top of page

Operational Excellence: Monitoring and Maintaining an RNC Network

  • Writer: Bridge Connect
    Bridge Connect
  • Aug 3, 2025
  • 4 min read

Even in 2025, Radio Network Controllers (RNCs) remain deeply embedded in telecom operations across a wide spectrum of markets. But while their technology may be two decades old, the expectations placed on them—stability, performance, efficiency—have never been higher.

This blog explores how telecom operators monitor, manage, and maintain RNCs to achieve operational excellence, protect service quality, and meet regulatory, commercial, and technical standards. It is not about survival; it’s about proactive optimisation.


Why Operational Rigor Still Matters

A live RNC handles:

  • Voice and data traffic for hundreds of thousands (sometimes millions) of users

  • Dynamic radio resource allocation

  • Real-time mobility management and power control

  • Quality-of-service differentiation

  • Handover decisions affecting customer experience

Even one misconfiguration or missed alert can lead to network-wide degradation. The role of the RNC, although legacy, is mission-critical.


Core Monitoring Domains for RNC Networks

Operators typically divide RNC monitoring into the following domains:

1. Radio Resource Monitoring

Focuses on utilisation levels of:

  • Code resources (spreading codes in WCDMA)

  • Power budgets

  • Channel element availability

  • Carrier utilisation per Node B

Thresholds are often configured to trigger alerts as cells approach congestion, allowing engineers to shift traffic or pre-empt outages.

2. KPI-Based Performance Monitoring

Common RNC-level KPIs include:

  • Call Setup Success Rate (CSSR)

  • Handover Success Rate (HOSR)

  • Dropped Call Rate (DCR)

  • Paging Success Rate (PSR)

  • Data Throughput (UL/DL)

These are tracked in near real time and compared against network-wide benchmarks and service-level agreements (SLAs).

3. Fault and Alarm Management

Automated systems flag:

  • Interface errors (Iub, Iur, Iu-CS, Iu-PS)

  • Node B communication failures

  • Timing issues and sync loss

  • Congestion on backhaul links

  • Security policy violations

Operators typically use integrated element management systems (EMS) or network management systems (NMS) to centralise alert management and correlate across domains.

4. Configuration and Inventory Control

Maintaining accurate inventory of:

  • RNC software and patch versions

  • Node B mappings

  • Transport links and physical ports

  • Logical configuration parameters

Misconfigured parameters—such as incorrect neighbour cell lists—can silently degrade network performance for days or weeks without immediate alarms.


Maintenance Cycles and Lifecycle Management

Maintaining an RNC isn’t just about break/fix response—it involves planned activities aligned to both the network lifecycle and vendor support roadmap.

1. Software and Patch Management

Even in legacy systems, security and feature updates must be planned and tested in lab environments before roll-out. Vendors may release:

  • Quarterly bug fixes

  • Performance optimisations

  • Compliance patches for lawful interception or QoS regulations

Some operators maintain parallel vRNC testbeds to trial patches without impacting the live network.

2. Capacity Audits

As user behaviour shifts (e.g. from voice to OTT messaging), RNC traffic patterns evolve. Annual capacity audits help determine:

  • Whether more Node Bs are needed

  • If spectrum refarming is appropriate

  • Whether RNC overload protection thresholds need tuning

In some cases, audits prompt rebalancing traffic between RNCs or upgrading transport layers to relieve Iub congestion.

3. Physical Infrastructure Checks

Legacy RNCs may still run on dedicated vendor hardware requiring:

  • Cooling system checks

  • Redundant power supply tests

  • Clock synchronisation audits

  • Hardware swap programs where end-of-life components are identified

Physical site access and legacy cabling still matter in many markets.


Transition to Virtual RNC Environments

For operators that have migrated to virtualised RNCs, operational excellence takes on a new shape:

  • Monitoring moves to the hypervisor layer

  • Elastic scaling metrics are added (CPU, memory, network load)

  • DevOps workflows are introduced for patching and rollbacks

  • Integration with orchestration platforms (e.g. OpenStack, VMware, Red Hat) becomes critical

However, legacy operational KPIs remain relevant even in virtual form—ensuring continuity between physical and virtual environments.


Cybersecurity: A New Front in RNC Operations

RNCs, like any network node, are subject to security risks:

  • Outdated cipher suites

  • Access control vulnerabilities

  • Unencrypted backhaul traffic (especially on Iub or Iur)

  • Out-of-band management interfaces with weak protection

Security-conscious operators now include RNCs in:

  • Penetration testing programs

  • Vendor compliance audits

  • Zero Trust architecture pilots

  • SIEM integration for event correlation

Protecting the RNC is not just about the node itself—it’s about preventing attack vectors into the mobile core.


Human Factors and Skills Retention

One overlooked risk is the loss of operational expertise. As 3G becomes less attractive to new engineers, knowledge gaps open:

  • Engineers with deep RNC and ATM/IP hybrid knowledge are retiring

  • Internal training budgets for legacy systems are shrinking

  • Documentation for older vendor systems is often incomplete

Some operators mitigate this by:

  • Creating internal legacy knowledge hubs

  • Offering cross-generational mentoring

  • Contracting external consultants for RNC-specific projects

  • Maintaining runbooks and SOPs for mission-critical tasks


Strategic Oversight: What Boards Should Monitor

While RNC operations are mostly managed at the engineering and NOC level, boards and executive teams should still track:

  • RNC-related outage incidents and root causes

  • Security posture and compliance gaps

  • Cost of maintenance vs. virtualisation or shutdown

  • Staffing risk associated with legacy systems

  • Customer experience trends in RNC-covered zones

These metrics affect brand reputation, regulatory relationships, and investment planning.


Conclusion: Legacy Doesn’t Mean Neglect

The RNC may be a legacy asset, but it demands modern operational discipline. Operators that monitor performance actively, manage configurations tightly, and plan lifecycle upgrades thoughtfully can maintain high availability and service quality—even on older platforms.

Operational excellence isn’t about nostalgia—it’s about risk management, business continuity, and value extraction from every layer of the mobile network.

 
 
bottom of page