HOSR degradation after ANR enabled

Hello Dears,

HOSR degraded after enable ANR over 100 new sites, S1 & X2 attempts increased after active ANR.

Only cells in the same eNB was defined to each other (manually).
Checked many sites, found X2 fault alarm, it happened frequently.

Any comments?

It’s normal behavior.

Any suggestions to improve HOSR?

ANR may cause bad effect if configuration ANR is not good.
Firstly you should check worst cells hosr, worst relation A->B hosr.
Pci conflict, confusion may also.

1 Like

What is the metric used for 4G_Intra_Rat_SucessRate calculation?

Verify what are the relations with more failures it will help you to identify reasons as PCI confusion, overshooting cells…
Bit weird for me in your graph we have HO_SR > 0% with no attempts on S1 before the feature activation.

1 Like

Check Ho stats, if there is any unnecessary relation like 4th tier cells or overshooting cells remove that relations using targets tilts or block that relation.
As well as check our cells TA.

1 Like

( [L.HHO.IntraeNB.IntraFreq.ExecSuccOut] + [L.HHO.IntereNB.IntraFreq.ExecSuccOut] ) / ( [L.HHO.IntraeNB.IntraFreq.ExecAttOut] + [L.HHO.IntereNB.IntraFreq.ExecAttOut] ) * *{100}

Metric is OK.

what is the alarm details, any description

Try to disable ANR, delete Relation, Activate ANR again with this script: (it will give you fresh relation on your enodeB)

MOD ENODEBALGOSWITCH: AnrSwitch=IntraRatEventAnrSwitch-0&IntraRatAnrAutoDelSwitch-0;


MOD ENODEBALGOSWITCH: AnrSwitch=IntraRatEventAnrSwitch-1&IntraRatAnrAutoDelSwitch-1;

need to check:

  • ’ O&M controlled Neighbour Relation Attributes’

  • rogue eNodeB uses legitimate mobile devices as a covert channel to launch attacks against SON enabled LTE networks.
    this cause X2 signaling flood when more cells are impersonated