KPI
            Dashboard (related to analysis through graphs), etc.
•     Brief Summary: raw files of the OSS's
      with counters (txt, csv, xls, etc. ..) are
      downloaded, for example via FTP or
      client.
       • They are then processed (macro)
           and stored in a database.                               KPI_DB




    Sunday, October 30, 2011                  telecomHall.com           13
Key Databases
• The three modules presented were some of the Hunter Key
  Databases. That's because with the Information of Network
  (physical data, azimuths ...), Performance KPI (drops, traffic ...)
  and information on Configuration Parameters, we already
  have enough information to various types of analysis.
      – Note: we do not attempt here to delve for example in the VBA code,
        scripts, algorithms, and analysis reports available or even the
        standardization process.
             • We intend only to demonstrate how custom tools can be used, and bring
               great benefits to our work.
• Besides the key modules, several modules may and has been
  developed for various other applications.
      – We will see below some of these additional modules.



Sunday, October 30, 2011               telecomHall.com                             14
Hunter GE Drive Test
• Google Earth© is undoubtedly the best
  browser for existing geo-referenced data. The
  file format that it reads is KML that can be
  created for example by using VBA with our
  existing data.
      – Based on this, we have modules like GE Hunter
        Drive Test.
             • Module Summary: From any Drive Test software , we can
               export the collected data to a plain text format.
               Running a macro, we have several types of possible analysis.




Sunday, October 30, 2011                   telecomHall.com                    15
Hunter GE (...)
• Also in relation to Google Earth , several other modules can
  be created, like the Hunter GE Network (plotting information
  from Network_DB) and also the Hunter GE KPI (plotting
  information from Network_DB – eg azimuth – with KPI_DB),
  as seen below.




 •    Clicking on a cell, we quickly access it’s        •      Easily identify the sectors with problems!
      information, such as antenna and Tilt!

Sunday, October 30, 2011                     telecomHall.com                                            16
Hunter Update
• An interesting module, and also quite useful,
  is the Update module.
• The information of key modules can be
  exported - via macros - for several specific
  formats of various other software and
  databases and tools.
• For example, we can update all data
  Prediction Tools, Frequency Planning, Archives
  of Cells to Drive Tests, etc.
      – This ensures our data is always
        updated, and automated.


Sunday, October 30, 2011   telecomHall.com         17
Hunter Operators
• As an example of auxiliary
  modules, we have for example the
  Operators: gather information
  from all carriers in one place.
      – This information can be used for
        example to identify opportunities for
        site sharing (antennas).




Sunday, October 30, 2011           telecomHall.com   18
Hunter Network (Sites)
• Another use of Auxiliary modules are for
  example to help some very specific task, like
  this one, used to improve procedures of Folder
  Structure for Telecom Documents.
      – For example, the methodology Hunter standardizes
        the Directory Structure, Organizing Files and all
        documents (designs, photos, etc ...)
             • We can create a simple interface to facilitate the search for
               data.




Sunday, October 30, 2011                     telecomHall.com                   19
Other Modules
• We presented just a few suggestions of modules
  according to the Hunter Methodology.
• However, the amount of existing and possible
  modules is much more!
      – Consequently, very hard to show everything here.


• Also, it was just an introduction for some modules.
      – Each has a number of peculiarities and tricks, as the best
        procedures for each task.
• The idea is to allow each professional to use their
  skills, and be able to create a complete system as
  shown.


Sunday, October 30, 2011           telecomHall.com                   20
IMPORTANT
• Hunter Methodology is not intended to replace any
  tool or existing database.
• Rather, it should be used as a complement to all the
  facilities that are not available to the professional.
• Its use however, naturally leads to better results.
      – Examples: automation through macros, faster execution of tasks,
        better reporting, data up to date, organization, etc...
• All this will contribute to improving the network overall
  performance.




Sunday, October 30, 2011          telecomHall.com                         21
Conclusion
• This was a brief introduction to the
  methodology Hunter, a set of customized tools
  and concepts, with the goal of helping
  professionals in IT and Telecom (and even
  other areas where the concept can be applied)
  to achieve greater productivity and efficiency
  in their daily work!




Sunday, October 30, 2011   telecomHall.com     22
How to ‘get’ the Tool?
• Hunter is not for sale.
• It is shared with friends and colleagues
  that join us, making an one time
  donation.
      – Why donate? Please visit:
             • http://www.telecomhall.com/donate.aspx
• If you decide to, when you donate you
  receive all past and future codes, and
  develop Hunter together!
Sunday, October 30, 2011     telecomHall.com            23

Mais conteúdo relacionado

Destaque

Workshop business model you
Workshop business model youWorkshop business model you
Workshop business model youRuud van Laar
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersCA Technologies
 
How (fr)agile we are. ALE2011
How (fr)agile we are. ALE2011How (fr)agile we are. ALE2011
How (fr)agile we are. ALE2011Gaetano Mazzanti
 
Telecommunications network engineer performance appraisal
Telecommunications network engineer performance appraisalTelecommunications network engineer performance appraisal
Telecommunications network engineer performance appraisaljarrydgorman484
 
Performance Based Internal Quality Audit Guide
Performance Based   Internal Quality Audit GuidePerformance Based   Internal Quality Audit Guide
Performance Based Internal Quality Audit Guidesuranto2000
 

Destaque (7)

Telcoflutura
TelcofluturaTelcoflutura
Telcoflutura
 
Workshop business model you
Workshop business model youWorkshop business model you
Workshop business model you
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service Providers
 
How (fr)agile we are. ALE2011
How (fr)agile we are. ALE2011How (fr)agile we are. ALE2011
How (fr)agile we are. ALE2011
 
Telecommunications network engineer performance appraisal
Telecommunications network engineer performance appraisalTelecommunications network engineer performance appraisal
Telecommunications network engineer performance appraisal
 
How (fr)agile we are
How (fr)agile we areHow (fr)agile we are
How (fr)agile we are
 
Performance Based Internal Quality Audit Guide
Performance Based   Internal Quality Audit GuidePerformance Based   Internal Quality Audit Guide
Performance Based Internal Quality Audit Guide
 

Semelhante a Using Custom Macros for getting Best Results (Performance, QoS...) in Telecom Networks

Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5Sudarshan Dhondaley
 
Composition of cots
Composition of cotsComposition of cots
Composition of cotsSaransh Garg
 
OpenHPC: A Comprehensive System Software Stack
OpenHPC: A Comprehensive System Software StackOpenHPC: A Comprehensive System Software Stack
OpenHPC: A Comprehensive System Software Stackinside-BigData.com
 
Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...
Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...
Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...Jeffrey Stewart
 
Emerging standards and support organizations within engineering simulation
Emerging standards and support organizations within engineering simulation Emerging standards and support organizations within engineering simulation
Emerging standards and support organizations within engineering simulation Modelon
 
Architecting systems for continuous delivery
Architecting systems for continuous deliveryArchitecting systems for continuous delivery
Architecting systems for continuous deliveryMarcel de Vries
 
Software Architecture
Software ArchitectureSoftware Architecture
Software ArchitectureAhmed Misbah
 
Eclipse plug in development
Eclipse plug in developmentEclipse plug in development
Eclipse plug in developmentMartin Toshev
 
The Unbearable Lightness of Ephemeral Processing
The Unbearable Lightness of Ephemeral ProcessingThe Unbearable Lightness of Ephemeral Processing
The Unbearable Lightness of Ephemeral ProcessingDataWorks Summit
 
software configuration management
software configuration managementsoftware configuration management
software configuration managementFáber D. Giraldo
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22jemtallon
 
System analysis ITM3(1).pptx
System analysis ITM3(1).pptx System analysis ITM3(1).pptx
System analysis ITM3(1).pptx Aram Mohammed
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavSandep Jadhav
 
Developing, testing and distributing elasticsearch beats in a complex, heter...
Developing, testing and distributing elasticsearch beats in  a complex, heter...Developing, testing and distributing elasticsearch beats in  a complex, heter...
Developing, testing and distributing elasticsearch beats in a complex, heter...Jesper Agerled Wermuth
 

Semelhante a Using Custom Macros for getting Best Results (Performance, QoS...) in Telecom Networks (20)

Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5Designing and documenting software architecture unit 5
Designing and documenting software architecture unit 5
 
Composition of cots
Composition of cotsComposition of cots
Composition of cots
 
Cracow MuleSoft Meetup #1
Cracow MuleSoft Meetup #1Cracow MuleSoft Meetup #1
Cracow MuleSoft Meetup #1
 
OpenHPC: A Comprehensive System Software Stack
OpenHPC: A Comprehensive System Software StackOpenHPC: A Comprehensive System Software Stack
OpenHPC: A Comprehensive System Software Stack
 
Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...
Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...
Strategies and Lessons Learned from Enterprise Integration of uProduce and uS...
 
Emerging standards and support organizations within engineering simulation
Emerging standards and support organizations within engineering simulation Emerging standards and support organizations within engineering simulation
Emerging standards and support organizations within engineering simulation
 
Architecting systems for continuous delivery
Architecting systems for continuous deliveryArchitecting systems for continuous delivery
Architecting systems for continuous delivery
 
Clean sw 3_architecture
Clean sw 3_architectureClean sw 3_architecture
Clean sw 3_architecture
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
Tool Evaluation of 'Horus'
Tool Evaluation of 'Horus'Tool Evaluation of 'Horus'
Tool Evaluation of 'Horus'
 
Eclipse plug in development
Eclipse plug in developmentEclipse plug in development
Eclipse plug in development
 
Innoslate Overview
Innoslate OverviewInnoslate Overview
Innoslate Overview
 
The Unbearable Lightness of Ephemeral Processing
The Unbearable Lightness of Ephemeral ProcessingThe Unbearable Lightness of Ephemeral Processing
The Unbearable Lightness of Ephemeral Processing
 
software configuration management
software configuration managementsoftware configuration management
software configuration management
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22
 
System analysis ITM3(1).pptx
System analysis ITM3(1).pptx System analysis ITM3(1).pptx
System analysis ITM3(1).pptx
 
Autonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep JadhavAutonomic Computing by- Sandeep Jadhav
Autonomic Computing by- Sandeep Jadhav
 
sdlc.pptx
sdlc.pptxsdlc.pptx
sdlc.pptx
 
Developing, testing and distributing elasticsearch beats in a complex, heter...
Developing, testing and distributing elasticsearch beats in  a complex, heter...Developing, testing and distributing elasticsearch beats in  a complex, heter...
Developing, testing and distributing elasticsearch beats in a complex, heter...
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 

Último

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 

Último (20)

How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 

Using Custom Macros for getting Best Results (Performance, QoS...) in Telecom Networks

  • 1. Using Tools for getting Best Results in Telecom Networks Hunter Methodology
  • 2. Objective • Presenting an Overview of how to work better with any cellular network. – Regardless of the technology, the use of appropriate tools and procedures result in greater productivity. • In general, involving all activities, since Planning, Design, Optimization, Maintenance & Operation, among others. • Although there is no general rule to follow, the suggestions presented here can be exploited by any professional, or even by students and enthusiasts of the area. Sunday, October 30, 2011 telecomHall.com 2
  • 3. What should be observed? • Every wireless network has one thing in common: they have a huge amount of elements, and they must be continuously observed. – Any fault in any of these elements, results in degradation of quality, and consequently affects customers. Sunday, October 30, 2011 telecomHall.com 3
  • 4. But how? • In addition to the procedures, an important way to achieve best results is using all possible and available tools. – In this case, the development of customized tools becomes a key differentiator, with the possibility to achieve amazing results. • Developing Custom Tools is very common: almost everyone has made ​a 'macro' using Microsoft© Excel©. Sunday, October 30, 2011 telecomHall.com 4
  • 5. Tools • It is common to use Vendor’s Proprietary Tools, purchased for certain purposes, as well as Systems/Tools developed by Operators. • However, 'local‘users can go further and develop their own local tools. – The most important thing is that they do follow some criteria, such as integrating with the existing tools, aiming only at what isn’t available for use. In other words, avoid reworking. Sunday, October 30, 2011 telecomHall.com 5
  • 6. Hunter • In this line of 'home‘ tools , we present a complete methodology, which ultimately ends up being not as homely as well. – We prefer to understand as a set of suggestions to be followed, including standardization and also tools to enable a better work and efficiency of each professional. OME SER ETWORK OOL FOR ENHANCED ESULTS Sunday, October 30, 2011 telecomHall.com 6
  • 7. Modules • Commercials Tools generally follow one important rule: modularization. This allows the use of parts of the system (modules), or the complete system (all modules). – This feature also allows for scalability, or you can go to evolve over time, always adding new modules to adapt to changing. • And in Hunter Methodology it is not different. – Although Hunter is not specifically a tool, it has focus on standardized modules. – The goal is to allow any professional to create new modules, according to the availability of software & applications, and their specific needs. • The Hunter is a Methodology and its standardization is free, as well as the creativity of each one to create and / or extend their own modules. Sunday, October 30, 2011 telecomHall.com 7
  • 8. Hunter Modules • Following it’s free customization structure, Hunter allows the development of a very large number of modules. Drive Test GIS • Speaking of all of them would be HUNTER virtually Others impossible. Physical • At center figure, we see some of the standardized modules. OSS’s • Following, we give KPI Others examples of them. Parameters Sunday, October 30, 2011 telecomHall.com 8
  • 9. Software Used • But before speaking of some modules, which software can be used to create Hunter Modules? • All that we have available and licensed for use! – In particular, the Microsoft Office© Suite, especially Microsoft Access©, and VBA programming language - the same one used to write macros in Microsoft Excel©. – And other complementary Software. • Especially the one for geo-referenced analysis , as MapInfo©, from Pitney Bowes Business Insight © and Google Earth©, from Google©. Sunday, October 30, 2011 telecomHall.com 9
  • 10. Structure • The Hunter Methodology has its structure and standard pre- defined, facilitating the integration of different modules, by the definition of it’s default directories. • The first, and main directory is 'C:Hunter '. • From this directory, we create all the modules - the name of each directory is the name of the module. • Each module, in turn, follows a standard nomenclature for its subdirectories, organizing the data. For example, the ‘database’ directory contains an ‘.mdb’ file to store the tables and all code from this module. • A major advantage of following a standardized structure like this, is that any module can access information from all others. For example, a macro can access the data from Network module (network physical data) and add to the information on KPI module, plotting indicators in Mapinfo and / or Google Earth. Sunday, October 30, 2011 telecomHall.com 10
  • 11. Hunter Network • Now we can speak of some modules, to exemplify. – One of the most important, of course, is the module that contains the information of the physical data network, such as latitude, longitude, antennas, azimuth, etc ... • This module is very important, but it is quite simple. Basically, it gathers all the tables with information from physical data network. • Thereafter, the data is accessed by other modules. Network_DB Sunday, October 30, 2011 telecomHall.com 11
  • 12. Hunter Parameters • The aim of the Parameters module is to gather all information from the network configuration parameters in a single database. – From this database, we can create several other useful modules. For example Hunter Audit (audit of the network configuration) and Hunter Journal (check what parameters have changed in the network). • Brief Summary: raw files of the OSS's: dump configuration parameters - (txt, csv, xls, etc. ..) are downloaded, for example via FTP or client. • They are then processed (macro) and stored in a database. Parameters_DB Sunday, October 30, 2011 telecomHall.com 12
  • 13. Hunter KPI • Just as the Parameters, the KPI module gathers information in a database. This time, stores the key Performance Indicators, such as Call Drop Rate Falls, Overflows, Traffic and Handover. – From this module we have others: Hunter KPI Reports (generating automated reports), Hunter Chart and KPI Dashboard (related to analysis through graphs), etc. • Brief Summary: raw files of the OSS's with counters (txt, csv, xls, etc. ..) are downloaded, for example via FTP or client. • They are then processed (macro) and stored in a database. KPI_DB Sunday, October 30, 2011 telecomHall.com 13
  • 14. Key Databases • The three modules presented were some of the Hunter Key Databases. That's because with the Information of Network (physical data, azimuths ...), Performance KPI (drops, traffic ...) and information on Configuration Parameters, we already have enough information to various types of analysis. – Note: we do not attempt here to delve for example in the VBA code, scripts, algorithms, and analysis reports available or even the standardization process. • We intend only to demonstrate how custom tools can be used, and bring great benefits to our work. • Besides the key modules, several modules may and has been developed for various other applications. – We will see below some of these additional modules. Sunday, October 30, 2011 telecomHall.com 14
  • 15. Hunter GE Drive Test • Google Earth© is undoubtedly the best browser for existing geo-referenced data. The file format that it reads is KML that can be created for example by using VBA with our existing data. – Based on this, we have modules like GE Hunter Drive Test. • Module Summary: From any Drive Test software , we can export the collected data to a plain text format. Running a macro, we have several types of possible analysis. Sunday, October 30, 2011 telecomHall.com 15
  • 16. Hunter GE (...) • Also in relation to Google Earth , several other modules can be created, like the Hunter GE Network (plotting information from Network_DB) and also the Hunter GE KPI (plotting information from Network_DB – eg azimuth – with KPI_DB), as seen below. • Clicking on a cell, we quickly access it’s • Easily identify the sectors with problems! information, such as antenna and Tilt! Sunday, October 30, 2011 telecomHall.com 16
  • 17. Hunter Update • An interesting module, and also quite useful, is the Update module. • The information of key modules can be exported - via macros - for several specific formats of various other software and databases and tools. • For example, we can update all data Prediction Tools, Frequency Planning, Archives of Cells to Drive Tests, etc. – This ensures our data is always updated, and automated. Sunday, October 30, 2011 telecomHall.com 17
  • 18. Hunter Operators • As an example of auxiliary modules, we have for example the Operators: gather information from all carriers in one place. – This information can be used for example to identify opportunities for site sharing (antennas). Sunday, October 30, 2011 telecomHall.com 18
  • 19. Hunter Network (Sites) • Another use of Auxiliary modules are for example to help some very specific task, like this one, used to improve procedures of Folder Structure for Telecom Documents. – For example, the methodology Hunter standardizes the Directory Structure, Organizing Files and all documents (designs, photos, etc ...) • We can create a simple interface to facilitate the search for data. Sunday, October 30, 2011 telecomHall.com 19
  • 20. Other Modules • We presented just a few suggestions of modules according to the Hunter Methodology. • However, the amount of existing and possible modules is much more! – Consequently, very hard to show everything here. • Also, it was just an introduction for some modules. – Each has a number of peculiarities and tricks, as the best procedures for each task. • The idea is to allow each professional to use their skills, and be able to create a complete system as shown. Sunday, October 30, 2011 telecomHall.com 20
  • 21. IMPORTANT • Hunter Methodology is not intended to replace any tool or existing database. • Rather, it should be used as a complement to all the facilities that are not available to the professional. • Its use however, naturally leads to better results. – Examples: automation through macros, faster execution of tasks, better reporting, data up to date, organization, etc... • All this will contribute to improving the network overall performance. Sunday, October 30, 2011 telecomHall.com 21
  • 22. Conclusion • This was a brief introduction to the methodology Hunter, a set of customized tools and concepts, with the goal of helping professionals in IT and Telecom (and even other areas where the concept can be applied) to achieve greater productivity and efficiency in their daily work! Sunday, October 30, 2011 telecomHall.com 22
  • 23. How to ‘get’ the Tool? • Hunter is not for sale. • It is shared with friends and colleagues that join us, making an one time donation. – Why donate? Please visit: • http://www.telecomhall.com/donate.aspx • If you decide to, when you donate you receive all past and future codes, and develop Hunter together! Sunday, October 30, 2011 telecomHall.com 23