Professional Documents
Culture Documents
GSM / UMTS
Voice Core Network
OAM User Guide
DRAFT
test
GSM / UMTS
Voice Core Network
OAM User Guide
The information contained herein is the property of Nortel Networks and is strictly confidential. Except as expressly authorized in
writing by Nortel Networks, the holder shall keep all information contained herein confidential, shall disclose it only to its employees
with a need to know, and shall protect it, in whole or in part, from disclosure and dissemination to third parties with the same degree
of care it uses to protect its own confidential information, but with no less than reasonable care. Except as expressly authorized in
writing by Nortel Networks, the holder is granted no rights to use the information contained herein.
Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as
progress in engineering and manufacturing may warrant.
* Nortel Networks, the Nortel Networks logo, the Globemark HOW the WORLD SHARES IDEAS, and Unified Networks are
trademarks of Nortel Networks. DMS, DMS-HLR, DMS-MSC, MAP, and SuperNode are trademarks of Nortel Networks. GSM is a
trademark of GSM MOU Association.
Trademarks are acknowledged with an asterisk (*) at their first appearance in the document.
ii
Nortel Networks Confidential Copyright © 1996–2005 Nortel Networks
The following apply to components or elements used in the GEM load and are
used by permission of the respective owners.
Preamble:
The intent of this document is to state the conditions under which a Package
may be copied, such that the Copyright Holder maintains some semblance of
artistic control over the development of the package, while giving the users of
the package the right to use and distribute the Package in a more-or-less
customary fashion, plus the right to make reasonable modifications.
Definitions:
“Package” refers to the collection of files distributed by the Copyright Holder,
and derivatives of that collection of files created through textual modification.
“Standard Version” refers to such a Package if it has not been modified, or has
been modified in accordance with the wishes of the Copyright Holder as
specified below.
“Reasonable copying fee” is whatever you can justify on the basis of media
cost, duplication charges, time of people involved, and so on. (You will not be
required to justify it to the Copyright Holder, but only to the computing
community at large as a market that must bear the fee.)
“Freely Available” means that no fee is charged for the item itself, though there
may be fees involved in handling the item. It also means that recipients of the
item may redistribute it under the same conditions they received it.
1. You may make and give away verbatim copies of the source form of the
Standard Version of this Package without restriction, provided that you
duplicate all of the original copyright notices and associated disclaimers.
2. You may apply bug fixes, portability fixes and other modifications derived
from the Public Domain or from the Copyright Holder. A Package
modified in such a way shall still be considered the Standard Version.
3. You may otherwise modify your copy of this Package in any way,
provided that you insert a prominent notice in each changed file stating
how and when you changed that file, and provided that you do at least
ONE of the following:
a. place your modifications in the Public Domain or otherwise make
them Freely Available, such as by posting said modifications to
The standard version of the Perl interpreter is obtained from the following
link: http://www.perl.com/pub/a/language/info/software.html
Permission is granted to anyone to use this software for any purpose, including
commercial applications, and to alter it and redistribute it freely, subject to the
following restrictions:
1. The origin of this software must not be misrepresented; you must not
claim that you wrote the original software. If you use this software in a
product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly: jloup@gzip.org
Mark Adler: madler@alumni.caltech.edu
Publication history
March 2005
GSM18/UMTS04, Preliminary, 05.02. This release of the document includes:
• additional review comments
• updated Configuration Management wizard information
• updated Fault Management toolbar description
• added information on alarm timestamps
• updated Performance Manager and Summary Report information
December 2004
GSM18/UMTS04, Draft, 05.01. The document was divided into three separate
NTPs. The following information has been added: NSS18/UMTS04 software
changes.
October 2004
NSS17/UMTS03 Revision 04.16. This Standard release of the document is
created for the NSS17/UMTS03 software release and includes:
• additional review comments
• updated Mass Export information
September 2004
NSS17/UMTS03 Revision 04.15. This Standard release of the document is
created for the NSS17/UMTS03 software release and includes:
• additional review comments
• updated Configuration Management information
August 2004
NSS17/UMTS03 Revision 04.14. This Standard release of the document is
created for the NSS17/UMTS03 software release and includes additional
review comments.
June 2004
NSS17/UMTS03 Revision 04.13. This Standard release of the document is
created for the NSS17/UMTS03 software release and includes:
• additional review comments
• updated Ports and Services lists
• updated Performance Management information
• addition of Secure Shell installation information
• updated managed nodes configuration procedures and associated
parameters information
April 2004
NSS17/UMTS03 Revision 04.12. This Preliminary release of the document is
created for the NSS17/UMTS03 software release and includes:
• additional review comments
• updated BICC Configuration Wizards
• updated Performance Management information
February 2004
NSS17/UMTS03 Revision 04.11. This release of the document is created for
the NSS17/UMTS03 software release and includes additional review
comments and updated BICC information.
February 2004
NSS17/UMTS03 Revision 04.10. This release of the document is created for
the NSS17/UMTS03 software release. This release includes additional review
comments.
December 2003
NSS17/UMTS03 Revision 04.09. This release of the document is created for
the NSS17/UMTS03 software release. This release includes updated Mass
Export information.
October 2003
NSS17/UMTS03 Revision 04.08. This release of the document is created for
the NSS17/UMTS03 software release. This release includes the addition of
GSM BICC functionality and the following changes:
• Addition of BICC Configuration Wizards
• Updated Mass Export information
• Addition of OM Correlation Editor
September 2003
NSS17/UMTS03 Revision 04.07. This release of the document is created for
the NSS17/UMTS03 software release. This release includes separating the
document into two volumes.
September 2003
NSS17/UMTS03 Revision 04.06. This release of the document is created for
the NSS17/UMTS03 software release. This release includes the addition of
review comments and updated Configuration Management Wizard
information.
September 2003
NSS17/UMTS03 Revision 04.05. This release of the document is created for
the NSS17/UMTS03 software release. This release includes the addition of
review comments and the following changes:
• Updated Ports and Services lists
• Telnet/FTP Pass Through on SDM
• Updated Mass Export information
August 2003
NSS17/UMTS03 Revision 04.04. This release of the document is created for
the NSS17/UMTS03 software release. This release includes the addition of
SDM and CEM server configuration and maintenance procedures.
July 2003
NSS17/UMTS03 Revision 04.03. This Preliminary release of the document is
created for the NSS17/UMTS03 software release. This release includes the
addition of review comments and the following NSS17/UMTS03 software
changes:
• Updated Sun Management Center information
• CEM GUI Enhancements
• Addition of CEM Ports and Services lists
• CEM support for Univity HLR
June 2003
NSS17/UMTS03 Revision 04.02. This Preliminary release of the document is
created for the NSS17/UMTS03 software release. This release includes the
addition of review comments and the following NSS17/UMTS03 software
changes:
• CEM Security Enhancements
April 2003
NSS17/UMTS03 Revision 04.01. This Draft release of the document is created
for the NSS16/UMTS03 software release. This release includes the addition of
review comments and the following NSS17/UMTS03 software changes:
• New Layout Management features in the File menu
• Addition of R4 BICN provisioning in the Configuration Manager
interface
• New AutoLogin feature for MAP, Telnet, and FTP in the Tools menu
• Addition of SSH protocols for secure MAP, Telnet, and FTP
January 2003
NSS16/UMTS03 Revision 03.03. This Preliminary release of the document is
created for the NSS16/UMTS03 software release. This release includes the
addition of review comments, CR changes.
July 2002
NSS16/UMTS03 Revision 03.02. This Preliminary release of the document is
created for the NSS16/UMTS03 software release. This release includes the
addition of review comments, CR changes.
July 2002
NSS16/UMTS03 Revision 03.01. This Draft release of the document is created
for the NSS16/UMTS03 software release. This release includes the addition of
review comments, CR changes, and the following NSS16/UMTS03 software
changes:
• Introduction of Call Trace feature
• Introduction of USP functionality
May 2002
NSS15/UMTS02 v 2.0 Revision 02.05. This second Preliminary release of
the document is created for the NSS15/UMTS02 software release. This
release includes the addition of review comments and CR changes.
April 2002
NSS15/UMTS02 v 2.0 Revision 02.04. This Preliminary release of the
document is created for the NSS15/UMTS02 software release. This release
includes the addition of review comments and CR changes.
March 2002
NSS15/UMTS02 v 2.0 Revision 02.03. This release of the document is
created for the NSS15/UMTS02 software release. This release includes the
addition of review comments and CR changes.
February 2002
NSS15/UMTS02 v 2.0 Revision 02.02. This draft release of the document is
created for the NSS15/UMTS02 software release. This release includes the
addition of review comments and CR changes.
November 2001
NSS15/UMTS02 v 2.0 Revision 02.01. This draft release of the document is
created for the NSS15/UMTS02 software release. This release includes the
addition of review comments and the following UMTS 02 software changes:
• New Add Server feature at the File Menu interface
• Addition of Customizable OM Window at the Performance Manager
interface
• Updates to Installation chapter to reflect software upgrades
October 2001
UMTS01/NSS14 v 1.2 Revision 01.08. This Standard release of the
document is created for the UMTS01/NSS14 software release. This release
includes the addition of review comments.
September 2001
UMTS01/NSS14 v 1.2 Revision 01.07. This Preliminary release of the
document was created for the UMTS01/NSS14 software release. This release
includes the addition of review comments.
August 2001
UMTS01/NSS14 v 1.2 Revision 01.06. This Preliminary release of the
documentation was created for the UMTS01/NSS14 software release. This
release includes the following changes:
• XA-Core and MMU information
• New screen shots
• Mass Export function moved from System Administration to Performance
Management
• New Tools menu bar
July 2001
UMTS01/NSS14 v 1.2 Revision 01.05. This Preliminary release of the
documentation was created for the UMTS01/NSS14 software release. This
release includes technical review comments, IT2 features, and the following
changes:
• Add section on installing Element Manager from a Sun platform.
• Add new installation procedure for Element Manager.
• Add HLR Summary Report.
• Add HLR SUMPAGE registers.
• Add Configuration Management Wizard and new Table Editor interface.
July 2001
UMTS01/NSS14 v 1.1. Revision 01.04. This Preliminary release of the
documentation was created for the UMTS01/NSS14 software release. This
release includes technical review comments and the following changes:
• Revised formula for XACore switch.
• Miscellaneous shortcut keys for the Element Manager were modified.
June 2001
UMTS01/NSS14 v 1.1. Revision 01.03. This Preliminary release of the
documentation was created for the UMTS01/NSS14 software release. This
release includes technical review comments and the following changes:
• Addition of hlrMeasurementFunct under the HLR container in the
compCore SuperNode.
May 2001
UMTS01/NSS14 v 1.1. Revision 01.02. This Preliminary release of the
documentation was created for the UMTS01/NSS14 software release. This
release includes technical review comments.
April 2001
UMTS01/NSS14 v 1.0. Revision 01.01. This Preliminary release of the
documentation was created for the UMTS01/NSS14 software release.
Contents 1
Tools 7-1
Tools menu 7-1
Messaging 7-2
Maintenance commands 7-4
@componentInstance macro 7-6
USP/SLR maintenance action 7-8
Construct maintenance commands 7-11
Add, delete and edit maintenance commands 7-12
Use Encryption 7-13
Set AutoLogin 7-14
MAP 7-14
MAP automatic login 7-14
File menu 7-16
Index A-1
Figures
Figure 1-1 CORE Element Manager banner 1-3
Figure 1-2 CEM User Login window 1-4
Figure 1-3 Element Manager main window 1-7
Figure 1-4 Waiting 1-7
Figure 1-5 Messages 1-8
Figure 1-6 Element Manager Menu bar 1-8
Figure 1-7 Element Manager File menu 1-9
Figure 1-8 Element Manager Fault menu 1-10
Figure 1-9 Element Manager Configuration menu 1-10
Figure 1-10 Element Manager Performance Menu 1-11
Figure 1-11 Element Manager Call Trace menu 1-11
Figure 1-12 Element Manager Tools menu 1-12
Figure 1-13 Element Manager Administration menu 1-12
Figure 1-14 Element Manager Help menu 1-13
Figure 1-15 Copy option from pop-up 1-16
Figure 1-16 Wireless filter group 1-18
Figure 1-17 Details 1-20
Figure 1-18 NSP Resource Browser pop-up menu 1-21
Figure 1-19 Alarms Manager window 1-22
Figure 1-20 Performance Manager window 1-23
Figure 2-1 File menu 2-2
Figure 2-2 Open layout window 2-4
Figure 2-3 Layout management window 2-5
Figure 2-4 Region pop-up menu 2-8
Figure 2-5 Info window 2-8
Figure 2-6 Server pop-up menu 2-9
Figure 2-7 IP Node / Slice pop-up menu 2-10
Figure 2-8 Network Element pop-up menu 2-10
Figure 2-9 Example MSC/HLR network layout 2-12
Figure 2-10 MSC/HLR element 2-13
Figure 2-11 Add element 2-13
Figure 2-12 Example hosts files (WindowsNT) 2-14
Figure 2-13 Select Server 2-15
Figure 2-14 Add Server 2-15
Figure 2-15 Move Node window 2-16
Figure 5-57 Pop-up menu for Nortel defined correlation - right table 5-113
Figure 5-58 Delete confirmation 5-114
Figure 5-59 OM Correlation Editor - using the Show command to display a long
definition 5-115
Figure 5-60 Save confirmation 5-116
Figure 5-61 OM Correlation Editor - Apply tab pane 5-117
Figure 6-1 Accessing Call Trace 6-1
Figure 6-2 Call Trace Activate/Deactivate window 6-2
Figure 6-3 Non Call Trace User Error Window 6-2
Figure 6-4 Print menu options 6-3
Figure 6-5 IMSI Print Report 6-4
Figure 6-6 About Call Trace 6-5
Figure 6-7 IMSI tab 6-6
Figure 6-8 Deactivation confirmation prompt 6-7
Figure 6-9 IMSI Activate Trace window 6-8
Figure 6-10 Foreign Subscriber prompt 6-9
Figure 6-11 MSISDN tab 6-10
Figure 6-12 MSISDN Activate Trace window 6-11
Figure 6-13 Trunk tab 6-13
Figure 6-14 Trunk Activate Trace window 6-14
Figure 6-15 PSTN tab panel 6-16
Figure 6-16 PSTN Activate Trace window 6-17
Figure 6-17 Blank IMSI warning 6-18
Figure 6-18 Blank MSISDN warning 6-18
Figure 6-19 Blank Trunk ID warning 6-19
Figure 6-20 Blank PSTN Number warning 6-19
Figure 6-21 Blank Trace Reference warning 6-19
Figure 6-22 Activated IMSI warning 6-20
Figure 6-23 Activated MSISDN warning 6-20
Figure 6-24 Activated Trunk ID warning 6-20
Figure 6-25 Activated PSTN warning 6-21
Figure 6-26 Network Element warning 6-21
Figure 6-27 Range Input warning 6-21
Figure 6-28 Incomplete Range warning 6-22
Figure 6-29 Overlapping Range warning 6-22
Figure 6-30 Manage Trace Records window 6-23
Figure 6-31 No records export warning 6-24
Figure 6-32 Example of Filtering text string 6-26
Figure 6-33 Example of Filtering results 6-26
Figure 6-34 Selecting tracking of Trace records 6-27
Figure 6-35 Histogram X and Y axis 6-27
Figure 6-36 Manage Trace Records summary list 6-28
Figure 6-37 View Trace Record window 6-30
Figure 6-38 Notes text box with buttons 6-31
Figure 6-39 Example of Notes indication 6-32
Figure 6-40 Location Update CTR Example 6-33
Figure 6-41 Setup CTR Example 6-34
Figure 6-42 Answer CTR Example 6-35
Figure 6-43 Disconnect CTR Example 6-35
Figure 6-44 Redirection CTR Example 6-36
Figure 6-45 CISS CTR Example 6-37
Tables
Table 1-1 CEM User Login Error Windows 1-4
Table 1-2 List of keyboard shortcuts 1-13
Table 1-3 Miscellaneous shortcuts 1-14
Table 3-1 Configuration manager tool bar icon descriptions 3-3
Table 3-2 Info window buttons 3-8
Table 3-3 DMS attributes 3-9
Table 3-4 Element icons 3-23
Table 3-5 Table GWINV Datafill 3-95
Procedures
Procedure 1-1 Launch CEM GUI from different NEs without closing CEM GUI after
the NE being launched 1-19
Procedure 1-2 Launch CEM GUI from different NEs 1-19
Procedure 2-1 Add a MSC/HLR element to the network 2-13
Procedure 2-2 Add a Server to the network 2-15
Procedure 2-3 Remove an element from the network 2-18
Procedure 2-4 Set Export Path 2-27
Procedure 3-1 Configure automated scripts 3-167
Procedure 3-2 Unix file configuration 3-168
Procedure 5-1 Enable ACT102 and CAP Logs on the Switch 5-33
Procedure 5-2 Add a destination group 5-51
Procedure 5-3 Replace a destination group 5-51
Procedure 5-4 Delete a destination group 5-51
• Fault Management (FM) - view active and cleared alarms from a MSC/
HLR and access the MSC/HLR sub-elements in a manner similar to a
Nortel Maintenance and Administration Position (MAP).
• Performance Management (PM) - retrieve and view operational
measurements (OMs) of a MSC/HLR.
To best use this document, the reader should have knowledge of the following
topics:
• TMN standards - The Core Element Manager requires at least a high-level
understanding of TMN standards to interpret the TMN Open System
Interconnection (OSI) states. These states reflect the different attributes of
components and elements.
• European Telecommunication Standards - For the Core Element Manager,
the system administrator must have a high-level understanding of the
operational measurements described in the GSM 12.04 standards.
• VCN knowledge - Required to understand the hierarchy of the MSC/HLR
components and elements.
• MAP knowledge -Required to use the Maintenance and Administration
Position Command Interpreter (MAPCI) interface.
Related documents 1
Refer to the following documents for more information on the Core Element
Management System:
• GSM /UMTS Voice Core Network OAM Upgrades, NTP 411-8111-233
• GSM /UMTS Voice Core Network OAM Administration, Maintenance &
Troubleshooting Guide, NTP 411-8111-937
• GSM /UMTS Voice Core Network OAM Reference Manual, NTP 411-
8111-803
Cancellation index
With the many changes occurring in product documentation due to the
introduction of PCLs, refer to 297-8991-002, DMS-10 and DMS-100
Cancellation Cross-Reference Directory, for a listing of cancelled NTPs and
the appropriate replacement NTPs.
This publication is applicable to the DMS-MSC Family offices that have the
GSM NSS18/UMTS VCN04 software release. Unless this publication is
revised, it also applies to offices that have software releases greater than GSM
NSS18/UMTS VCN04.
For more information about the new features contained in the GSM NSS18/
UMTS VCN04 software release, refer to the GSM / UMTS MSC Software
Delta, 411-2231-199, and the GSM / UMTS HLR100/200 Software Delta,
411-2831-199.
Before GSM05, software loads were package-based loads. GSM05 was the
first DMS-MSC Product Computing Module Load (PCL). PCLs are
composed of layers of software, or Delivery Receivable Units (DRUs).
Getting started 1
This chapter is an introduction to the CORE Element Manager (CEM)
application and discusses the following subjects:
• starting the Element Browser on the PC and the Sun workstations
• structure of the Element Manager application window
• status bar
• the Element Manager menu bar
• keyboard shortcuts
• cut and paste functions
• open the Element Manager from the Network Server Protocol (NSP)
browser
• CEM security
• restrictions and limitations
In networks having a CEM Server, a network browser using Java Web Start
on a Sun workstation, PC workstation or W-NMS NSP can access the
Element Manager server application on the CEM Server. In this configuration,
the Element Manager application software is not installed on the workstation
or NSP.
The Core Element Manager banner is displayed (Figure 1-1), followed by the
Element Browser, showing the Element Manager main window (Figure 1-3).
# /opt/nortel/mgr/<ElementMgr17-xxx>/sunMgr.sh.
The CORE Element Manager banner is displayed (Figure 1-1), followed by the
Element Browser, showing the Element Manager main window (Figure 1-3).
Start the Element Manager from a Sun or PC using Java Web Start
Open the Internet Explorer or Netscape browser. Enter the web address
supplied by the network administrator. Example:
http://<server hostname>:8080/CEM/current_CEM
The Core Element Manager banner is displayed (Figure 1-1), followed by the
Element Browser, showing the Element Manager main window (Figure 1-3).
Start the Element Manager from an NSP using Java Web Start
The Element Manager can also be launched from the Network Services
Platform (NSP) GUI. Launch instructions are similar to those of the Java Web
Start for the Element Manager.
The Core Element Manager banner is displayed (Figure 1-1), followed by the
Element Browser, showing the Element Manager main window (Figure 1-3).
Figure 1-1
CORE Element Manager banner
Figure 1-2
CEM User Login window
Login Failed: Invalid UserID or Password This error message is displayed when the userid
or the password entered is not valid. Upon
acknowledging this message, the user may
reattempt login by entering the valid userid and
password or attempt to login as another user.
User authenticated successfully but <userID> This error message is displayed when the userid
does not belong to any CEM defined Groups or the password entered is valid but there are no
group privileges defined for that user in the
security server. Upon acknowledging this
message, the user may attempt to login as
another user.
—sheet 1 of 2—
Table 1-1
CEM User Login Error Windows
Login Failed: Failed to Connect This error message is displayed when the
connection with the validation server cannot be
established. Upon acknowledging this message,
the user may reattempt login by entering another
validation server name or reattempt login at a
later time.
Login Failed: Password retry number exceeded This error message is displayed when the user
has exceeded the max login attempts allowed by
the account lockout policy enforced by the LDAP
Directory Server or the DCE Security Server.
Upon acknowledging the message, the user may
or may not be able to attempt login right away.
The users ability to attempt login again depends
on the account policy enforced by the LDAP
Directory Server or the DCE Security Server.
Login Failed due to Password Expiration This error message is displayed when the login
attempting user’s password has expired. Upon
acknowledging this message, the user is
provided with the Change password screen to
change the current password. This scenario is
termed as “System Initiated Change Password”.
—sheet 2 of 2—
Status bar
The status bar at the bottom of the Element Manager main window indicates
status of the element manager (Figure 1-4).
• Number Message - The numbered message (Figure 1-5) indicates that the
Element Manager is processing messages on its queue from an SDM.
Figure 1-5
Messages
If the input alarm rate from all connected SDMs is above 14 alarms per
second and sustained for a period longer than a day, and the Element Manager
is looking at the SDMs from which the alarms are coming, the Element
Manager warns the user of this situation by showing a red status bar at the
bottom of its window with a count of how may messages are back-logged in
its queue. If this red bar is displayed for an extended time, the Element
Manager will most likely run out of memory and freeze.
If this condition is seen, disconnect the SDM that is producing such a large
volume of alarms. Or try switching the view by drilling into a SDM that is not
producing so many alarms to see if the backlog dissipates.
For information on the menu bar options, refer to the sections that follow and
to the corresponding chapters of this manual.
File menu
The File menu (Figure 1-7) allows you to manipulate the Element Manager
windows and export or print alarm data. For more information, refer to
Chapter 2, “File menu” of this manual.
Figure 1-7
Element Manager File menu
Fault menu
The Fault menu (Figure 1-8) allows you to manipulate how alarm and state
information about DMS MSC/HLR elements is displayed. For more
information, refer to Chapter 4, “Fault management” of this manual.
Figure 1-8
Element Manager Fault menu
Configuration menu
The Configuration menu shown in Figure 1-9 allows you to determine how
configuration and state information is displayed. For more information, refer
to Chapter 3, “Configuration management” of this manual.
Figure 1-9
Element Manager Configuration menu
Performance menu
The Performance menu (Figure 1-10) allows you to choose one of six
performance applications. For more information, refer to Chapter 5,
“Performance management” of this manual.
Figure 1-10
Element Manager Performance Menu
Figure 1-11
Element Manager Call Trace menu
Tools menu
The Tools menu (Figure 1-12) allows you to do some things on the network
that you cannot do any other way. For more information, refer to Chapter 7,
“Tools” of this manual.
Figure 1-12
Element Manager Tools menu
Administration menu
The Administration menu (Figure 1-13) allows you to open the
Administration Manager or the Server Application Management system. It
also allows for a Force Out option. Administration Management monitors the
status of the SDMs in the system. For more information, refer to Chapter 8,
“Administration management” of this manual.
Figure 1-13
Element Manager Administration menu
Help menu
The Help menu (Figure 1-14) tells you how to use the Element Manager
viewer, and how to use help. For more information, refer to Chapter 9, “On-
line help” of this document.
Figure 1-14
Element Manager Help menu
Keyboard shortcuts 1
You can use keyboard shortcuts to access menu items in the Element
Manager. The tables below show a list of keyboard shortcuts supported in the
Element Manager.
Table 1-2
List of keyboard shortcuts
Exit Ctrl + E
—sheet 1 of 2—
Table 1-2
List of keyboard shortcuts
Wizard Ctrl + Z
—sheet 2 of 2—
Description Shortcut
—sheet 1 of 2—
Table 1-3
Miscellaneous shortcuts
Description Shortcut
Node whose name starts with this letter KEY corresponding to a letter
(ignoring case)
—sheet 2 of 2—
• To paste, place the cursor where you want the text to be, then right-click
the mouse to display the pop-up menu and click Paste.
The operator can launch Element Manager from within the NSP Browser
window if the Network Elements (NEs) are displayed. This allows an
operator to view the physical and logical resources within the NE and to view
the OSI states and other attributes for each sub-component. The user can also
launch Performance Manager, Summary Report and Threshold Manager.
Figure 1-16
Wireless filter group
Step Action
1 Open NSP GUI and choose a NE (for example: NE1). Right click on
that NE to launch CEM GUI from NSP GUI.
Procedure 1-2
Launch CEM GUI from different NEs
Step Action
1 Open NSP GUI and choose a NE (for example: NE1). Right click on
that NE to launch CEM GUI from NSP GUI.
Note: The Data Server (DS) is supported only by the primary Main
Server in the W-NMS environment.
Figure 1-17
Details
The number in the bubble is the number of the highest alarms. In this
example, it is 41 Critical alarms.
Figure 1-18
NSP Resource Browser pop-up menu
In Figure 1-19, the Alarm Manager window shows alarms for the node
selected. You can filter the alarms by several means, including severity and
acknowledged.
Figure 1-19
Alarms Manager window
Figure 1-20
Performance Manager window
Proxy settings for the Internet browser must be disabled for SAM21 GUI
launching. The following proxy changes need to be made before launching the
HLR200 GUI:
1. Go to the Tools menu and select “Internet Options.”
2. Go to the Connections tab and press the “LAN Settings” button.
3. Make sure that in the Proxy server content panel area “Use a Proxy server
for your LAN (These settings will not apply to dial-up or VPN
connections.)” the check box is unchecked.
CEM security 1
Prior to GEM16, no login was required on the CEM Browser. In GEM16, a
security framework was introduced which required the user to log in using a
login id and a password.
Login information such as the user ID and the password are sensitive
information that needs to be protected when being transported over the network.
There are five possible connections over which the login credentials are
transported:
1. Connection between the NSP desktop and the NDS Server.
Securing the connection between the NSP desktop and the NDS Server in
the W-NMS environment depends on the security mechanism supported
by NSP. Refer to the NSP documentation for further information
regarding security mechanisms supported in NSP.
2. Connection between the OMC-S browser and the SDM/FT.
The connection between the OMC-S browser and the SDM/FT is not
secured but the login user ID and password are encrypted when passed
between the OMC-S browser and the SDM-FT.
The Telnet and the FTP sessions from the OMC-S browser to the SDM/
FT are also not supported over secure connection.
3. Connection between the OMC-S browser and the OMC-S Server.
The connection between the OMC-S browser and the OMC-S Server is
also not secured but the login user ID and password are encrypted when
passed between the OMC-S browser and the OMC-S Server.
4. Connection between the SDM/FT or the OMC-S Server and the IDS
Server.
The IDS has a configuration option for enabling Secure Socket Layer
(SSL) communication. Setting this option provides a secure connection
between the IDS and an SSL enabled client running on the SDM/FT or
the OMC-S Server. This option does require a certificate from a
recognized Certificate Authority to be installed on IDS.
5. Connection between the SDM/FT and the MSC
The connection between the SDM/FT and MSC is over DS-512 private
network link. This link is internal and is not externally accessible.
LDAP:
• Vendor: Sun (Formerly SunONE)
• Software: SunONE Directory Server (Formerly NDS)
• Version: 5.1
• Build Number: 2001.326.2401
SSL:
• Vendor: OpenSSH (www.openssl.org)
• Software: OpenSSL
• Version: 0.9.6.c
• Module in Apache package: mod_SSL 2.8.6-1.3.23
Note: The LDAP and SSL are required to be installed and configured
following the NSP-FW3.2 installation and configuration in order for the
CEM security to work properly.
The user is allowed to save their login credentials for a specific node on the
CEM System so that the next login attempt into that node can be performed
automatically by the CEM browser. The login credentials are actually saved
on the CEM Servers, which are added into the CEM System. It is therefore
necessary to enter the CEM Server as the validation server on the initial CEM
login window in order to facilitate the retrieval of the credentials from the
given Server.
When no login credentials are previously saved on the CEM System for that
node and for that user, a login dialog is provided to the user to manually enter
the login credentials. On the manual login screen, the user is given the option
to save the login credentials entered.
If the automatic login fails for any reason, the user will have to re-enter the
user ID and password when prompted by the server or re-attempt the
automatic login by terminating the current session and restarting a new
session.
The CEM administrator can configure the operational privileges on a per user
group basis for each of the nodes added into the CEM System. Each user
group is defined in the LDAP Directory Server or the DCE Security Server.
This functionality is only supported for the nodes where the corresponding
SDM/FT is in CEM Server configuration and the CEM Server is running the
GEM17 CEM Software.
Note: This is not supported for the nodes where the corresponding SDM/
FT is in standalone configuration.
The user’s preferences are stored on the CEM Server. At login time, the User
Preferences for that specific user are retrieved from the CEM Server (entered
as the validation server on the login window) and applied to the user’s CEM
Browser. This functionality allows the user to login from any CEM Client
Workstation and still be able to operate with their specific configuration
setup.
Telnet, FTP and MAP all utilize TCP/IP protocol for accessing remote nodes.
The Users login credentials are transferred over the network in plain text. To
avoid this security problem, data must be encrypted before transmission.
Secure Shell access between CEM browser and any SSH Server
Upon successful login, the user is able to select secure shell access under
tools menu.
Security alarms
The OMC-S system generates security alarms to draw the immediate attention
of the administrator to a potential security problem or a suspicious activity. The
occurrence of following events triggers a security alarm to be generated:
• Maximum number of consecutive unsuccessful login attempts in a single
login session.
• Successful and unsuccessful attempts to gain permissions or assume the
identity of another user.
13. The CEM server cannot be configured as the DCE master server as the
same time. This configuration will cause the DCE cell unstable and some
of the DCE’s functionality will not work correctly
14. The SDM cannot be configured as the validation server while the security
in ‘ldap.config’ is set to ‘DCE’ mode. Due to issues with the DCE in the
AIX platform, this configuration may causing the EMAdapter to core
dump occasionally and unexpectedly.
15. The OpenSSH server only differentiates the passkey base on the protocol
(i.e., SSH1 and SSH2) at the connection time. The OpenSSH server does
not distinguish the connection request based on key type (i.e., rsa1, rsa2,
or dsa). Since rsa1 belongs to the SSH1 protocol family and both rsa2 and
dsa belongs to the SSH2 protocol family, the user will get a login error if
they attempt to use the rsa1 key and declare it as either rsa2 or dsa.
However, the user will not get the same error message if they declare rsa2
as dsa or vice versa because, as stated earlier, both rsa2 and dsa are in the
same protocol family.
16. When the SSH organization first introduced SSH2 protocol, dsa was the
only key type to use for this new protocol (SSH2). The rsa2 key type has a
higher level of encryption compared to dsa. Since some older systems
already used the dsa key type, the SSH organization supports both rsa2
and dsa key types in SSH2 protocol.
17. Generic table editing for Media Gateway is not supported.
18. The R4 wizards do not support the HLR.
19. There is no table-change notification in the Media Gateway wizards for
Media Gateway tables.
20. There is a limit on how many Passports are supported on one MDM (there
is a limit of 256 VSP cards in the GWINV table).
21. When an network element’s IP address is changed, often CEM does not
get notified of or detect the change without the applicable MDM FMDR
process or the CEM Device Manager or Object Manager being restarted.
22. If a Passport has been down for more than two hours before the CEM GUI
starts, then the historical OM data of this Passport is stored in the archive
server and is not available for query until the Passport re-connects with
MDP.
23. The CEM online help is not available to users for SIG, GGSN and SGSN
network elements.
24. The alarm state of the MTP resources will be set to ‘unknown’ because
USP has MTP alarms pegged against card resources.
25. Probable cause of the USP alarms are not available to CEM. Thus, most
alarm’s probable cause are set to ’probableCauseUnknown’. The
42. The dataCollector requires a valid FTP username and password on the
USP; without these, OM transfer will fail.
43. There is a 5-minute delay introduced by the dataCollector from the time
the USP writes an OM report to the time the dataCollector transfers the
report to the archive, in order to ensure the USP report is completely
written before FTP occurs. This assumes that the clocks are in-sync on the
CEM Server and USP; if they are not, this delay could decrease/increase.
File menu 2
The File menu allows you to open, disconnect, and reconnect Element Manager
windows. It also allows you to export or print alarm data. The File menu includes
the following commands:
• Display a New Window
• Layout management
• Display a New Layout
• Display the Info Log
• Set up the network display
• Add an element or server to the network display
• Remove an element from the network display
• Relocate an element from one network path to another
• Change the location of an element
• Disconnect/Reconnect an element
• Close windows
• Set Preferences
• Export alarm data
• Print alarm data
• Exit Element Manager
Note: On the Unix platform, after you exit the Element Manager
application, wait 15 seconds before running it again. This allows x-
resources to be released properly.
Figure 2-1
File menu
Layout management 2
Layout management enables users to create custom layouts which contain
Network Elements (NEs) specific to their interest. It also allows users to
create different layouts based on type of NEs, region where NEs are located,
or by any reasonable choice. Apart from the configuration of NEs, the
backdrop images if set for any level of the CEM browser, position of the
nodes, and other user settings are also saved as part of the layout. Layout
management allows users to have multiple configurations, or layouts, of NEs.
The layouts can be stored on the user’s local machine, PC or Sun workstation,
or a CEM Server so that they can be shared with other users.
Each layout can contain NEs which are in stand alone mode as well as those
being managed by a Sun Server. By default a layout is empty, NEs can then be
added to the layout. Existing NEs in a layout can be disconnected or excluded
from CEM. If a Sun Server is added to the CEM, all of the NEs managed by
the server are automatically added to the layout and the users can remove
specific NEs which are not of their interest.
Note: The CEM browser by default will display the layout last visited by
the user.
Layout Management only supports grouping NEs already added to the CEM
browser in the user defined region. The NEs can be configured into a
particular region at the time of installing the slices pertaining to the NEs on
the CEM server.
New layout
This File menu option creates a new layout and clears the current layout being
displayed in the CEM browser by removing all the NEs, CEM servers, their
corresponding alarms and histograms.
Open layout
This File menu option displays a file browser window (see Figure 2-2) from
which the user can select from a list of layouts previously saved on either a
local machine or a remote CEM server.
Figure 2-2
Open layout window
Show layout
This File menu option displays the Layout Management window for the
current layout displayed in CEM browser. The Layout Management window
consists of all the NEs, their current status and their paths displayed in a
tabular format.
Save layout
This File menu option displays a file browser window prompting the user to
enter a name for the layout and select a location to save the layout file.
Note: At least one CEM server has to present in the layout in order to
save the layout file remotely. Layouts will have to be stored locally on PC
or Sun Workstation running the CEM browser in case of networks
consisting of only Stand Alone Mediation Devices (SDM/FTs or MDMs).
Figure 2-3
Layout management window
The NE List is displayed in a tabular tree format which consist of the following
columns:
• Network Element - network element along with the path to the network
element displayed as a tree structure.
• Status - current alarm status or excluded state of an NE or Server.
• Region - path of the NE or Server in the CEM browser.
The titles of the Layout Management window and the CEM browser are set to
the name of the layout saved by the user.
Save Layout
Layout files can be saved in public and private directories on the remote Sun
Server or on the local machine, PC or Sun workstation, on which the CEM
browser is running. If there are existing layouts, the CEM browser by default
will display the last visited layout. If for some reason the layout file is not
accessible, an error message is displayed to notify the user of the reason.
Merge Layout
The existing layout being displayed in the Layout Management window can
be merged with a layout. The layout can be selected from the local PC or Sun
workstation running the CEM browser or private/shared directories on a
particular CEM Server.
Figure 2-4
Region pop-up menu
Figure 2-5
Info window
Figure 2-9
Example MSC/HLR network layout
Add an element 2
The Add Element option allows you to identify either an element or server to
be monitored. Before the Element Manager can monitor an element, you must
identify the SDM and MSC/HLR SDM element, or server, and you must
specify where you want to position the element in the network hierarchy. The
Element Manager identifies the hierarchy of the element based on the path to
element that you enter in the Add Element window. You may also optionally
enter any type of notes you would like to have associated with this element.
The notes will be visible in the Info Window (see Configuration menu) for
that element.
Procedure 2-1
Add a MSC/HLR element to the network
1 From the File menu, select the Add Element option and select MSC/HLR to add an element
for monitoring. See Figure 2-10.
Figure 2-10
MSC/HLR element
3 In the SDM IP Address field, enter the telco side IP address or alias of the SDM connected
to the element. For example, 47.186.79.9. If a hostname or alias has been created in the
hosts file (WindowsNT: c:\winnt\system32\drivers\etc\hosts: Sun: \etc\hosts) you can
substitute the hostname or alias. The IP address cannot appear on more than one line. In the
hosts file (Figure 2-12), either the SDM hostname or the switch alias will reference the SDM
IP address, and can be used as the element label.
Figure 2-12
Example hosts files (WindowsNT)
4 In the Path to Node field, enter the path name of the element in the network layout. For
example, in the path to MSCa is Southwest/Texas/North
5 Click OK.
6 Repeat this procedure for each element.
Procedure 2-2
Add a Server to the network
1 From the File menu, select the Add Element option and select Server to add a Server for
monitoring. See Figure 2-13.
Figure 2-13
Select Server
3 In the Server IP Address field, enter the IP address or alias of the Server connected to the
element. For example, 47.186.79.9. If a hostname or alias has been created in the hosts file
(WindowsNT: c:\winnt\system32\drivers\etc\hosts: Sun: \etc\hosts) you can substitute the
hostname or alias. The IP address cannot appear on more than one line.
Relocate an element 2
This feature allows you to change the network path of an element. To launch
this application, select Relocate Element under the File menu (Figure 2-1).
This opens the Move Element window (Figure 2-15) where you enter the new
element path.
Figure 2-15
Move Node window
Note: The region/path of a CEM Server managed element can also be set
while configuring the corresponding slice on the CEM Server. The node
corresponding to the slice will appear in this region/path on the CEM
browser.
Disconnect/reconnect an element 2
This feature is a type of flow control mechanism provided by the Element
Manager. You can disconnect a switch from being monitored to reduce
congestion, and thereafter none of the OA&M information for that switch will
be processed by the Element Manager. You can also reconnect to the switch.
If no elements have been disconnected, the reconnect element option is not
available. Once an element has been disconnected, the reconnect option
becomes available. To perform either operation, select the element and then
select either Disconnect Element(s) or Reconnect Element(s). Once selected a
confirmation window displays (Figure 2-16 and Figure 2-17).
region icon, all slices below the region will be disconnected. If this menu
item is invoked from the slice icon, only that slice will be disconnected.
As there can be many slices under a region, the disconnect menu item will
always be enabled on a region icon. The disconnect menu item will be
disabled on a slice icon if that slice is already disconnected.
• Reconnect: The reconnect menu item can be used to reconnect a managed
slice to the CEM server. If this menu item is invoked from a region icon,
all slices below the region will be reconnected. If this menu item is
invoked from the slice icon, only that slice will be reconnected. As there
can be many slices under a region, the reconnect menu item will always
be enabled on a region icon. The reconnect menu item will be disabled on
a slice icon if that slice is already connected.
Figure 2-16
Disconnect confirmation
Figure 2-17
Reconnect confirmation
Note: You can only disconnect the element in the network display. The
physical elements within the element cannot be reconfigured by the
Element Manager.
Remove an element 2
The Remove Element option removes the element from monitoring by
Element Manager display.
To remove an element or server from the network display, use Procedure 2-3.
Procedure 2-3
Remove an element from the network
1 In the Configuration Management window, highlight the element to be removed.
2 From the File menu, select the Remove Element option. The Confirm window appears (see
Figure 2-18).
Figure 2-18
Remove Node window
Note: You can only change the location of the elements in the network
display. The physical elements within the element cannot be reconfigured
by the element manager.
Exclude element(s) 2
This File menu option excludes the selected NE(s) and CEM server(s) from
the CEM browser. The excluded NEs and CEM servers are still displayed in
the Layout Management window.
Find NE 2
This File menu option opens a Find NE window (Figure 2-19) displaying a list
of all the connected Network Elements along with their Type, Region, Alarm
State, NE Release, Slice, Server IP and Mediation Device IP. The Find NE
window can also be accessed from the pop-up menu on the CM panel when
the user right clicks on a selected NE.
Figure 2-19
Find NE window
In the Find NE window, the user can select a specific NE and right click on it
to display a pop-up menu (Figure 2-20). This pop-up menu has the following
options:
• Locate NE - locates specific NE on the CM panel.
• Performance Manager - shortcut to open the Performance Manager.
• Threshold Manager - shortcut to open the Threshold Manager.
• Telnet - shortcut to open a Telnet session.
• Map - shortcut to open a MAP session.
Note: These same menu options are available from the File menu on the
Find NE window.
Figure 2-20
Find NE window pop-up menu
When the user selects a particular NE in the table, right clicks and selects the
pop-up menu option “Locate NE”. That specific NE is located on the CM
panel of the main Element Manager window.
Figure 2-21
Info log window
Click Clear to clear the current status log. Click Close to close the Info Log
window. Click Save to save the text in the Info Log window to a file. A Save
dialog box opens to help you choose a path and name a file to receive the log
data.
To filter the data in the Info Log window, you can enter a search string and click
Match. Only the logs matching the criteria specified in the search string are
displayed. The search string can include both specific identifiers and Boolean
logic (and, or, and not). For example:
• all - shows all the logs
• localhost - shows only the logs which have localhost in them
• sdmip_ip - shows all the up messages for a specific sdmip
• sdm_ip and up - shows all the up messages for sdmip
• Not sdm_ip - shows all the messages except for a specific sdmip
Note: sdmip1 or sdmip2 - shows all the messages for sdmip1 or sdmip2
Replace sdm_ip in the above examples by the IP address or host name of
the SDM.
In the Preference window (Figure 2-22), the user preferences are divided into
four sets of preferences: General, FM Panel, CM Panel and Tools preferences.
Figure 2-22
Preferences General tab option
On the General Tab (Figure 2-22), transparent user preferences can be modified
by the following check box:
• Save Preferences On All Servers - selecting this option indicates that the
user wishes to store their preference information on all of the CEM
Servers currently added in the CEM Browser and on the validation server
indicated during the current CEM Browser login. When this option is
selected, the Save Preferences On Validation Server option is
automatically selected as well. When this option is deselected and the
Save Preferences On Validation Server is selected, then the user
preferences are stored locally on the validation server only.
• Save Preferences On Validation Server - when this option is selected, the
user’s preferences will be stored locally only and will only be available on
that particular workstation. When this option is deselected, the Save
Preferences On All Servers option is automatically deselected.
When upgrading from GEM17, if the user had selected the option Save
Preferences On All Servers in GEM17, the default setting in the current release
would automatically be as follows:
• Save Preferences On Validation Server selected.
• Save Preferences On All Servers selected.
When upgrading from GEM17, if the user had not selected the option Save
Preferences On All Servers in GEM17, the default setting in the current release
would be as follows:
• Save Preferences On All Servers deselected.
• Save Preferences On Validation Server deselected.
On the Tools tab (Figure 2-23), transparent user preferences can be modified
by the following four check boxes:
• Save Auto Login State - Check marking this box indicates that the current
setting of the AutoLogin option under the Tools menu need to be saved as
the user preference.
• Save Telnet Login Credentials - Check marking this box indicates that the
login credentials entered during the Telnet Session initiated during the
current CEM Browser session should be saved permanently (until they are
modified the next time) in the CEM System. The saved telnet login
credentials can be retrieved in the next CEM Browser session.
• Save FTP Login Credentials - Check marking this box indicates that the
login credentials entered during the FTP Session initiated during the
current CEM Browser session should be saved permanently (until they are
modified the next time) in the CEM System. The saved ftp login
credentials can be retrieved in the next CEM Browser session.
• Save MAP Login Credentials - Check marking this box indicates that the
login credentials entered during the MAP Session initiated during the
current CEM Browser session should be saved permanently in the CEM
System. The saved map login credentials can be retrieved in the next
CEM Browser session.
Figure 2-23
User preferences for functionality under the Tools menu
It is necessary for the user to choose the Save Preference On Main Server
option in order to achieve the capability of retrieving their preferences when
using any other W-NMS client workstation.
Note: The Save Preferences On All Servers option is not applicable in the
W-NMS environment and therefore not available on the CEM Preferences
window.
Figure 2-24
CEM preferences window in W-NMS environment
Figure 2-25
Export alarm menu
Use to set the export file name and path every time you choose to export
alarm data by format.
Procedure 2-4
Set Export Path
1 If the directory where you want to store the alarm data file does not exist, create it before
beginning the Export command. Make a note of the directory name and path.
2 Select the File>Export. Select from the options displayed to export the portion of the data
you want in the format you want.
3 The Export Alarm window appears (Figure 2-26). In the Export Alarm window, select the
path name (including the drive name) where you want the export data file to be created and
click OK. For example c:\data.
Figure 2-26
Export alarm window
You can change the name of the alarm data file. Do not include an extension
in the filename. The export function automatically appends the .txt extension
to the filename. Click Save.
• Alarm Data (Headers) sends just the header information of the alarms
displayed in the FM window (according to the filtering criteria).
• Alarm Data (Full) sends the full text (Figure 2-27) of the alarms displayed
in the FM window (according to the filtering criteria).
Note: Every full alarm is queried from the SDM, so it may take a while to
finish.
Figure 2-27
Sample alarm data file in full format
OverWritten by:
NotifID = 175981;AlarmType = communicationsAlarm
Severity = minor;ProbCause = c7LinkFailure;
Figure 2-28
Sample alarm data file in histogram (text) format
Figure 2-29
Sample alarm data file in component list (text) format
=========================================================================
=====
The SDM generates a text file which allows you to import the data into an
Excel spreadsheet. Figure 2-30 provides an example of export by date.
Figure 2-30
Export Alarm Database by Date
Configuration management 3
The Element Manager displays complete information for each target network
element and its subordinate elements. The W-NMS NSP GUI displays
information about the entire network.
Figure 3-1
Configuration manager tool bar
Table 3-1
Configuration manager tool bar icon descriptions
Drill down to This button allows you to show the children within
children the element you select. If there are no children
within the element, this button is disabled.
Physical view This button displays the physical view for the current
level.
Logical view Displays the logical view for the current level.
—sheet 1 of 2—
Table 3-1
Configuration manager tool bar icon descriptions
Pin The buttons displays the pin view, if there are any
pinned nodes.
—sheet 2 of 2—
Note: The alarm state of CCS7 Message Transport Part (MTP) resources
will be set to ‘unknown’ because USP and SLR nodes do not report this
information at the present time.
Configuration Menu 3
Figure 3-2 identifies the display options available from the Configuration menu:
• Hide —hides or shows the Configuration Management window. A check
mark in the menu confirms Hide.
• Drill Up — displays the next hierarchy level up the current element.
• Drill Down — displays the next hierarchy level down a selected element.
• Info Window — displays a window describing a selected element.
• Color Nodes by — displays nodes in color by either Alarm Severity or
Propagated Severity.
— Alarm Severity: nodes that have an alarm are colored. They are
colored by the value of their alarm status attribute. This will cause
container nodes and region nodes to be grey as they have no alarms on
them. Color Nodes by Alarm Severity is the new default mode of
operation.
MDM/DMS nodes are colored based on their most severe alarm
status; alarm status is not propagated to parents. The child indicator
color will reflect the color of the highest alarm under them.
— the ‘Color Nodes By’ options are only available for the raw feed.
— if color changes are applied in the NSP GUI, the user must always exit
out of the CEM GUI then restart the CEM GUI for the alarm severity
color change(s) to be applied. The user must use the File menu then
select Exit to close the GUI before restarting it. If the CEM GUI is
closed using the ‘X’ button, the color change(s) will not be applied
when restarted as the CEM GUI was not completely closed.
• Set Background — displays a background in the CM panel.
• Clear Background — removes the background.
• Clear Layout — moves the icons to the last saved positions.
• Set Default Login Id - allows entry of the default DMS user id and
password to verify for all connected DMS nodes.
• Clear Default Login Id - clears the default DMS user id and password
being used for all connected DMS node.
— Clear Non MDM Default Login Id
— Clear MDM Default Login Id
• Table Access - brings up the Table Editor interface.
• Wizard - brings up the main CM Wizard interface.
Figure 3-2
Configuration menu options
The drill up, or back, button preforms the reverse operation of the drill down
button causing the view to start at a higher level.
The user can also navigate by double clicking on nodes. This method of
navigation is not the same as drilling up and down on the nodes. A double
click will open a node if it is closed or close a node if it is open. If the view is
set to iconic or list, the level will change on the double click to show the
opened node's children. However if the view is logical or physical, the child
nodes may be displayed without a level change.
Information on elements
To view the attributes of an element in an Info Window, select the element in
icon or list mode and select either the Info button in the tool bar or the Info
Window menu item from the Configuration menu. The Information Window
for the selected element is displayed (see Figure 3-3).
The user can access the visible attributes by clicking on the folder containing
those attributes.
Figure 3-3
Info window
Table 3-2
Info window buttons
Button Description
The Info Window identifies the attributes (see Table 3-3) that are assigned to
the element. These attributes are updated dynamically as the Element
Manager monitors the node.
Status Description
alarmStatus The status of the selected element. If the children of the parent
element have multiple alarms of a different severity, the status of the
parent element represents the status that is one less severe than the
most critical status (unless all children have the same status).
alarmSummaryTabulation A summary of the critical, major, and minor alarms for the element.
Prior to GEM17, only alarms of children were tabulated.
DMS State The state of an entity on the DMS, rather than the representation of
that state in terms of TMN states. Both perspectives on the state of
the entity are represented in each object. DMS state is provided by
the attributes: nodeDmsState, linkSetDmsState, etc.
equipmentId The name of the object instance (for all types of DMS equipment).
linkSetId The name of the link set object instance. Corresponding to the CLLI of
the link set.
networkId The name of the object instance for the network class.
—sheet 1 of 3—
Table 3-3
DMS attributes
Status Description
operationalState The operational state of the entity: enabled or disabled. If the entity is
completely unable to function, the operationalState is disabled.
Otherwise, the value is enabled.
plane0State, plane1State The DMS state on the DMS of plane 0 on an ENET shelf. The
Element Manager may be out of sync with the DMS during major
maintenance processes. The maximum insync period is 30 minutes.
pSideState The state of the internal links from the CM message controller to the
(cMmessageController) peripheral modules, through the ENET.
remoteSubsystemStatus The DMS status of the remote SS7 subsystems with which the DMS
is communicating.
routeId The name of the route. The format is the CLLI of the containing route
set concatenated with a “-” and the number of this route. For example,
the third route in the TORRTSET route set will be named
“TORRTSET-2”. (Numbering of routes begins with 0.)
linkSetId The names a link set corresponding to the CLLI of the linkSet on the
DMS. When used in the route object, this attribute identifies the
linkSet which corresponds to that route.
unknownStatus When this value is set to true, other status attributes may not be
accurate (up-to-date).
carrierState The state of the T1 carrier associated with the peripheral module
which includes this attribute.
cmSynState Whether the units of the CM (CPU-0 and CPU-1) are currently
(computingModule) synchronized.
—sheet 2 of 3—
Table 3-3
DMS attributes
Status Description
cSidePortState An aggregate view of the state of the ports on the ENET used to
(enhancedNetwork) communicate with the computing module (that is, the C-side ports).
cSideStatus (LIM, LIU, The state of the links used to communicate between the listed nodes
C7SignallingProcessing,cM and the CM, through the ENET.
messageController)
msPortStatus (linkset, This represents an aggregate view of the status of the ports on the
messageSwitch) message switch.
pSidePortState An aggregate view of the state of the ports used to communicate with
(cMmessageController, the peripheral modules (i.e. the P-side ports).
enhancedNetwork)
rpcStatus The status of the remote SS7 Point Codes the DMS is communicating
(C7SignallingProcessing) with.
—sheet 3 of 3—
Figure 3-4
CM window with background image
The background images must be in GIF (.gif) or JPEG (.jpg) format. The
image files can reside in any directory. The Manager/backdrops directory is
the default directory for the Element Manager background files.
To specify an image for a specific network level, drill down to the level and
select the Set Background option. Select the image filename from the list and
click Open.
Figure 3-5
Set Background
Arrange icons
You may want to place the element icons in a specific location on the screen.
To move all the nodes back to their home position, de-select the nodes and
select Clear Layout from the Configuration menu.
To move a single node back to its home position, select the node and select
Clear Layout for the Configuration menu.
To move all the nodes back to their home position, de-select the nodes and
select Clear Layout in the Configuration menu. If the layout of the nodes is
lost when re-sizing the Element Manager window, select Clear Layout in the
Configuration menu to reset the node positions, then re-arrange them to your
requirements.
When exiting the Element Manager application, always save your changes.
This will save the new location of your icons.
Information bubble
You can activate information bubbles in the Configuration Management
window by clicking on an element using the middle mouse key (Figure 3-6).
Figure 3-6
Information bubble with the number of sub-elements
Note: If the link between the SDM and Element Manager goes down, all
nodes appear in cyan (status unavailable). When this happens, the
information bubble displays the status of the node before the link went
down.
The items displayed in the bubble depend on what type of element is selected:
• Alarm status - The line on whether the element contains sub-elements or
not, this status may be the status of the element itself, or may reflect the
highest severity alarm status of a sub-element.
• Availability status - This line is displayed only for elements which have an
availability status.
• Location - This status is displayed only for switch elements.
• Software version of the NE
Note: When the information bubble for an SDM is activated, the software
version displayed in the information bubble is the software version of the
CEM Server and not the SDM.
Some of the pop-up menus contain menu items that disconnect or reconnect
the selected element. Refer to “Disconnect/reconnect an element” on page 2-
16 for more information.
When the right mouse button is clicked on the region (circular) nodes in
physical mode, a pop-up menu (Figure Figure 3-7) is displayed which
contains a Reshape command.
Figure 3-7
Reshaping Region Nodes Pop-up Menu
When the Reshape menu item is selected, the region node and border around
it is clear and the user can then give the desired shape to the node. While
reshaping the node, a different set of actions are supported by the pop-up
menu (Figure 3-8), which can be launched by clicking the right mouse button.
Figure 3-8
Reshaping option menu
• Abort - cancels the reshaping of the node, and sets the shape of the region
node to the previously saved shape and not the default.
Note: Reshaping of the nodes is only allowed for region or circular nodes
and can be performed only in physical mode. Also curved lines are not
supported for the shape of the region node.
These options are available from a pop-up menu (Figure 3-9) which is
displayed by right-clicking in an empty region of the Configuration
Management window.
Figure 3-9
Configuration Management Window Pop-up Menu
The nodes displayed in List Mode can be sorted by double clicking on the
header of the column. The sort order can be reversed by double clicking on
the header of the column again.
Workspaces
Workspaces allow the user to group NEs, Servers, or sub components of NEs
into a user defined region. This allows the user to manage only the specific
resources in which they are interested. When a component is added to a
workspace, an exact copy of the component is created and placed in the work
space, and any change in the alarm status of the component is reflected in the
workspace as well as in the original path.
Note: Workspaces are part of a layout and are saved upon exit along with
the layout information and are restored when a layout is opened.
The difference between the concept of workspaces and layout management are:
• Components or resources under an NE cannot be isolated in layout
management.
• The elements in a workspace are just copies of original elements and
removal of elements from a workspace will not affect the elements in the
original path.
A workspace can be added by selecting “Add Work Space” menu item from
the pop-up menu on the background of the Configuration Management panel
(Figure 3-10).
This will display a dialog prompting the user to enter the name of the
workspace.
Figure 3-10
Workspace Name Window
The pop-up menu for a resource, which can be displayed by clicking the right
mouse button on the resource, contains an “Add To” menu which lists all the
workspaces created. The resource can be added to a workspace by selecting
the work space from this menu.
Figure 3-11
Workspace Name Window
WARNING:
A server or standalone SDM cannot be added directly
to a workspace with the add menu commands as it
must be first added to a region and then added to a
workspace with the “Go to Workspace” menu item. If
the region name entered when adding the node
happens to match an existing workspace name, the
region will be added as a region node and not try to
put the node under the matching workspace. The end
result will be a region and a workspace with the same
name appearing in the GUI.
Physical mode
The Physical mode identifies Network elements in the logical view, with the
exception of Trunks, which are shown as icons. (Figure 3-12) This is the
default setting.
Figure 3-12
Configuration Management window in physical mode
Logical mode
The logical mode identifies the network elements in a logical block format
(Figure 3-13).
Figure 3-13
Configuration Management window in logical mode
Icon mode
The icon mode displays the element of the network as icons.
Figure 3-14
Configuration Management window in icon mode
Icon shapes
The icon that appears is based on the type of element that the system
identifies. Table 3-4 identifies the icons for the different types of network
elements.
Table 3-4
Element icons
Node or region - This icon identifies the top layer of the network
hierarchy. From here, you can add a switch or region with the
Add Node command from the File menu. For more information
on adding or removing a node, refer to Chapter 1, “Getting
started”
MDM Server
—sheet 1 of 3—
Table 3-4
Element icons
Process
—sheet 2 of 3—
Table 3-4
Element icons
—sheet 3 of 3—
Note: The colors for the icons in the above table are default colors and
are replaced by actual colors based on the alarm status of the resources.
Icon colors
When there is an alarm associated with a resource, the color of the resource
changes. This alarm could be a state change alarm (for example, from in
service to manual busy), a non-state change alarms (for example, test result
failed), or a propagation of alarms from its children (if it’s a logical
container). The colors are further determined by the rules explained in GSM /
UMTS Voice Core Network OAM Reference Manual, NTP 411-8111-803.
List mode
The list mode identifies the network elements in a table format (Figure 3-15).
Figure 3-15
Configuration Management window in list mode
Resize columns
To resize a column in the list window, drag the list header of the column to the
right of the column you want to resize. All columns to the right of the selected
column will move.
Note: All sorting is case sensitive, where A-Z is sorted before a-z.
For multiple selection sorting, first select the second sorting criteria with the
sorting preference then select the primary sorting criteria with the sorting
preference.
Pin mode
The pin mode identifies the network elements in a pinned/unpinned format
(Figure 3-16).
Figure 3-16
Configuration Management window in pin mode
Pin mode allows you to filter the nodes displayed in the configuration
management area. Pinning keeps a node in place when the parent node is
closed. When the node is unpinned, and the parent node is closed, the node
disappears. If the parent node remains open, the node remains displayed. As
the name implies this view only displays the pinned nodes in the
configuration management area.
Pinning allows you to separate a group of nodes of interest. These nodes may
be from the same switch or from different switches. The pinned nodes are
displayed with a “Pin” image drawn on top of them as shown in Figure 3-17.
Figure 3-17
Pinned Nodes
If the user drills down manually to a node at level four, all of the parent nodes
are open. Pinning and unpinning of the terminal node does not close the
parent nodes.
If, however, a find and pin menu item is used to find a node, then the terminal
node is shown with all parent nodes closed. If the node at level three is then
manually opened and the terminal node (level four) is unpinned, then the
parent node at level two will close as it was never manually opened. This
causes nodes at levels three and four to close as the level two node is closed.
This is pinning to force a node to show even though a parent node is closed.
Once a pinned node is unpinned and one of its parents is closed, it too will be
closed.
In the case of DMS based network elements, shelf and shelf row position
information can be obtained from the hardware inventory tables. They usually
contain the floor, row, frame position, frame type, frame number, shelf
position and pec information. The CEM browser arranges the resources in a
shelf based on these attributes.
Shelf Level Display is only available for components under MS, ENET, XA
Core, PM (Series III & Series IV), SLR Shelf-0 and SAM21 containers. Shelf
Level Display can only be viewed when the Physical View is selected from
the Configuration Management panel. When one of the above supported
components is opened in physical view, the shelf and the cards on the shelf
are displayed.
If a level for a resource has cards on two physical sides (for example: front
and back), they are displayed one below the other in the Configuration
Management panel.
All the operations pertaining to a resource like opening a MAP terminal and
executing maintenance commands, filtering the alarms for a particular
resource, and viewing histograms are supported for Shelf Level Display in
physical view.
Figure 3-18
Shelf level display of message switch for DMS
The notes for the nodes are stored locally on the PC. They are not shared
amongst other users and also the note was created when a node was added and
thereafter there was no way to modify the note.
Note: The nodes which are already drilled down and are displayed on the
left hand side of the configuration management area will not be printed.
Figure 3-19
Configuration menu options
Security
As a security measure, when you select either one of the Table Configuration
commands, you must enter a DMS user ID and password at the Default User
Login screen (Figure 3-20) in order to access DMS datafill. When a user logs
in using this interface, the ID and password become the default ID and
password. When the user clicks OK, the Element Manager attempts to verify
the user ID and password on all connected DMS nodes. The Clear Default
Login Id screen clears the default DMS user ID and password being used for
all connected DMS nodes.
Figure 3-20
Default User Login screen
Table Editor
In the Nortel DMS, a data file used to configure a portion of the system is
known as a table. In those tables, a record is known as a tuple. The
information in a table is known as datafill.
The Table Editor performs all table editing functions such as reading, adding,
changing, and deleting tuples. It can create new tuples, and copy and paste
tuple(s) from one DMS node to another. It provides a direct way to edit
datafill without using the MAPCI interface. The Table Editor displays
multiple DMS nodes that the Element Browser is currently monitoring.
Tables for each node are dynamically discovered and displayed when a node
is selected.
Figure 3-21
Table Access Editor
The Table Editor supports viewing and editing of all tables listed in table
CUSTAB except for tables GCALLINT, GCALLTRCE, GHLRTRCE, and
PSTKTRCE.
DMS access is checked each time a node is selected from the drop down box.
The Table drop down box displays the list of tables automatically discovered
when a node is selected.
Figure 3-22
Table Access Editor toolbar
The Table drop down box (Figure 3-23) provides the following capabilities:
• Refresh - performs the same function as Refresh button in the tool bar.
• Select All - selects all the tuples for the table.
• Paste Tuple(s) - adds the tuples copied from the table editor desktop to the
selected table.
• Add Tuple - launches the Add Tuple window. From here the user can
either display or delete tuples.
• Sort - sorts the tuples in alphabetical order when Alphabetical is selected,
or by the order in which they were received from the OMC-S application
on SDM when Default is selected.
• Hide - removes the selected table and all the tuple keys from display.
• Help - displays help for the selected table.
Figure 3-23
Table drop down menu
Displaying tuples
Selecting the Display Tuples option (Figure 3-24) shows the tuples selected
from the table keys list in a tabular format (Figure 3-25). Functionality is
obtained by using the shift key.
Figure 3-24
Display tuples
Figure 3-25
Tuple table
Table datafill can be retrieved automatically through the Table Editor as long
as the SDM load connected to the target node is at least GEM14. When a
resource is in view in the configuration management panel, right clicking on
the resource pops up a menu with Datafill as one of its options (Figure 3-26).
By clicking this menu item, a new instance of the generic table editor is
brought up along with the associated tuple.
Figure 3-26
Pop-up menu view
Another way to start the Table Editor is through the Info window of a
resource.
The header of the tuple table consists of all the field names grouped
appropriately. The key and non-key fields are grouped separately.
Once a tuple is selected, a pop-up menu (Figure 3-27) displays the following
options:
• Add - launches the Add Tuple window.
• Change - launches the Change Tuple window. This menu item is disabled
if multiple tuples are selected.
• Delete - deletes the selected tuple(s).
• Copy - copies the selected tuple(s) to the system clipboard.
• Hide - removes the selected tuple(s) from the tuple table.
• Help - launches the help document for the table. This menu item is
disabled if multiple tuples are selected.
Figure 3-27
Tuple pop-up menu
In addition to the selected tuple pop-up menu, the user has two toolbar
options, File and Edit. Once File is selected, the user can either export (Figure
3-28) the displayed tuples to a specified file, or close the tuple table. Exported
tuple fields are separated by tabs with empty fields represented by a dash.
Tuples can be exported in text format or tab separated files can be opened into
an Excel format. Edit provides the ability to copy selected tuples to the
system clipboard or paste previously copied tuples to the table.
Figure 3-28
Export tuple
Add tuples
Launch the Add Tuple window (Figure 3-29) by selecting the Add Tuple
menu item for a table node from the Table Keys list or by selecting the Add
menu item from the pop-up menu for a tuple in a tuple table window.
The new values entered for the fields are indicated in red.
• Close - cancels the changes made to the fields and closes the window.
• Reset Field - resets the value of the selected field to its original value.
• Reset All - resets the values of all the fields to their original values.
• Add Tuple - sends the add tuple request to the OMC-S application on the
SDM.
Figure 3-29
Add Tuple Window
Changing tuples
The Change Tuple window (Figure 3-30) can be launched by selecting the
Change menu item from the pop-up menu for a selected tuple or by double
clicking on a tuple in a tuple table window.
The current value for a selected field of a tuple displays at the bottom. The
modified values for the fields are indicated in red. Values are not displayed for
folder nodes and fields representing sub-tables.
Figure 3-30
Changing Tuple window
The results of the change tuple operation are displayed in a dialog box and are
also logged to the Table Access Info Log window.
• cTAI_BAD_TUPLE_KEY_ERROR
• cTAI_CM_PROCESSING_ERROR - CM not in sync or image dump in
progress
• cTAI_CM_TRANSMIT_BUFFER_FULL
• cTAI_INVALID_DATA_CHG_REQUESTOR
• cTAI_JOURNAL_FILE_UNAVAILABLE
• cTAI_BUILD_JOURNAL_FILE_FAILURE
Sub-tuples
Sub-tuples are displayed under the folder representing the main tuple. The
procedure to add, change, or delete a sub-tuple is similar to that of a head
tuple. Select the sub-tuple (Figure 3-31) and an Add Tuple window for the
sub-tuple is displayed.
Figure 3-31
Sub-tuple
Figure 3-32
Table Editor File menu
• Info Log - displays the Table Access Info Log window which contains a
log of the table access operations performed along with the results. Add,
change, and delete messages (and results) sent to the OMC-S Element
Manager are logged to this window.
• Close - closes the Table Access Editor window.
Figure 3-33
Table Access Info Log
Help Menu
The Help menu displays an on-line Element Browser User’s Guide and
provides on-line help.
Figure 3-34
Help menu
To configure CCS7 trunks first, use the Add Trunk Group wizard, followed by
the Add CCS7 MTP wizard, followed by the Add CCS7 User Part wizard.
The main interface window (Figure 3-35) provides the user with a list of
wizards.
Figure 3-35
Main wizard interface
The user selects the wizard by double-clicking the list item or selecting the
list item and clicking the Start button. Only one wizard can be started per
browser at any time.
When each wizard is brought up, there are several buttons in each interface that
guide the user. On the bottom of the CM Wizard box, the following buttons
appear:
• Cancel - cancels the wizard
• Back - returns user to the previous frame
• Next - verifies the current entry and continues to the next frame
On the top right area of each frame, sometimes the ‘?’ button is visible to select.
The ‘?’ button brings up on-line help on the DMS table of interest
On the center right area of each frame, sometimes the following button is visible
to select.
• Show Info... - displays related table datafill for the user to identify the
right datafill to enter.
• Hide Info - turns the display off what the ‘Show Info...’ data is displaying.
When entering each frame, sometimes it is required that the wizard retrieve
information from the target node. In these situation, a working progress
indicator is displayed that it is in the process of waiting for completion of this
retrieval. Only upon completion, the wizard will allow to continue.
The user at any time has the option to cancel the wizard or go back to the
previous frame except when in the midst of submitting tuples to the target
node.
When the user selects this wizard, a list of available DMS nodes is displayed
and the user is asked which DMS node is to be added to the trunk group
(Figure 3-36). A list of available DMS nodes displays. After the user selects a
node, the Next button is enabled. The user then clicks Next to continue with
the configuration.
Figure 3-36
Select target node screen
A check box allows a user to select another user ID and password for this
function. The wizard prompts the user for a user ID and password when there
is no default user ID and login was unsuccessful (Figure 3-37).
Figure 3-37
User ID screen
Once the User ID and Password have been verified, the wizard prompts the
user for a CLLI name (Figure 3-38).
Figure 3-38
CLLI prompt
Clicking on the Show Info button displays a list of CLLI names on the target
node. Once a CLLI name is entered, the wizard tries to find the closest match
to the name entered and displays the name in the CLLI list. The user can turn
off the CLLI display by clicking the No Info button. When a name is entered,
the Next button becomes enabled. However, if the name chosen already
exists, the wizard displays a dialog box indicating the problem and prohibits
the user from continuing.
When the user enters a new CLLI name and clicks on the next button, the
following screen appears.
Figure 3-39
Add CLLI tuple
The CLLI values are displayed. The user has the option of changing the
values entered (including the Admin Number). The Admin Number is a
unique number assigned by the wizard. Changing the Admin Number does
not guarantee that the addition of the CLLI will succeed. The ? button brings
up table CLLI documentation.
Once the information is correct, click on the Finish button to datafill table
CLLI or the Next button to continue with the next trunk group configuration.
Note: Currently available wizards cannot pick up from this point later
once the wizard submits the datafill addition.
Clicking on the Next button displays the following screen (Figure 3-40).
Figure 3-40
Add Trunk Group
This screen prompts the user for the trunk group type. The ? button brings up
table TRKGRP documentation.
If the user selects GSM, PET or MAINT as the Trunk Group type, the Finish
button will be disabled. Clicking on the Next button will display Figure 3-41
prompting the user for the direction and CICPOOL for the trunk group.
Figure 3-41
Select the Direction and CICPOOL
If the selected group type is GSM, Figure 3-42 displays and prompts the user
for the Trunk Subgroup Number.
Figure 3-42
Trunk Subgroup Number
If the Trunk Group Type is not PET, the user selects the Finish button to only
datafill up to table CLLI, TRKGRP, and TRKSGRP. If the user later decides
to continue adding trunk members from the trunk group, he selects the Add
Trunks or Add Maintenance Trunks wizard to add members.
If the group type is TL, clicking the Next button directs the user to the
following screen. Figure 3-43 also appears and the indicated steps are
performed.
Figure 3-43
Defining trunk members
This screen prompts the user for the peripheral name, number, circuit, and the
number of timeslots to allocate to members. The ? button brings up table
TRKMEM documentation. The Show Info button brings up the list of
available peripherals.
After the fields are filled, the user can continue selecting other circuits and
peripherals to add. When the user is finished adding trunk members, he clicks
on Finish to start the tuple submission stage; the final step of the wizard.
If the selected Trunk Group Type was MAINT, the wizards directs the user to
enter the card code for this group (Figure 3-44). Once the Next button is
selected, the wizard prompts the user to define the trunk group members.
Note: If a trunk group of type MAINT is added, then the following error
message displays:
CTAI_VERIFY_PROC_ERROR: Datafill TRKSGRP before
TRKGRP.
If this occurs, keep the Add Trunk Group window open and manually add the
tuple to table TRKSGRP with the desired datafill in the MAP interface. Then,
click on the BACK button and submit the tuples to tables TRKGRP and
TRKMEM.
Figure 3-44
Card Code screen
Selecting Trunk Group Type PET prompts the user to add a Signaling Type
for the group (Figure 3-45).
Figure 3-45
Signalling Type screen
Once the Signaling Type is entered, the wizard prompts the user for the
Translation System and Name (Figure 3-46 and Figure 3-47).
Figure 3-46
Translation System screen
Figure 3-47
Translation Name screen
Clicking on the Next button prompts the user for a billing destination number
(Figure 3-48).
Figure 3-48
Billing Destination Number screen
At this point in the wizard, if the Trunk Group Type is PET and the signalling
type is C7UP, the user enters the trunk protocol timer (Figure 3-49).
Figure 3-49
Trunk C7UP Timer screen
Submit tuples
Once tuples are added and configured, they are submitted (Figure 3-50).
Figure 3-50
Submit tuples
Clicking the Submit button begins the addition of each tuple and displays the
addition results. The user cannot go back to the previous frame and cancel the
wizard. If for any reason the submission is unsuccessful, the failure is brought
up in a dialog box and is noted in the log window of the browser. This
information along with a time stamp is stored in the wizard.log file and the
process halts. The user can return to the previous window, enter new data, and
re-submit the tuple.
Keep the Delete Trunk Group window open, and manually delete the
tuple from the table TRKSGRP in the MAP interface. Then, click on the
BACK button and submit the tuples to tables TRKGRP and TRKMEM
for deletion.
After the tuple is deleted from TRKMEM, the user can delete it from table
TRKSGRP within MAPCI and proceed with the trunk group deletion
using the Delete Trunk Group wizard or the Table Editor.
When the Delete Trunk Group wizard begins, it queries for a DMS node. A
list of nodes is available from the pull-down list.
Figure 3-51
Target node screen
Once a node is selected, the Next button becomes active. The user then clicks
Next to continue with the deletion. As with the adding of trunk group wizard,
if the user has not been verified on the target DMS node, the user ID
verification interface (Figure 3-52) is displayed. Once the user enters a user
ID and password, the Next button is enabled. The user then clicks Next to
verify the user ID and password. If successful, the wizard continues with the
deletion. If not, a dialog box (Figure 3-53) will appear indicating
unsuccessful verification. The wizard will not continue to the next interface
until the user ID and password combination is successfully verified.
Figure 3-52
User ID verification
Figure 3-53
User ID verification error
Once identification has been established, the user is asked to select a network
type from a pull-down list (Figure 3-54). The user then clicks Next to
continue.
Figure 3-54
Network type selection
The user is given a pull-down list of CLLI names and selects the CLLI name
of the trunk group to be deleted. Once a CLLI name is selected and data
retrieval completed, the Next button is enabled to allow the user to advance to
the next window. The ? button is displayed to allow the user to bring up on-
line help on table CLLI.
Figure 3-55
Trunk group selection
The wizard directs the user to busy and offline the trunk group (Figure 3-56)
if it has not been offlined already. Only click on Next when the trunk group
has been offlined.
Figure 3-56
Busy/Offline prompt
The user is then presented with the list of tables that the wizard found to
contain the trunk group chosen (Figure 3-57). Clicking the More Info... button
displays the table and keys to be deleted.
Figure 3-57
Submit window
When the user clicks the Submit button, the wizard deletes each tuple and
displays the results of the deletion (Figure 3-58). Once begun, the process
cannot be cancelled.
Figure 3-58
Successful submission
If for any reason the deletion is unsuccessful, the reason for the failure is
brought up in a dialog box and is noted in the log window of the browser. The
submitted tuple and the failure reason along with a time stamp are stored in
the wizard.log file and the process halts. The user can return to the previous
windows, enter new data, and re-submit the tuple for deletion.
Upon successful submission, the Close button is enabled for the user to click
to close the wizard.
Target node
This interface queries the user to select which DMS node the user is
interested in adding trunk group. A list of DMS nodes is available to the user
for selection. When the user selects a node, the ‘Next’ button is enabled. The
user then clicks ‘Next’ to continue with the configuration.
The check box is for a user who has already entered a default user id and
password through the main browser menu but wishes to use another user id
and password for write access to these tables. The default is not to enable this
check box. The user will still be prompted for user id and password if no
default user id and password is set or successfully logged in.
Figure 3-59
Select Target Node
User ID verification
If the user has not enter a user id and password to be verified on the DMS
node selected previously, or if the user wants to enter another user id and
password, this interface will be displayed. Otherwise, the interface in the next
section is displayed.
This interface queries the user for the user id and password to be verified on
the target DMS node. Once the user enters a user id and password, the ‘Next’
button is enabled. The user then clicks ‘Next’ to verify the user id/password.
If successful, the wizard will continue with the configuration. If not, a dialog
box will appear to indicate unsuccessful verification. The wizard will not
continue to the next interface until the user id/password combination is
successfully verified.
Figure 3-60
User ID Verification
Figure 3-61
Select Passport Node
Note: The wizard will not continue to the next interface until the user id/
password combination is successfully verified.
Figure 3-62
Passport User ID Verification
The ‘?’ button is displayed to allow the user to bring up on-line help on table
‘CLLI’.
Figure 3-63
Initial Add Trunk Name Screen shot
By clicking ‘Show Info...’, the list of CLLI names on the target node is
displayed. The user can use this list to determine if the name they chose has
already been used.
Figure 3-64
After clicking the ‘Show Info...’ Button
To hide the info panel that is shown, click the ‘Hide Info’ button.
When the list of CLLI is displayed and by entering a CLLI name, the wizard
will try to find the closest match to the name entered and highlight a name in
the CLLI list. The user has the option to turn off the display of the CLLI list
by clicking ‘No Info’ button. When the name is entered, the ‘Next’ button is
enabled for the user to continue on. However, if the name chosen already
exists, the wizard will pop up a dialog box indicating the problem and will not
allow the user to continue until a unique name is entered.
Figure 3-65
Typing in a CLLI Name
At this point, the user can select the ‘Finish’ button to only datafill table CLLI
and not continue on. Refer to “Submit tuple(s)” on page 3-81, if ‘Finish’ is
selected. Be advised that the currently available wizards cannot pick up from
this point later once the wizard submits the datafill addition.
By selecting the ‘Next’ button, the wizard continues with the next trunk group
configuration.
Figure 3-66
Add Table CLLI entries
At this point, the user can select the ‘Finish’ button to only datafill up to table
CLLI and TRKGRP and not continue on. Refer to “Submit tuple(s)” on page
3-81, if ‘Finish’ is selected. Be advised that the current available wizards
cannot pick up from this point later once the wizard submits the datafill
addition.
Figure 3-67
Adding Trunk Group Type Screen shot
Based on the selection, the wizard will take the user to different screens.
• ‘GSM’ type - the wizard continues to “Add Table TRKSGRP tuple” on
page 3-77.
• ‘PET’ type - the wizard continues to “Add signalling type” on page 3-75.
Figure 3-68
Signalling Type Screen shot
Figure 3-69
Translation System Screenshot
Figure 3-70
Translation Name Screenshot
At this point, the user can select the ‘Finish’ button to only datafill up to table
CLLI and TRKGRP and not continue on. Refer to “Submit tuple(s)” on page
Figure 3-71
Billing DN Screenshot
At this point if the trunk group type is not ‘PET’, the user can select the
‘Finish’ button to only datafill up to table CLLI, TRKGRP, and TRKSGRP.
Refer to “Submit tuple(s)” on page 3-81, if ‘Finish’ is selected. If the user
later decides to continue adding trunk members from the trunk group added,
the user can select the ‘Add Trunks’ or ‘Add Maintenance Trunks’ wizard to
add members.
If the group type is not ‘PET’, clicking the ‘Next’ button will direct the user
to “Passport node name” on page 3-69.
Figure 3-72
Adding Table TRKSGRP Screenshot
Figure 3-73
Trunk Protocol Screenshot
At this point, the user can select the ‘Finish’ button to only datafill up to table
CLLI, TRKGRP, and TRKSGRP. Refer to “Submit tuple(s)” on page 3-81, if
‘Finish’ is selected. If the user later decides to continue adding trunk
members from the trunk group added, the user can select the ‘Add Trunk
Members’ wizard to add members.
Figure 3-74
Trunk C7UP Timer Name Screen shot
The ‘Show Info...’ button is available to bring the list of MGW Id’s and a list
of Carrier Numbers on the selected MGW is available for use.
After the entries are filled, the user has the option to continue selecting other
circuit and peripheral to add members by clicking ‘Next’. This will bring up
the same interface to add additional members on a different circuit and/or
peripheral. When the user is finished with adding trunk members, the user
selects ‘Finish’ to start the tuple submission stage; the final step of the wizard.
Before the next frame can be brought up when the ‘Next’ or ‘Finish’ button is
selected, the wizard will verify the number of timeslots on the selected circuit
is available.
Figure 3-75
Add Table TRKMEM Tuples
Submit tuple(s)
In this screen, the user is given the tables that the tuples will be added. The
‘More Info...’ button is available to list the tuple(s) to be added.
Figure 3-76
Initial Submit Tuple Screenshot
By clicking the ‘Submit’ button, the wizard starts the addition of the each
tuple and displays the result of the addition. At this point, the user cannot go
back to the previous frame or cancel the wizard. When all tuples have been
submitted, the ‘Close’ button is enabled to close the wizard.
If for any reason a tuple addition is unsuccessful, the reason for the failure is
displayed in a dialog box and also noted in the log window of the browser.
The submitted tuple and the failed reason along with the time stamp are also
stored in the ‘wizard.log’ file. The wizard will not continue with the submit
operation. The user has the ability to traverse back to the window that
generates the tuple that failed and re-enter different data and submit the tuple
to the target element again. The user will not be able to traverse back beyond
the window that generates the failed tuple.
Figure 3-77
Completion of Submit Tuple
Target node
This interface queries the user to select the DMS node the user is interested in
adding to a trunk group. A list of DMS nodes is available to the user for
selection. When the user selects a node, the ‘Next’ button is enabled. The user
then clicks ‘Next’ to continue with the configuration.
The check box is for user who has already entered a default user id and
password through the main browser menu but wish to use another user id and
password for write access to these tables. The default is not to enable this
check box. The user will still be prompted for user id and password if no
default user id and password is set or successfully logged in.
Figure 3-78
Select Target Node
User ID verification
If the user has not enter a user id and password to be verified on the DMS
node selected previously or wish to enter another user id and password, this
interface will be displayed. Otherwise, the interface in the next section is
displayed.
This interface queries the user for the user id and password to be used to
verify on the target DMS node. Once the user enters a user id and password,
the ‘Next’ button is enabled. The user then clicks ‘Next’ to verify the user id/
password. If successful, the wizard continue with the configuration. If not, a
dialog box will appear to indicate unsuccessful verification. The wizard will
not continue to the next interface until the user id/password combination is
successfully verified.
Figure 3-79
User ID Verification
Figure 3-80
Select Passport Node
Figure 3-81
Passport User ID Verification
Figure 3-82
Select Trunk Subgroup
‘Show Info...’ button is available to bring the list of MGW Id’s and a list of
Carrier Numbers on the selected MGW available for use.
After the entries are filled, the user has the option to continue selecting other
circuit and peripheral to add members by clicking ‘Next’. This will bring up
the same interface to add additional members on a different circuit and/or
peripheral. When the user is finished with adding trunk members, the user
selects ‘Finish’ to start the tuple submission stage; the final step of the wizard.
Before the next frame can be brought up when the ‘Next’ or ‘Finish’ button is
selected, the wizard will verify the number of timeslots on the selected circuit
is available.
Figure 3-83
Add Table TRKMEM Tuples
Submit tuple(s)
In this screen, the user is given the tables that the tuples will be added. ‘More
Info...’ button is available to list the tuple(s) to be added.
By clicking ‘Submit’ button, the wizard starts the addition of the each tuple
and displays the result of the addition. At this point, the user cannot go back
to the previous frame or cancel the wizard. When all tuples have been
submitted, the ‘Close’ button is enabled to close the wizard.
If for some reason any tuple addition is unsuccessful, the reason of the failure
is brought up in a dialog box and also noted in the log window of the browser.
The submitted tuple and the failed reason along with the time stamp are also
stored in the ‘wizard.log’ file. The wizard will not continue with the submit
operation. The user has the ability to traverse back to the window that
generates the tuple that failed and re-enter different data and submit the tuple
to the target element again. The user will not be able to traverse back beyond
the window that generates the failed tuple.
The MGWs are provisioned within the MSC by data filling relevant
information in the table GWINV. The ‘ADD R4 MGW’ Wizard is used to
accomplish the above.
The following gives a step by step procedure to provision a MGW using the
Wizard tool (snapshots of the screens that the user will be prompted for when
adding the MGW information to the table GWINV is added here for clarity):
• Target Node - This interface queries the user which DMS node the user is
interested in adding the MGW. The user will need to select a node from
the list of DMS nodes provided by the Wizard tool.
Figure 3-84
Target Node Screenshot
• User ID Verification - This interface queries the user for the User ID and
password to be used to verify on the target DMS node.
Figure 3-85
User ID/Password Verification Screenshot
• Passport Node Name - This interface queries the user which Passport
node the user is interested in. The user needs to select from the list of
Passport nodes provided by the Wizard tool.
Figure 3-86
Passport Node Name
• Passport User ID Verification - This interface queries the user for the
user ID and password to be used to verify on the target Passport node.
Figure 3-87
Passport User ID Verification
• Add GWINV table tuple - The user is prompted to select the Node
Name, Node Number, MID, PROTOCOL, TRANS and INACT to datafill
a tuple in the table GWINV. The user can continue to datafill another
tuple in the table by just clicking on Next. When the user selects Finish,
the submission stage of the tuples start.
Figure 3-88
Add GWINV Table Tuple
• Submit Tuple - In this screen, the user is given the table the tuple will be
added. By clicking the Submit button, the wizard starts the addition of the
tuple(s) to the table and displays the result of the addition.
For reference and added insight provided in Table 3-5 are a couple sample
tuples for table GWINV.
Note: The data is fictitious and not based on any real customer datafill.
Table 3-5
Table GWINV Datafill
The ‘Delete MGW’ wizard is used to remove the MGW datafill from table
GWINV. The following shows the sequence of screens that the user will
encounter while executing the wizard:
• Target Node - This interface queries the user which DMS node the user is
interested in removing MGW. A list of DMS nodes is available to the user
for selection.
Figure 3-89
Select a Target Node
• User ID Verification - This interface queries the user for the User ID and
Password to be sued to verify on the target DMS node.
Figure 3-90
User ID Verification
• Submit Tuple - In this interface, the user is given the table that the tuple
will be removed from.
Figure 3-92
Submit Tuple
This wizard audits the DMS datafill against the MGW’s datafill and shows all
the inconsistencies in TRKMEM and GWINV tables. The user selects the
DMS that he wants to audit first and then need to select a list of passport
nodes. The audit will be accurate if the user can select the list of all the
passport nodes that the DMS is connected to.Following will give a snapshot
of the screens that the user will be prompted for to audit DMS BICN datafill.
The following sections will describe the sequence of frames the user will
encounter.
Target node
This interface queries the user which DMS node the user is interested in
auditing. A list of DMS nodes is available to the user for selection. When the
user selects a node, the ‘Next’ button is enabled. The user then clicks ‘Next’
to continue with the configuration.
The check box is for user who has already entered a default user id and
password through the main browser menu but wish to use another user id and
password for write access to these tables. Default is not to enable this check
box. The user will still be prompted for user id and password if no default
user id and password is set or successfully logged in.
Figure 3-93
Select Target Node
User ID verification
If the user has not enter a user id and password to be verified on the DMS
node selected previously or wish to enter another user id and password, this
interface will be brought up. Otherwise, the interface in the next section is
brought up. This interface queries the user for the user id and password to be
used to verify on the target DMS node. Once the user enters a user id and
password, the ‘Next’ button is enabled. The user then clicks ‘Next’ to verify
the user id/password. If successful, the wizard continue with the
configuration. If not, a dialog box will appear to indicate unsuccessful
verification. The wizard will not continue to the next interface until the user
id/password combination is successfully verified.
Figure 3-94
User ID Verification
Figure 3-95
Select Passport Node
Figure 3-96
Passport User ID Verification
MGW audit
This interface audits all the MGW datafill in TRKMEM and GWINV tables.
TRKMEM table inconsistencies can be seen by clicking ‘Show trkmem
inconsistencies’ button and GWINV table inconsistencies can be seen by
clicking ‘Show GWINV inconsistencies’. The inconsistencies in these tables
mean that datafill for those tuples on DMS is not right.
Figure 3-97
MGW Audit
The ‘Add CFIWF Trunk Group’ wizard is used to provision the CFIWF
trunks. This wizard queries the user for an XPM/SPM and a MGw to setup
CFIWF trunks. The pair trunk members are setup and then added to the table
CFIWFMAP.
The following gives a step by step procedure to provision the CFIWF trunk
groups and its members.
• Target Node - This interface displays a list of available DMS nodes to the
user.
Figure 3-98
Selecting a Target MSC
• User ID Verification - This interface queries the user for a user ID and
password that is verified on the target DMS node.
Figure 3-99
DMS Login
• Passport User ID Verification - This interface queries the user for the
user ID and password to access the selected Passport node.
Figure 3-101
Passport Login
• Defining a CIWF CLLI - This interface prompts the user for a CLLI
name for the CIWF side.
Figure 3-102
Defining a CIWF CLLI
• Add Table CLLI Tuple (CIWF side) - In this interface, the default
values that will be added to the table CLLI is displayed. The user can
either modify them (if needed) or continue with the trunk group
configuration by clicking on the NEXT button.
Figure 3-103
Add Table CLLI entries
• Add Table TRKGRP Tuple (CIWF side) - This interface prompts the
user to enter the trunk group type to configure. The default trunk group
for CFIWF trunks is “BICNCFIWF”.
Figure 3-104
Define Trunk Group Type
• Add Table TRKSGRP Tuple (CIWF side) - This interface prompts the
user for the trunk subgroup number to use.
Figure 3-105
Defining Trunk Subgroup Number
Figure 3-106
Defining Table TRKMEM entries
• Defining a MIWF CLLI - This interface prompts the user for a CLLI
name for the MIWF side.
Figure 3-107
Define MIWF CLLI
• Add Table CLLI Tuple (MIWF side) - In this interface, the default
values that will be added to the table CLLI is displayed. The user can
either modify them (if needed) or continue with the trunk group
configuration by clicking on the NEXT button.
Figure 3-108
Add Table CLLI entries
• Add Table TRKGRP Tuple (MIWF side) - In this interface, the user is
prompted for the trunk group type to configure. The default trunk group
for CFIWF trunks is “BICNCFIWF”.
Figure 3-109
Adding Trunk Group Type
• Add Table TRKSGRP Tuple (MIWF side) - This interface prompts the
user to enter the trunk sub-group number.
Figure 3-110
Defining trunk sub-group number
• Add Table TRKMEM Tuples (MIWF side) - This interface allows the
user to define the TRKMEM table entries. The user selects a MGW name,
MGW number, Carrier Number and Number of timeslots to add.
Figure 3-111
Defining table TRKMEM entries
• Add Table CFIWFMAP Tuple - This interface allows the user to specify
the “FROM GROUP” CLLI for table CFIWFMAP. The options displayed
in the pull-down menu are the CIWF and MIWF CLLIs that the user
selected.
Figure 3-112
Configuring CFIWFMAP table tuple
• Submit Tuples - This interface displays the tables that will be modified.
By clicking the ‘Submit’ button, the wizard starts the addition of each
tuple and displays the result of the addition.
Figure 3-113
Submit Tuples display
Figure 3-114
Submitting Tuples
Figure 3-115
Completion of Submit Tuples
GRPKEY GRPINFO
Table 3-7
Table TRKSGRP Datafill
Table 3-8
Table TRKMEM Datafill
MGW0CIWF1 1 0 DTC 1 0 1
MGW0CIWF1 2 0 DTC 1 0 2
MGW0MIWF1 1 0 MGW 0 2 1
MGW0MIWF1 2 0 MGW 0 2 2
Table 3-9
Table CFIWFMAP Datafill
FROMGRP TOGRP
MGW0CIWF1 MGW0MIWF1
Once all the migrated T1s are backed-out, the CFIWF trunks are deleted. The
‘DELETE CFIWF TRUNK GROUP’ wizard is used to delete the CFIWF trunk
groups and its members. The following describes the sequence of GUI
interfaces that the user will encounter while executing the wizard:
• Target Node - This interface queries the user which DMS node the user is
interested in removing the CFIWF trunks.
Figure 3-116
Selecting a Target Node
• User ID Verification - This interface queries the user for the User ID and
Password to be used to verify on the target node.
Figure 3-117
User ID Verification
• INB Prompt Message - This interface prompts the user to INB the
selected trunk group.
Figure 3-119
INB prompt message
• Submit Tuples - This interface displays the tables that will be modified.
Figure 3-120
Submit tuples display
By clicking the ‘Submit’ button, the wizard starts the deletion of each tuple
and displays the result of the action.
Figure 3-121
Completion of Submit Tuples
Each of these approaches has a common set of interfaces at the beginning and
at towards the end of the migration - the interfaces common to these
approaches are explicitly indicated as such.
• Target Node - In this interface the user is prompted to select a DMS node.
Figure 3-122
Select a target MSC
• User ID Verification - This interface queries the user for the User ID and
Password that is verified on the target DMS node. Once the user enters a
User ID and Password, the ‘Next’ button is enabled. The user then clicks
‘Next’ to authenticate the User ID and Password. If successful, the wizard
continues with the provisioning. If not, a dialog box is displayed to
Figure 3-124
Trunk Migration Strategy Selection
Note: If there are PSTN trunks and BSS trunks in a given remote market,
the PSTN trunks are migrated first, followed by the BSS trunks. This is
due to the backhaul requirements of the PSTN verses that of the Ater
interface.
Figure 3-125
Select trunk group
The user is given the option to select all the members or a range of members
in the selected trunk group.
Figure 3-126
Select the trunk members
Figure 3-127
Select the range of members
Based on the tuples retrieved from the table C7TRKMEM, identify the trunk
member CLLI + member number of each selected trunk.
• MGW Circuit Selection - In this interface, the user is asked to choose the
carrier that needs to be migrated to the desired Passport/MGW/Brag
combination. The following shows the sequence of screens that the user
will encounter.
In this screen, the user is prompted to select the carrier he wishes to migrate.
Figure 3-128
Select the carrier to be migrated
This screen below shows the TRKMEMs that will be migrated based on the
carrier selected earlier. This screen will be seen when you click on the “Show
TRKMEMs” check box.
Figure 3-129
Carrier circuits that will be migrated is displayed
In this screen, the user is asked to select the Passport to which the circuits are
to be migrated.
Figure 3-130
Select the Passport
Figure 3-131
Login to the Passport
In this screen, the user is asked to select the MGW to which the circuits are to
be migrated.
Figure 3-132
Select the VSP
In this screen, the user is asked to select the brag the circuits need to be
migrated to. Please note that only the active brags on the MGW are displayed
by the wizard. The type of the brag (GSM, PET etc) is also displayed for
reference.
Figure 3-133
Select the Brag
follow the sequence of steps shown under step 6. When done, click on the
‘NEXT’ button.
Figure 3-134
Carrier - Passport/MGW/Brag combination displayed
Figure 3-138
Tuples ready to be submitted (tuples displayed)
Figure 3-139
Submitting Tuples
Figure 3-140
Submitting Tuples
Figure 3-141
Submit completed successfully
Figure 3-143
DMOPRO filename
Once the filename are specified, the DMOPRO files will be generated.
Figure 3-144
Example of DMOPRO file generated
TABLE C7TRKMEM
QUIT
TABLE TRKMEM
QUIT
TABLE C7TRKMEM
QUIT
Once the DMOPRO files are generated, the migration can be performed at a
later time. This DMOPRO approach was being implemented to gain time for
the migration activity during the migration window time frame. If DMOPRO
based Migration is in progress, you are done with the process of collecting the
DMOPRO files. Please do not perform any of the steps mentioned below.
• Bring circuits back into service - The user then brings a couple of
individual circuits into service and verifies if they function correctly on
the new packet fabric. The CIC Isolation Tool is used to test individual
circuits on the new fabric. This tool is used to verify if the migration
worked correctly. Once the individual circuits pass the basic call testing,
the user brings all the circuits into service. Once the circuits are RTSed,
please ensure they come into service at the MAP level.
Note: The CIC Isolation Tool can be used only if T1 by T1 migration is
performed. If the whole BSC is migrated (when the BSC does not support
multiple transcoders), we do not use the tool to verify if the migration is
successful.
A sample of the table C7TRKMEM and table TRKMEM datafill are shown
here for reference.
Pre-migration
Table 3-10
Table C7TRKMEM before migration
MEMKEY CIC
BSSP1CP1 1 1
BSSP1CP1 2 2
BSSP1CP1 3 3
Table 3-11
Table TRKMEM before migration
BSSP1CP 1 0 DTC 0 0 1
BSSP2CP 1 0 DTC 0 1 1
BSSP1CP 9 0 DTC 0 0 9
Post-Migration
Table 3-12
Table TRKMEM after migration
BSSP1CP 1 0 MGW 0 0 1
BSSP2CP 1 0 MGW 0 1 1
BSSP1CP 9 0 MGW 0 0 9
Table 3-13
Table C7TRKMEM after migration
MEMKEY CIC
BSSP1CP1 1 1
BSSP1CP1 2 2
BSSP1CP1 3 3
The following sections will describe the sequence of frames the user will
encounter.
Target node
This interface queries the user which DMS node the user is interested in
adding trunk group. A list of DMS nodes is available to the user for selection.
When the user selects a node, the ‘Next’ button is enabled. The user then
clicks ‘Next’ to continue with the configuration.
The check box is for user who has already entered a default user id and
password through the main browser menu but wish to use another user id and
password for write access to these tables. Default is not to enable this check
box. The user will still be prompted for user id and password if no default
user id and password is set or successfully logged in.
User ID verification
If the user has not entered a user id and password to be verified on the DMS
node selected previously or wish to enter another user id and password, this
interface will be brought up. Otherwise, the interface in the next section is
brought up. This interface queries the user for the user id and password to be
used to verify on the target DMS node. Once the user enters a user id and
password, the ‘Next’ button is enabled. The user then clicks ‘Next’ to verify
the user id/password. If successful, the wizard continue with the
configuration. If not, a dialog box will appear to indicate unsuccessful
verification. The wizard will not continue to the next interface until the user
id/password combination is successfully verified.
The ‘?’ button is displayed to allow the user to bring up on-line help on table
‘CLLI’.
By clicking ‘Show Info...’, the list of CLLI names on the target node is
displayed. The user can use this list to determine if the name he/she chooses
has not already been used.
To hide the info panel that is shown, click the ‘Hide Info’ button.
When the list of CLLI is displayed and by entering a CLLI name, the wizard
will try to find the closest match to the name entered and highlight a name in
the CLLI list. The user has the option to turn off the display of the CLLI list
by clicking ‘No Info’ button. When the name is entered, the ‘Next’ button is
enabled for the user to continue on. However, if the name chosen already
exists, the wizard will pop up a dialog box indicating the problem and will not
allow the user to continue until a unique name is entered.
By selecting the ‘Next’ button, the wizard continues with the next trunk group
configuration.
At this point, the user can select the ‘Finish’ button to only datafill up to table
CLLI, TRKGRP, TRKSGRP, ISUPDEST, TRKOPTS and GBCIC.
Target node
This interface queries the user which DMS node the user is interested in
deleting trunk group. A list of DMS nodes is available to the user for
selection. When the user selects a node, the ‘Next’ button is enabled. The user
then clicks ‘Next’ to continue with the deletion. As with the adding of trunk
group wizard, if the user has not been verified on the target DMS node, the
user id interface described in “4.1.2.2 User ID Verification” section is
displayed. By avoiding duplicating the same description here, please refer
that section for more information.
The ‘?’ button is displayed to allow the user to bring up on-line help on table
‘CLLI’.
Submit tuple
The user is presented with the list of tables that the wizard found to contain
the trunk group chosen. By clicking the ‘More Info...’ button displays the
table and keys to be deleted.
By clicking ‘Submit’ button, the wizard starts the deletion of the each tuple
and displays the result of the deletion. At this point, the user cannot go back
to the previous frame and cancel the wizard. When all tuples have been
submitted, the ‘Close’ button is enabled to close the wizard.
If for some reason any deletion is unsuccessful, the reason of the failure is
brought up in a dialog box and also noted in the log window of the browser.
The submitted tuple and the failed reason along with the time stamp are also
stored in the ‘wizard.log’ file. The wizard will not continue with the submit
operation. The user has the ability to traverse back to the window that
generates the tuple that failed and re-select different data and submit them to
the target element again.
Target node
This interface queries the user which DMS node the user is interested in
adding trunk group. A list of DMS nodes is available to the user for selection.
When the user selects a node, the ‘Next’ button is enabled. The user then
clicks ‘Next’ to continue with the configuration.
The check box is for user who has already entered a default user id and
password through the main browser menu but wish to use another user id and
password for write access to these tables. Default is not to enable this check
box. The user will still be prompted for user id and password if no default
user id and password is set or successfully logged in.
User ID verification
If the user has not enter a user id and password to be verified on the DMS
node selected previously or wish to enter another user id and password, this
interface will be brought up. Otherwise, the interface in the next section is
brought up. This interface queries the user for the user id and password to be
used to verify on the target DMS node. Once the user enters a user id and
password, the ‘Next’ button is enabled. The user then clicks ‘Next’ to verify
the user id/password. If successful, the wizard continue with the
configuration. If not, a dialog box will appear to indicate unsuccessful
verification. The wizard will not continue to the next interface until the user
id/password combination is successfully verified.
The ‘?’ button is displayed to allow the user to bring up on-line help on table
‘C7RTESET’.
‘Show Info...’ button is available to bring the list of MGW Id’s available on
the selected Passport.
After the entries are filled, the user has the option to continue selecting other
Media gateways to add by clicking ‘Next’. This will bring up the same
interface to add additional Media gateways. When the user is finished with
adding media gateways, the user selects ‘Finish’ to start the tuple submission
stage; the final step of the wizard.
Submit tuple(s)
In this screen, the user is given the table that the tuples will be added. ‘More
Info...’ button is available to list the tuple(s) to be added.
By clicking ‘Submit’ button, the wizard starts the addition of the each tuple
and displays the result of the addition. At this point, the user cannot go back
to the previous frame or cancel the wizard. When all tuples have been
submitted, the ‘Close’ button is enabled to close the wizard.
If for some reason any tuple addition is unsuccessful, the reason of the failure
is brought up in a dialog box and also noted in the log window of the browser.
The submitted tuple and the failed reason along with the time stamp are also
stored in the ‘wizard.log’ file. The wizard will not continue with the submit
operation. The user has the ability to traverse back to the window that
generates the tuple that failed and re-enter different data and submit the tuple
to the target element again. The user will not be able to traverse back beyond
the window that generates the failed tuple.
The following sections will describe the sequence of frames the user will
encounter.
Target node
This interface queries the user which DMS node the user is interested in
removing MGWPOOL. A list of DMS nodes is available to the user for
selection. When the user selects a node, the ‘Next’ button is enabled. The user
then clicks ‘Next’ to continue with the configuration.
The check box is for user who has already entered a default user id and
password through the main browser menu but wish to use another user id and
password for write access to these tables. Default is not to enable this check
box. The user will still be prompted for user id and password if no default
user id and password is set or successfully logged in.
User ID verification
If the user has not enter a user id and password to be verified on the DMS
node selected previously or wish to enter another user id and password, this
interface will be brought up. Otherwise, the interface in the next section is
brought up. This interface queries the user for the user id and password to be
used to verify on the target DMS node. Once the user enters a user id and
password, the ‘Next’ button is enabled. The user then clicks ‘Next’ to verify
the user id/password. If successful, the wizard continue with the
configuration. If not, a dialog box will appear to indicate unsuccessful
verification. The wizard will not continue to the next interface until the user
id/password combination is successfully verified.
Submit tuple
In this screen, the user is given the table that the tuple will be removed form.
‘More Info...’ button is available to list the tuple to be removed.
By clicking ‘Submit’ button, the wizard starts the deletion of the tuple and
displays the result of the deletion. At this point, the user cannot go back to the
previous frame or cancel the wizard. When the tuple has been submitted, the
‘Close’ button is enabled to close the wizard.
If for some reason any tuple deletion is unsuccessful, the reason of the failure
is brought up in a dialog box and also noted in the log window of the browser.
The submitted tuple and the failed reason along with the time stamp are also
stored in the ‘wizard.log’ file. The wizard will not continue with the submit
operation. The user has the ability to traverse back to the window that
generates the tuple that failed and re-enter different data and submit the tuple
to the target element again. The user will not be able to traverse back beyond
the window that generates the failed tuple.
Recovery Wizard
This wizard resubmits the datafill. Whenever a wizard submits datafill
changes to DMS, a recovery file will be created with all the tuples. The file
will also have information on whether the tuple has been successfully
submitted or not. The Recovery wizard lists the created recovery files. When
a file is selected this recovery wizard will submit all the unsuccessful tuples in
that file.
In the middle of the migration procedure, if some unforeseen issue arises and
interrupts the datafill process, the ‘Recover’ wizard is used to resubmit the
datafill. This wizard recovers if any wizard failed to submit the tuples
successfully.
The Recover wizard displays a list of recover files created. The Recover
wizard provides two radio buttons: Lexicographical and Chronological. The
user can sort the "Existing Recovery Filenames" either Lexicographically
(Alphabetically) or Chronological (in order of time stamp).Once a recover file
is selected by the user, this wizard will resubmit all the unsuccessful tuples in
that recover file.
The following gives the sequence of GUI interfaces the user will encounter
while executing the Recover wizard:
• Recovery File - This interface will list all the recover files that the user
can select.
Figure 3-145
Select a file to recover
• Target User ID Verification - This interface queries the user for the User
ID and Password to be sued to verify on the target DMS node. The DMS
node or the target node is picked up from the recover file.
Figure 3-146
User ID Verification
• Submit Tuple - In this interface, the user is given the table that the tuple
will be removed from or added to. By clicking the ‘Submit’ button, the
wizard starts add/delete of the tuple and displays the result of the addition/
deletion.
Fallback Wizard
During an upgrade this wizard can be used to fallback any datafill. Whenever
a wizard submits datafill changes to DMS, a fallback file will be created with
all the tuples. The Fallback wizard lists all of the fallback files created. When
a file is selected this wizard will submit all the fallback tuples in that file.
The Fallback wizard is used to fallback any wizard datafill after the datafill
has been submitted. During the pre-migration datafill process and migration
process, when a wizard submits datafill changes to the DMS, a fallback file is
created will all the tuples.
The Fallback wizard lists all the fallback files created. The Fallback wizard
provides two radio buttons: Lexicographical and Chronological. The user can
sort the "Existing Recovery Filenames" either Lexicographically
(Alphabetically) or Chronological (in order of time stamp). When the user
selects a fallback file, this wizard will fallback on all the tuple changes in the
fallback file.
The following sections describe the sequence of frames the user will
encounter while using the Fallback wizard.
• Fallback File - This interface will list all the fallback files that the user
can select. The user selects a file from the list.
Figure 3-147
Fallback file
• Target User ID Verification - This interface queries the user for the User
ID and Password to be used to verify on the target DMS node. The DMS
node or the target node is picked up from the fallback file.
Figure 3-148
User ID Verification
• Submit Tuple - In this interface the user is given the table that the tuple
will be removed from or added to. By clicking on the ‘Submit’ button, the
wizard starts add/delete of the tuple and displays the result of the addition/
deletion.At this point, the user cannot cancel the fallback wizard.
Figure 3-149
Submit tuples
Figure 3-150
Submit Tuples (tuples displayed)
Figure 3-151
Fallback successfully completed
Tool. Once the basic call testing passes, all the circuits can be brought into
service. Once all the circuits are RTSed, please ensure they come into
service at the MAP level.
MDM 3
If the CEM application is configured in Server mode and an MDM is co-
resident on the CEM Server, it is possible to launch some MDM applications
from the CEM GUI. This applies to CEM when it is by itself or when it is
collocated with W-NMS.
In order for the MDM to show up in the CM panel of the CEM Browser, the
MDM needs to be configured as a CEM slice on the CEM Server. When the
user right-clicks an MDM node in the CEM Browser CM panel, a drop-down
menu appears with (node-specific) maintenance commands in the top half of
the menu, and MDM launching commands in the bottom half of the menu
(i.e. "Launch MDM toolset"). The user then selects the MDM application
they would like to launch, and the application will become available.
There are some special considerations that need to be addressed in order for
the MDM launch to work correctly:
1. The MDM applications are unix-based only. If the CEM Browser used to
launch the MDM resides on a Windows PC, then an active X-Server of
some sort is required on the PC to display the unix applications. After the
MDM application launch, the application will show up automatically in
the Xserver.
2. The CEM Server must have privileges to export a DISPLAY to the target
unix environment (X-server on PC, or the SUN workstation)
3. The DISPLAY setting of the target unix environment must be set for a
DISPLAY that ends in ":0.0".
Figure 3-152
Launch MDM Toolset
The MDM Configuration tool is launched from the main server by using the
following steps:
1. Access the server’s bin directory from the main server. For example:
/opt/nortel/data/coreEMS/nodes/server/bin
2. Set the display to sh;
3. Run ./MDMConfig to start the GUI application of the MDM Configuration
tool.
4. Edit the configuration data.
5. Save the changes. CEM will activate the new configuration within 30
seconds after it has been saved.
Note 1: A restart is not required, but the MDM Configuration tool has the
‘-restart’ command line option available to restart CEM processes when
needed.
Figure 3-153 is an example of the MDM Configuration Tool for the MDM
Device Manager.
Figure 3-153
MDM Configuration Tool
In Figure 3-153, the first column (Exclude), the fourth (Group Type), the fifth
(Group Name), and the sixth (Application Type), are editable. The last
column (Active), displays whether the NE displayed is currently a MDM
managed element.
Table 3-14 lists the commands necessary to run a command line MDM
Configuration Tool.
Table 3-14
Command line MDM Configuration Tool
Command Description
./MDMConfig -listNodes [-nickName Lists all the MDM managed EM type nodes,
<nickName>] which allows excluding, including, grouping, or
renaming.
—sheet 1 of 2—
Table 3-14
Command line MDM Configuration Tool (continued)
Command Description
./MDMConfig -exclude [-nickName Excludes a node from MDM managed nodes list.
<nickName>] <elementType>
<elementName>
./MDMConfig -restart [-noprompt] - Restarts the CEM applications once the new
nickName <nickName> entries are saved.
—sheet 2 of 2—
Use the command option [-nickName <nickName>] only when there are
multiple MDM Device Manager nodes installed on the server.
Note: Re-start the Device Manager and the Object Manager processes to
activate all configuration changes made using the above commands.
In the MDM Configuration tool, the MDM monitored nodes lists are not
guaranteed to automatically update. To ensure update of the nodes lists,
manually issue the following command:
./MDMConfig -listNodes
This command retrieves an updated MDM monitored nodes list from the
MDM Servers.
Note: The remote MDM feature uses remsh. Activate this command
before launching MDM remotely.
Automated scripts
Follow Procedure 3-1 to configure automated scripts for remote MDM
launch.
Procedure 3-1
Configure automated scripts
Step Action
1 On the CEM Sun server, use the configCEMS tool to set the device type
to MDM. Enter the IP address of the remote machine running the MDM in
the Target SDM/MDM ip address field.
Note: When running the MDM on the same server as the OMC-S, enter
127.0.0.1 in the Target SDM/MDM ip address field.
3 Transfer the script to the remote MDM host machine using E-mail, ftp, or
tar on to floppy.
4 Once the script is transferred, login to the remote MDM host system as
root, and cd to the directory containing the remoteMDMscripts.
6 Enter:
<directory path>/remoteMDMscripts
where <directory path> equals the results from the pwd command.
7 End of procedure.
Note: The script needs to be executed only once and can be run from any
directory the administrator chooses. /tmp is an acceptable location.
Step Action
3 Create a user nortel if one doesn’t exist. In the home directory of user
nortel, create a file named .rhosts with the following line as content:
+ <hostname> nortel
4 On the OMC-S Server, use the configCEMS tool to set the device type to
MDM. Enter the IP address of the remote machine running the MDM in
the Target SDM/MDM ip address field.
5 When running the MDM on the same server as the OMC-S, enter
127.0.0.1 in the Target SDM/MDM ip address field.
7 End of procedure.
Fault management 4
The Fault Management (FM) function displays logs of alarm, or fault events,
that occur within the network usually within a switch node. These alarms, or
events, may have an impact on the overall service of the network element. To
aid you in correcting any problems with a network element, the Fault
Management function gives you information about the element so you can
perform further maintenance operations.
To help manage the alarms or events that occur within the network, Fault
Management provides the following capabilities:
• displays alarms for a specific switch node. When a repeated alarm occurs
for the same problem and the same resource, the most current alarm is
shown. The previous alarms are kept as cleared alarms.
• displays a time-based histogram of alarm activity for time periods of 1 to
30 day. By default, the retention period is 30 days for uncleared alarms
and 7 days for cleared alarms.
• displays alarms by alarm type (active, cleared, manual, and/or cleared
manual alarms)
• displays alarms by selected severities (Critical, Major, Minor, Warning,
unknown, information or any combination)
• displays the element color to reflect the current alarm status
• displays alarms for specific filters, and causes specific actions to happen
• provides alarm notifications as they occur within the underlying resources
• exports alarm data to file
• prints alarm data to paper
• provides filter criteria for alarms
• provides online help for alarms
• provides actions triggered by alarms
The Element Manager may show alarms that are not shown in other systems,
such as MAPCI.
WARNING:
There is a known issue in respect to troubleshooting time
synchronization issues. Alarm information sent to either
CEM or W-NMS may not be in synchronization with what
can be found in MAPCI on the MSC.
Note: The CCA alarms generated after CEM applications start will be
displayed in the CEM GUI. After a restart of CEM applications, the
highest level of CCA alarms will be displayed as TMN600 in the CEM
GUI.
The Histogram and its interface is used to control the time span of displayed
alarms.
The Alarm box is used to display the fields of the alarms to display, and the
order to display individual alarms. The Fault menu and the Fault toolbar work
together as the interface to accomplish this.
The FM window provides several ways for you to control and refine the list of
alarms displayed in the alarm list scroll box (see Figure 4-1) and the
histogram view.
Figure 4-1
Fault Management window - stand-alone mode
To change the width of any column, place the arrow over the right edge of the
heading until a double-arrow appears. Then drag the edge to resize the
column.
To sort the Alarm list by any of the columns, double-click in the heading of
that column. An arrow appears showing whether it is sorted in ascending or
descending order. To change the order, double-click in the heading again.
Fault menu 4
Figure 4-2 identifies the options available in the Fault menu. The Fault menu
allows you to perform the following:
• manipulate how alarm and state information about MSC/HLR elements is
displayed
• manually acknowledge and clear alarm
• narrow down the field of which alarms to display
Figure 4-2
Fault menu
To access the commands of the Fault menu without the use of the mouse,
press F10.
The toolbar display boxes and buttons can be grouped in seven classes.
Figure 4-3
Toolbar - stand-alone mode
Figure 4-4
Toolbar - server mode
Table 4-1
Toolbar icon descriptions
—sheet 1 of 3—
Table 4-1
Toolbar icon descriptions
—sheet 2 of 3—
Table 4-1
Toolbar icon descriptions
Subtree Filter Subtree Filter Displays alarms that match the selected
component and all of its subtending
components. If no component is selected,
no alarms are shown.
Active
—sheet 3 of 3—
The toolbar has buttons in which you can choose how to display the alarms
For example, Active alarms, Cleared alarms, Active Manual alarms, Cleared
Manual alarms in any combination or all at once.
The Severity buttons allow you to select critical, major, minor, warning, or
unknown alarm types in any combination or all at once.
The zoom in and out buttons allow you to view pre-defined histogram
information.
The selected node and subtree filter buttons affect how alarms are filtered in
relation to the selected component in the CM panel. The buttons are mutually
exclusive if one is selected the other is automatically deselected. If neither of
the buttons is selected, all the alarms for the NE or region are displayed.
These settings are remembered between the GUI sessions so the user can
select and control the alarm filtering behavior.
Note: The default when the GUI is first launched is to have no filtering
enabled so all alarms will be shown. This functionality is the same in a
CEM standalone configuration as in an NSP launched configuration.
• Custom - Only alarms matching the criteria defined and enabled in the
Filters and Actions menu and the checkboxes will be displayed in the
alarm list. Drop-down box selections may be used to further refine the
alarm list. Drop-down boxes and custom filters are additive, meaning that
when “custom” is selected in the drop-down list the alarm list will be
modified by the state of the drop-down boxes and active custom filters.
Note that custom filters will have no effect on the histogram view, which
will continue to report alarms based on the status of the drop-down boxes
only.
Note: In order to display the alarms that match the criteria defined in the
Filters and Actions list, you have to either click on the element that was
specified on the criteria list or background area in the Configuration
Management area. Do not select an element other than the defined
element or alarms will not be displayed.
All these settings are preserved for each window when the Element Manager
is shut down and are restored when the Element Manager is restarted. Some of
the settings which are saved are:
• name of the window
• position of the windows on the screen
• size of the window
• states of the FM and CM panels
• alarm filter options
• tracking state
Histograms
The FM window contains a histogram (Figure 4-5) which gives an overview
of the selected type of alarm activity occurring in a selected period (maximum
of seven days for cleared alarms and 30 days for uncleared alarms).
The Histogram works in conjunction with the other alarm selection controls
on the FM window, including the Filter selection drop-down list box. You can
see, for example, all Critical and Major alarms which are also Active or
Cleared occurring within the selected time period for a selected node.
Figure 4-5
Histogram
The length of the Histogram view time period responds to the Zoom In and
Zoom Out buttons on the FM tool bar. Vertical stack bars appear, with widths
representing 15 minutes to four hours.
Arrows on the left and right-hand sides of the histogram display can be used
to select any date for viewing. A single click on the left-hand arrow moves
back one day. A single click on the right-hand arrow moves forward one day.
When the tracking button (T) on the right side of the histogram is selected, the
thumb will continuously track the current time, causing the most recent
alarms meeting criteria to be displayed in the alarm list box. Tracking only
applies to the Selected Node Filter. It is not possible to track on the Subtree
Filter as there would be too many alarms in a subtree view as it can apply to
NEs or regions.
The Selected Node Filter tracking view will automatically change the time
scale to display the time between the first and last alarm. The times are taken
from the attributes on the node that is selected. If the time range is larger than
the selected zoom setting, the zoom setting will be expanded to match the
time range. If the time range is less than the zoom setting, the zoom setting
will be left unchanged at the user specified level. For example if the setting is
at a two day view and a node is selected that has alarms that span three days,
the zoom will be changed to the next available setting of four days. If the node
selected only had alarms that spanned one day, the zoom setting is left
unchanged at the two day view.
Click in the Histogram and it displays two vertical lines, representing the
beginning and end of the Alarm list time period. Each of the lines can be
dragged to change the length of the displayed time period. The size of the
time period ranges from 15 minutes to four hours in increments of status bar
widths. If a blue background is displayed, the Element Manager is performing
resource discovery on the alarms. Wait, and when the blue disappears, the
alarms have all been found.
The Histogram header displays the time period of the Alarm list view, the
exact date and time of the Alarm list view, and the number of alarms in that
time period. The time period of the Alarm list view in the Histogram is also
the time period of the alarms appearing in the Alarm list scroll box. Also,
there is a maximum of 1000 logs per element. If alarms you are expecting are
not showing in the Alarm list, check the Histogram time period selected.
The Histogram is not affected by the custom filters defined via the Filters and
Actions menu item. When Custom (from the choice box) is chosen, the
histogram shows the same values as if the Unfiltered choice box is chosen.
Figure 4-6
Right click on alarm
Alarm timestamps
The timestamps on the alarms are set by the objectManager with the time
when objectManager received the alarms. For the SNMP MDM nodes, the
timestamp of an alarm is propagated from the MDM server which means that
the timestamp of the alarm is the time when the MDM server received the
alarm. For the other nodes, the alarms have the CEM server time.
Not all SNMP based device use the server time zone to set the alarm timestamp.
The device exceptions are:
• BG - Border Gateway
• MLC - Location Server
• MNM - MetaSolv Network Mediation
• VPN - Contivity Virtual Private Network
The alarm timestamp for these devices will instead propagate CEM’s received
timestamp since the time zone of these devices cannot be determined. All
other SNMP devices will propagate the original alarm timestamp in the server
time zone.
Field Description
Cleared By Identifies the user or the log that cleared this alarm.
Color Definition
Clearing alarms
When the system displays an alarm, you must take the appropriate action to
correct the problem. Corrective actions may require hardware or software
maintenance performed from the switch. After you correct the problem,
depending on the alarm type, the system automatically clears the alarm. If the
Fault Management window is currently in the Current view, the cleared alarm
disappears. To view the cleared alarm again, select the Cleared Alarms button
on the tool bar.
The “Clear All Alarms on Node” option is not enabled for USP, UNPM or
SLR nodes. Manual clear of active alarms for USP, UNPM and SLR
components will be ignored because USP, UNPM and SLR do not allow this
action on their devices.
Manual clears
There are some alarms that you must clear manually. The manual clear alarms
have an M over the alarm status.
To remove the problem reported by the manual clear alarm, right-click on the
alarm in the Alarm list and select the Clear Alarm command, or select the
Clear Manual Alarm option from the Fault menu (see Figure 4-2).
To clear manual alarms on a node and all the nodes below, select a node from
the Configuration Management area then select “Clear Manual Alarms on
Subtree” from the Fault menu.
The existing alarm which is moved into the history category is considered
cleared by the new, redundant alarm. You will see the name of the alarm in the
Cleared By column.
Figure 4-7
Alarm info window
Figure 4-8
Custom Filters & Actions Panel window
Filters are cumulative. When a user-defined filter is selected from the filters
list on the FM panel, it is applied only to those alarms passing any previous
filters selected directly on the FM panel. For example, if a user selected to see
only Critical alarms from the FM panel then also selected a user-defined filter
from the filter list, the alarms displayed would have to pass the Critical filter
first, then pass the named filter before being displayed in the FM panel alarm
list.
Only a single instance of the Custom Filters & Actions area can be launched
for each workstation. If the Custom Filters & Actions area is already open on
a PC, then it is accessible form any Element Manager and from the Windows
task bar.
Filters tab
The Filters tab (as shown in Figure 4-8) allows you to:
• display a list of saved filter definitions
• create new filter definitions
• modify existing filter definitions
• concatenate two or more filter definitions into a third
• delete one or more existing definitions
Status field
The status field displays an error message or explanation when invalid
selections are made to add to the Filter definition area.
Selection buttons
Several Selection buttons (as shown in Figure 4-8) are available to the user on
the Filters tab. These buttons are automatically enabled or disabled depending
on the text currently in the Filter definition field. If a particular button is not
currently a valid choice it is disabled and cannot be selected. These buttons
automatically re-enable themselves when their use becomes appropriate.
To add parentheses to a statement, first press and hold the left mouse button in
the Filter definition field and drag to select all or part of the items to be
included. It is not necessary to select entire items. Selecting part of an item
will automatically expand the parentheses to include the entire item.
Pressing the parentheses button when appropriate text is selected in the Filter
definition area causes the system to insert a pair of open and closed
parentheses around the selected text.
If you choose items that are invalid selections for parentheses, an error
message appears in the status bar area explaining the problem.
The undo and redo buttons can be used to remove or re-add sets of
parentheses in a single operation.
These operators follow logical rules. From highest precedence to lowest, the
rules are:
• Parentheses have the highest precedence - items within parentheses are
always evaluated first
• Logical And
• Logical Or
• Logical Not
This pattern is followed for all other drop-down list boxes as well. For
example, Note=No-Note AND Note=Has-Note is invalid, etc.
The Not button may be used on its own without a preceding “and” or “or” only
if it is the first item entered in the Filter definition area. For example, the
following are valid filters:
• Not Sev=Critical
• Not (Sev=Critical And Note=Has-Note)
are invalid statements because “not” must be preceded by “and or “or” when
it is not the first item in the filter.
Undo/Redo buttons
These buttons allow you to undo or redo changes made to the Filter definition
field one at a time. The only exception to this is for parentheses - where each
set is removed in one operation. Note that the text enclosed by the parentheses
is not removed along with the parentheses. Each text item requires a separate
Undo/Redo operation of its own.
Following an undo or redo operation the contents of the Filter definition field
will be logically consistent though possibly logically incomplete. As undo
and redo actions are performed, validity checking occurs on each logical
operator button and drop-down list box item. Selections which would be
invalid (based on the contents of the Filter definition field following the undo
or redo) are disabled.
When items are added to the Filter definition field either by an Include or
Edit, they are first parsed and added one item at a time to the existing undo
and redo history. This allows a step-by-step undo of the addition just as
though it were entered by making selections.
Clear button
The clear button erases the contents of the Filter definition field, the name
field, and clears the current undo and redo histories.
Duplicate filter names are not allowed. If the selected name already exists in
the filter list, a warning message will be displayed. Changing an existing filter
definition has down-stream effects. If a combination has been defined that
contains the filter the definition of the combination will change to contain the
new filter definition. If that combination is currently active it will be
immediately deactivated.
Newly saved filters are automatically propagated to the FM Panel filter list as
well as the Combinations pane filter list. Filters are saved between Browser
sessions on a per user basis.
A few of these list boxes can be edited to add and remove components. Any
additions or deletions made to the contents of a list box during an Element
Manager session are automatically saved on a per user basis.
Severity Box
The severity box (Figure 4-9) contains a non-editable list of all available
alarm severity choices.
Figure 4-9
Severity box
Notes box
The Notes box (Figure 4-10) contains a non-editable list of choices for Has-
Notes, No-Notes.
Figure 4-10
Notes box
Element box
The Element box (Figure 4-11) automatically determines the names of all
elements connected to the Element Browser. It automatically adds those
elements to the list of choices available in the element box list. If an element
goes off-line, that choice is automatically removed from the list.
Figure 4-11
Element box
The element box is also completely editable. Element names can be added to
the list by selecting the input area of the element box and entering a new
name. The Browser need not be connected to the element in order to add it to
the list. Elements can be deleted from the list by selecting them so that they
appear in the input area and pressing the delete key. Duplicate entries are not
allowed in the list. All changes are saved on a per user basis.
Resources box
The Resources box (Figure 4-12) contains an editable list that is initially
unpopulated. You can add or delete resources from the drop-down list.
Resources are NOT automatically added to the list by the system. Duplicate
entries are not allowed. All changes are saved on a per user basis.
Figure 4-12
Resources box
Figure 4-13
Acknowledged-by box
Figure 4-14
Cleared-by box
Log box
The log box (Figure 4-15) is initially unpopulated. You may add specific logs
to this list as needed.
Figure 4-15
Logs box
When a single filter is selected in the list, the right-mouse button displays a
pop-up menu which allows users to edit, rename, or delete the selected filter.
See Figure 4-16.
Figure 4-16
Single-Selection Pop-Up Menu
If text exists in the Filter definition field and it is valid to do so, the Include
option will also be enabled on the pop-up menu (Figure 4-17). Selecting the
Include option causes the currently selected filter to be appended to the text in
the Filter definition field. In this way, two or more filter definitions can be
combined to create a more complex filter.
Figure 4-17
Pop-Up Menu with Include Enabled
The saved filter definition list box allows you to select two or more
contiguous (use shift-click) or non-contiguous filters from the list. A right-
mouse click on multiple selections presents a pop-up menu allowing users to
delete all the selected filters at once (Figure 4-18).
Figure 4-18
Pop-Up Menu for Multiple Filter Selections
Actions tab
The Actions tab (Figure 4-19) is where you can define and save actions to be
performed when an alarm passes an associated filter. Actions cannot be
executed (with the exception of test) without first being associated with a
filter definition on the Combinations tab.
Figure 4-19
Actions Tab
Arguments field
This is a user-editable field used to define any parameters required by the
executable file specified in the Action Text field.
Select button
The select button invokes a file chooser window and dialog box which can be
used to find a file containing an executable program or command file to be
invoked by the action. Only Windows NT executable and command files are
displayed. Users can select any file of type “exe”, “cmd”, or “bat” to define an
action. Clicking the select button in the file chooser adds the selected path and
filename to the definition field on the Action tab. Clicking the Cancel button
exits without selecting an executable file.
Figure 4-20
File chooser window
Save button
This button allows users to save the action definition currently in the Action
text definition field, the name (if entered) in the name field, and the include
log choice. If no name exists in the name field users will be prompted to enter
one. If the name already exists in the saved actions list box, a dialog box
informs users that this change will be propagated to any combinations that use
this action - and DEACTIVATE those combinations immediately.
The +Logs field contains “Y” when alarms are to be appended to the action
definition.
Figure 4-21
Single Selection Pop-Up Menu
Selecting edit in the pop-up menu causes the currently selection action to be
copied to the action definition field where it is editable by the user. The action
name is copied to the name field, and the include log choice is selected in the
radio button box. Users can change any of these items.
Selecting rename in the pop-up menu prompts the user for a new name for the
currently selected action. If the new name already exists in the action list and
is not identical to the current name, the user is warned that an action by this
name already exists. Changing an existing action definition has down-stream
effects. Changes will be propagated to any combinations using this actions,
and DEACTIVATE those combinations immediately. If the user continues,
the action will be saved under the new name, the previously saved action
using that name will be lost, and the action defined with the original name
will be removed from the list.
Selecting test from the pop-up menu copies the definition of the currently
selected item to the action definition, name, and include logs fields, executes
the action one time, and displays the detailed command string in the status
field. Currently, result codes from the Windows NT operating system are not
returned in the status field.
All saved changes to the Actions defined in the actions list are automatically
propagated to the Combinations Pane and are immediately available. Actions
are saved between Browser sessions on a per user basis.
Figure 4-22
Multiple-selection pop-up menu
Combinations tab
A combination represents a relationship between an action and a filter. The
Combinations tab (Figure 4-23) is used to tie filters and actions together into a
combination definition which can be invoked whenever an alarm is received
which passes the filter definition.
For this reason, if a filter or action that is used in a combination is deleted that
combination will be automatically deleted as well since it no longer defines a
valid filter/action pair.
Clear button
The clear button erases the contents of all the fields, except the user-defined
combination.
If the selected name already exists in the combination list, a message box
warns the user of the consequences of changing an existing combination
definition. In particular, if that combination is currently active, it will be
immediately DEACTIVATED.
Figure 4-24
Selected Filter field and drop-down list
Figure 4-25
Selected Action drop-down list
The user-defined combinations list box allows users to select two or more
contiguous (shift-click) or non-contiguous (ctrl-click) combinations from the
list. A right-mouse click on one of these multiple selections displays a pop-up
menu. To activate, deactivate, or delete all the selected combinations at once,
select the command. The commands edit and rename are not available when
multiple actions have been selected.
Figure 4-26
Pop-up menu when single item is selected
Selecting Activate from the pop-up menu immediately activates the selected
combination, Deactivate immediately deactivates the selected combination,
and Edit copies information from the selected combination into the editing
areas at the top of the window.
Rename causes a dialog box to appear prompting users for a new name for the
selected combination. If the new name matches a previously saved name
already in the list, users are asked if they wish to overwrite the existing entry.
If so, all data from the combination originally called by the new name is
overwritten by the data from the selected row. The entry originally selected
for rename is then removed from the list.
Figure 4-27
Multiple-selection pop-up menu
Performance management 5
The Operational Measurements (OM) system provides the operating company
with the following measurements for the network elements:
• switch performance measurements
• traffic measurements
• service data
The user can view OM records to ensure that the network element operates at
its fullest potential with optimum efficiency. OM data is transferred from the
switch every transfer period, such as every 15 or 30 minutes.
9. Thresholds shown on the graph are the values currently set in the SDM/
FT. The history of the threshold value changes is not available.
10. Thresholds shown on the graph will not be displayed on a particular
resource, if it no longer exists.
11. Resources are not shown in the PM interfaces until data is available for
them in the Archive (for example, an OM report has arrived containing the
particular resource and its data); consequently, the list in the New Study
interface or the Threshold Manager interface may not be in-sync with the
resources listed in the Configuration Management window.
12. If the last OM report is unknown to the Element Manager, it will use the
current PC/SUN time rounded back to the nearest transfer period as the
time period to retrieve the resource list for display in the New Study
interface or the Threshold Manager interface. Typically, the timestamp of
the last OM report is only unknown to the Manager when no data is stored
in the archive.
13. Switch Format mass export does not support Billing OM groups as the
billing to OM conversion happens after dmsDataServer and Switch format
mass export occurs from Data Server. Users will not be able to export
Billing to OM (BOM) groups using Switch Format sessions, but they will
get these groups through Tab Format mass export. If a user tries to export
ALL GROUPS using Switch Format, they will be able to export DMS
Groups and not BOM groups.
14. For the Server configuration, up to 100 user-defined destination tags can
be defined at any one time in the Dialed Digits Manager.
15. For the standalone configuration, up to 30 user-defined destination tags
can be defined at any one time in the Dialed Digits Manager.
16. For the standalone configuration, up to 300 digits may be assigned, total,
within the Dialed Digits Manager. These can be in any combination of the
30 user-defined destination tags.
17. For the Server configuration, up to 500 digits may be assigned, total,
within the Dialed Digits Manager. These can be in any combination of the
100 user-defined destination tags.
18. Up to 10 user-defined diagnostic groups can be defined at any one time in
the Diagnostic Manager. This value is configurable.
19. The number of diagnostics allowed in each group is limited by the number
of diagnostics available.
20. Because the Billing Manager on the SDM/FT for the standalone
configuration, or on the server for the Server configuration, can only keep
track of one set of destination tags from any given Manager, it is advised
that one Manager input all the destination tags of interest, so as not to
overwrite another Manager’s data.
Performance menu 5
The Performance Management (PM) section of the element manager consists
of several graphical components and screens that allow the end user to manage
a MSC/VLR or HLR.
The Performance Management (PM) menu of the OMC-S Element Manager
allows access to five applications to view the network operational
measurements (OMs). The Performance menu consists of five commands.
Figure 5-1 identifies the display options available from the Performance
menu.
Figure 5-1
Performance Menu Options
The historical list includes all the OM groups/resources from collected data in
last two months. The current list is defined as the list of OM groups/resources
from collected data in the current UTC day, or from collected data in the
previous UTC day if no data is collected in the current UTC day and it is
within the first hour of the current UTC day. The current groups/resources is
displayed in plain font and the rest of the list is in italic font.
Note: For nodes earlier than GEM17.1 and stand-alone NEs, the
displayed groups listed in the three windows are the groups that the user
intends to collect and the resources list contains all resources in the last
two hours from the last OM report time. In this case, all the OM groups/
resources list are displayed in plain font.
Performance Manager 5
Bring up the Performance Manager by selecting the Performance Manager
menu option from the Performance menu in the Element Manager window
(Figure 5-1).
Figure 5-2
Performance Manager window
— Load Report - displays the Open Reports window where the user can
select an existing report available in the local, private and shared
folders. Shared folders can only be accessed if the user is a CEM
Administration user.
— Merge Report - displays the Merge Reports window where the user
can select an existing report available in the local, private and shared
folders. Shared folders can only be accessed if the user is a CEM
Administration user.
— Save Report - displays the Save Reports window where the user can
save the report in the following: the local, private and shared folders.
Shared folders can only be accessed if the user is a CEM
Administration user.
— Delete Report - displays the Delete Reports window where the user
can delete a report currently available in the local, private or shared
folders. Shared folders can only be accessed if the user is a CEM
Administration user.
— Set Color - displays the Customize Dashboard window where the user
can modify the color scheme and apply it to all open Dashboard
windows. Refer to “Customize the Dashboard window color scheme”
on page 5-25 for more information.
• Help - contains two menu items
— MSC OM Reference Manual - opens the Help window.
— USP OM Reference Manual - opens the Help window.
— HLR OM Reference Manual - opens the Help window.
— SLR OM Reference Manual - opens the Help window.
OM selection area
The OM selection area provides user a list of collected operational
measurement (OM) in categories for each managed network elements. The
user can use them to select their choice of OMs to query.
Groups and Fields listed under the categories are colored. While blue
groups/fields means that the groups/fields are user defined, the red ones
currently cannot be queried because of some of the resources in the
definition of the fields are not available. Different fonts are used to
distinguish OMs with current data (plain font) or OMs with only
historical data (italic font). Refer to “Historical OMs versus current OMs”
on page 5-5 for additional information.
• Resources Tree: shows all the device resources associated with the
selected OM group if any.
Users can view additional details on the selected correlations in the Performance
Manager window by doing any of the following:
1. Double click on any Correlated OM fields (blue colored), a new OM
Correlation Editor Window is launched. In this window, the selected field
definition is displayed. User can view or edit the definition if needed.
2. In the OM selection Panel of Performance Manager window, when a
correlated OM is selected, the graph of the correlated OM data is
displayed in the Data display panel;
3. Right mouse click on the graph brings up a pop-up menu. In this menu, a
new sub-menu “Show Correlation” is added. Two menu items are
included in the sub-menu: “Definition” and “Related OMs”;
4. When “Definition” is selected, a new OM Correlation Editor Window is
launched and the definition of the correlation is displayed in the window;
5. When “Related OMs” is selected, a new Dashboard window is launched.
In this window, all the OMs involved in the definition are displayed is one
or more charts.
any, a query is send to PM server for the selected measurement data and the
data will be displayed in the Data Display Area. The time stamp for each data
point is the start time for each transfer period.
Tool bar
The tool bar contains icons that provide more options to control the data display:
• Graph type - by clicking on the Graph type button, the graph will be
displayed in line type.
• Bar type - by clicking on the Bar type button, the graph will be displayed
in bar type.
• Data table - by selecting Data table button, the OM data display format is
switched from graph to table.
• Print view - click on the Printer button to send the current view in the
display area to printer.
• Export Data - click on the Export Data button to save the current view to a
file locally.
• Show in Excel - click on the Show in Excel button to have the OM data
displayed in Excel where the Excel file contains the data, data displayed
in graph type and data displayed in bar type.
• Add to Chart - click on the Add To Report button to make the current OM
to be added into the selected PM report. For details on how to edit or
create a PM report, see “OM report editing area” on page 5-14.
Instant PM graphing
Instant Performance Management (PM) graphing is provided in the
Performance Manager window. By using instant PM graphing, the user can:
• query and graph the current day’s performance data by selecting an OM in
the OM selection area. The granularity of the data displayed is the transfer
interval on the network element. The time stamp for each data point is the
start time for each transfer period.
Note: Text format is also available for viewing.
• view the previous day’s performance data, by using the Forward and
Backward buttons on the graphing panel. The moving interval is one day.
The retention time for OM data stored in Archive server is configurable
(default is 30 days).
• use the Zoom In and Zoom Out buttons on the graphing panel to display
(graph or text): 1 day, 2 days, 4 days, 7 days, 14 days or 30 days of
measurements data. The granularity of the displayed OM data is
automatically adjusted when the graph zoomed in/out: for 1 day, 2 days
view, the granularity of the data is transfer-period; for 4 days, 7 days and
14 days view, the granularity of the data is set to be hourly; for 30 days
OM display, the granularity of the data is daily.
• add, set and display thresholds for the displayed OM in the same graph.
Note: The PM graph window does not support negative values for display
of threshold. All negative values are forced to zero.
Note: The Graphing and Data Notification windows both display data
using the start time of the interval. Due to this, all data for a day has the
same date stamp.
icon. The text on the left hand side of the icons shows whether the
threshold setting is enabled.
• click and drag: by clicking and dragging on the graph area, a user can get
a closer look at the data points in the area. Double clicking on the graph
will bring the graph back to the default look.
• double click on a plot: double clicking on a select plot brings up a new
window which displays only the selected plot.
• threshold alarm indication: the fact of that there is a threshold alarm
raised against the OM displayed is indicated by a colored boarder around
the graph, where the color is the same as the severity of the alarm.
• pop-up menu: the pop-up menu (Figure 5-3) provided on the graph gives
the user some very convenient ways to control the way the graph is
displayed and to manipulate thresholds. There are two different pop-up
menus: the menu when thresholds are not displayed and the menu when
thresholds are displayed. The pop-up menu is brought up by right clicking
in the graph and contains the following:
— Show Correlation: this option is only displayed when a correlated OM
is selected.
– Definition: opens the OM Correlation Editor window to display
the correlation definition.
– Related OMs: opens a Dashboard window to display the graphs of
the OMs used in the correlation.
— Options: to display the graph as data points, connected lines, in bar
type or in line type.
– Bar Chart
– Show Points
– Show Lines
Figure 5-3
Data display pop-up menu & Options submenu
— Enlarge: opens a Chart window containing only the Data Display area
from the Performance Manager window.
Note: Double clicking on the graph in the PM window will also open a
Chart window containing only the Data Display area from the PM
window.
A user can modify the threshold value or move the threshold lines
in two different ways. The first option is for the user to left click
on the threshold line associated with the raise threshold value,
then two small arrow icons will appear on the raise threshold value
line and on the clear threshold value line. The user can then left
click on the icons to drag the line to reset the threshold value
individually, or left click anywhere between the band and drag to
move the value of both raise and clear value together.
Figure 5-5
Data display pop-up menu & Threshold submenu - thresholds displayed
All the saved PM studies from previous releases are converted to a new PM
Report with the following changes:
• each study is converted to one new report named by study’s name.
• if the study has less than 8 OMs, then all 8 OMs will be put into one chart
named chart-0; otherwise, put the next 8 OMs into the second chart called
chart-1, and so on.
• all the start time, stop time and granularity interval information in the
study are discarded.
A pop-up menu (Figure 5-6) can be invoked by selecting any tree node
of the Report Tree, then click on the right mouse button. The details of
the menu items on the pop-up menu is discussed in the following:
Figure 5-6
Report Tree Pop-up Menu
The created data reports can be saved to the local disk as well as a private, or
shared, folder on the CEM server. Only a user in the administration group can
save to the shared directory on the server. All users can then load reports from
the shared directory.
Note: All the changes done for the PM Reports are auto-saved to the local
disk when the Performance Manager window is closed.
Note: In the case of minor changes, such as setting the clock back several
hours, the typical behavior would be to raise a "Data Missing" alarm until
the OM reports catch up with where they left off prior to the change.
OM templates
An OM Template is a special type of abstract OM reporting, in which all the
OMs are from the same data source type and they all have an editable NE
name. If a user needs to create a similar OM report for multiple NEs, then the
user can choose to create an OM template first and then apply the template to
the multiple NEs. The limitation for the "apply operation" is that an OM with
multi-tuple groups is "blindly applied" to the user selected NE. This means
that even if the resource does not exist in the selected NE, the OM would still
apply to the NE, but no data will show when the report is displayed.
Comparable template
A Comparable Template provides a user with an easy way to compare OM
data from multiple network devices. A Comparable Template contains up to
32 charts and each charts only has one measurement. Applying a Comparable
template to multiple NEs (up to 8) will create a report which contains the
same number of charts as the template, but each chart contains all the OMs
obtained from applying the OM to all the NEs.
Figure 5-7
Template pop-up menu
Figure 5-8
Apply Template to NEs
10. Select all the NEs from the "Apply Template" window, then click the
"Apply" button.
11. A new OM Report node under the PM report tree for each NE selected
should be displayed.
12. Select the new report node just created, then select "Rename" menu item
to finish up the OM Report editing or select “Show” menu item to display
the data.
In the following, we list all the Nortel Defined Templates. These templates are
loaded in the OM Report Tree of Performance Manager window when the
window is initialized, they can be applied to any devices of the same type so
that desired OM report can be easily generated. Those templates are not
editable.
1. MSC_PerformanceSummary. The following OMs are in the template
(all the fields in SUMPAGE group):
— AUTHSUCR
— CPCAPUSD
— DSINUSE
— FPGSUCCR
— IERMSCHR
— LLSUCCR
— MLSUCCR
— MMSUCCR
— OERMSCHR
— PSINUSE
— RAMSCHR
— RAVLRLUR
— SERMSCHR
— SHBMSCHR
— SMMOSUCR
— SMMTSUCR
— TOTMSCHR
— TOTSUCCR
2. HLR_PerformanceSummary. The following OMs are in the template
(part of the fields in HLRSUMPAGE groups):
— ADMIN
— ATMRQ
— DISCARD
— DTMRQ
— HLRACTSSREQ
— HLRAUCERR
— HLRAUCOVLD
— HLRAUCREQ
— HLRAUCRQ
— HLRAUCTOUT
— HLRCRRPRN
— HLRDACSSREQ
— HLRERASSREQ
— HLRINTSSREQ
— HLRLURQ
— HLROCRR
— HLRREQSSREQ
— HLRFSMR
— HLRPWSSREQ
— HLRRSMDR
— HLRSMSR
— HLRULNOISD
— INTERNAL
— NETWORK
— TRERROR
— USSDRA
— USSDTB
— USSNIN
— USSNRQ
— USSRIN
— USSRRQ
If a user needs to create a similar OM report for multiple NEs, then follow the
steps listed under “Create a new template” on page 5-17 to create a template
first and then apply the template to multiple NEs to get multiple OM Reports
easily.
PM Dashboard window
As mentioned in the above section, a PM Report is a collection of PM Charts
(up to 32). A PM Chart contains a list of Measurements (up to 8), where a
Measurement is defined as a combination of NE name, data source type, OM
group name with an associated resource name and a field name. The PM
Dashboard window provides the user with a very flexible way to display
multiple measurements in multiple Charts in one window.
Figure 5-9
PM Dashboard Window
plots corresponding to the measurements list defined in the chart. All the
functionalities described in“Data display area” on page 5-9, are available
in the Panel also.
Double clicking on any selected plot in a chart launches a window which
only displays the selected plot.
• Tool Bar: as described in “Tool bar” on page 5-10, this Tool Bar provide
controls on all the Data Display Panes in the window.
• Time Control Bar: as described in “Time control bar” on page 5-14, this
time control bar provide controls on all the data display panes in the
window. One difference here is that “Tracking” button is not available
here since it does not make sense for multiple OMs. Since the initial time
setting on the bar is current day. So all the data display panes will display
OM data for current day.
• Pop-up menu: provided on the graph, this pop-up menu (Figure 5-10)
gives the user ways to control the way the graph is displayed. The pop-up
menu is brought up by right clicking in the graph and contains the
following:
Figure 5-10
Dashboard pop-up menu
Figure 5-11
Legend window
Note: When more than one graph is displayed in the Dashboard window,
double clicking on an individual graph will open a new isolated
Dashboard window.
Figure 5-12
Report menu options
Figure 5-13
Customize Dashboard Color window
Data collection 5
Data collection is consolidated into a single extendable processes which
forwards data for archival and thresholding without storing intermediate
results.
Note: DMS OMs are not converted or displayed with 3GPP prefixes.
User-defined correlations are outside of the scope of 3GPP. If the user wishes
to see these OMs in 3GPP format, they must define the field name
appropriately.
If no time zone or offset is configured, the data collector uses the time zone of
the server. All data is converted to GMT prior to storage and is displayed in
the time zone of the GUI. This includes data that is graphed and the
timestamp shown in the Data Arrival Notification window. The time that a
threshold is raised is based on the server time, but is shown in the time zone of
the GUI (as are other alarms).
In the Mass Export window, timestamps are displayed in the Server’s time
zone. The only exception is if no files have yet been exported for the session.
In this case, the Network Element View panel displays the time of the last
OM report. This time is the start time based on the PC’s time zone.
Note 2: As default, the server time zone will be used to derive the default
UTC offset for Passports. The offset is used to obtain the GMT timestamp
for Passport alarms. The Universal Time (UTC) offset can be changed if
the offset parameter in FTDM, MDM Passport Communication Manager,
service is changed. The changed UTC offset should be the same in time as
the offset for FDTM.
The MDP Data Collector supports filtering by group. Operators can use the
Customizable OMs window to filter or re-activate group collection for each
Passport. By default, all Passport data is collected.
Note 1: Although passport metrics do not have the concept of groups, the
DMS concept has been extended to all types of NEs managed by CEM
Performance Management. In Passports, a group is defined by a type of
subcomponent, so the “LogicalProccessor” group contains metrics from
all the Logical Processors on the Passport Shelf.
Note 2: The MDP Data Collector only collects data from MDP. No
statistical data is collected from MDM itself.
Although the same Data Collector collects data for USP, SLR, UNPM and
SGW NEs, the representation of this data in the GUI is different. USP data
appears as part of the HLR200 itself, whereas SLR and UNPM data is directly
under the name of the SLR or UNPM NE.
The GGSN Data Collector (GDC) receives files from the ASCII Data
Collector (ADC) in its incoming directory (/opt/nortel/data/coreEMS/
GGSNdata).The ADC is responsible for collecting the CSV files from the
GGSN node(s) and must be configured to deposit the GGSN CSV files into
the “/opt/nortel/data/coreEMS/GGSNdata” directory. The GDC will check
this directory once every minute and make these files immediately available
to the GDI for processing.
Any unrecognized files found in the GDC input directory is held for up to 30
minutes, after which they are removed. The typical situation for this to occur
requires a node to be added to the ADC before Fault Management operations
have discovered the node. Only nodes known to Fault Management will have
CSV files processed. Once Fault Management changes propagate to the GDC,
the files will be processed for that node. The 30 minute delay is provided to
allow for this type of configuration delay.
The default configuration of the GDC will process files at 7, 22, 37, and 52
minutes after the hour. This works for both 15 and 30 minute OM collection
intervals with a 7 minute grace period to allow the ADC complete gathering
all period related data. Although unlikely to be necessary, this timing can be
changed in the appropriate GGSN configuration file (/opt/nortel/data/
coreEMS/nodes/<Main Server name>/dataCollectorGSNS/dat/
GSNSParser.dat). Information on changing this cycle is found in the
comments of this configuration file.
The SDC (SIG Data Collector) receives files from the ADC in its incoming
directory (/opt/nortel/data/coreEMS/SIGdata). The ADC is responsible for
collecting the OM files from the SIG node(s) and must be configured to
deposit the SIG OM files into the “/opt/nortel/data/coreEMS/SIGdata”
directory. The SDC will check this directory once every minute and make
these files immediately available to the SDI for processing.
The ADC must be configured to append the node name at the end of the SIG
data files. This suffix is critical as this is used by the SDC to determine the
correct node to associate a data file with.
Any unrecognized files found in the SDC input directory is held for up to 30
minutes, after which they are removed. The typical situation for this to occur
requires a node to be added to the ADC before Fault Management operations
have discovered the node (only nodes known to Fault Management will have
OM files processed). Once Fault Management changes propagate to the SDC,
the files will be processed for that node. The 30 minute window is provided to
allow for this type of configuration delay.
Note: The default configuration of the SDC will process files every
minute.
ArchiveAdmin tool 5
The archiveAdmin tool resides with dataProcessor in CEM server:
/opt/nortel/data/coreEMS/nodes/<slicename>/dataProcessor/bin
It provides ASCII user interface to configure export profile and to query or set
retention period of archive.
To launch archiveAdmin tool, use the launch script and give its slice name:
cd /opt/nortel/data/coreEMS/nodes/<slicename>/dataProcessor/
bin
./archiveAdmin.start <slicename>
ArchiveAdmin menu
ArchiveAdmin has three menus: main menu, retention setting menu and mass
export menu.
Figure 5-14
ArchiveAdmin Main Menu
ARCHIVEADMIN TOOLS
------------------------------------------
1. RETENTION PERIOD SETTING
2. SHOW/DELETE/ADD EXPORT SESSIONS
3. SET MAX NUMBER OF FILE TRANSFER
0. QUIT
Please select your choice (0-3):
Figure 5-16
Change Monthly Retention Value
Would you like to set a new retention value of monthly data now (Y/N)? [Y] y
Figure 5-17
Change Daily Retention Value
RETENTION SETTING MENU
------------------------------------------
1. MONTHLY RETENTION SETTING
2. DAILY RETENTION SETTING
3. HOURLY RETENTION SETTING
0. EXIT THIS MENU
Please select your choice (0-3): 2
Would you like to set a new retention value of daily data now (Y/N)? [Y] y
Figure 5-18
Change Hourly Retention Value
Would you like to set a new retention value of hourly data now (Y/N)? [Y] y
Mass export
The archiveAdmin tool can used to show, add, delete or modify tab mass
export profiles. It can also be used to reset exports on dataProcessor. The user
interface of adding a profile is kept the same as GEM17 or older
archiveAdmin.
Figure 5-19
Mass Export Menu
MASS EXPORT MENU
------------------------------------------
1. SHOW CURRENT EXPORT SESSIONS
2. DELETE ALL EXPORT SESSIONS
3. DELETE AN EXPORT SESSION
4. ADD AN EXPORT SESSION
5. MODIFY AN EXPORT SESSION
0. EXIT THIS MENU
Please select your choice (0-5) [Q=Quit]:
Starting in GEM17, archiveAdmin tool supports to export all groups from all
NEs. It also supports export CAP logs from DMS nodes.
Note: ACT (Activity) logs were renamed to CAP (Capacity) logs for XA-
Core switches. These logs can still be set in the OM reports and have the
same significance as the Activity logs.
ACT102/CAP logs are generated every 15 minutes after they are activated in
the switch. If the switch transfer period is 15 minutes, then you will receive
one ACT102/CAP log in the export file, two for a 30 minute transfer period
and four for a 60 minute transfer period. In order to receive the ACT102/CAP
logs along with the OM data files, these logs need to be enabled on the switch
by following the steps in Procedure 5-1.
Mass Export Configuration allows for the export of all CAP logs activated
from the MAPCI;MTC;CAPACITY level. Specifically, CAP101 log is
generated by selecting YES from the Mass Export Configuration menu. The
CAP101 log outputs all information (using three logs) in 5 minute
information blocks. Figure 5-21 provides an example of a CAP101 log report.
Procedure 5-1
Enable ACT102 and CAP Logs on the Switch
1 Login to the switch.
2 Type the following command: mapci;mtc;CAPACITY;StrtLog and press Enter.
3 Answer YES to the following question:
Do you wish for the logs to be left on after quitting? Please confirm
("YES", "Y", "NO", or "N")
4 These logs can be viewed on the switch by typing the following commands at the switch prompt
at least 30 minutes after turning on the logs:
• logutil
• open CAP
5 All the generated CAP logs (CAP100, CAP101, CAP103) will be listed.
Figure 5-20
ACT102 Log Example
Figure 5-21
CAP101 Log Example
Figure 5-22
Show Profiles
Please select your choice (0-5) [Q=Quit]: 1
Figure 5-23
Add a profile
Would you like to export all groups in a transfer period for all NEs?
[Report period will be set to switch transfer period for EXPORT ALL] (Y/N)? [Y]
Would you like to get Capacity (ACT/CAP) logs in the export file?
[the logs should be enabled in the switch] (Y/N): [N] y
Figure 5-24
Delete a profile
Please select your choice (0-5) [Q=Quit]: 3
You want to delete export session 3: profile. Is this correct (Y/N)? [N] y
setExportReply: UPDATE -- delete export session: profile.
Figure 5-25
Modify a profile
Would you like to export all groups in a transfer period for all NEs?
[Report period will be set to switch transfer period for EXPORT ALL] (Y/N)?
Would you like to get Capacity (ACT/CAP) logs in the export file?
[the logs should be enabled in the switch] (Y/N): [N]
Figure 5-26
Reset Export
MASS EXPORT MENU
------------------------------------------
1. SHOW CURRENT EXPORT SESSIONS
2. DELETE ALL EXPORT SESSIONS
3. DELETE AN EXPORT SESSION
4. ADD AN EXPORT SESSION
5. MODIFY AN EXPORT SESSION
0. EXIT THIS MENU
Please select your choice (0-5) [Q=Quit]: 2
Figure 5-27
Change Maximum number of file transfer per export period
ARCHIVEADMIN TOOLS
------------------------------------------
1. RETENTION PERIOD SETTING
2. SHOW/DELETE/ADD EXPORT SESSIONS
3. SET MAX NUMBER OF FILE TRANSFER
0. QUIT
Please select your choice (0-3): 3
Connect to dataProcessor, please wait ...
Would you like to set a new number of files per transfer now (Y/N)? [Y] y
OM archive backup 5
On the SDM/FT, if the logical volume containing the archive directory
becomes full, all future OM data will not be saved. To prevent filling up the
disk and losing OM data, you must manually backup and delete this data as
space becomes an issue.
Note 1: Files for Groups EXT, TRK, and VLR3 use more space than
other group files. This is due to the larger number of tuples in these
groups.
Note 2: If any user other than “maint” manually backups the archive, the
ownership and permissions of the archive need to be preserved
(permission/ownership).
Figure 5-28
Summary Report window
The Summary Report lists the switches of interest in a tree structure. When
expanding one of these tree nodes, the switch names are displayed. When a
switch is selected, data from the previous day is retrieved and displayed in the
report area (see Figure 5-29). When a switch that is not already selected under
a report node is selected, data based on the interval and the time stamp is
retrieved. Display data of another time frame by selecting the switch and
changing the time by modifying the interval or time and clicking on the Query
button.
Note: Click the Query button only once and wait for the information to
display. You might have to wait several seconds to a few minutes.
Clicking on the Query button more than once may slow the process.
Figure 5-29
Summary Report window with switch data
The Measurement Period list box is provided to select daily interval, busy hour
and a set of interval hours which indicate from what time to what time:
• to get the daily data, input date you want in the Date text box and select
Daily (Universal Time) in the Measurement Period list box. Click the
Query button.
• to get data for Busy hour if the busy hour function is available, input date
you want in the Date text box and select BusyHr in the Measurement
Period list box. Click the Query button.
• to get data between hours, input date you want in the Date text box and
select one of intervals in the Measurement Period list box. Click the
Query button.
• the Universal Time in the Measurement Period list box means that the
date in the Date text box is based on the Coordinated Universal Time that
is Zero hours UTC is midnight in Greenwich, England. The Universal
Time is applied only for the Daily data.
• the Local Time in the Measurement Period list box means that the date in
the Date text box and the interval in the Measurement Period list box are
based on the local time of your CEM GUI machine. The Local Time is
applied for the Busy hour and the hourly interval.
If a user submits new configuration data (Group tag and its digits, or
Diagnostic tag and its codes), all other Dialed Digits Manager or Diagnostic
Manager sessions opened by other users will have their configuration data
updated automatically without invoking the refresh function. If one more user
is modifying, he will be notified for the update notification and the Managers
will not be updated automatically. The user will have options to select
whether they refresh data or keep modifying their configuration data.
A race condition occurs if two users modify and submit data at the same time,
data arriving at the Billing Manager later will be stored and the data that
arrived earlier will be wiped out. If the race condition occurs, the first arrival
will be accepted and the second arrival will be rejected. The user whose
submission is rejected will be notified of the rejection and the Managers will
not update automatically. The user will have options to select whether they
refresh data or keep modifying their configuration data.
Billing to OM GUI
The Billing to OM (BOM) GUI provides windows to edit configuration and
to display BOM statistics. There are two windows for configuration edit:
Dialed Digits Manager and Diagnostic Manager.
Dialed Digits Manager GUI and Diagnostic Manager GUI both provide an
information button represented with an “info” icon for viewing the
configurations of ombill (Billing Manager and Billing Collector). The info
window is launched by clicking the “Info” button on the Dialed Digits
Manager GUI (see Figure 5-32) or the Diagnostic Manager GUI.
Note: The Info button is only supported for CEM Server mode and is
disabled, or grayed out, in Stand-alone mode.
Figure 5-30
Info GUI for Ombill Configuration
The BOM Configuration GUI provides view functions for configuration items
of Billing Manager and Billing Collector. The GUI also shows the versions of
GSM CDR, Billing Collector and Billing Manager.
Billing Collector
The configuration of the valid CDR types specifies a set of CDR record types
which Billing Collector selects from an SBA billing file and sends to Billing
Managers. The Billing Collector configuration items are:
• GSM CDR version
• Billing Collector version
• Billing Collector CDR Mode: Enhanced/Normal
A set of valid CDR types defined as “Normal” Billing Collector CDR
Mode are:
standalone mode where a Billing Manager is located in the same node, the
Data Compression is set with OFF as default. In the server mode where a
Billing Manager is located in a remote node, the Data Compression is set
with ON as default.
Billing Manager
The Billing Manager configuration items are:
• Billing Manager version
• Billing Manager CDR Collecting Mode: Enhanced/Normal
“Normal” Billing Manager CDR Collecting Mode collects data from four
CDR record types:
To open the Dialed Digits Manager window, select Performance > Summary
Report > Configuration > Dialed Digits Manager in the Element Manager
window.
Figure 5-32
Dialed Digits Manager window
After you have entered digits in the Dialed Digits Manager window and
submitted them to the Billing Manager, you can generate results in the
Destination Summary report. The Dialed Digits Manager window allows you
to add, replace or delete digits and/or group tags (see Figure 5-32). A Status/
Information box displays status and warning messages in the Dialed Digits
Manager.
Note: When the billing manager application is busy and the information
button is clicked, the following error message is displayed: “Timed out
and no reply message received. Please check the Billing Manager state.”
• Dialed Digits
• Forward-To Number
• Calling Number, Called Number pair
• Calling Number, Dialed Digits pair
• Calling Number, Forward-To Number pair
Only one selection may be made for each destination tag. One or more
numbers are entered for the first four selections. One or more pairs of
numbers are entered for the final three selections. For each pair, both numbers
must match the CDR (AND relationship). However, the tag will be pegged if
any of the pairs match the CDR (OR relationship).
Group tags
While connected to a Billing Manager, you can add (Procedure 5-2), replace
(Procedure 5-3), or delete (Procedure 5-4) a destination group.
Procedure 5-2
Add a destination group
1 Enter a destination group tag in the group tag text field.
2 Press Enter or the Add button. The group tag is added to the end of the list and is highlighted.
This also allows editing of the group options and the prefixes in the digits list.
3 Check the Per Circuit-group Statistics checkbox if these statistics are desired.
4 Select the destination type from the radio button group (Dialed Digits, Calling Numbers, Called
Numbers or Forward-to-number).
5 Enter digit sets the same way you entered group tags.
6 Repeat as needed.
7 Submit changes when finished.
Procedure 5-3
Replace a destination group
1 Select a group tag to replace in the group tag list.
2 Highlight the group tag name in the group tag text field, and type the new name over it.
3 Click on the Replace button. The group tag name is overwritten with the new group tag name
4 Submit changes when finished.
5 Digit sets are replaced the same way you replaced the digits list.
Procedure 5-4
Delete a destination group
1 Select a group tag in the group tag list.
2 Click on the Delete button. The group tag and all associated digit sets are deleted.
3 Submit changes when finished.
4 Digit sets are deleted the same way you deleted the digits list, with the exception that multiple
digit sets can be selected for deletion.
When the same group tag name is input in the Group Tag text box, non-
supported characters, a duplicate number, or a subset number are input in the
Digits text box, the warning message will appear in status/information box. If
a user inputs superset number, then the dialog box will appear to prompt a
user to select either number.
Summary report will show no per-circuit group data for this group tag. Data
may still be available for other group tags on this machine, if this checkbox is
checked for those groups.
Please note that the list of reports is static in the Summary Report window.
Checking or un-checking the Per Circuit-group Statistics checkbox will not
alter the list of reports, only the data available within the Destination Circuit
Group Summary report.
Configuring trunks
The Dialed Digits Manager supports configuration of Incoming and Outgoing
Trunks for a group tag. The button “Configure Trunk..” supports this in
Dialed Digits Manager. The trunk configuration is used to collect the
TRAFFICDEST3 billing OM group in the Billing Manager.
TRAFFICDEST3 is collected only if the Billing Manager and Billing
Collector are in enhanced mode.
To select incoming and outgoing trunk groups for a group tag, the “Configure
Trunk..” button needs to be clicked. When the button is clicked, a new
window, “Trunk Configuration,” is displayed. This GUI has two lists:
“Incoming Trunk List” and “Outgoing Trunk List”. To select a pair of
incoming and outgoing trunks, the user needs to select one or more trunks
from each list and then click the “Select” button. When the “Select” button is
clicked, the pair appears in the “Incoming and Outgoing Trunk Pair” table.
All combinations of trunk groups selected in the Incoming Trunk list and
trunk groups selected in the Outgoing Trunk list are generated and displayed
on the Trunk Pair Table in the right hand side. If there are some pairs which
have already been in the Trunk Pair list, they will not be generated again to
avoid duplications.
Note: To select multiple trunk groups in the list use normal methods such
as Shift key, Ctrl key and dragging the mouse.
The number of selected pairs is displayed in the title of the Trunk Pair table. If
the number of pairs in the Trunk Pair list exceeds the maximum number of
pairs for one group tag, the Apply button will be disabled until the number is
reduced to the maximum number. The maximum number of pairs is 225. This
provides users a more efficient method to generate trunk group pairs.
A pair can be de-selected by selecting the pair to be removed then clicking the
“De-Select” button, or right clicking on the selected pair then selecting “De-
Select” from the pop-up menu. To apply the selected incoming and outgoing
trunk pair for the group tag, the user needs to click the “Apply” button and
this returns the user to the Dialed Digits Manager window. A similar
procedure can be done for configuring trunks for other group tags. When the
“Submit” button of Dialed Digits Manager is clicked, these settings are
reflected.
If trunk groups are changed in MSC, the Trunk Configuration GUI needs to
be closed and re-opened in order to update a list of trunk groups. If trunk
groups in destination tag groups which are already set and/or submitted do
not exist in a new list of trunk groups, the “Trunk Configuration” GUI (Figure
5-34) will inform a user to delete non-existing trunk groups from destination
tags by displaying them in the color red.
Figure 5-34
Trunk Configuration GUI
The Billing Manager will not collect any data by processing multiple CDR
records simultaneously. If the Forward-to number is set in the Dialed Digits
Manager to measure the TRAFFICDEST3 OM group for the call forwarding,
the following settings in the Dialed Digits Manager will not affect
measurement:
• Incoming trunk group and outgoing trunk group fields are set to “CLLI,”
not “Don’t Care.”
• Incoming or outgoing trunk group is set to “All”.
Dialed digits
You must create a group tag before you can add digits. You can add dialed
digits for a given switch, by first selecting a Switch Name from the drop down
menu.
If there are any dialed digits for that switch they will be displayed in the area
below. To add a number, type the number in the Digits text field above the
Add, Replace and Delete buttons. After you have entered the pre-fix or
specific phone number, click on the Add button. Click on the Submit button to
accept your entry.
If you have entered anything other than what is on the phone key pad (1, 2, 3,
4, 5, 6, 7, 8, 9, 0, *, #), a dialog box will appear informing you that an invalid
entry was made.
To replace a number, click on a number in the dialed digits list. The number
will appear in the text field below the Add, Replace and Delete buttons.
Change the number by entering the new number and clicking on the Replace
button. Click on the Submit button to accept your entry. To delete a number,
highlight a number in the list. The number will appear in the text field. Click
on the Delete button. Click on the Submit button to accept your entry. The
Refresh button will return the screen to the original condition or to the point
of the last entry submitted. For example, if you added, replaced or deleted
several numbers without clicking on the Submit button, and then you clicked
on the Refresh button, anything you added, replaced or deleted would not
have taken effect. Instead the list will appear as when you first entered the
Dialed Digits Manager window.
Figure 5-35
Update Notification for Dialed Digits Manager
Diagnostic Manager
The Diagnostic Manager allows call diagnostics to be grouped to a diagnostic
tag. Diagnostic groups already being collected can be viewed and addition,
modification, and removal of these tags can be performed. Modifying
diagnostic tags will cause inaccurate data collection on the modified data for
the daily analysis; therefore, modification is discouraged.
Status/Information Box
The Status/Information Box informs the user about success/failure of submit,
warning invalid input, etc.
Note: When the billing manager application is busy and the information
button is clicked, the following error message is displayed: “Timed out
and no reply message received. Please check the Billing Manager state.”
Figure 5-37
Performance Summary report window
The MSC or HLR element, year, month and day are selected using the text
fields. Daily interval, busy hour, or a set of interval hours which indicate from
what time to what time is selected using the Measurement Period list box.
To get the daily data, input a date into the Date text box and select Daily
(Universal Time) from the Measurement Period list box. Click the Query
button.
To get data for Busy hour if the busy hour function is available, input a date
into the Date text box and select BusyHr from the Measurement Period list
box. Click the Query button.
To get data between hours, input a date into the Date text box and select one
of the intervals from the Measurement Period list box. Click the Query
button.
The Universal Time in the Measurement Period list box means that the date in
the Date text box is based on the Coordinated Universal Time where Zero
hours UTC is midnight in Greenwich, England. The Universal Time is
applied only for the Daily data.
The Local Time in the Measurement Period list box means that the date in the
Date text box and the interval in the Measurement Period list box are based on
the local time of the user’s CEM GUI machine. The Local Time is applied for
the Busy hour and the hourly interval.
After clicking the Query button, the table is populated with the attributes and
values for the specified time. The summary data can be exported to a file by
pressing the “Export” button.
Note: The listed items are measurements from the group SUMPAGE.
Refer to the chapter “Correlated, Supported, and Billing OMs” for a list of
the SUMPAGE measurements.
For each destination tag name, TRAFFICDEST3 will collect data on calls
whose incoming and outgoing Trunk Group match to ones defined in the
destination tag name. The collected data are as follows:
• Incoming Trunk Group name
• Outgoing Trunk Group name
• Total Calls
• Answered, Normally Terminated
• Answered, Abnormally Terminated
• No Answered, Normally Terminated
• No Answered, Abnormally Terminated
• International Calls
• National Calls
The incoming and outgoing trunk group fields can be set with “Don’t Care”
or “All” instead of trunk group (CLLI) name.
If “Don’t Care” is set into the origination and/or destination number fields,
then TRAFFICDEST3 will collect data without checking the origination and/
or destination number in billing records. The Summary Report will not
display the origination/destination numbers if “Don’t Care” is set.
If “Don’t Care” is set for the incoming or outgoing trunk group fields, then
TRAFICDEST3 will collect data without checking the incoming or outgoing
trunk groups in the billing records respectively. If “Don’t Care” is set, trunk
group names will not be displayed.
If “All” is set into the incoming or outgoing trunk group fields, not both of
them, then TRAFICDEST3 will collect data with any incoming or outgoing
trunk groups in billing records. If “All” is set, all trunk group names which are
collected during some interval time will be displayed.
You can rearrange the columns in the multi-column list of the Billing OM
report area. However, if diagnostic tags are not defined for the selected
switch, the column order of the diagnostic columns is lost and they are placed
at the end of the multi-column list when the next retrieval with diagnostic
information is available.
Note 2: The default order of the columns in any of the call statistics
reports will be restored when the Summary Manager window is closed
and opened.
Only one timestamp and interval entry is applicable to all billing OM report
requests. Interval, Date, and Stop Time entries represent all the billing OM
report request timestamp. For example, 1999/10/10 00:00 is set for MSC
CDR Statistic report. When selecting the Ckt Group Statistics report, the
same timestamp, 1999/10/10 00:00, is used to retrieve the data.
When the Daily interval is selected, the report is based on the 24 hour period
for the time range of the Date field at 00:00 time to 00:00 time of the next day.
Note: The default order of the columns in MSC CDR Statistics report is
restored every time the Summary Report window is closed and opened.
Note: The default order of the columns in Circuit Group Summary report
is restored every time the Summary Report window is closed and opened.
The following information is presented in the circuit group statistics data table:
• Circuit Group Name (CLLI)
• Direction
• Total
• Answered, Normally Terminated
• Answered, Abnormally Terminated
• No answer, Normally Terminated
Destination summary
The destination summary report is based on the destination group of interest
that is input through the Dialed Digits Manager.
All of the following counts indicate the number of times the customer supplied
prefix appeared as the initial digits of the following:
• Destination
• Call Origination
• Call type
• Total
• Answered, normally terminated
• Answered, abnormally terminated
• No answer, normally terminated
• No answer, abnormally terminated
• International call
• National call
• Average time to answer (seconds)
• Average system setup time (seconds)
• Average time to disconnect (seconds)
• Average call duration (seconds)
• Total call duration (hours)
• Diagnostic groups
All of the following counts indicate the number of times the customer supplied
prefix appeared as the initial digits of the following:
• Destination
• Circuit group name and type
• Traffic Direction
• Type
• Total
• Answered, normally terminated
• Answered, abnormally terminated
• No answer, normally terminated
• No answer, abnormally terminated
• International call
• National call
• Average Time To Answer (seconds)
• Average System Setup Time (seconds)
• Average Time To Disconnect (seconds)
• Average Call Duration (seconds)
• Total Call Duration (hours)
additional fields to display the origination and destination numbers, and both
the incoming and outgoing trunk group as well as the destination tag names.
All of the following counts indicate the number of times the customer supplied
prefix appeared as the initial digits of the following:
• Destination
• Incoming Circuit Group
• Outgoing Circuit Group
• Call Type
• Total
• Answered, Normally Terminated
• Answered, Abnormally Terminated
• No Answer, Normally Terminated
• No Answer, Abnormally Terminated
• International
• National
• Average Time To Answer (seconds)
• Average System Setup Time (seconds)
• Average Time To Disconnect (seconds)
• Average Call Duration (seconds)
• Total Call Duration (hours)
The Threshold Manager window displays all the groups, resources and fields
associated with an element. It also provides an editable interface for entering
the warning, minor, major, critical threshold values and direction for every
field. The interface for enabling or disabling thresholding for any field is also
provided. The layout of the threshold window is shown in Figure 5-38.
prevents alarms from frequently raising and clearing if the field value
fluctuates around the threshold value.
• Thresholds can be set for all NEs of the same type under each managed
“slice.” This means that a threshold can be set across all Passports of a
certain type managed by a single MDM installation. They cannot be set
across all MSCs or HLRs, however, as these are managed individually.
• Threshold alarms are throttled when the number of threshold alarms
crosses a configurable maximum. There are two configurable values - one
is for the managed “slice” and the other one is for each element type.
Generation of alarms is stopped when the number of alarms of an element
crosses the limit set for the element type. This number gets reset upon
data arrival. Generation of alarms is throttled when the total number of
threshold alarms for a slice crosses it’s maximum limit. This number gets
reset after a configurable period. Throttling of alarm generation issues
another QOS alarm reporting threshold is throttled.
• Threshold Manager windows in other GUIs update automatically when
threshold values are changed.
• Each resource can have multiple threshold alarms for different fields. The
alarm text contains the field information. Alarms containing multiple field
crossings are no longer raised.
• The user can set warning level threshold value.
• Thresholding can be done on correlated groups/fields.
• Threshold Manager generates an alarm when OM data does not arrive for
an element. It generates the alarm after waiting for one transfer period and
a configurable allowance time set for that element type.
Note 1: The time a threshold alarm is raised is always based on the Server
time and time zone.
Table 5-1
Predefined Thresholds for GPRS SGSN
# Threshold Details
GroupName: GprsMobilityManagement
Resources: ALL
Field: percentAttachRejected
Direction: Positive
GroupName: SessionManagement
Resources: ALL
Field: percentPDPActivationRejected
Direction: Positive
—sheet 1 of 2—
Table 5-1
Predefined Thresholds for GPRS SGSN
# Threshold Details
GroupName: SessionManagement
Resources: ALL
Field: VS.percentPDPActivationRejectedV4
Direction: Positive
—sheet 2 of 2—
Alarm Header:
NotifID = <NotifId>;
AlarmType = qualityofServiceAlarm;
Severity = <Severity>;
ProbCause = thresholdCrossed;
SpecificProblem =;
Date = <YYYY/MMM/DD-HH:MM:SS>;
Alarm Body:
<NE Name><DMS style alarm severity represented by *> TMN318
<MMMDD HH:MM:SS>UTC TBL PM threshold crossed
Status: Trouble raised
Location: Threshold Manager
Description:
NE: < NE Type NE Name>
Class: < Group Name>
Instance: < Resource Name>
Measurement: < Field Name>
Measurement Value: < Value of the field>
This is a change from the previous release where a single threshold alarm was
raised per object and the Measurement attribute was a list of field names
whose alarm condition matched the overall severity.
Note: With the previous threshold format, the contents of the alarm could
become stale. This occurred when new fields on the same resource cross
thresholds of the same severity as the original alarm. The previous format
will continue to be received until the Server upgrade is complete.
Data Notification 5
The Data Notifications window (Figure 5-39) displays the last OM report
time for each CEM managed “slice” for each data source type since the
Element Manager was started. The user can clear the display or close this
window.
Figure 5-39
Data Notifications window
Mass Export 5
Launch Mass Export by selecting Mass Export from the Performance menu of
the Performance Element Manager (Figure 5-1). Once Mass Export is
launched, the Export Status window appears (Figure 5-40). Only one Export
Status window can be opened per Element Manager window.
The Export Status window allows the user to configure profiles and
destinations. These profiles and destinations are stored locally and can be
retrieved and used for mass export. Up to four export profiles are supported
per mass export with the exception that only one export profile that exports
CAP/ACT102 logs is supported.
Figure 5-40
Mass Export Window
Mass Export supports two transfer methods: FTP and copy. If the destination
is remote, FTP is used to transfer export files to the target machine. If the
destination is local, copy is used to copy files to the target directory.
The Mass Export window supports up to 12 transfer files per report period.
Any extra files will be backed up first and then appended on the ship list at the
next report transfer time until it exceeds the hours of back up. The number of
transfer files per report period can be modified by using archiveAdmin.
Note: The archiveAdmin tool on the Sun Server supports only export
profiles of all NEs and all groups. Specific groups can be selected from
the GUI to be exported. Users should not attempt to use the archiveAdmin
tool to modify configurations with specific group lists, or they will reset
that configuration to collect all groups.
The user ID and password entered with export profile information are
encrypted by nortel proprietary encryption method. The encrypted user ID
and password are encoded by java encode convention.
Supported OM groups
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Table 5-2
OM Groups Supported by Mass Export
Not all OM groups are listed individually for tab/csv mass export. Some OM
groups are combined into a Parent Correlation Group for export. Table 5-2
specifies the associated Parent Correlation Group for each OM group listed.
Profile Editor
The Profile Editor window (Figure 5-41) has group selection, export format
selection and destination information sections. The main purpose of this
window is to help user edit a profile.
Figure 5-41
Profile Editor to Help User Edit A Profile
Figure 5-42
Profile Editor Has pop-up Menu to Help User Select OMs
The editor window has pop-up menu to when users select an item in OM
selection panel, and right click mouse:
• Apply selection to this region: apply select or de-select this item to the
region based on NE type if selected item is a NE element, or based on
name otherwise.
• Apply selection to all regions: apply select or de-select this item to all
regions based on NE type if selected item is a NE element, or based on
name otherwise.
Figure 5-44
Network Element View shows network element related sources and its export profiles
Figure 5-45
Launch profile editor
Action menu and pop-up menu on profile information panel have the same set
of buttons:
• New: bring up Profile Editor Window with empty selection
• Edit: select a disabled profile from table, edit button will bring up Profile
Editor with selected profile
• Enable/Disable: toggle between enable or disable selected profile
• Delete: delete selected profile
Sort function
Users can sort the Mass Export GUI tables by clicking on the table header. A
click will sort table ascent and shift click will sort table descent. However,
when the table data changes, the tables lose the sorted order.
Figure 5-46
Mass Export File Name Protocol for GEM17
For example:
Tab_30_TRI_MSCY20030617230.profile1
Figure 5-47
Mass Export File Name Protocol for GEM16
Backup Export File Name = <Export File Name>. bak.<no. of backup in this profile
For example:
Tab_30_TRI_MSCY200306171230.profile1.bak.1
Back up Rules:
• The number of back up files is determined by hours of backup. The hour
of back up can be configured by GUI or archiveAdmin tool.
• The maximum hours of back up is set to 48 hours. It begins at OM report
start time.
• The suffix 0 indicates the most recent back up.
The start time and stop time of the header are in GMT time. Conversion to
GMT may either be accomplished from information received from the NE, or
approximated using the Server time zone as described previously. The start
time in the file name matches the start time in the file. The delta GMT is the
difference (in seconds) between the NE time (or Server time) and GMT. This
value can be added to the GMT start time to get the start time in the NEs (or
Servers) time zone.
Note: The Mass Export GUI also displays a “latest export” time. This is
the time that the last file was transferred from the Server, and is always
presented in the Server’s time zone.
Within the body of either tab or csv files, each OM group starts with the group
name and fields names.
For multi tuple groups in tab format, subsequent lines consist of resource
names and register values. For single tuple groups in tab format, the resource
name is empty and the subsequent line consists only of field values.
In csv file format, the resource name combines the Network Element name
and resource name of multi tuples OM group, or the Network Element name
only in single tuple OM groups.
Note: CSV file format is not supported for mass export if the SDM is in
stand-alone mode.
For both tab and csv formats, two blank lines separate file header and file
body, and one blank line separates groups.
Figure 5-49
Tab Mass Export File Header
Figure 5-50
Tab Mass Export File
Header
Figure 5-51
CSV Mass Export File Header
Network Element NAME, Network Element INFO,Associated Types,DELTA GMT, START TIME,
STOP TIME, REPORT PERIOD
Figure 5-52
CSV Mass Export File
Header
In an MSC standalone slice, the MSC mass export file will have NE type
MSC and associated types NA which means there are no associated types for
this NE.
The NE name will stay the same for all associated types.
If export files fail to ftp to their destination, mass export backs up the files in
the following directory: /opt/nortel/data/coreEMS/data/<slicename>/
exportElementPM/.
The maximum number of back up hours is 48 hours. Any files that failed to
transfer to the destination will be backed up first and appended on the transfer
list at the next report transfer time until it exceeds the hours of back up.
Export profiles
The Mass Export GUI and the archiveAdmin tool both manage export
profiles.
Profile states
A shown profile can be in one of the following states:
• ENABLED: a profile is working
Enabled profiles are held by CEM server. The server will export OM
groups according to the profiles. Only NORMAL_USER can disable the
profile.
Transient Profile
Sometimes mass export calls DISABLING or ENABLING states a transient
state. The user uses the action menu to enable or disable a profile. The Mass
Export GUI will send down requests to servers. The profile enters a transient
state.
Some servers may reject Mass Export GUI’s request or some replies may loss
in network. The profile will return to its original state. Those information
display in NE tables. In Profile View, user clicks the profile in profile table,
request results show in NE table below. In Network Element View, user can
see server’s reply in NE table and only those servers that accept the request
have the profile in profile table below. It is recommended to use Profile View
to enable or disable a profile so that user can view the result easily.
Those profile states are known to GUI only. On the server side, a profile has
only one state: enabled. A disable message will cause server to delete the
profile.
Not all of action menu items are available for any selected profile. A menu item
is enabled based on the state of profile:
• Enabled or warning profile has items: show, enable/disable
• Disabled profile has all items: show, edit, enable/disable, delete
• Transient profile has least item: show.
Broadcast messages
In a GEM17.1 server, data process implements broadcast messages of
"exportInfoChanged" and "exportReset". Only archiveAdmin Tool is allowed
to reset export profiles.
When user is using archiveAdmin tool or Mass Export GUI, the application
notifies user that export profile list is changed upon receiving those broadcast
messages. If a profile is added to the system, it will add to profile list. If a
profile is deleted from the system, archiveAdmin tool will delete the profile.
Mass Export GUI will delete the profile and its clones (profiles has the same
name) and query servers again. Mass Export GUI does the same thing when it
receives exportReset message.
The Mass Export displays profile based on profile name cross slices. For
example, profile1 can have export group list a from slices1 and group list b
from slices2. In Profile view, click profile1 on status info table, it shows
export information of slice1 and slice2 in NE table. In NE view, click slice1
or slice2, it shows profile1 in profile table.
It may happen that two different profiles have the same name, especially if
user configured profiles by mixed use of archiveAdmin tools and GUI.
If Mass Export detects a profile has the same name as other profile but
different export properties, e.g., destination information, file format, report
period, etc. The Mass Export will clone the profile name and assign to the
profile: <profile>~<number>. It also shows warning messages at bottom. The
mass export will repair profile name up to 9 profiles.
This clone profile name is known only to the GUI. It can still be shown,
disabled, delete, or edit. The Mass Export will change profile name when user
edits the profile
The user should avoid to use the same profile name when profiles have
different properties. Repairing profile names will slow Mass Export GUI
dramatically.
OM groups are classified into categories based on the nature of the group.
OM groups from a GEM17.1 server can be in category
<source_type>:CollectedOMgroups or <source_type>:fCorrelationGroups.
OM groups from GEM17 or older server can be in category:
<source_type>:CollectedOMgroups, BillingOMgroups or USPgroups.
A warning window will pop-up when the user selects more than 50 individual
groups. The window will provide hints as to what should be selected to get
ALL_GROUPS from down stream processes point of view.
Customizable OM window 5
The Customizable OM window allows the user to select and manipulate
which OM groups are to be collected. Launch this window by selecting
Customizable OM Window from the Performance menu (Figure 5-1).
Figure 5-53
Customize OM Window
Note: The current Collected groups list may not be the same as the
groups list displayed in the Performance Manager window since the
groups list in Performance Manager window contains all the groups
which have stored data in the Archive server in last 30 days.
• Buttons:
— Apply: by clicking this button, the Collected/NonCollected OMs are
sent to the server.
— Default: by clicking this button, the Collected/NonCollected OMs list
are updated with the default Collected/NonCollected OM lists.
— Refresh: by clicking this button, the Collected/NonCollected OMs list
are updated with the current Collected/NonCollected OM lists from
the server.
— Close: closes the window.
OM Correlation Editor 5
Operational Measurement Correlation Editor Graphical User Interface (OM
Correlation Editor GUI) provides an interface to create or modify correlated
OM Groups which consists of functions as fields. These correlated OM
groups are available for graphing, thresholding and mass export.
The name of a correlation is used as the group name in the output. The list of
NE types determines to which NE types the correlation may be applied. The
list of versions determines to which version the correlation applies. A special
version of default indicates that this correlation may be applied to any
versions not specified in other correlations of the same name and NE type.
Functions consist of a name, and a list of operators and operands. The name is
used as the name of the resulting column. The operators and operands are
applied in reverse-polish notation (stack based). An operand is a field, a scalar
value, or a field that is to be summed across all of the tuples and then applied
User defined correlations make use of NE type and allow the following:
• Creation of new correlated groups consisting of functions whose inputs
are fields from single-tuple groups. These correlated groups are
distinguished by NE type.
• Creation of new correlated groups, each with functions consisting of
inputs from one multi-tuple group. The correlated group retains the same
name as the original multi-tuple group.
• Correlations only need to be defined once and then they can be applied
multiple times. Once a user defines correlations, the user can apply the
correlations to several proper NE nodes by simply selecting the
correlation name.
• Augmentation of Nortel’s correlations.
ATTENTION
For information on Nortel defined correlations, refer to the GSM/UMTS
Voice Core Network OAM Reference Manual, NTP 411-8111-803.
Figure 5-54
OM Correlation Editor - Edit tab pane
Single-tuple correlations
Single-tuple correlations are created by taking inputs as raw fields from other
single-tuple groups. The field is selected from the OM selection area and
based on the selection all the multi-tuple groups are disabled. For single-tuple
correlations, a blue icon along with the label “Single-Tuple Correlation
Definition” is displayed in the “Correlation Definition” area. The correlated
field can be added as an extension field in the group used in the correlation
definition or it can be used to create a new single-tuple group.
Note: For GEM16 or earlier servers, all the correlations are treated as
single-tuple.
Multi-tuple correlations
Multi-tuple correlations are created by taking inputs as raw fields from a
multi-tuple group. Once the field is selected from a multi-tuple group, all the
The Tool menu contains only one menu item, Get All Correlations....
Export
To store correlations into a file:
1. Select the group names or the field names from the bottom table in the
Edit tab pane to save.
2. Select Export & a file format (Global format / Local format) from the File
menu. A Save dialog box appears.
3. Follow the dialog box to save data into a file.
The Get All Correlations... command collects all correlations applied to each
slice whose version is higher than GEM17. Once all correlations are
collected, a user can save them by using the Save button. Refer to “Save
button” on page 5-115 for more information. If some slices are in BSY or are
down, then the command will not collect correlations from those slices.
After collecting correlations, you may see an error in the correlation table at
the bottom. It indicates that the correlation is conflicted with the same group
name and field name, but different correlation definitions. This is fixed by
deleting some fields and/or groups. These fields are shown with multiple rows
in the right table. After fixing all errors by deleting correlations, the Save
button can be used to save all correlations. After saving all correlations, these
correlations can be used to apply to any NE nodes in the Apply tab pane.
Correlations cannot be submitted until all errors are fixed.
Note: The Get All Correlations... command may delete some correlations
that were edited for GEM18 because this function will collect all
correlations from NE nodes, but not from the Global Correlation Manager
in the GEM18 CEM server.
When working with GEM18 CEM server, newly defined correlations can be
submitted to multiple NEs at once. All correlations defined by users are saved
and applied to NEs in a more convenient way.
4. Click a field name and the selected field name is shown in the Correlation
Definition area in the middle. Also NE type and Group name of the
selected field are shown in the NE types text box and Group Names
combo box.
5. Click one of operator buttons (+, -, *, /, or %) and the selected operator is
shown in the Correlation Definition area. You can also click on the ( )
button which can be used to enclose valid arithmetic expressions for
evaluation.
10. To add more in the Correlation Definition, repeat the above steps to add
field names and operators.
You can make a new name in the Group Name combo box for a new
correlation.
Note: There is a limitation for naming a new correlation and field. The
maximum length of the name is 80. Available characters are a-z, A-Z, 0-9,
and _.
After editing correlations and storing them into the correlation table, you can
save them in the CEM server so that other operators can use them.
A user can apply correlations to preferred NE nodes in the Apply tab pane
after saving correlations defined in the Edit tab pane. Refer to “Apply tab
pane” on page 5-116 for more information.
Pop-up menus
All the changes done for the correlation table are saved at the server.
There are some pop-up menus which can be launched by clicking the right
mouse button in the Correlation table.
For a user defined correlation, there are two pop-up menus. One has two
commands, Edit and Delete, in the left table where NE types, Version, and
Group name are displayed. The other pop-up menu has three commands:
Edit, Copy and Delete, in the right table that displays Field name, Field
definition, and Tool tip description.
Figure 5-55
Pop-up menu for user defined correlation - left table
Figure 5-56
Pop-up menu for user defined correlation - right table
For a Nortel defined correlation, there is no pop-up menu in the left table, but
in the right table there is a pop-up menu with two commands: Show and
Copy.
Figure 5-57
Pop-up menu for Nortel defined correlation - right table
The Delete command in the pop-up menu deletes a selected item. When a
group name is selected in the left table and delete command is executed, the
group name is deleted after the user confirms that it needs to be deleted
(Figure 5-58). When a field name is selected in the right table and the delete
command is executed, the selected field name is deleted. If the deleted field
name is the last field name under the selected group name, then the group
name will be deleted too.
Figure 5-58
Delete confirmation
The Edit, Copy, and Show commands fill the Correlation editing area with
data of selected group name or field name.
All data for a selected correlation/function are displayed in the editing area.
Also a correlation definition and tool tip description can be modified here.
Since a group name cannot be changed by this edit command, the group name
combo box is disabled.
To change a group name, use the Edit command in a pop-up menu in the left
side of the correlation table. This command allows a user to change only a
group name.
Note: Users are not allowed to modify the Nortel defined correlations, so
there is no Edit command for the Nortel defined correlations.
If the field name is not changed, then no new field name is added but your
other modifications are applied.
The Copy command can also be used to augment a Nortel defined correlation.
This allows a user to add a new field under the Nortel defined correlation.
The Show command displays long correlation definitions which are too long
to display in the Correlation table. The Show command for Nortel defined
correlations only displays data of the selected field name. All components for
editing correlations are disabled, so no data can be changed here.
Figure 5-59
OM Correlation Editor - using the Show command to display a long definition
Save button
The Save button invokes the Save function to save all of correlations created
in the Edit tab pane into files in the CEM server. All saved correlations can be
applied to proper NE nodes in the Apply tab pane. A confirmation dialog box
(Figure 5-60) appears to confirm that the user wants to save data.
Figure 5-60
Save confirmation
Refresh button
The Refresh button makes all data revert to previously saved data. All
unsaved correlations are discarded after executing the refresh button. A
confirmation dialog box appears to confirm that the user wants to refresh data.
When you select a NE node from the list of Network Elements, all
correlations already assigned to that node are shown in the Selected
Correlations list box and all available correlations for NE type of the selected
node are shown in the Available Correlations list box.
The << button moves a selected correlation from the Available Correlations
list to the Selected Correlations list. When you select a correlation in the
Available Correlations list, the << button becomes enabled. When a
correlation is deselected, the << button goes back to disabled.
The >> button moves a selected correlation from the Selected Correlations list
to the Available Correlations list. When you select a correlation in the
Selected Correlations list, the >> button becomes enabled. When a correlation
is deselected, the >> button goes back to disabled.
The Submit button submits all correlations in the Selected Correlations list to
the selected NE node.
Figure 5-61
OM Correlation Editor - Apply tab pane
If there are some correlations in the Selected Correlations list which have
already been deleted in the Edit tab pane, those correlations will not be shown
in the Selected Correlations list after submitting successfully. If some
correlations, not new correlations, in the Edit tab pane are modified or deleted
and those correlations need to be applied to NE nodes, click the Submit
button for each affected NE node in order to update those correlations in the
NE nodes.
Note: For GEM17.0 or earlier NE nodes and standalone SDM nodes, the
Submit button is disabled. To submit data for these nodes, use the Apply
button in the Edit tab pane.
The Refresh button makes all the data revert to the previously submitted data.
If multiple NE nodes are selected with different NE types, then all user
defined correlations which are defined for at least one of the selected NE
types are shown in the Available Correlations list.
Call trace 6
Call Trace is a feature that generates call trace records using the Nortel
Supernode Data Manage-Fault Tolerant (SDM/FT) and the Nortel Mobile
Switching Center/Home Location Register (MSC/HLR).
Call trace is activated through the Element Manager browser. The SDM/FT
layer receives the data and activates the trace on the HLR100 or the MSC.
The MSC generates a Call Trace Record (CTR) and delivers it to the SDM/FT
layer. The SDM/FT layer formats the CTR into a call trace record (CTR) and
stores it on the SDM/FT in the Call Trace Database. It also forwards the CTR,
in real-time, to the connected Element Manager browsers in the network.
Figure 6-1
Accessing Call Trace
Activate/deactivate trace 6
Activate/Deactivate Trace allows the user to begin or end the tracing of
selected calls. Selecting Activate/Deactivate Trace from the Call Trace drop-
down menu opens the Call Trace Activate/Deactivate window shown in
Figure 6-2.
Figure 6-2
Call Trace Activate/Deactivate window
The Call Trace Activate /Deactivate window contains a menu bar, tabbed
sections, a status window, and selection buttons.
Figure 6-4
Print menu options
Selecting one of these options prints the information as it appears under the
corresponding tab. Figure 6-5 is an example of an IMSI print.
Figure 6-5
IMSI Print Report
IMSI : 505023501205000
Status : Active
Invoking Event : MOC, MTC, SMS MO, SMS MT, SS, Location
Updates, IMSI attach/detach
__________________________________________
IMSI : 505023501205001
Status : Active
Invoking Event : MOC, MTC, SMS MO, SMS MT, SS, Location
Updates, IMSI attach/detach
__________________________________________
Under the Help option, there are two sub-items: User’s Guide and About Call
Trace. Selecting User’s Guide opens an on-line help manual. About Call
Trace provides the current version number of the Element Browser Call Trace
feature being used. See Figure 6-6.
Figure 6-6
About Call Trace
Figure 6-7
IMSI tab
There are three buttons located at the bottom of the IMSI tab panel. These
buttons are:
• Activate - opens the Activate Trace window.
• Deactivate - This button is enabled when one or more activations are
selected from the given list. Once the activations are selected and the
Deactivate button is clicked, a prompt appears verifying the deactivation
selection (Figure 6-8). Clicking the Yes button deactivates the selection
from the corresponding Network Elements. Selected activations with a
failed status are deleted from the list and no longer exist in the system.
Figure 6-8
Deactivation confirmation prompt
Figure 6-9
IMSI Activate Trace window
• Invoking Event - This field allows for the selection for an invoking event
for a selected trace record. The choices are:
— MOC, MTC, SMS-MO, SMS-MT, SS, Location Updates, IMSI
Attach/Detach;
— MOC, MTC, SMS-MO, SMS-MT, SS only;
— Location Updates, IMSI Attach/Detach.
Once the desired values have been entered and the OK button clicked, the
system verifies that all of the fields have a value. If either the IMSI or Trace
Reference field is left blank, a warning message displays. The types of
warning messages are discussed in detail later in this chapter.
Note: Clicking the Cancel button at any time discards any entered data
and closes the Activate Trace window.
Upon verification of the datafill, the system sends the IMSI and its related
data to the HLR100 for activation. The HLR100 automatically accepts home
subscriber IMSIs. If the IMSI belongs to a foreign subscriber, a prompt
appears for activating the trace as a foreign subscriber (Figure 6-10).
Figure 6-10
Foreign Subscriber prompt
Figure 6-11
MSISDN tab
There are three buttons located at the bottom of the MSISDN tab panel. These
buttons are:
• Activate - opens the Activate Trace window.
• Deactivate - This button is enabled when one or more activations are
selected from the given list. Once the activations are selected and the
Deactivate button is clicked, a prompt appears verifying deactivation
selection (Figure 6-8). Clicking the Yes button deactivates the selection
from the corresponding Network Elements. Selected activations with a
failed status are deleted from the list and no longer exist in the system.
• Close - closes the Call Trace Activate/Deactivate window.
Figure 6-12
MSISDN Activate Trace window
• This window also contains a field for selecting the Network Element on
the MSC. The Network Element: MSC List provides a list of available
MSCs in the network. More than one MSC may be selected.
Once the desired values have been entered and the OK button clicked, the
system verifies that all of the fields have a value. If either the MSISDN or
Trace Reference field is left blank, or the Network Element is absent, a
warning message appears. These warning messages are described in detail
later in this chapter.
Note: Clicking the Cancel button at any time discards any entered data
and closes the Activate Trace window.
Upon verification of the datafill, the system sends the MSISDN and its related
data to the MSC for activation.
Figure 6-13
Trunk tab
There are three buttons located at the bottom of the Trunk tab panel. These
buttons are:
• Activate - opens the Activate Trace window.
• Deactivate - This button is enabled when one or more activations are
selected from the given list. Once the activations are selected and the
Deactivate button is clicked, a prompt appears verifying deactivation
selection (Figure 6-8). Clicking the Yes button deactivates the selection
Figure 6-14
Trunk Activate Trace window
At the top of the Trunk Activate Trace window is a field for Trunk ID. This
field is used to enter the PRI-ISUP or an ETSI-ISUP Trunk ID. A maximum
of 18 alphanumeric characters, including underscore, can be entered in this
field.
The next field is Trace Reference. This field is used to enter an identifier, that
when combined with the given Trunk ID, uniquely identifies an individual
active trace within the network. This field accepts a maximum of 5 numeric
characters. The value of the numeric input cannot exceed 65535.
There are two options for Range value. Choosing All activates traces on all
Trunk members in this group. When Range is selected, the From and To fields
are enabled. These fields accept an input value from 0 to 9999. Up to 10
ranges are allowed. The All and Range fields are mutually exclusive. Only
one may be selected for each trace.
The From field value cannot exceed that of the To field value and no
overlapping ranges are allowed. For each additional range, both the From and
To fields must contain data. If only one trunk member needs to be traced, set
both fields to the same value.
The last field is the Network Element: MSC List. This provides a drop-down
list of the available MSCs in the Network.
Once the desired values have been entered and the OK button clicked, the
system verifies that all of the fields have a value. If data is missing from any
of the fields, the Network Element is absent, or range values are incorrect,
warning messages appear. The types of warning messages are discussed in
detail later in this chapter.
Note: Clicking the Cancel button at any time discards any entered data
and closes the Activate Trace window.
Upon verification of the datafill, the system sends the Trunk ID and its related
data to the MSC for activation.
Figure 6-15
PSTN tab panel
There are three buttons located at the bottom of the Trunk tab panel. These
buttons are:
• Activate - opens the Activate Trace window.
• Deactivate - This button is enabled when one or more activations are
selected from the given list. Once the activations are selected and the
Deactivate button is clicked, a prompt appears verifying deactivation
selection (Figure 6-8). Clicking the Yes button deactivates the selection
from the corresponding Network Elements. Selected activations with a
failed status are deleted from the list and no longer exist in the system.
• Close - closes the Call Trace Activate/Deactivate window.
Figure 6-16
PSTN Activate Trace window
At the top of the PSTN Activate Trace window is a field for the PSTN
number. This field is used to enter the PSTN number on which the trace is to
be performed. A maximum of 15 numeric characters can be entered in this
field.
The next field is “Trace Reference.” This field is used to enter an identifier
that, when combined with the given PSTN number, uniquely identifies an
individual active trace within the network. This field accepts a maximum of 5
numeric characters. The value of the numeric input cannot exceed 65535.
The “PSTN Trace Represents” field allows for the selection of the number to
be traced. The drop-down menu includes: Calling Number, Called Number, or
Both Numbers.
The last field is the “Network Element: MSC List.” This field provides a
drop-down list of the MSCs in the Network.
Once the desired values have been entered and the OK button clicked, the
system verifies that all of the fields have a value. If data is missing from any
of the fields or the Network Element is absent, warning messages appear. The
types of warning messages are discussed in detail later in this chapter.
Note: Clicking the Cancel button at any time discards any entered data
and closes the Activate Trace window.
Upon verification of the datafill, the system sends the PSTN number and its
related data to the MSC for activation.
Figure 6-17
Blank IMSI warning
Figure 6-18
Blank MSISDN warning
Figure 6-19
Blank Trunk ID warning
Figure 6-20
Blank PSTN Number warning
The following warning message (Figure 6-21) appears when activating call
trace from any of the tab panels and the Trace Reference Number is left blank.
Figure 6-21
Blank Trace Reference warning
The following warning messages (Figure 6-22, Figure 6-23, Figure 6-24, and
Figure 6-25) appear when activating call trace from any of the tab panels and
the requested trace is already active.
Figure 6-22
Activated IMSI warning
Figure 6-23
Activated MSISDN warning
Figure 6-24
Activated Trunk ID warning
Figure 6-25
Activated PSTN warning
The following error message (Figure 6-26) appears when activating call trace
from the MSISDN, Trunk ID, or PSTN Number tab and the Network Element
is absent.
Figure 6-26
Network Element warning
Figure 6-27
Range Input warning
Figure 6-28
Incomplete Range warning
Figure 6-29
Overlapping Range warning
Note: If a Manage Trace Records window is already open and the user
attempts to open another Manage Trace Records window, the already
opened Manage Trace Records window is displayed.
Figure 6-30
Manage Trace Records window
The Manage Trace Records window contains a summary list of all current
records existing within the Call Trace system. This list represents the trace
records generated by the MSCs in the network along with the corresponding
SDM/FTs that successfully delivered the records to the Element Manager
browser.
The Manage Trace Records window consists of a menu bar, a record count
display, IMSI, MSISDN, Trunk, and PSTN toggle buttons, a Filter field, the
records summary table, and a histogram located at the bottom of the screen.
Figure 6-31
No records export warning
• Print - Prints all existing trace records directly to the designated printer. If
no records exist in the system, a message displays indicating there are no
records to print.
• Close - Closes the window and exits the user from the Manage Trace
Records function.
Selecting Help from the Manage Trace Records menu bar opens a drop-down
menu with the following options:
• About Manage Trace Records - Displays up the version window.
• User’s Guide - Displays an on-line help manual.
A records count display appears directly below the menu bar. This display
provides a count of all trace records for a given date and time range.
—sheet 1 of 2—
Table 6-1
Manage Trace Records toggle buttons’ descriptions
—sheet 2 of 2—
For example, entering Disconnect in the Filter field allows only trace records
with the word Disconnect in the record to be displayed. Figure 6-32 and
Figure 6-33 illustrate the filtering process.
Figure 6-32
Example of Filtering text string
Figure 6-33
Example of Filtering results
The arrows to the far left and right of the histogram area adjust the date and
time range for the trace records display.
To display a summary list, depress the T toggle button and drag the
rectangular box located in the histogram area until it encompasses the stacked
bar representing call trace records. See Figure 6-34.
Figure 6-34
Selecting tracking of Trace records
The X axis represents the date and time range selected for call trace records.
The Y axis represents the number of records generated for the selected time
frame. See Figure 6-35.
Figure 6-35
Histogram X and Y axis
Once the date and time range is selected, the summary list appears in the
Manage Trace Records window summary area. From here, users can view the
list of existing call trace records within the call trace system.
Figure 6-36
Manage Trace Records summary list
The Manage Trace Records summary list contains the following seven fields:
• T - Indicates the activation type The four types of activation are color
coded to match the toggle buttons located below the menu bar.
— I - Subscriber’s IMSI. This activation is also indicated with a
background color of blue.
— M - Subscriber’s MSISDN. This activation is also indicated with a
background color of green.
— T - Trunk ID. This activation is also indicated with a background
color of yellow.
To access this window, select a record from the Manage Trace Records
summary list. Once the record is selected, right-click to display the pop-up
menu. Selecting View opens up the Trace Record Window (Figure 6-37).
Figure 6-37
View Trace Record window
Figure 6-38
Notes text box with buttons
Figure 6-39
Example of Notes indication
• Delete Notes - Deletes notes entered in the Notes text box. This button is
only enabled when notes have been entered into the text box or previously
entered notes are displayed.
• Print - Prints the entire displayed record and any associated notes.
• Help - Not active at this time.
Figure 6-40
Location Update CTR Example
Header:
tracedParty [0]: MSISDN: 61411215075
tracedReference [1]: 1
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 15:56:58.071
endTime [9]: 2002-08-12 15:56:58.071
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: Location Update
servedIMSI [1]: 505024101215075
location [19]:
Traced Party Location [1]: LAC: 301 Cell ID/SAC: 6
Other Party location [2]: Not Available
msClassmark [22]: 1F 00 FF FF FF FF
startTime [31]: 2002-08-12 15:56:58.071
endTime [32]: 2002-08-12 15:56:58.071
eventNumber [33]: 0000
sequenceNumber [12]: 1000
recordReason [13]: Location Update type - 00
Figure 6-41
Setup CTR Example
Header:
tracedParty [0]: PSTN_DN: 61410315000
tracedReference [1]: 1
omcID [3]:
mscBssTraceType [4]: 0x33
startTime [8]: 2002-08-12 09:00:33.007
endTime [9]: 2002-08-12 09:00:33.007
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: PSTN Terminated Call
callingcalledNumber [4]:
callingNumber [1]: Calling Num: 61410316100#E.164#Internatio
Number
calledNumber [2]: Called Num: 61410315000#E.164#National Num
translatedNumber [7]: #None#Others
originalCalledNumber [12]: 61410315000#E.164#National Number
roamingNumber [13]: #None#Others
networkTKGP [14]: incoming: ETSIISUPS1-2
basicService [15]: Telephony
location [19]:
Traced Party Location [1]: Not Available
Other Party Location [2]: Not Available
startTime [31]: 2002-08-12 09:00:33.007
endTime [32]: 2002-08-12 09:00:33.007
eventNumber [33]: 9F7F
sequenceNumber [12]: 1000
recordReason [13]: Setup
Figure 6-42
Answer CTR Example
Header:
tracedParty [0]: PSTN_DN: 61410315010
tracedReference [1]: 1
omcID [3]:
mscBssTraceType [4]: 0x33
startTime [8]: 2002-08-12 09:13:13.074
endTime [9]: 2002-08-12 09:13:13.074
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: PSTN Originated Call
callingcalledNumber [4]:
callingNumber [1]: Original Calling Num:
61410315010#E.164#International Number
calledNumber [2]: Called Num: 61410315000#E.164#National N
connectedNumber [8]: #None#Others
networkTKGP [14]: outgoing: ETSIISUPP-1
location [19]:
Traced Party Location [1]: Not Available
Other Party Location [2]: Not Available
startTime [31]: 2002-08-12 09:13:13.074
endTime [32]: 2002-08-12 09:13:13.074
eventNumber [33]: 108F
sequenceNumber [12]: 1000
recordReason [13]: Answer
Figure 6-43
Disconnect CTR Example
Header:
tracedParty [0]: PSTN_DN: 61410385000
tracedReference [1]: 1
omcID [3]:
mscBssTraceType [4]: 0x33
startTime [8]: 2002-08-12 09:11:17.061
endTime [9]: 2002-08-12 09:11:17.061
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: PSTN Originated Call
location [19]:
Traced Party Location [1]: Not Available
Other Party Location [2]: Not Available
startTime [31]: 2002-08-12 09:11:17.061
endTime [32]: 2002-08-12 09:11:17.061
eventNumber [33]: FF7F
sequenceNumber [12]: 1000
recordReason [13]: Disconnect
Figure 6-44
Redirection CTR Example
Header:
tracedParty [0]: MSISDN: 61411215001
tracedReference [1]: 1
transactionID [2]: 0
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:24:47.057
endTime [9]: 2002-08-12 16:24:47.057
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: MSISDN Terminated Call
servedIMSI [1]: 505024101215001
callingcalledNumber [4]: Original Calling Num:
61411215000#E.164#International Number
forwardedToNumber [9]: 61411215002#E.164#International Number
redirectingNumber [11]: 61411215001#E.164#International Number
originalCalledNumber [12]: 61411215001#E.164#International Number
location [19]:
Traced Party Location [1]: Not Available
Other Party Location [2]: Not Available
ssInformation [20]:
supplServicesUsed [1]: CFNRy
ssAction [3]: invocation (5)
msClassmark [22]: 1F 02 20 10 FF FF
startTime [31]: 2002-08-12 16:24:47.057
endTime [32]: 2002-08-12 16:24:47.057
eventNumber [33]: 508F
sequenceNumber [12]: 1000
recordReason [13]: Redirection
Figure 6-45
CISS CTR Example
Header:
tracedParty [0]: MSISDN: 61411215042
tracedReference [1]: 1
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:22:10.012
endTime [9]: 2002-08-12 16:22:10.012
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: ssAction (CISS)
servedIMSI [1]: 505024101215042
location [19]:
Traced Party Location [1]: LAC: 401 Cell ID/SAC: 9
Other Party Location [2]: Not Available
ssInformation [20]:
supplServicesUsed [1]: CFU
basicServices [2]: Speech Transmission
ssAction [3]: CISS Operation: Register Supplemen
Service.
ssParameters [4]: Forwarded to Number 61411215043#Un
fined#Subscriber
ssActionResult [5]: Return Result Value: Normal Cleari
ssActionResult [5]: Return Error Code: Nil Error
basicServices [2]: Service 1 Speech Transmission
ssActionResult [5]: Operative, Provisioned, Registered
Active
ssInvokeId [6]: 10
msClassmark [22]: 1F 03 20 10 00 FF
startTime [31]: 2002-08-12 16:22:10.012
endTime [32]: 2002-08-12 16:22:10.012
eventNumber [33]: 108F
sequenceNumber [12]: 1000
recordReason [13]: CISS
Figure 6-46
Detach CTR Example
Header:
tracedParty [0]: MSISDN: 61411215052
tracedReference [1]: 1
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:31:37.012
endTime [9]: 2002-08-12 16:31:37.012
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: IMSI Detach
servedIMSI [1]: 505024101215052
location [19]:
Traced Party Location [1]: LAC: 301 Cell ID/SAC: 10
Other Party Location [2]: Not Available
msClassmark [22]: 1F 00 FF FF FF FF
startTime [31]: 2002-08-12 16:31:37.012
endTime [32]: 2002-08-12 16:31:37.012
eventNumber [33]: 0000
sequenceNumber [12]: 1000
recordReason [13]: Detach
Figure 6-47
Call Hold CTR Example
Header:
tracedParty [0]: MSISDN: 61411215070
tracedReference [1]: 1
transactionID [2]: 8
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:33:10.003
endTime [9]: 2002-08-12 16:33:10.003
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: MSISDN Originated Call
servedIMSI [1]: 505024101215070
location [19]:
Traced Party Location [1]: LAC: 301 Cell ID/SAC: 3
Other Party Location [2]: Not Available
msClassmark [22]: 1F 03 20 10 00 FF
startTime [31]: 2002-08-12 16:33:10.003
endTime [32]: 2002-08-12 16:33:10.003
eventNumber [33]: 118F
sequenceNumber [12]: 1000
recordReason [13]: Call Hold
Figure 6-48
Call Retrieve CTR Example
Header:
tracedParty [0]: MSISDN: 61411215070
tracedReference [1]: 1
transactionID [2]: 8
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:33:41.072
endTime [9]: 2002-08-12 16:33:41.072
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: MSISDN Originated Call
servedIMSI [1]: 505024101215070
location [19]:
Traced Party Location [1]: LAC: 301 Cell ID/SAC: 3
Other Party Location [2]: Not Available
msClassmark [22]: 1F 03 20 10 00 FF
startTime [31]: 2002-08-12 16:33:41.072
endTime [32]: 2002-08-12 16:33:41.072
eventNumber [33]: 118F
sequenceNumber [12]: 1000
recordReason [13]: Call Retrieve
Figure 6-49
Call Waiting CTR Example
Header:
tracedParty [0]: MSISDN: 61411215070
tracedReference [1]: 1
transactionID [2]: 0
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:35:39.025
endTime [9]: 2002-08-12 16:35:39.025
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: MSISDN Terminated Call
servedIMSI [1]: 505024101215070
location [19]:
Traced Party Location [1]: LAC: 401 Cell ID/SAC: 4
Other Party location [2]: Not Available
msClassmark [22]: 1F 03 20 10 00 FF
startTime [31]: 2002-08-12 16:35:39.025
endTime [32]: 2002-08-12 16:35:39.025
eventNumber [33]: 418F
sequenceNumber [12]: 1000
recordReason [13]: Call Waiting
Figure 6-50
Call Barring CTR Example
Header:
tracedParty [0]: MSISDN: 61411215070
tracedReference [1]: 1
transactionID [2]: 8
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:38:32.030
endTime [9]: 2002-08-12 16:38:32.030
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: MSISDN Originated Call
servedIMSI [1]: 505024101215070
basicService [15]: Telephony
location [19]:
Traced Party Location [1]: LAC: 301 Cell ID/SAC: 2
Other Party location [2]: Not Available
ssInformation [20]:
supplServicesUsed [1]: Bar Outgoing
ssAction [3]: invocation (5)
msClassmark [22]: 1F 03 20 10 00 FF
startTime [31]: 2002-08-12 16:38:32.030
endTime [32]: 2002-08-12 16:38:32.030
eventNumber [33]: 718F
sequenceNumber [12]: 1000
recordReason [13]: Call Barring
Figure 6-51
Explicit Call Transfer CTR Example
Header:
tracedParty [0]: MSISDN: 61411216070
tracedReference [1]: 1
transactionID [2]: 8
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:42:33.089
endTime [9]: 2002-08-12 16:42:33.089
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: MSISDN Originated Call
servedIMSI [1]: 505024101216070
location [19]:
Traced Party Location [1]: Not Available
Other Party Location [2]: Not Available
ssInformation [20]:
supplServicesUsed [1]: ECT
ssAction [3]: invocation (5)
ssInvokeId [6]: 10
msClassmark [22]: 1F 02 40 10 FF FF
startTime [31]: 2002-08-12 16:42:33.089
endTime [32]: 2002-08-12 16:42:33.089
eventNumber [33]: A18F
sequenceNumber [12]: 1000
recordReason [13]: Call Transfer
Figure 6-52
Multi Party CTR Example
Header:
tracedParty [0]: MSISDN: 61411215066
tracedReference [1]: 1
transactionID [2]: 1
omcID [3]: 45678
mscBssTraceType [4]: 0x00
startTime [8]: 2002-08-12 16:47:28.066
endTime [9]: 2002-08-12 16:47:28.066
recordingEntity [10]: 614181000000
traceEventRecords [11]:
invokingEvent [0]: MSISDN Terminated Call
servedIMSI [1]: 505024101215066
callingcalledNumber [4]: Calling Num: 61411215066#E.164#Internation
Number
location [19]:
Traced Party Location [1]: LAC: 301 Cell ID/SAC: 9
Other Party Location [2]: Not Available
ssInformation [20]:
supplServicesUsed [1]: Three Party Call
ssAction [3]: invocation (5)
ssInvokeId [6]: 10
msClassmark [22]: 1F 03 20 10 00 FF
startTime [31]: 2002-08-12 16:47:28.066
endTime [32]: 2002-08-12 16:47:28.066
eventNumber [33]: E18F
sequenceNumber [12]: 1000
recordReason [13]: Multi Party
Figure 6-53
SMS CTR Example
Header:
tracedParty [0]: IMSI: 505021120313001
tracedReference [1]: 1234
omcID [3]: 5432
mscBssTraceType [4]: 0xFF
startTime [8]: 2002-07-01 12:30:45.009
endTime [9]: 2002-07-01 12:30:45.009
recordingEntity [10]: 123456789ABCDE123456789ABCDE
traceEventRecords [11]:
invokingEvent [0]: Mobile Originated Call (MOC)
servedIMSI [1]: 505021120313001
servedMSISDN [3]: 61411002133001#X.121#No number present,
through call to carrier
callingcalledNumber [4]: Original Calling Num:
535353535353535353535353535353#X.121#No number present, cut-through call
carrier
location [19]:
Traced Party Location [1]: LAC: 1 Cell ID/SAC: 257
Other Party Location [2]: Not Available
msClassmark [22]: 35 30 35 30 35 30
startTime [31]: 2002-07-01 12:30:45.009
endTime [32]: 2002-07-01 12:30:45.009
eventNumber [33]: 013F
sequenceNumber [12]: 2468
recordReason [13]: SMS
Figure 6-55
Classmark Update CTR Example
Header:
tracedParty [0]: IMSI: 505021120313001
tracedReference [1]: 2
omcID [3]: 5432
mscBssTraceType [4]: 0xFF
startTime [8]: 2002-07-01 12:30:45.011
endTime [9]: 2002-07-01 12:30:45.011
recordingEntity [10]: 123456789ABCDE123456789ABCDE
traceEventRecords [11]:
invokingEvent [0]: Mobile Originated Call (MOC)
servedIMSI [1]: 505021120313001
servedMSISDN [3]: 61411002133001#E.164#National Number
location [19]:
Traced Party Location [1]: LAC: 1 Cell ID/SAC: 257
Other Party Location [2]: Not Available
msClassmark [22]: 35 30 35 30 35 30
startTime [31]: 2002-07-01 12:30:45.011
endTime [32]: 2002-07-01 12:30:45.011
eventNumber [33]: 013F
sequenceNumber [12]: 2468
recordReason [13]: Classmark Update
Figure 6-56
Handover CTR Example
Header:
tracedParty [0]: IMSI: 505021120313001
tracedReference [1]: 3
omcID [3]: 5432
mscBssTraceType [4]: 0xFF
startTime [8]: 2002-07-01 12:30:45.044
endTime [9]: 2002-07-01 12:30:45.044
recordingEntity [10]: 123456789ABCDE123456789ABCDE
traceEventRecords [11]:
invokingEvent [0]: Mobile Originated Call (MOC)
servedIMSI [1]: 505021120313001
servedMSISDN [3]: 61411002133001#E.164#No number present,
through call to carrier
location [19]:
Traced Party Location [1]: LAC: 1 Cell ID/SAC: 257
Other Party Location [2]: Not Available
msClassmark [22]: 35 30 35 30 35 30
startTime [31]: 2002-07-01 12:30:45.044
endTime [32]: 2002-07-01 12:30:45.044
eventNumber [33]: 013F
sequenceNumber [12]: 2468
recordReason [13]: Handover
Figure 6-57
Activate Trace window
If the Disable Query to HLR option is not selected, then the HLRs are listed
under Network Element and the provisioning request is sent to the selected
HLR(s). The activation request is sent to the HLR first and if the IMSI is not
present in the HLR database, then the operator is asked for confirmation if the
IMSI needs to be provisioned as a Foreign Subscriber. This is the default
behavior of the CT GUI.
The Disable Query to HLR option can also be saved as a user preference
when the operator exits the CEM GUI. The Save Call Trace Settings option
under the General preferences saves the settings updated by the user.
Tools 7
The Core Element Manager (CEM) can launch additional tools that allow you
to interface with managed DMS Core elements: Mobile Services switching
Center (MSC) or Home Locator Register (HLR), the Universal Signalling
Point (USP), and CS2000 Succession elements: Audio Provisioning Server
(APS), Gateway Controller (GWC), Universal Audio Server (UAS), Line
Maintenance Manager (LMM), Trunk Maintenance Manager (TMM).
Tools menu 7
Figure 7-1 shows the Tools menu.
Figure 7-1
Tools menu options
• Use Encryption - Toggle on and off encryption for MAP, Telnet, and FTP
connections.
• Set AutoLogin -
Toggle on and off the automatic login for MAP, Telnet,
and FTP connections.
• MAP - Launch multiple Maintenance and Administration Position (MAP)
command interfaces (CIs) to monitor and control the Core elements.
• Telnet - Launch Telnet interfaces to managed Core elements, SDMs and
other hosts.
• FTP - Launch FTP interfaces to managed Core elements, SDMs and other
hosts.
• SSH Suite - Lists options of SSH protocols for establishing secure Telnet,
FTP, and MAP sessions between the CEM Client Workstation and a
remote host.
• USP Visual Basic GUI -
Manage USP OA&M functions. (PC Element
Manager only). Supports USPs/SLRs that are based on USP8.0 or earlier.
• USP Java GUI - Manage USP OA&M functions. (PC Element Manager
only). Supports USPs/SLRs that are based on USP8.1 or higher.
Messaging 7
The Messaging window is launched by selecting Messaging from the Tools
menu (Figure 7-1). This window (Figure 7-2) allows users to send messages
to all users connected to a selected node.
Figure 7-2
Messages window
Nodes are selected one at a time from the list of connected nodes in the Send
to Users On drop-down menu. Below the Send to Users On drop-down menu
is a blank area for typing the message.
At the top of the Messages window is a menu bar with two options: File and
Help.
Selecting Help links you to the on-line User Guide at the location that details
the Messaging function.
To clear one message, select a message and right click on it. A pop-up menu
appears. Click on Clear.
Just below the menu bar is an area to display all or some of the messages that
have been sent. Message filters, in the form of character strings, may be
entered in the blank Filter Messages text box. Only those messages that
contain the filter are displayed.
At the top of this message display box are five category headings. You can
drag the division lines between categories and change the size of each
column. The messages can be sorted by any of the categories, in ascending or
descending order. There is an arrowhead in the heading selected for sorting,
pointed up or down, depending on the order chosen.
Maintenance commands 7
The Maintenance Commands window is launched by selecting a network
element in the Configuration Manager, and then either selecting the
Maintenance Commands menu item in the Tools menu (Figure 7-1) or
pressing Ctrl+D.
Selecting Help is links you to the on-line User Guide at the location that
details the Maintenance Commands window to aid you in constructing
complicated maintenance commands based on the attribute available in the
Info window for a node.
The Maintenance commands menu has three submenu items (see Figure 7-3):
• Commands Window - Launches the Maintenance Commands window
• Export Maintenance Commands - Launches a File dialog which takes the
name of a file to which the maintenance commands for all the resources in
the Element Manager should be saved
• Import Maintenance Commands - Launches a File dialog which prompts
you to enter the name of the file from which the maintenance commands
should be imported into the Element Manager.
Figure 7-3
Maintenance Commands window
The icon displayed at the left side in the Maintenance Commands window
represents the node currently selected in the configuration area of the CEM
browser. This is dynamically updated when a different node is selected in the
configuration area.
The Maintenance Commands list box allows you to enter or edit maintenance
commands for an element and execute them dynamically. The list box
displays the maintenance commands available for the selected node. This list
is dynamically updated when a different node is selected in the configuration
are of the CEM browser.
When a command is selected from the list, the Menu Command and the Actual
Command for the entry selected are displayed in the text fields to the right of
the list.
By default, the commands rts, busy, post and offline are supplied for all the
nodes in a file, where applicable. On start-up the commands are read from the
file and the command lists for the nodes are populated.
After doing a post on certain nodes, the response may be longer than a single
screen. In that case, the MAP prompts you with “more...”. Press ENTER to
display the next screen of information.
Table 7-1
Maintenance commands window fields and buttons
Item Definition
Menu Command box Displays the Menu command, the descriptive name of the maintenance
Command, for a node. This field is displayed when a user selects a
command from the list, and it can be edited and cleared when New button
is clicked.
Actual Command box Displays the Actual command to be executed on the MAP session for a
node selected. This field can be edited and cleared when New button is
clicked.
New button Clears the Menu command and Actual command text areas, and allows
the user to enter a new command for a selected node.
Delete button Allows the user to select a command from the list and remove it.
Apply button Saves the Menu command and Actual command and immediately displays
them. It also updates the pop-up menu for that node.
OK button Closes the Maintenance Commands window, prompting the user to save
any unsaved information (if the apply button was not selected) before
closing the window.
Import button Imports maintenance commands for a resource from a file into the
Element Manager.
Export button Exports the maintenance commands for a resource from the Element
Manager to a file.
Help button Launches the On-line Help window and the loads the section of the User
Guide which explains in detail the procedure to add commands using the
attributes of the node available in the “Info Window”.
@componentInstance macro
The @componentInstance macro creates the component name that will be
sent to the MGW when a maintenance command is selected and should only
be used with MGW components. This macro is implemented because
components can appear in multiple places in the component hierarchy and
For example, if the user selects the VC4 component illustrated in Figure 7-4,
the macro will generate the string “LP/15 SDH/0 VC4/0”.
Figure 7-4
VC4 Component
VC4 Component
The final command sent to the MGW node will be “help LP/15 SDH/0 VC4/
0” as show in Figure 7-5.
Figure 7-5
Final Help Command
Help
Command
For user convenience, a ‘telnet’ menu item will be available on the pop-up menu
of the USP components. The components that will have the ‘Telnet’ menu item
are:
• USP/SLR
• UNPM
• routeset
• linkset-group
• combined-linkset
• linkset
• link
• slot
The CEM browser provides pop-up menu options for available maintenance
actions on USP and UNPM resources in the GUI containment tree. Users can
select a specific maintenance action and the command will be posted to an
opened telnet session of the specified USP or UNPM. This is similar to how
the DMS commands are executed in the CEM GUI.
The following are the maintenance actions on USP components that are
supported through the pop-up menu items which often do not require additional
data in order to perform the action:
• shelf component
— post
• slot (card) component
— post (show)
— lock
— unlock
— offline
— load
— swact
• routeset component
— post (show)
— activate
— de-activate
• linkset-group component
— post (show)
• combined-linkset component
— post (show)
• linkset component
— post (show)
— activate
— de-activate
• link (SLC) component
— post (show)
— activate
— de-activate
— inhibit
— uninhibit
— test
Note 1: Only maintenance action on the slot and routeset components can
be performed when the USP is on USP7 load because USP7 telnet
interface cannot recognized actions for the other components.
— swact
• routeset component
— post
— activate
— de-activate
• combined-linkset component
— post
• linkset-group component
— post
• linkset component
— post
— activate
— de-activate
• link (SLC) component
— post
— activate
— de-activate
— inhibit
— uninhibit
— test
Note: This is useful for nodes like “DAT-0-2” under “FP”, where
@unitnumber [1] can be used to identify “fpScsiNum” which is ‘0’ and
@unitnumber[2] can be used to identify “fpDeviceNum” which is “2”.
4) In the Actual Command field, enter the actual command to be entered at the
command prompt. Refer to the “Construct maintenance commands” section.
5) Select Apply.
6) Select Done.
Note: The commands are stored per class. Once you add a command for a
particular element, it applies for all the elements of the same type or class
name.
Procedure 7-2
Delete a Maintenance command
3) Select Delete.
4) Select Done.
Procedure 7-3
Edit a Maintenance command
1) From the Configuration Manager window, select the network element to
receive the command.
4) In the Actual Command field, edit the command. Refer to the “Construct
maintenance commands” section.
5) Select Apply.
6) Select Done.
Use Encryption 7
When connecting through MAP, Telnet, or FTP to managed Core elements,
Use Encryption (Figure 7-6) determines whether the information sent is to be
encrypted or not.
Figure 7-6
Use Encryption menu item
Set AutoLogin 7
When connecting through MAP, Telnet, or FTP to managed Core elements, Set
AutoLogin enables the automatic login functionality. Clicking on Set
AutoLogin in the Tools menu (Figure 7-1) toggles the automatic login on and
off. When there is a checkmark preceding the Set AutoLogin option, the
automatic login is enabled.
MAP 7
For each Core element, you can display a standard MAP interface and
manually enter the commands at each command level. The MAP submenu is
shown in Figure 7-7.
Figure 7-7
MAP submenu
When logging into the MAP command interface (CI), the standard Core
element security is enforced. Therefore, prior to accessing the MAP interface,
your system administrator must assign you a valid user name and password
for that Core element.
Figure 7-8
MAP Login window
the credentials permanently in the CEM System, the user has to invoke the
Preferences window (refer to “Transparent user preferences” on page 2-
22) and check mark the “Save Login Credentials” checkbox under the
Tools tab.
• OK - When this button is clicked, following verifications are performed:
— The first user ID and password fields should have a value in it. It
cannot be empty. If this field is empty, an error message will be
displayed.
— If second user ID is entered then second password has to be entered. If
this field is empty, an error message will be displayed.
— If second password is entered then the second user ID has to be
entered. If this field is empty, an error message will be displayed.
— If third user ID is entered then third password has to be entered. If this
field is empty, an error message will be displayed.
— If third password is entered then the third user ID has to be entered. If
this field is empty, an error message will be displayed.
— If third user ID and password should not be allowed if second user ID
and password are left empty. If this field is empty, an error message
will be displayed.
• Cancel - When this button is clicked, the dialog and the MAP session
window closes.
File menu
The File menu is located on the MAP and Telnet windows ().
Table 7-2
File menu options
—sheet 1 of 2—
Table 7-2
File menu options
Logout Allows you to logout from the session and close the
window.
—sheet 2 of 2—
Preferences menu
The Preferences menu is located on the MAP and Telnet windows (Table 7-3).
Table 7-3
Preferences Menu Options
Preferences Definition
Menu
Options
Terminal Allows you to change the number of rows that can be set
Rows for the terminal. Supported values are 24, 48, 100, 200,
and 400 rows. The default number of rows set for a
terminal is 200.
Smaller Font Allows you to reduce the font size of the text displayed in
the terminal by a decremental value of 1 pixel.
Larger Font Allows you to increase the font size of the text displayed
in the terminal by an incremental value of 1 pixel.
Note: Terminal Preferences are only valid for the current session of the
CEM browser and are not restored when the CEM browser is restarted.
A node may have several post commands which represent different ways of
posting a node. These post commands have unique descriptive names. Only
the post command is executed when a node is double-clicked: Other post
commands can only be executed by selecting them from the pop-up menu for
the node.
Telnet Interface 7
The Telnet submenu appears as shown in Figure 7-9.
Figure 7-9
Telnet submenu
Note: In the case of DMS nodes, even though the associated host is Core,
the Telnet host defaults to the mediation device which is SDM/FT.
The Telnet Host Information Login window (Figure 7-10) contains the
following:
• Host - This is a field where the user enters the IP address or the hostname
of the Telnet Server (machine that the user wants to connect to).
• OK - When this button is clicked, the following verification is performed:
— The Host field should have a value in it. It cannot be empty. An error
message will be displayed if the Host field is empty.
• Cancel - When this button is clicked, the dialog and the Telnet session
window closes.
Figure 7-10
Telnet Login Host Information window
The Telnet Login dialog can be displayed when the login credentials for the
selected host are previously saved on the CEM System, or when the user
manually enters the login credentials for the selected host and wants to save it
on the CEM System. If the automatic telnet login fails, an Automatic Telnet
Login Failure window is displayed and the user has to enter the login
credentials manually on the selected host. If the automatic telnet login on the
selected host fails, the error message “You entered an invalid login name or
password” is displayed and the user will be asked to login manually.
Figure 7-11
Telnet Login window
— The password field should have a value in it. It cannot be empty. If the
password field is empty, an error message will be displayed.
• Cancel - When this button is clicked, the dialog and the Telnet session
window closes.
Figure 7-12
Configure Telnet Timeout Value Window
Figure 7-13
Select MGW node
Select MG
Node
Figure 7-14
Establish telnet session
Select Available
Telnet Session
The operator will then supply a valid MGW user name and password as
shown in Figure 7-15.
Figure 7-15
MGW login
After the telnet session is established, the operator can then invoke the MG
pop-up menu and display the available maintenance commands.
Figure 7-16
Invoke pop-Up menu
Select Command
From List
Finally, the telnet window will be brought to the front and the command
results displayed for the operator as shown in Figure 7-16.
Figure 7-17
Command response
Error messages
An error message will be displayed to the user if there is no telnet terminal
open to the selected MGW node or if the terminal is not selected as
“Targeted”.
The operator then invokes the MGW pop-up menu and selects the “Telnet”
command as shown in Figure 7-18.
Figure 7-18
Select telnet command
Select Telnet
Command
The operator will then supply a valid MGW user name and password as
shown in Figure 7-15.
FTP interface 7
The File Transfer Protocol (FTP) submenu appears as shown in Figure 7-19.
Figure 7-19
FTP submenu
Figure 7-20
FTP Login Host Information window
The FTP Login Host Information window (Figure 7-20) contains the following:
• Host - This is the field where the user enters the IP address or the
hostname of the FTP Server (machine that the user wants to connect to).
• OK - When this button is clicked, following verifications are performed:
— The Host field should have a value in it. It cannot be empty. If this
field is empty, an error message will be displayed.
• Cancel -
When this button is clicked, the dialog and the Telnet session
window closes.
The FTP Login dialog is displayed when the login credentials for the selected
host are previously saved on the CEM System or when the user manually
enters the login credentials for the selected host and wants to save it on the
CEM System. If the automatic FTP login fails, the user will need to click on
the Connect button, manually enter the user ID and Password, and click on
the OK button.
Figure 7-21
FTP Login window
Timeout Value submenu item. The Configure FTP Timeout Value window
(Figure 7-12) is displayed. The default timeout value is 10 minutes. The
OMC-S System verifies the user’s input and stores it into the user preferences
file which is based on the user ID used on the PC Login.
Figure 7-22
Configure Telnet Timeout Value Window
FTP window
The FTP window consists of various panes, which provide user the ability to
perform various operations supported by the FTP protocol.
Figure 7-23
File transfer interface window
The various regions of the FTP window are illustrated in detail in the
following sections.
• The local file window which displays the files and directories in the
current directory of the local or remote machine. The pane is provided
with a scroll bar.
• The file or directory displayed in the local file window is highlighted
when it is selected. A double click on a directory drills down and displays
the contents of the directory and updates the current directory.
The buttons are associated with the operations that can be performed on a local
or remote machine:
• List Vols Button - (Remote System only) Launches a window with
complete list of SLM and DDU volumes on the DMS node. This is only
applicable to File Transfers to and from DMS nodes.
• ChgDir Button - Allows you to change the current directory.
• MkDir Button - Allows you to create a directory in the present working
directory.
• Rename Button - Allows you to rename a file or a directory.
• Delete Button - Allows you to select files or directories and delete them.
• Refresh Button - Allows you to get a fresh copy of the contents displayed.
The actions corresponding to these buttons are performed only if the user has
the right permissions to execute the actions.
Below the Local System and Remote System panes are two radio buttons
(mutually exclusive) which allow you to select the mode in which the files will
be transferred:
• ASCII - Sets the mode to ASCII.
• Binary - Sets the mode to Binary.
FTP console
This text area at the bottom of the FTP window, displays the messages sent by
the remote machine after every operation is performed. From these messages,
you can determine the status of the FTP connection to the remote machine.
You can also type FTP commands manually and execute them. The FTP
commands that are supported can be displayed by entering “?” or “help” in
the FTP console.
SSH suite 7
The SSH Suite (Figure 7-24), as part of the CEM browser, provides series of
Graphic User Interface (GUI) windows that allow the user to access different
SSH services from the CEM browser. The SSH Suite, which is available in Sun
Solaris and MS-Windows (i.e. Windows NT/2000/XP) platforms, provides the
following services:
• SSH (Telnet): Secured Telnet and Secured MAP Login through
“passthru”
• SFTP: Secured FTP
The user can invoke different SSH services (i.e. SSH Telnet, SFTP, etc.) from
the CEM browser by going to the main menu of the CEM browser and
selecting ‘Tools’, then ‘SSH Suite’, then selecting one of the items on the
submenu. The CEM Browser only supports user (i.e. manual) initiated SSH
sessions.
Figure 7-24
SSH suite submenu
Establishing an SSH secured MAP session directly with the DMS is not
currently supported. However, an SSH user initiated MAP session can be
established through the use of the SDM “Passthru” functionality. To utilize
this “Passthru” functionality, a “passthru” account must be established on the
SDM. With the use of SSH, the user logs in as CMuser (no password
required), the SDM automatically connects this SSH session to CM. The user
must then be authenticated by the CM by entering a valid user ID and
password. After successful authentication, a MAP session is established. For
this MAP session, the communications between the CEM Browser and the
SDM/FT is secured by SSH and communications between the SDM/FT and
the CM is internal and remains safely hidden from the outside world.
To securely retrieve a file from the DMS, the user must first FTP the file from
the DMS to the SDM/FT. This step should be done from an SSH secured
MAP session. The user can then use SFTP or SCP to retrieve the file from the
SDM/FT. To securely send a file to the DMS, the user will first transfer the
file to the SDM/FT using SFTP or SCP. The file can then be moved to the
DMS by logging into the CM (from and SSH secured MAP session) and
using FTP to transfer the file from the SDM/FT to the DMS.
SSH (Telnet)
SSH Telnet provides a secured way to logon to the remote node. The user can
use either a passkey or a password as the login authentication mechanism.
Once the login is successful, then all commands issued from the client’s
terminal will be encrypted before sending to the server and will be decrypted
at the server site. SSH Telnet is meant to replace legacy non-secure ‘telnet’
and ‘rlogin’ applications.
Figure 7-25
SSH (Telnet) window
— Path to the Key File: Full path to the key file stored on PC.
— Key and Protocol type: Protocol to be used based on the selected key.
– rsa1
– rsa2
– dsa
If all input information from the SSH (Telnet) was validated successfully, the
SSH session will be started in a command prompt window. Figure 7-26 shows
an SSH session connected to a server. From this command prompt window,
the user can issue the telnet command just like a normal telnet session.
Figure 7-26
SSH (Telnet) session
When user clicks on the ‘Browse’ button located below the ‘Path to File’ text
field, the system navigator window will pop up. Using this window, the user
can browse their local hard drive to select the key file. The navigator window
for the key will be preset to filter with file extension “.PPK”
• No User Name Input - This window displays when user clicks the OK
button in the SSH (Telnet) window without entering the host name.
• No Key’s Protocol Selected - This window displays when user clicks the
OK button in the SSH (Telnet) window without selecting the Key and
Protocol type.
SSH (Telnet) window (Sun Solaris Platform)
The SSH (Telnet) window (Figure 7-27) allows user to input all information
that is required to start an SSH session from OpenSSH. This window contains
the following:
• Remote Server Host Name: The host name or IP address of the remote
server.
• User Name: User name to log on the remote system.
Note: By default, OpenSSH will automatically try the authentication in
the following order: 1) rsa2 2) dsa 3)UNIX password. Hence, there is no
need for user to select protocol if the CEM browser is running in Sun
Solaris platform.
Figure 7-27
SSH (Telnet) window
The switch login ID and password will be required to log on to the CM/XA-
Core.
SFTP
SFTP provides a secured way to transfer files from/to the remote host. The
user can use either passkey or user password as login authentication
mechanism.Once the login is successful, all FTP commands issued from the
client’s terminal will be encrypted before being sent to the server and will be
decrypted at the server site. The SFTP application is meant to replace the
legacy ‘ftp’ application, which is unsecured. The CEM browser provides
SFTP access on MS-Windows platforms as well as Sun Solaris platforms.
Figure 7-28
SFTP window
Note 1: If the user chooses not to enter any data in the ‘Path to the Key
File’ text field, the application will automatically use password as login
authentication.
— Path to the Key File: Full path to the key file stored on PC.
— Key and Protocol type: Protocol used based on the key selected.
– rsa
– dsa
Note 2: The protocol selected from this list and the protocol used when
the key is generated must be the same.
When the user clicks on the ‘Browse’ button which is located below the ‘Path
to File’ text field, the system navigator window will pop up. Using this
window, the user can browse their local hard drive to select the key file. The
navigator window for the key will be preset to filter with file extension
“.PPK”.
If all the input information from the SFTP window was validated
successfully, the secured FTP session will be started in a command prompt
window. From this command prompt window, the user can issue FTP
commands just like a normal FTP session.
If all the input information from the SFTP window was validated
successfully, the secured FTP session will be started in a xterm. From this
xterm, the user can issue FTP commands just like a normal FTP session.
Figure 7-29
SFTP window (Sun Solaris Platform)
SCP
SCP provides a secured way to copy files from/to the remote host. The user
can use either a passkey or a password as the login authentication mechanism.
Once the login is successful, all SCP commands issued from the client’s site
will be encrypted before being sent to the server and will be decrypted at the
server site. The SCP application is meant to replace the legacy ‘rcp’
application, which is unsecured.
Figure 7-30
SCP window
Note: If user chooses not to enter any data in the ‘Path to the Key File’
text field, the application will automatically use a password as login
authentication.
— Key and Protocol type: Protocol to be used based on the key selected.
– rsa1
– rsa2
– dsa
Figure 7-31
SCP window with System Navigator
Key generation
The key generator for SSH on MS-Windows will be done through the PuTTY
Key Generator, a third party software key generation utility. Figure 7-32
shows the PuTTY Key Generator window invoked from the CEM browser.
Figure 7-32
PuTTY Key Generator
Figure 7-33
New key
The public and private keys should be saved in the same directory.
In order to prevent the system from unwanted hacking, the user should always
supply a passphrase for every generated key.
A limitation on PuTTY reading the path in Windows is that the path to the
public key and private key directory should not contain the ‘ ‘ (white space
character). If there one or more ‘ ‘ characters in the path where the keys are
saved, the user will see an error message stating that there is an ‘Invalid port
number.’
2. From the menu, select ‘Tools’ -> ‘SSH Suite’ -> ‘Key Generation’. As the
result, the ‘PuTTY Key Generator’ for windows will be started (Figure 7-
32).
3. From the ‘Actions’ frame, click the ‘Load’ button to start the navigator
window. Navigate to the directory where the private key has been saved
and open the designated private key.
4. If there is a passphrase associated with this key, user will be prompted to
enter the passphrase (Figure 7-34).
Figure 7-34
Enter passphrase window
5. As the result, the key will be loaded into the key ‘PuTTy Key Generator’
window (Figure 7-35).
Figure 7-35
Existing key window
Figure 7-36
Copying the key information
Note 2: The keys will be stored in the keys file (i.e., authorized_keys or
authorized_keys2) one line per key.
Note 3: If there is an existing key file, the best way to handle the new key
is to append the key at the end of the key file.
Figure 7-37
SSH key generator window
The user needs to supply the Pass Phrase and select the key type at the Key
Generator window and click the ‘OK’ button (Figure 7-37).
As the result, an xterm window will pop up and prompt the user for the path
to save the key file. By default, the key file will be saved at $HOME/.ssh
(Figure 7-38).
Figure 7-38
xterm window
Note 2: If the Pass Phrase field is emptied, the key will still be generated.
This key can be installed in any SSH server. Once the key is installed, the
user can login on to the server without authentication.
WARNING:
It is a security risk to generate the key without a Pass
Phrase.
Note 3: Always use the default directory to save the generated key. In the
Sun Solaris platform, the OMC-S SSH Suite was designed to look for the
key in the default directory. If there is an existing key of the same type, the
old key will be overwritten.
USP Visual Basic GUI only supports USPs/SLRs that are based on USP8.0 or
earlier. USPs/SLRs that are based on USP8.1 or higher require launching of
the USP Java GUI.
The USP Visual Basic GUI is launched by selecting USP Visual Basic GUI in
the Tools Menu (Figure 7-39).
Figure 7-39
USP Visual Basic GUI
Note: The USP Visual Basic GUI software must be installed on the
workstation before launching it from the Element Manager. Refer to NTP
411-8111-937 for details.
Figure 7-40
Launch GUI window
Note: The USP Visual Basic GUI and the SESM Manager items are visible
only on the Windows-based PC workstation.
The command to launch the USP Visual Basic GUI is saved and displayed in
the Enter Command window. You can change the command before clicking
the OK button.
This window is not displayed after the first time, if the Don’t ask again box is
checked. The Launch GUI window is displayed again when the command to
launch is not executed, even if the Don’t ask again box has been checked.
Clicking the OK button launches the USP Login window, as shown in Figure
7-41.
Figure 7-41
USP login window
This USP Login window prompts you for your User ID and Password. It then
allows you to select a site from the Site drop-down box. Finally, it allows you
to click the Connect button and connect to the selected site.
Note: The menu item will not be shown if the USP based device is not of
load 8.1 or higher.
If the table ID is available, the launched GUI will bring up the associated
table after user validation passes. The user only needs to select Retrieve
button on the GUI to retrieve the table contents. If the table ID is not
available, then in-context launch displays the user validation window with the
device already selected.
If a USP GUI is running and launched by CEM GUI, every attempt will be
made to re-use the existing GUI when the device of interest is the same as the
one the GUI is connected to.
• Any alarm that cannot correlate to a discovered object will be put in the
MISCELLANEOUS container of the USP object tree.
• No initial resource state is available through the USP interface.
• All Swerr and Info logs clear when re-synchronization of the alarm is
performed.
• If no card or routeset is retrieved from the USP interface, the associated
containers will not be created in the object model.
• Synchronization of alarms on the OMC-S can be completed only when
the heartbeat or info/swerr log is received by the CEM.
• USP Performance Management provides a different set of counters than
those available on the DMS.
• By using the configuration tool to update the managed SLRs will result in
the removal of the previously managed SLRs and start fresh to manage
the SLRs specified in the new update.
• USP GUI needs to be installed on the PC in order to support connection to
USP based devices; Java GUI for USP8.1, Visual Basic GUI for USP8.0
or earlier load.
• Java GUI will have to be provisioned with the USP/SLR/UNPM IP
addresses prior to requesting in-context launch; else the Java GUI could
not perform in-context launch.
• Visual Basic USP GUI does not have the ability to perform in-context
launch.
Administration management 8
Administration Manager 8
The Administration Manager is accessed through the main menu bar (see
Figure 8-1). The administration manager can also be invoked through the
pop-up menu on the SDM node in CM area. It consists of a number of
graphical components and screens which allows you to monitor the status of
the SDMs in the system.
Figure 8-1
Administration menu
The user interface consists of the main monitor window, which displays the
status of the currently selected SDM and allows you to switch the view to
another SDM. The background color changes to indicate state.
Status monitoring
The Administration Manager main window (see Figure 8-2) consists of a list
of monitored SDMs on the left side of the window, and a status display area
beside that.
Figure 8-2
Administration manager main window
When the Administration Manager is first started, it connects with all SDM
machines that the user has requested (using the “Add SDM” menu option),
and creates an entry in the SDM List for each.
If the SDM is selected in the APPL level in the CM panel, and the user selects
“Administration Manager” from the pop-up menu on the SDM, then the
Administration Manager will automatically select the chosen SDM in the list.
Otherwise, the first SDM that responds to the Administration Manager’s
request for the information is shown.
The label associated with the problem area in the status display will also turn
the same color. For example, if one of the logical volumes exceeds its
threshold, the entry associated with that SDM will turn red.
If there is a problem with one of the SDM machines being monitored by this
window, the list item associated with the SDM will change color.
Data lists
There are three data lists in the display area for each SDM. Each list has a
label at its top left corner, which identifies the data being displayed in the list.
When the amount of space being used in a logical volume meets or exceeds
the threshold level, the numbers under the level and threshold columns turn
red. When all monitored logical volumes are below their thresholds, the
numbers will turn black (normal).
Applications list
The second list in the window displays the current state of the system’s
applications. Each application consists of one or more processes.
Force Out 8
The Force Out window is launched by selecting Force Out from the
Administration drop-down menu (Figure 8-1).
The Force Out window (Figure 8-3) contains File and Help drop-down
menus. Selecting File allows a user to print or close the window. Selecting
Help opens an online User’s Guide.
Figure 8-3
Force Out window
The Force Out window contains two tabs: Users and Elements. The Users tab
provides a list of users, host connected from, and the date and time of the
connection. The Elements tab contains the Element ID, the host connected
from, and the date and time of the connection. Users can be forced out from
either tab.
To force out a user from the Users tab view, select a node from the
Configuration Management panel. This displays a lists of users for that node.
Highlight the user to be forced out and then right-click. This removes the
selected user from the node.
To force out a user from the Elements tab view, select a user to get a list of
elements, highlight the desired element and then right-click.
Note: If a user who launched CEM from the W-NMS GUI is forced out
of the managed feed and they want to get the managed feed again, the user
must exit CEM by using File -> Close and then re-open the CEM window
from the W-NMS GUI.
Limitations
• Remote users cannot be forced out.
• Force out does not allow certain features when:
— GEM17 GUI is connected to a GEM15 Stand Alone SDM
— GEM16 GUI is connected to a GEM15 Stand Alone SDM
• The features which are not supported in the above circumstances are:
— showing the CEM login user names
— showing any users connected since and connected from user ID
Note: From the Sun Server, users control only applications on the server.
From the Element Browser, users control applications of all servers added
to the browser.
Figure 8-4
Application Management tool
Menu bar
The Application Management Tool window menu bar offers two options:
• Close - exits the Application Management interface.
• Action - allows the user to Rts, ManB, or OffL an application.
Information window
The information window provides the user with the following application
information:
• Application Name - displays the application name in a hierarchical
structure.
• Process ID - displays the process ID of the application that is running on
the server.
• Version - displays the software version of the application, after the
application has begun.
• State - displays the current status of the application.
• InSv/ManB/Fail Time - displays the time when the application is started,
stopped, or the time it fails.
• Service Ports - displays the service names and port numbers that the
application will listen on.
Application states
An application can exist in one of the following states:
• InSv (In Service) - indicates the application is functioning properly.
• IsTb (In Service Trouble) - indicates part of the application functionality
is not working.
• ManB (Manual Busy) - indicates the application has been manually
halted.
• Fail - indicates the application has been abnormally terminated and cannot
be restarted.
• OffL (Off Line) - indicates the application is not running.
One or more applications form a package. The state of the package depends on
the state of all related applications. For example:
• If all applications of a package are in the same state, then the state of the
package is the same as its applications.
• If one or more applications are in the IsTb state, the state of the package is
IsTb.
• If one or more applications have died or are busied, and at least one other
is still running, the state of the package is IsTb.
• If one or more applications have died and the rest are all busied, the state
of the package is Fail.
Figure 8-5
Application Management commands
This action can also be performed using the Action drop-down menu from the
menu bar.
Once ManB is selected, a prompt appears confirming the action. The ManB
confirmation window is shown in (Figure 8-6). When ManB, an application
has a default grace period of 60 seconds to finish its current process.
Figure 8-6
ManB Confirmation Window
If the connection between the Element Manager Browser and the server is
lost, a Lost Connection to the Server message displays at the bottom of the
information window and all application states on that server will be shown as
Unknown.
Figure 8-7
Command Line Interface
Status >
Command > busy omBill
Figure 8-8
Change CEM Password window
The Change CEM Password window contains the items listed in Table 8-1.
Table 8-1
Change CEM Password window Fields and Buttons
Item Definition
—sheet 1 of 2—
Table 8-1
Change CEM Password window Fields and Buttons
Item Definition
—sheet 2 of 2—
Invalid Current Password! This error message is display when an incorrect current
password is entered in the Current Password field. Upon
acknowledging the message, the user may enter the
correct Current Password.
Password Change Failed: Invalid This error message is displayed when the new password
Password Syntax entered does not comply with password syntax policy
enforced by the LDAP Directory Server or the DCE
Security Server. Upon acknowledging the message, the
user may enter a new password that complies with the
password syntax policy.
Password Change Failed: Invalid This error message is displayed when the new password
Password Length entered does not comply with password syntax policy
enforced by the LDAP Directory Server or the DCE
Security Server. Upon acknowledging the message, the
user may enter a new password that complies with the
password syntax policy.
Password Change Failed: Password This error message is displayed when the new password
should not be trivial, e.g. zero-length, entered does not comply with password syntax policy
userId=password enforced by the LDAP Directory Server or the DCE
Security Server. Upon acknowledging the message, the
user may enter a new password that complies with the
password syntax policy.
—sheet 1 of 2—
Table 8-2
Change CEM Password Error Windows
New Password cannot be empty! The error message is displayed when the new password
field is empty.Upon acknowledging the message, the user
may the new password that complies to the password
syntax policy.
New Password and Confirmation This error message is displayed when the confirmation
Password do not match! password does not match the new password entered. The
confirmation password has to match the new password.
Upon acknowledging the message, the user enter in the
new password again in the Confirm New Password field.
Password Change Failed: Password This error message is displayed when the new password
can not be the same as previous entered in the Change Password dialog window exists in
password the password history. Upon acknowledging the message,
the user enter in the new password that has not does not
exist in the password history. The number of passwords
that can be stored in the password history can be
configured on the LDAP Server or on the DCE Security
Server.
Password Change Failed: User is not This error message is displayed when the user attempts to
allowed to change password change his/her password and the configuration on the
LDAP Server or the DCE Security Server is set to User not
permitted to change password. For the users to be able to
change their passwords, the security server should be
configured to enable this functionality.
—sheet 2 of 2—
The OMC-S system will respond appropriately to any error indications when
the password complexity described above has not been followed at the time of
user changing the password.
The OMC-S system will utilize the necessary User Database commands to
authenticate a user and will respond appropriately to any error indications
with respect to the user authentication.
The Group Access Control menu item is displayed under the Administration
menu (Figure 8-1). Clicking on this menu item displays the Configure Group
Access Control window.
Groups can either be defined by the customer or can simply be a single User
Classification. A Customer Defined Group consists of a combination of User
Classifications and Network Elements (i.e. a series of User Classifications are
associated with one or more Network Elements). The operator privileges
defined by a User Classification are fixed and cannot be modified.
User groups
FMUser
For users belonging to this User Classification, the CEM System
automatically sets the operation privileges to permit access to all Fault
Management and all Observer Functions on all of the Network Elements
added into the CEM System.
CMUser
For users belonging to this User Classification, the CEM System
automatically sets the operation privileges to permit access to all
Configuration Management and all Observer Functions on all of the Network
Elements added into the CEM System. Of course, this only applies to
Network Elements that permit Configuration Management from the CEM
System.
PMUser
For users belonging to this User Classification, the CEM System
automatically sets the operation privileges to permit access to all Performance
Management and all Observer Functions on all of the Network Elements
added into the CEM System.
CTUser
For users belonging to this User Classification, the CEM System
automatically sets the operation privileges to permit access to all Call Trace
and all Observer Functions on all of the DMS Nodes added into the CEM
System.
Observer
For users belonging to this User Classification, the CEM System
automatically sets the operation privileges to permit access to all Observer
Functions only on all of the Network Elements added into the CEM System.
An Observer is a more restricted User Classification than those previously
described.
CEMAdminUser
For users belonging to this User Classification, the CEM System
automatically sets the administration privileges to permit the access to all the
Observer and administrative functions on the CEM System.
Groups must first be defined on the LDAP Directory Server or the DCE
Security Server and then the Group must be correlated to a particular user. On
the LDAP Directory Server, the Group names are first added to the Group
Organizational Unit. The correlation of a Group to a User is then
accomplished by defining the Group as a value of the attribute “ou” belonging
to that user.
Example
UserA has the user classification as CMUser, FMUser. These classifications
are values assigned to the attribute “ou” in the UserA profile.
On a LDAP Server, Groups have to be defined on the LDAP Server under the
Group Domain:
CMUser is defined
FMUser is defined
PMUser is defined
CTUser is defined
Observer is defined
CEMAdminUser is defined
GroupA is defined
GroupB is defined
GroupC is defined
On the DCE Security Server, the correlation between the Group and the User
belonging to the particular Group is established by defining the individual
user as a principle of that Group.
The Group privileges established by the CEM administrator are saved on all
of the CEM Servers. These privileges go into effect when the user belonging
to the Group logs into the CEM Browser and establishes connection with the
DMS-nodes corresponding to CEM Servers.
If the user is already logged into the CEM Browser and has established
connections with the DMS nodes prior to the CEM administrator modifying
the privileges for that user’s Group, the user shall maintain its prior privileges
until the user re-establishes the connections with the DMS-node by either
logging out completely from the CEM browser and logging in again or
disconnecting the connection to the DMS node in the existing login session
and then reconnecting to the DMS-node.
Figure 8-9
Configure Group Access Control Window
Figure 8-11
Help Menu
Field descriptions
• Group Name - This is the field that indicates the name of the Group as
defined in the LDAP Server or the DCE Security Server.
• Region - This is the field that the region in which the corresponding
Network Element(s) are defined.
• Network Elements - This is the field that indicates the Network Element
name, for example, the MSC name, HLR100 name, SGSN name etc., on
which the corresponding access privileges apply.
• FM Functions - This is the field that indicates whether or not Fault
Management functions are allowed on the corresponding Network
Elements. The values in this field can be either ‘Y’ indicating that the FM
functions and all the Observer functions are allowed or ‘N’ indicating that
the FM functions and all the Observer functions are not allowed.
• CM Functions - This is the field that indicates whether or not
Configuration Management functions are allowed on the corresponding
Network Elements. The values in this field can be either ‘Y’, indicating
that the CM functions and all the Observer functions are allowed or ‘N’,
indicating that the CM functions and all the Observer functions are not
allowed.
• PM Functions - This is the field that indicates whether or not
Performance Management functions are allowed on the corresponding
Network Elements. The values in this field can be either ‘Y’, indicating
that the PM functions and all the Observer functions are allowed or ‘N’,
indicating that the PM functions and all the Observer functions are not
allowed.
• CT Functions - This is the field that indicates whether or not Call Trace
functions are allowed on the corresponding Network Elements. The
values in this field can be either ‘Y’, indicating that the PM functions and
all the Observer functions are allowed or ‘N’, indicating that the PM
functions and all the Observer functions are not allowed.
• Observer Only Functions - This is the field that indicates whether or not
Call Trace functions are allowed on the corresponding Network
Elements. The values in this field can be either ‘Y’, indicating that the PM
functions and all the Observer functions are allowed or ‘N’, indicating
that the PM functions and all the Observer functions are not allowed.
• Filter - This is the field where the user may enter a string that will filter
out and only display the list of Group Access Information that have that
matching string in any of the above fields.
Pop-up menu
A pop-up menu is available on the Configure Group Access Control window
(Figure 8-9) which can be displayed by clicking on the right mouse button. The
items in the Pop-Up menu are enabled only if the one or more rows are selected
prior to initiating the display of the menu.
Figure 8-12
Group Access Control Pop-Up Menu
Button functionality
Down at the bottom of the Configure Group Access Control window (Figure
8-9), there are radio buttons which can be set, or not set, by an Administrative
user to allow or disallow the appropriate functions.
Note: None of the radio buttons have an effect until the Apply button is
clicked. The settings of the radio buttons only affect the selected row(s).
When none of radio buttons are set and Apply button is clicked, then the
users belonging Groups indicated in the selected row(s) would be not be
permitted to do any CEM functionality.
• Allow FM Functions - This is a radio button: when set, implies that the
restricted Fault Management Functions and all Observer Functions are to
be permitted on the Network Element(s) indicated in the selected row(s)
by the users belonging to Group(s) indicated in the selected row(s).
When not set, implies that the restricted Fault Management Functions and
all Observer Functions are not to be permitted on the Network Element(s)
indicated in the selected row(s) by the users belonging to Group(s)
indicated in the selected row(s).
• Allow CM Functions - This is a radio button: when set, implies that the
restricted Fault Management Functions and all Observer Functions are to
be permitted on the Network Element(s) indicated in the selected row(s)
by the users belonging to Group(s) indicated in the selected row(s).
When not set, implies that the restricted Fault Management Functions and
all Observer Functions are not to be permitted on the Network Element(s)
indicated in the selected row(s) by the users belonging to Group(s)
indicated in the selected row(s).
• Allow PM Functions - This is a radio button: when set, implies that the
restricted Performance Management Functions and all Observer
Functions are to be permitted on the Network Element(s) indicated in the
selected row(s) by the users belonging to Group(s) indicated in the
selected row(s).
When not set, implies that the restricted Call Trace Functions and all
When not set, implies that Observer Only Functions are not to be
permitted on the Network Element(s) indicated in the selected row(s) by
the users belonging to Group(s) indicated in the selected row(s).
• Apply - This button is to apply the setting indicated by the radio buttons
to the selected row(s).
• Save - This button is to submit the Group Access Control information into
the CEM system.
• Close - Closes the Group Access Control window.
Error/status messages
• A Warning window is displayed information regarding whether or not the
Group Access Control information could be saved successfully on the
given server in the Current CEM System.
• A Confirm window is displayed when the user attempts to close the
Group Access Control window without first attempting to Save the
information
The W-NMS user privileges will be based on the Group names assigned to the
“ou” attribute in their LDAP profile. The “ou” attribute can have the value of
any of the predefined Groups such as CMUser, PMUser, FMUser, CTUser,
CEMAdminUser or Observer. It can also have value of any other customer
defined groups.
On-line help 9
The OMC-S Element Manager contains several on-line help facilities,
designed to provide you with the information you need, when you need it,
without leaving the application you are working in. You can find information
automatically, according to where you are in the tool.
Note: The CEM online help is not available to users for SIG, GGSN and
SGSN network elements.
Figure 9-1
Help menu
The following paragraphs describe the individual items in the Help menu.
On Version...
Selecting “On Version...” will display a window (Figure 9-2) showing the
details about the version of the Core Element Manager being used. To close
the window, click anywhere on the window.
Figure 9-2
Core Element Manager Version window
User’s Guide
Selecting “User’s Guide” allows online viewing of the OMC-S Element
Manager User Guide. When you click on “User’s Guide” from the Help
menu, it will take you to the beginning of the OMC-S Element Manager
User’s Guide in the Help facility.
Help on Help
Selecting “Help on help” opens the Help facility if it is not already open.
Figure 9-3
Info window
Click on the Help button at the bottom of the Info window to open the Help
window and show help for the selected alarm.
Figure 9-4
Help window
By moving the cursor over the buttons you can see the function for each
button. The left pane of the window contains the table of contents and search
facility. You can navigate to any of the items in the table of contents by
clicking on it. The right pane of the window displays a page of help content.
Note: The Help window toolbar will display a spinning Nortel globemark
(Figure 9-5) to indicate when a page is loading.
Figure 9-5
Nortel globemark
Annotations
Annotations are user-defined notes which can be added to supplement the
help content. They are displayed to the user in a pop-up web browser window.
Only one annotation is allowed per page.
Figure 9-6
Annotation icon
An annotation dialog box is displayed. Type your note and click “Save”.
Figure 9-7 provides an example. Be aware that the pop-up web browser
window will display the annotation as HTML text.
Note: You can use Ctrl-x to cut, Ctrl-c to copy and Ctrl-v to paste from
the system clipboard.
Figure 9-7
Adding an annotation
The text formatting such as line breaks may not be reflected in the pop-up
web browser window (see Figure 9-13).
HTML tags can be entered into the annotation to enable text formatting
(Figure 9-8).
Figure 9-8
Adding HTML text to annotation
To check the correctness of the HTML text, click on the “Verify HTML”. If
the HTML text is correct, a “Verify HTML” message box appears (Figure 9-
9).
Figure 9-9
Verify HTML
If the HTML text is incorrect, an “HTML parsing errors” box appears (Figure
9-10).
Figure 9-10
HTML parsing errors
If the HTML text is correct, the text formatting will be reflected in the pop-up
web browser window (see Figure 9-14).
Figure 9-11
Help window with annotation list
Figure 9-12
Web icon
Figure 9-13
Annotation in pop-up window without using HTML formatting
Figure 9-14
Annotation in pop-up window using HTML formatting
Delete annotation
To delete the annotation, click on the delete icon (Figure 9-15).
Figure 9-15
Delete icon
Figure 9-16
Delete annotation
Import annotation
The import annotation icon (Figure 9-17) allows you to import an annotation
from outside the OMC-S Element Manager. Click on the import icon.
Figure 9-17
Import icon
Go to the directory containing the file you want to import (Figure 9-18).
Figure 9-18
Import annotation file
Note: You can only have one annotation per file. If you already have an
annotation file for the current page and you import an annotation, a dialog
box will prompt you to confirm replacing an existing annotation file
(Figure 9-19).
Figure 9-19
Replace annotation file
Export annotation
You can export an annotation to a directory by clicking on the export icon
(Figure 9-20).
Figure 9-20
Export icon
Locate the directory to export the annotation file, specify a file name for the
export file and click on Save (Figure 9-21).
Figure 9-21
Export annotation file
Search
The Help system uses a full-text search engine which not only retrieves files
with matching text but also ranks the “hits” according to the number of items
found.
To access the search panel, click on the search icon (Figure 9-22). To initiate a
search, type the search text in the “Find” field and press Return. Multiple
terms may be specified by separating them with commas or spaces in the
“Find” field.
Figure 9-22
Search window
Figure 9-23
Found items
The number returned in the left column indicates the number of times the
query was matched in the listed topic.
The red circle indicates the ranking of the matches for that topic. There are
five possible rankings, ranging from a completely filled circle indicating the
best matches to a completely empty circle indicating the least applicable
matches.
Figure 9-24
Performance Manager window
Figure 9-25
Performance management window with query button
Index A
A C
Action(s) 4-18 Call Trace 1-8
icons 4-7 Cancellation index xxx
Alarm 3-26 CEM Security 1-24
Alarm data Change CEM Password 8-10
export 2-25 Group Access Control 8-13
Alarm Severity 3-4 User Login Window 1-3
Alarm(s) 4-11 Clear Default Login Id 3-5
clearing 4-15 Clear Layout 3-5
manual clear 4-15 Cleared by 4-13
status colors and letters 4-14 Color Nodes by 3-4
Annotation 9-5 Configuration 1-8
add or edit 9-5 menu 1-10, 3-3
delete 9-9 menu options 1-10, 3-6, 3-31
export 9-11 Configuration Management
import 9-10 window 1-6, 3-7
view existing 9-8 in list mode 3-21, 3-22, 3-26, 3-27
view list 9-7
Application(s) D
start 1-2 Drill down 3-3
Drill up 3-3
B DrillDown 3-4
Background DrillUP 3-4
clear 3-5
set 3-5 E
background image Element(s)
clear 3-13 information window 3-7
format 3-12 Execute 7-17
set 3-12
F
Fault 1-8
menu 1-10
Fault Management
window 1-6
File 1-8 P
menu 1-9 Performance 1-8
Filter(s) 4-18 Propogated Severity 3-4
H R
Help Region 3-23
menu 9-1
search 9-12
Hide 3-4 S
Set Background 3-12
Set Default Login Id 3-5
I State 3-26
icon(s) Sub Alarms 3-26
arrange 3-13
Info 3-4
Info Log 2-20 T
Information bubble tool bar 1-6, 3-2, 4-4
with the number of sub-elements 3-14 icon descriptions 3-3, 4-5
L W
Log(s) Window(s)
informational 2-20 display 2-2
M
MAP
commands
adding 7-12, 7-13
menu bar 1-6
N
Network
example layout 2-12
setup 2-11
GSM / UMTS
Voice Core Network
OAM User Guide
To order documentation from Nortel Networks Global Wireless Knowledge Services, call
(1) (877) 662-5669
Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as
progress in engineering and manufacturing may warrant.
* Nortel Networks, the Nortel Networks logo, the Globemark HOW the WORLD SHARES IDEAS, and Unified Networks are
trademarks of Nortel Networks. DMS, DMS-HLR, DMS-MSC, MAP, and SuperNode are trademarks of Nortel Networks. GSM is a
trademark of GSM MOU Association.
Trademarks are acknowledged with an asterisk (*) at their first appearance in the document.
Document number: 411-8111-503
Product release: GSM18/UMTS04
Document version: Preliminary 05.02
Date: March 2005
Originated in the United States of America