XBOX 3. 60 Archives - Games Torrents. Download copy xbox 3. Free download of SOFTWARE, GAMES, VIDEO, MUSICPinnacle Game Profiler 9. Build 8. 2. 8 . Pinnacle comes preconfigured for most popular game titles and gamepads, which means setup is quick and easy. As new games or software updates are released, they are effortlessly installed with a point and click. World of Tanks: Xbox 360 Edition full game free pc, download, play. World of Tanks: Xbox 360 Edition full game DOWNLOAD http://femeedia.com/game/index.php?title=World. Results of copy xbox 360 games: Free download software, Free Video dowloads, Free Music downloads. Pinnacle is also a game launching platform, allowing you to categorize your games and launch them from the taskbar. Alternatively, the program has the ability to detect when games are launched, automatically configuring your desired controller for play. No extra steps required.
0 Comments
Sage Handbook Of Qualitative Research Pdf. SAGE Pub. Posted on 2. Sep- 2. 01. 4 . By the early 1. Doing qualitative research. SAGE Publications, 2. Interpreting .. http: //www.
Get Instant Access to free Read PDF Sage Handbook Of Qualitative Research 4th Edition at Our Ebooks Unlimited Database. 5/15 Sage Handbook Of Qualitative Research 4th Edition. This presentation engages. Lincoln (Eds.) The SAGE handbook of qualitative research (2 rd. CCLR1. 32. 01. 2%2. Observational Techniques. Y., Handbook of Qualitative Research , Sage, 1. Gerer. The Sage Handbook of Qualitative Research. Knowledge and Attitudes on HIV .. Source #2: sage handbook of qualitative research 2. FREE PDF DOWNLOAD. Theory and Methods in Organizational Research. Natural and Organizational: .. Stefan. The Sage encyclopedia of qualitative research meth- .. Sage handbook of action research: .. Handbook of Qualitative Health Research for Evidence-Based Practice. DRM-free; Included format: EPUB, PDF. Among the topics in the Handbook: Get Now http:// The SAGE Handbook of Qualitative Research New E-Books. Research. FREEMAN - College of the Holy Cross. Posted on 1. 9- Jul- 2. Given (Ed.), The Sage Encyclopedia of Qualitative Research Methods (pp. Kreuger (Eds.), Handbook of Research Methods in Personality .. Qualitative research meets the ghost of .. Newbury Park, CA: Sage. Jana. Handbook of Qualitative Research, Second Edition .. Thousand Oaks, CA: Sage Publication. Page 6 of 2. 4 .. Staking Our Claim for Qualitative Psychology as Science, Qualitative Research in Psychology. London: Sage .. http: //www. NUR1. 02. 4. pdf. Title Type sage handbook of qualitative research 2nd edition PDF mla handbook writers .. THE SAGE HANDBOOK OF QUALITATIVE METHODS IN HEALTH RESEARCH. Studying. Denzin and Lincoln’s (2. The Sage Handbook of Qualitative Research. EJ9. 81. 47. 0. pdf. The evolving definition by Denzin and Lincoln (1. We provide copy of sage handbook qualitative research fourth edition in digital format, so the. Mixed methods applications in action research: From methods to community action. Educational research: Quantitative .. Stainton- Rogers (Eds.), .. The Sage Handbook of Qualitative Research in Psychology Page: 4. Silvester%2. 0(2. Qualitative%2. 0methods%2. Work%2. 0Psychology%2. Stainton%2. 0%2. 6%2. Willig). pdf. The SAGE handbook of qualitative research in psychology - Willig, Carla, 2. FE7. 12. 13. 4- 4. F6. B- FB5. 7- 7. CFB0. 02. 06. 5E. This handbook is the first to provide .. The SAGE Handbook of Qualitative Data. Our flagship tutoring programs are available for $1. Tulsa District Curriculum Used in Our In- Home Tutoring Programs. Tulsa Public Schools serves approximately 4. This second largest school system in Oklahoma has a mission to give each student high quality learning each day. The educators of Tulsa focus on the common core curriculum of English Language Arts and mathematics, which has been established by the Oklahoma State Department of Education.
Homeschool World Exclusive! Top 10 Tips for Working at Home while Homeschooling. Fascinating Facts About Homeschool vs. Public School With great visuals! Tulsa High School opened in 1906 on the same block formerly. EduRec Tulsa Bears; EduRec Tulsa Lady Bears. After School Program; Partners With Programs. The University of Tulsa’s graduate programs have been. Communicate with Graduate School staff. The Immigration Innovation Act of. Economic Policy Institute. But now they will consider abandoning the guest worker program it. The bill also called for the Utah State Tax Commission to create a parallel tax. 116, 'Guest Worker Program Act,' passed out of the House Workforce Services and Community and Economic Development Committee yesterday after a vo. Utah, where Republicans. The legislation includes both a watered-down enforcement provision that police say won’t make much difference and a guest-worker program that. The 'guest' worker program is described here: (1). Home » Utah to start own 'guest' worker program, collaborating with Mexican government; Shurtleff. The Wage and Hour Division has been delegated enforcement responsibility by the. 2016 DOL Appropriations Act did not vacate these. Utah 2. 01. 1 HB1. Guest Worker Program Act. Hochgeladen am 0. Not polished, late in the evening and unrehearsed but Utah State Representative Fred C. Cox, District 3. 2, speaking against the committee report, which would change 2. HB 1. 16 from the Guest Worker Program Act (which he had already voted against) and amending and creating the Utah Immigration Accountability and Enforcement Amendments, which he voted against but which passed and was signed into law. Utah Students March for Immigration Reform. Destiny - Dead Ghost Locations - Moon - Ghost Hunter Achievement/Trophy Destiny Playlist: https://www.youtube.com/playlist?list. Subscribe: http:// 1 - Mark of the Golden Crow was often putting a timer on the game, that when reached. Hunting in Texas at the Wildlife Ranch. Red Sheep. Origin: Iran. This small wild sheep is a light reddish gray. The horns of the males grow up, out, and back around above the. The females have short horns usually less than five inches. A large Armenian. They are very high- strung and can become quite wild. Nathan Drake returns one last time in Uncharted 4: A Thief's End. You'll be tasked with a trophy list that requires you to do more varying tasks than your standard Uncharted adventure in the past, however it's definitely doable. Welcome to our collection of Serious Sam 3: BFE trainers, cheat codes, savegames and more. Visit our dedicated message board to discuss this game with other members. Latest Trainers and Editors. Bloodborne wiki: Weapons, Armor, Classes, Items, Locations, Secrets, Gestures, Walkthroughs, and Maps. Find out everything you need to know about the game. The Red sheep. have horns that are somewhat similar to Aoudad.
Barnett Whitetail Hunter - Crossbow Hard shell case with waterproof zipper, ergonomic carry handle, and pass through foot stirrup slot for easy hanging. Padded interior provides safe transport for your bow. Fits Barnett Raptor Series, Recruit Series, Whitetail Hunter, and Blackspur crossbows. How to use group policy to install Print Job Agent remotely and silently. Command line examples. Keep in mind the following: The examples use specific products and versions. Modify the command line to suit. I just configured a group policy to push install a software for machines in the domain. However, it fails with error code 1. The following is the log appmgmt on the client. Software installation extension has been called for foreground synchronous policy refresh. Please look for any errors reported earlier by that extension. The hosts run in VMWare. Edit 2: I tried to use startup script to install the package, it works for Windows 7 client. During the startup phase in Windows 7 client, a pop- up of Interactive Services Detection window shows the installed software wants to show some message. Other than that, the installation works fine, no input is required during the installation process. Note that manual installation of the msi shows a message that restart is required after the installation. The startup script is the following: Set Wsh. Shell = Create. Object(. When I try to do a silent install using the below, it keeps showing the install wizard to click next, any suggestions? The following command will install Adobe Reader 9 silently, suppressing the restart, accepting the end user license agreement and lastly it suppresses the launch of adobe reader 9 once complete. PSEXEC has a nasty little limitation: It can't invoke files from a UNC path (or at least I've never successfully gotten it to, even when the account you are using has the rights but I digress.) You must copy the installation. I have a batch file, which exists as soon as start it (run as admin) and does not execute commands that are in it, but if I specify it at the command-line, it runs fine and executes all commands. Read the insect article 'Butterfly Etymology', originally featured in the Cultural. Path, lane, trail are passages or routes not as wide as a way or road. A path is a way for passing on foot; a track. Online Etymology Dictionary. The soul patch is a small patch of facial hair just below the lower lip and above the chin. It came to prominence in the 1950s and 1960s, when it was a style of. The soul patch (also known as a mouche or a jazz dot) is a small patch of facial hair just below the lower lip and above the chin. It came to prominence in the 1950s. List of band name etymologies. List of band name etymologies. This is a list of band names, with their name origins explained and referenced with reliable sources. Doors Down . As the band decided to tour outside of their hometown of Escatawpa,Mississippi and into Foley,Alabama, they came up with their official name as they saw a building with a sign with most of its letters fallen off the sign read . One rainy day, 3. P- Nut and some friends went skinny dipping in a public pool. They were apprehended by police. He was issued a citation for a code 3. The band found the incident amusing, so they based their name on it. A widely repeated claim, disputed by King, but confirmed in a 1. Lol Creme and also on the webpage of Graham Gouldman's current line- up, is that the band name represented a volume of semen that was more than the average amount ejaculated by men (. Morten Harket was looking through Waaktaar's notebook and came across the name . He liked it and said, . That's what we should call ourselves. After checking dictionaries in several languages, they found out that a- ha was an international way of expressing recognition, with positive connotations. It was short, easy to say, and unusual. The group later did other songs, such as . The group was formed as theater- based, to perform at its own theater at Akihabara on a daily basis, so that fans could always go and see them live. It still performs there every day, although, after the group's popularity went up, tickets started being distributed only via an online lottery. Allegedly, Alice Cooper was the name of a spirit members of the band came in contact with through a ouija. Layne Staley shed some light on the subject in a Rolling Stone article in 1. We were going to have this band that dressed up in drag and played heavy metal as a joke. The name came from New Found Glory's song, . Abasi went into further depth by saying, . We have a niche on the planet and we have a role in sustainable sort of ecology. The name is acknowledging that we do have more of a natural role on the planet. I think of the name as being both nonsensical and really literal. He was told that an arcade in Exeter had burnt down, killing many youths. Auto- Icon Started as a one- man project in Los Angeles in 1. Y2. K looming,It seemed to founding member J. It is a play on the words . The band's name had previously been . All band members agreed that Bachman- Turner Overdrive sounded cooler. Anything that might make parents, teachers, and people with authority bristle was up for discussion. We also wanted a name that would suggest a great logo for stickers and T- shirts. Many of the names were compelling but too repulsive. Smegma, Vaginal Discharge, and Head Cheese might make for great logos but were quickly rejected as not representative of our songs. We played around with a lot of names involving the word . When we hot on Bad Religion, it seemed perfect. That year, 1. 98. Jimmy Swaggart, Pat Robertson, and Jim Bakker. The year before, Jerry Falwell had founded the Moral Majority, which was having a powerful influence on the presidential election between Jimmy Carter and Ronald Reagan. Religion was a hot topic, and those TV preachers seemed like a good target to us, though we didn't think they could possibly last for more than a few years. We knew that most people were so defensive about their religious ideas that they would be highly offended by our name - a major plus! And then Brett came up with a logo that represented our philosophical stance. Once the band was signed to Apple Records by The Beatles the band took the opportunity to change their name. While working with Bob Dylan in the 1. They finally decided to simply call themselves . They also made up various fictional band names, one of which was . The band broke up and he forgot about the gig. When he received a phone call a week before the show, asking him to confirm the gig, he improvised that the name of the band had changed to . He then called Page and asked if he wanted to do the gig; Page reportedly could not believe Robertson had given that name. The two played the show on October 1, 1. The show went well and the pair continued performing and started writing songs together. Additionally, the misspelling of . Heaton explained at the time that the name was partly a sarcastic reflection of his own dislike of southern England, and partly an attempt to force macho men to utter the word 'beautiful'. These are that one time lead singer, Simon Neil bought a Cliff Richard pen therefore it was a Cliffy Biro. They then changed this to Biffy Clyro. Another theory is that 'Biffy Clyro' were a Welsh tribe. The third rumour is that Biffy Clyro was a former player of the band's football team, Ayr United. They have never confirmed any of these. Big Drill Car . This name was inspired from the fantasy novel. Imajica (1. 99. 1) by Clive Barker. According to their vocalist Chibi: . Sort of contrasty, you know? Birthday, and massacre. Crowe's Garden, after a favorite children's book. They performed under that name until they signed with Def American Records in 1. They renamed themselves in response to the suggestion of a producer. In a reference to the story that The Beatles took their name from one motorcycle gang, Peter Hayes, guitarist, and bassist Robert Levon Been, originally named their band . Furstenfeld stated that afterwards he wrote songs to keep depression away which led to the forming of the band. The label disliked the band name and suggested the group select a new one from a provided list, from which . The brothers spent part of their youth growing up in Canada, and credit the Film Boards' documentaries as a source of inspiration for their sound. They were forced to keep this name after the performance hit fame. The band, like most of Finland, was already aware of the unsolved triple murder which occurred at the lake, claiming the lives of three camping teenagers. The band believed they had found an impacting name with an interesting story behind it, and so chose the name Children of Bodom. Many of their songs have also been named after the murders, such as . When they did not want the name anymore, . The original Coldplay took the name from a book of collected poems called Child's Reflections: Cold Play. They turned to a JV look and shortened the name to The Invaders. Tony Greene, who published a short lived SF punk zine No Exit convinced them to change their name to Crime. Crush 4. 0 . The name is also a reference to Crush soda, guitarist Jun Senoue's favorite brand of soft drink. The Cure . The name was later shortened to The Cure because frontman Robert Smith felt the name was too American and . According to him and the band's official website, the English word cute means . Wanting to somehow express the girls' overflowing fervor (enthusiasm), he substituted . A negative review in the UK's Melody Maker described their effort as . The song was named for a headline in a tabloid about a woman killed in a taxi accident. Deftones . Carpenter said the name is intentionally vague to reflect the band's tendency to not focus on just one style of music. Depeche Mode . The name was suggested by drummer Mike Portnoy's father, who lived in Monterey. The number 6. 5 was added mistakenly to an early pressing of their first single, Blue (Da Ba Dee). ELO . M& M representing his initials. Evanescence . They also wanted to do some artwork (with whatever name they chose) and decided to look under E. They liked the word and definition, likening it to the temporal nature of life. One audience member suggested . When Carper asked what FIDLAR meant, he was told that it was an acronym for . The name stuck when every member of the band, with the exception of guitarist Elvis Keuhn, had the word tattooed on their bodies after a night of heavy drinking. He was kind of paranoid, and afraid that if he went outside on this particular night he was going to get jumped by some people. He had a golf club to defend himself and he said something to the effect of it being like . Scott looked at the golf club he was holding, and noting that it was a five iron said, . Welch and Summers performed together for a time under the names of . Later, this was shortened to Florence and the Machine as it was felt to be too cumbersome. In a 2. 01. 1 interview, Foster also recalled, . The first few shows that we played were for charities. It kind of clicked: Foster the People, that's us. The poster has the headline . It was chosen by a friend and local artist, named Ambrose, from strange Liverpool cult group Pink Military. Bandmember Tuli Kupferberg is credited with choosing the name. King was a songwriter and record producer who had a hit single at the time, . King named the band Genesis (after previously suggesting the name Gabriel's Angels after lead singer Peter Gabriel), recalling that he had . Stephanie Grant and Julian Moore from the band chose the name after trying to duplicate these powers from an expos. According to Phil Lesh, in his biography (pp. Billie Joe Armstrong wrote a song called . Axl Rose, who had formed Hollywood Rose, combined his band with Tracii's to form Guns N' Roses. Being admirers of Perry's work, the band decided to name themselves after his distinctive sound. One had an owlish face and was nicknamed . Band names were often supplied by their booking agents' staff, one of whom, a history enthusiast, eventually christened them . The name stuck because they were using it the first time a club manager liked their show enough to invite them to return. Lead vocalist Jim Adkins' younger brother drew a picture on Jimmy's door of him putting a globe in his mouth, and wrote on it . According to Robert Fripp, Beelzebub would be an anglicised form of the Arabic phrase . Rool, the main antagonist of the Donkey Kong Country video game series. KISS . All three members knew that Peter used to be in a band named LIPS. They were trying to think of a band name at that time. There was a rumor going around in the early 1. K)ids (I)n (S)atan's (S)ervice. Download Hide My IP Full Version with Crack 2. Home. Download Hide My IP Full Version with Crack 2. Super Hide IP full version Patch & how to crack it to full version Full tutorial. Hide My IP 5. 3 Full Version Incd Crack Free Downloadplatinum hide ip full version crack Patch Download. Auto Hide IP 5. 3. Full Version Crack. Hide My IP V6. 0 FULL Crack. Hide ALL IP 2. 01. Full Crack Software download. Free RapidShare Premium Account Cookies . Gardens Of Time; Hidden Chronicles. Easy Hide Ip 5 1 9 6 Setup Crack Full Version 2. Working 1. 00% Perfectly Adils Edition. Super Hide IP 3. 4. With Crack free crack software a. No. Mercy (Retail) 2. Zombies 2 v. 2. 4. Mod (Unlimited Coins/Gems/Keys) Apk Android. Evolution Logger Platinum. Pok- emon Leaf Green Speedrun. IMVU credits hack 2. Prototype 2 er. exe. Flash. Point. Password. Las 10 frases que nunca debes decir a una amiga que est With the premium account, you can download all files at any time with full speed and countless other benefits. Cheat Tool For Pool Live Tour. We do not provide any download link points to Rapidshare. Facebook 10.3.0.2 for Blackberry 10 (new Version) . Gardens of Time Cheat Engine v1.0. Castle Clash Hack Cheat Tool 2014 Android IOS April 2014. The. Movie. Banana. Rapidshare Prog. The Ville Hack. Rugby League Live 2 Installer for XBOX3. Cheats for Clumsy Ninja hack free coins and gems 2. Yurixy. Works AREA6. Rift v. 4 HD. zip. Easy Screen Capture Keygen. Castle Clash Hack Cheat Tool 2. Android IOS April 2. Exchange by Touch. Down Key. apk. PHP 6 and My. SQL 5 for Dynamic Web Sites 2. Hotfile Cookie Editor. Fighter FX 7. 2. zip. Grand Theft Auto 5 CD Key Generator et New Crack. How To Hack Bloons TD 5 Game Money (March 2. LIKE BOT, Comment, SUB BOT - USERS LIST YOUTUBE 2. FREE no surveys 1. Working. Spy. Hunter 4 - Crack Keygen - Full. Free Download and information on ColorSkate. Gardens inc 2 the road to fame Software. Gardening Software - Free Download gardening - Top 4 Download. Download Times: 4.782 Download Times: 4.728 Latest Update 2 h ago Need Help with Download, Click button below: DAILY DOWNLOAD LIMIT:- We Are Offering 20 Downloads. Fentanyl: learn about side effects, dosage, special precautions, and more on MedlinePlus. Prescription opioids are divided into two main categories – immediate-release (IR) products. Easy to read patient leaflet for fentanyl patch. Includes indications, proper use, special instructions, precautions, and possible side effects. Fentanyl 50 micrograms/ml Solution for Injection/Infusion - Summary of Product Characteristics (SPC) by Concordia International - formerly AMCo. Fentanyl (Duragesic, Actiq) Uses, Side Effects, and More. Examples. Fentanyl is available as a skin patch, lozenge, pills, shots, a film that dissolves in your mouth, nasal spray, or by IV (intravenous). Use fentanyl exactly as prescribed by your doctor. This is very important so that you do not get too much of the drug. If you get too much fentanyl in your system, you could have serious problems that can lead to death. How It Works. Fentanyl acts upon specific receptors in your brain and spinal cord to decrease the feeling of pain and to reduce your emotional response to pain. The action of fentanyl is similar to other drugs in the morphine category (opioids). Why It Is Used. Fentanyl is used to manage moderate to severe pain, usually in people who have chronic pain. It may also be used for breakthrough pain. Fentanyl is often used when your other pain medicines no longer work. How Well It Works. For people with cancer who are already on opioid pain medicine such as morphine or oxycodone, fentanyl works well for treatment of cancer pain. Side Effects. Fentanyl has many side effects, including: Fentanyl should be used with caution by older adults and by people who have lung disease, such as chronic obstructive pulmonary disease (COPD) or asthma. Fentanyl can cause your body to expect this medicine daily (drug dependency). Dependency is not the same as addiction, which is a behavioral disorder marked by craving a drug. Reasons not to use fentanyl. Transdermal and Parenteral Fentanyl. Q: I was prescribed fentanyl patch (25) for excruciating back pain, but after reading all of the side effects from the included pamphlet, I am actually afraid to use it. The first thing that struck me was that it can cause. You should wear the DURAGESIC Offers basic facts about the synthetic opioid Fentanyl including how it is abused, its affect on the brain, and other health effects. Fentanyl can cause serious or life- threatening respiratory problems (hypoventilation). For that reason it should not be used in: Cancer patients who have not been taking continuous opioid pain medicines. The management of pain that responds to other pain medicine. Doses greater than 2. See Drug Reference for a full list of side effects. Do not drive or operate any type of equipment if you are taking fentanyl. If you have severe side effects, call your doctor, and stop taking this medicine. Do not drink alcohol or use other drugs while you are taking fentanyl. Fentanyl can interact with many other drugs. Make sure that your doctor is aware of all the medicines you are taking. Fentanyl should be used during pregnancy only if the benefits to the mother outweigh the risks to the fetus. If you are or may be pregnant, talk with your doctor before using fentanyl. This drug can pass through your body in breast milk and should not be used if you are breast- feeding. When you remove your fentanyl patch, dispose of it as your doctor tells you to. Avoid the use of heat, such as a heating pad, electric blanket, hot tub, or sauna, while you are using a fentanyl patch. Heat can increase the amount of fentanyl released from the patch, which causes more risk of serious side effects. Complete the new medication information form (PDF)(What is a PDF document?) to help you understand this medication. Citations. Foley KM, Abernathy A (2. Management of cancer pain. In VT De. Vita Jr et al., eds., De. Vita, Hellman, and Rosenberg's Cancer: Principles and Practice of Oncology, 8th ed., vol. Philadelphia: Lippincott Williams and Wilkins. By. Healthwise Staff. Primary Medical Reviewer. E. Gregory Thompson, MD - Internal Medicine. Specialist Medical Reviewer. Michael Seth Rabin, MD - Medical Oncology. Current as of. November 1. On vous propose de venir vous d Israeli optical communications company ColorChip has raised $20 million from Gemini Israel Funds, BRM Group, IGP, Vintage, HGL Capital, and Viola Credit. Founded in 2001 by Dr. Shimon Eckhouse and Prof. Shlomo Rushin of Tel. Elsevier, books24x7, safari books online, electronic books, online books, ebooks, books in pdf. 3G mobile service provider traffic analysis using KPIs of CSSR and CDR in Circuit Switched and Packet Switched network Prepared by: Almontaser bellah faisal Mohamed hussien [email protected] Abstract. Beginning with the environment itself, we address reliability and variability. Wireless channels are more prone to errors than fixed networks because of exposure to various physical phenomena such as noise, fading, or. International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research. As the demand for mobile communication is steadily increasing, this will lead to an increased complexity in radio access network through addition of femtocells, picocells, as well as WiFi access. Here you can find all of the fantastic talks and speakers to be presented at DEF CON 23! In this document, the words “Qualcomm,” “we,” “our,” “ours” and “us” refer only to QUALCOMM Incorporated and its subsidiaries and not any other person or entity. This Annual Report (including, but not. Main Features and Benefits Integrated 4G LTE WWAN broadband: With the 4G LTE WWAN modem integrated into the router, you gain the benefits of simplified installation and management. In addition, the Cisco 4G LTE WWAN EHWICs are. UMTS (telecommunication) - Wikipedia, the free encyclopedia. The Universal Mobile Telecommunications System (UMTS) is a third generation mobile cellular system for networks based on the GSM standard. Developed and maintained by the 3. GPP (3rd Generation Partnership Project), UMTS is a component of the International Telecommunications Union. IMT- 2. 00. 0 standard set and compares with the CDMA2. One technology. UMTS uses wideband code division multiple access (W- CDMA) radio access technology to offer greater spectral efficiency and bandwidth to mobile network operators. UMTS specifies a complete network system, which includes the radio access network (UMTS Terrestrial Radio Access Network, or UTRAN), the core network (Mobile Application Part, or MAP) and the authentication of users via SIM (subscriber identity module) cards. The technology described in UMTS is sometimes also referred to as Freedom of Mobile Multimedia Access (FOMA). These speeds are significantly faster than the 9. GSM error- corrected circuit switched data channel, multiple 9. High- Speed Circuit- Switched Data (HSCSD) and 1. CDMAOne channels. Since 2. 00. 6, UMTS networks in many countries have been or are in the process of being upgraded with High- Speed Downlink Packet Access (HSDPA), sometimes known as 3. G. Currently, HSDPA enables downlink transfer speeds of up to 2. Mbit/s. Work is also progressing on improving the uplink transfer speed with the High- Speed Uplink Packet Access (HSUPA). Longer term, the 3. GPP Long Term Evolution (LTE) project plans to move UMTS to 4. G speeds of 1. 00 Mbit/s down and 5. Mbit/s up, using a next generation air interface technology based upon orthogonal frequency- division multiplexing. The first national consumer UMTS networks launched in 2. TV and video calling. The high data speeds of UMTS are now most often utilised for Internet access: experience in Japan and elsewhere has shown that user demand for video calls is not high, and telco- provided audio/video content has declined in popularity in favour of high- speed access to the World Wide Web. In the currently most popular variant for cellular mobile telephones, W- CDMA (IMT Direct Spread) is used. Please note that the terms W- CDMA, TD- CDMA and TD- SCDMA are misleading. While they suggest covering just a channel access method (namely a variant of CDMA), they are actually the common names for the whole air interface standards. It supports conventional cellular voice, text and MMS services, but can also carry data at high speeds, allowing mobile operators to deliver higher bandwidth applications including streaming and broadband Internet access. In contrast, the competing CDMA2. MHz channels for each direction of communication. W- CDMA systems are widely criticized for their large spectrum usage, which delayed deployment in countries that acted relatively slowly in allocating new frequencies specifically for 3. G services (such as the United States). The specific frequency bands originally defined by the UMTS standard are 1. Some carriers such as T- Mobile use band numbers to identify the UMTS frequencies. For example, Band I (2. MHz), Band IV (1. MHz), and Band V (8. MHz). UMTS- FDD is an acronym for Universal Mobile Telecommunications System (UMTS) - frequency- division duplexing (FDD) and a 3. GPPstandardized version of UMTS networks that makes use of frequency- division duplexing for duplexing over an UMTS Terrestrial Radio Access (UTRA) air interface. Later NTT Do. Co. Mo submitted the specification to the International Telecommunication Union (ITU) as a candidate for the international 3. G standard known as IMT- 2. The ITU eventually accepted W- CDMA as part of the IMT- 2. G standards, as an alternative to CDMA2. EDGE, and the short range DECT system. Later, W- CDMA was selected as an air interface for UMTS. As NTT Do. Co. Mo did not wait for the finalisation of the 3. G Release 9. 9 specification, their network was initially incompatible with UMTS. Qualcomm created an experimental wideband CDMA system called CDMA2. W- CDMA (3. GPP) and CDMA2. GPP2) network technologies into a single design for a worldwide standard air interface. Compatibility with CDMA2. Japan, since Qualcomm CDMA2. Americas, with coverage in 5. However, divergent requirements resulted in the W- CDMA standard being retained and deployed globally. W- CDMA has then become the dominant technology with 4. April 2. 01. 2. Though W- CDMA does use a direct sequence CDMA transmission technique like CDMA2. W- CDMA is not simply a wideband version of CDMA2. The W- CDMA system is a new design by NTT Do. Co. Mo, and it differs in many aspects from CDMA2. From an engineering point of view, W- CDMA provides a different balance of trade- offs between cost, capacity, performance, and density. W- CDMA may also be better suited for deployment in the very dense cities of Europe and Asia. However, hurdles remain, and cross- licensing of patents between Qualcomm and W- CDMA vendors has not eliminated possible patent issues due to the features of W- CDMA which remain covered by Qualcomm patents. Mobile User Objective System using geosynchronous satellites in place of cell towers. J- Phone Japan (once Vodafone and now Soft. Bank Mobile) soon followed by launching their own W- CDMA based service, originally branded . The name of the service was changed to . This strategy has been criticised for aiming to drain the cash of operators to the brink of bankruptcy in order to honour their bids or proposals. Most of them have a time constraint for the rollout of the service. Mobile. One of Singapore commercially launched its 3. G (W- CDMA) services in February 2. New Zealand in August 2. Australia in October 2. AT& T Wireless (now a part of Cingular Wireless) has deployed UMTS in several cities. Though advancements in its network deployment have been delayed due to the merger with Cingular, Cingular began offering HSDPA service in December 2. Rogers in Canada March 2. HSDPA in the Toronto Golden Horseshoe district on W- CDMA at 8. MHz and plan the launch the service commercial in the top 2. October, 2. 00. 7. Telia. Sonera opened W- CDMA service in Finland October 1. Availability only in main cities. Due to poor coverage and lack of choice in handhelds, the W- CDMA service has barely made a dent in the Korean market which was dominated by CDMA2. By October 2. 00. SK Telecom has announced that it will provide nationwide coverage for its WCDMA network in order for it to offer SBSM (Single Band Single Mode) handsets by the first half of 2. KT Freecel will thus cut funding to its CDMA2. In Norway, Telenor introduced W- CDMA in major cities by the end of 2. Net. Com, followed suit a few months later. Both operators have 9. EDGE, but Telenor has parallel WLAN roaming networks on GSM, where the UMTS service is competing with this. For this reason Telenor is dropping support of their WLAN service in Austria (2. Maxis Communications and Celcom, two mobile phone service providers in Malaysia, started offering W- CDMA services in 2. In Sweden, Telia introduced W- CDMA March 2. UTRA- TDD. Both air interfaces use a combination of two channel access methods, code division multiple access (CDMA) and time division multiple access (TDMA): the frequency band is divided into time slots (TDMA), which are further divided into channels using CDMA spreading codes. These air interfaces are classified as TDD, because time slots can be allocated to either uplink or downlink traffic. TD- CDMA (UTRA- TDD 3. Mcps High Chip Rate (HCR)). TD- CDMA is the channel access method for UTRA- TDD HCR, which is an acronym for UMTS Terrestrial Radio Access- Time Division Duplex High Chip Rate. TD- CDMA is used to multiplex streams from or to multiple transceivers. Unlike W- CDMA, it does not need separate frequency bands for up- and downstream, allowing deployment in tight frequency bands. UTRA- TDD HCR is closely related to W- CDMA, and provides the same types of channels where possible. UMTS's HSDPA/HSUPA enhancements are also implemented under TD- CDMA. It is standardized by the 3. GPP and also referred to as . Unlike the other air interfaces, TD- SCDMA was not part of UMTS from the beginning but has been added in Release 4 of the specification. Like TD- CDMA, TD- SCDMA is known as IMT CDMA TDD within IMT- 2. The term . While it suggests covering only a channel access method, it is actually the common name for the whole air interface specification. This is likely primarily for practical reasons, since other 3. G formats require the payment of patent fees to a large number of Western patent holders. TD- SCDMA proponents also claim it is better suited for densely populated areas. The launch of a national TD- SCDMA network was initially projected by 2. It is likely to be replaced with a newer TD- LTE system over the next 5 years. Technical highlights. By dynamically adjusting the number of timeslots used for downlink and uplink, the system can more easily accommodate asymmetric traffic with different data rate requirements on downlink and uplink than FDD schemes. Since it does not require paired spectrum for downlink and uplink, spectrum allocation flexibility is also increased. Using the same carrier frequency for uplink and downlink also means that the channel condition is the same on both directions, and the base station can deduce the downlink channel information from uplink channel estimates, which is helpful to the application of beamforming techniques. TD- SCDMA also uses TDMA in addition to the CDMA used in WCDMA. This reduces the number of users in each timeslot, which reduces the implementation complexity of multiuser detection and beamforming schemes, but the non- continuous transmission also reduces coverage (because of the higher peak power needed), mobility (because of lower power control frequency) and complicates radio resource management algorithms. Benefits of Self- Organizing Networks (SON) for Mobile Operators. Copyright . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Self- Organizing Networks (SON) is a collection of functions for automatic configuration, optimization, diagnostisation and healing of cellular networks. It is considered to be a necessity in future mobile networks and operations due to the increased cost pressure. The main drivers are essentially to reduce CAPEX and OPEX, which would otherwise increase dramatically due to increased number of network parameters that has to be monitored and set, the rapidly increasing numbers of base stations in the network and parallel operation of 2. G, 3. G and Evolved Packet Core (EPC) infrastructures. This paper presents evaluations on the use of some of the most important SON components. Mobile networks are getting more complex to configure, optimize and maintain. Many SON functions will give cost savings and performance benefits from the very beginning of a network deployment and these should be prioritized now. But even if many functions are already available and can give large benefits, the field is still in its infancy and more advanced functions are either not yet implemented or have immature implementations. It is therefore necessary to have a strategy for how and when different SON functions should be introduced in mobile networks. Introduction. Briefly, SON is a collection of procedures (or functions) for automatic configuration, optimization, diagnostication, and healing of cellular networks. It is considered to be a major necessity in future mobile networks and operations mainly due to possible savings in capital expenditure (CAPEX) and operational expenditure (OPEX) by introducing SON. The SON family consists of a variety of functions that in nature are very different and which maturity are at different levels. As the number of SON functions will increase with each new vendor releases, one of the main issues for operators will be to determine which functions to introduce and also determine the appropriate timing for activating these functions to obtain a well- behaving and cost- efficient network. This paper considers SON for the 3. GPP family of technologies, but similar functionality is also included in Wi. MAX . The GSM/3. GPP family of technologies consists of GSM, UMTS, and LTE. GSM (global system for mobile communications) is a 2nd generation (2. G) mobile technology and provides a digital, circuit switched network optimized for full duplex voice telephony. Circuit switched and packet switched data transport is also supported. UMTS (universal mobile telecommunications system) is a 3rd generation (3. G) mobile technology based on wideband code division multiple access (W- CDMA) radio technology with better spectrum efficiency and capacity than GSM. It supports data transfer rates through its enhancement HSPA (high speed packet access). HSPA accounts for the majority of worldwide broadband networks today. LTE (long time evolution) is the latest technology in the family. It is based on orthogonal frequency division multiple access (OFDMA) radio technology offering higher capacities and lower latencies than UMTS. Its network architecture is simpler and based on IP technology. LTE- Advanced, which is an enhancement of LTE, was approved by ITU as one of two 4. G technologies (the other being Wi. MAX 2) in January this year . These features are currently not available between 3. GPP access technologies and other access technologies like Wi- Fi. This paper will therefore focus on 3. GPP SON solutions since this will be in line with the main interest for mobile operators. The main drivers for introducing SON are to reduce CAPEX and OPEX, which would otherwise increase dramatically. There are three main reasons for this. The first is that the number of parameters that must be set in the network elements has increased significantly from each technology generation to the next. UMTS has a significantly higher number of parameters than GSM, and LTE has even more. Hence, it is not practical to set and maintain these manually. The second reason is that the quick evolution of wireless networks has led to operators having parallel operation of 2. G, 3. G, and LTE infrastructures, and even also networks using non- 3. GPP technologies like Wi- Fi. Operators need to coordinate the operations of their network to utilize their network resources as efficiently as possible. This requires inter- RAT (radio access technology) SON functionality. The third reason is that an increasing part of the traffic will be on small cells such as microcells, picocells, and femtocells. Densifying the networks will be necessary to meet the ever increasing demand for capacity since the amount of spectrum available for mobile services is limited. Hence, networks will consist of cells with very variable size from several kilometres for macrocells down to some few tens of meters for femtocells. Such networks of cells with widely varying cell sizes, and possibly also different radio technologies, are denoted Het. Nets (feterogeneous networks). Compared to the networks today, which mainly consist of macrocells, the number of network elements will increase dramatically with the development towards Het. Nets. Configuring and optimizing the parameters in all these network elements represent a complexity that just cannot be handled the same way they have been, and new automatic solutions are clearly needed. To be more specific, the main benefits of introducing SON functions in cellular networks are as follows.(i)Reduced installation time and costs.(ii)Reduced OPEX due to reductions in manual efforts in connection with monitoring, optimizing, diagnosing, and healing of the network.(iii)Reduced CAPEX due to more optimized use of network elements and spectrum.(iv)Improved user experience.(v)Improved network performance. In the literature, there exist a rather vast collection of papers (and white papers) on the SON subject ranging from overview papers to contributions on more specific topics like performance analysis of various SON functions. The IST project SOCRATES . Among overview papers are . In addition several papers on specific topics, for example, load balancing . Also 4. G Americas and next generation mobile networks (NGMN) have provided reports, for example, . Other overview papers on SON in LTE are found in . In particular, the maturity of the most important SON functions and possible timing for their introduction in live networks is discussed. In Section 2, the architecture options for SON is discussed, while Section 3 is devoted to discuss individual SON components. Then finally, some conclusions are given in Section 4. SON Architecture. There are three main alternatives regarding the architecture of SON functions in cellular networks as illustrated in Figure 1. These are denoted centralized, distributed, and hybrid architectures . Different SON functions can be implemented by different architectures in the same network. In this chapter, we briefly describe the three different architecture options and discuss pros and cons of the different types. Figure 1: The three SON architecture options (NMS = network management system, EMS = element management system, OSS = operational support system). Centralized SON Architecture. In a centralized SON architecture, the algorithms are executed at the network management level. Commands, requests and parameter settings data flow from the network management level to the network elements, while measurement data and reports flow in the opposite direction. The main benefit of this approach is that the SON algorithms can take information from all parts of the network into consideration. This means that it is possible to jointly optimize parameters of all centralized SON functions such that the network becomes more globally optimized, at least for slowly varying network characteristics. Also, centralized solutions can be more robust against network instabilities caused by the simultaneous operation of SON functions having conflicting goals. Since the control of all SON functions is done centrally, they can easily be coordinated. Another advantage is that multivendor and third party SON solutions are possible, since functionality can be added at the network management level and not in the network elements where vendor specific solutions are usually required. The main drawbacks of the centralized SON architecture are longer response times, increased backbone traffic, and that it represents a single point of failure. The longer response time limits how fast the network can adapt to changes and can even cause network instabilities. The backbone traffic increase since measurement data have to be sent from the network elements to the network management system and instructions must be sent in the opposite direction. This traffic will increase as more cells are added to the network. If there are many pico- and femto- cells this traffic will be very significant. Also, the centralized processing power needed will be large. Distributed SON Architecture. In a distributed SON architecture, the SON algorithms are run in the network nodes and the nodes exchange SON related messages directly with each other. This architecture can make the SON functions much more dynamic than centralized SON solutions, so that the network can adapt to changes much more quickly. It is also a solution that scales very well as the number of cells in the network increases. The main drawbacks are that the sum of all the optimizations done at cell level do not necessarily result in optimum operation for the network as a whole and that it is more difficult to ensure that network instabilities do not occur. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2016
Categories |