Bsc6910 Umts Lmt User Guide(v100r021c10_02)(PDF)-En
Bsc6910 Umts Lmt User Guide(v100r021c10_02)(PDF)-En
Bsc6910 Umts Lmt User Guide(v100r021c10_02)(PDF)-En
V100R021C10
Issue 02
Date 2019-09-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Preface
Overview
This document describes the functions and relevant components of the BSC6910
Local Maintenance Terminal (LMT). It also provides instructions for performing
basic operation and maintenance (OM) tasks of the BSC6910.
Product Versions
The following table lists the product version and the solution version related to
this document.
Intended Audience
This document is intended for:
● Network engineers
● System engineers
● Field engineers
Contents
Preface........................................................................................................................................... ii
1 Change History.........................................................................................................................1
2 Introduction to LMT................................................................................................................5
2.1 Configuration Requirements of the LMT PC.................................................................................................................. 6
2.2 Logging In to and Logging Out of the LMT...................................................................................................................9
2.3 Components of the LMT Main Page.............................................................................................................................. 14
2.4 Obtaining a Documentation Package............................................................................................................................18
2.5 File Manager...........................................................................................................................................................................19
2.6 User-defined Command Group........................................................................................................................................ 23
2.7 LMT Software......................................................................................................................................................................... 25
2.7.1 Installing LMT Offline Tools...........................................................................................................................................25
2.7.2 LMT Offline MML.............................................................................................................................................................. 27
2.7.2.1 Introduction to the LMT Offline MML Server...................................................................................................... 27
2.7.2.2 Logging In to and Out of the LMT Offline MML Tool...................................................................................... 28
2.7.2.3 Introduction to the LMT Offline MML Window.................................................................................................. 29
2.7.2.4 Preparing Offline MML Scripts.................................................................................................................................. 31
2.7.3 Convert Management System.......................................................................................................................................31
2.7.4 Performance Browser Tool............................................................................................................................................. 33
2.7.5 TrafficRecording Review Tool........................................................................................................................................ 34
5 Alarm/Event Management..................................................................................................65
5.1 Concepts Related to Alarm Management.................................................................................................................... 65
5.1.1 Alarm Type........................................................................................................................................................................... 66
5.1.2 Alarm Severity.................................................................................................................................................................... 66
5.1.3 Alarm-Event Type.............................................................................................................................................................. 67
5.1.4 Alarm Flag........................................................................................................................................................................... 68
5.1.5 Alarm Box............................................................................................................................................................................. 69
5.2 Managing Alarm Logs......................................................................................................................................................... 70
5.2.1 Setting Storage Limitations of Alarm Logs.............................................................................................................. 70
5.2.2 Querying Storage Limitations of Alarm Logs.......................................................................................................... 71
5.3 Managing Alarm Masking Conditions........................................................................................................................... 71
5.3.1 Creating an Alarm Masking Condition...................................................................................................................... 71
5.3.2 Deleting an Alarm Masking Condition...................................................................................................................... 72
5.3.3 Querying an Alarm Masking Condition..................................................................................................................... 72
6 Log Management.................................................................................................................. 84
6.1 Logs........................................................................................................................................................................................... 84
6.2 Setting Log Storage Limitations...................................................................................................................................... 85
6.3 Querying Operation/Security Logs................................................................................................................................. 85
6.4 Obtaining Operation/Security Logs................................................................................................................................ 86
6.5 Obtaining Running Logs..................................................................................................................................................... 87
6.6 Collecting Logs....................................................................................................................................................................... 88
7 Trace Management............................................................................................................... 93
7.1 Concepts................................................................................................................................................................................... 93
7.1.1 Tracing Principles............................................................................................................................................................... 93
7.1.2 Management of Tracing Operation Rights............................................................................................................... 94
7.1.3 Tracing Mode...................................................................................................................................................................... 95
7.1.4 Tracing Specifications....................................................................................................................................................... 95
7.2 Basic Tracing Operations.................................................................................................................................................... 96
7.2.1 Browsing Traced Messages Online.............................................................................................................................. 96
7.2.2 Viewing the Interpretation of Traced Messages..................................................................................................... 97
7.2.3 Saving Traced Messages.................................................................................................................................................. 98
7.2.4 Browsing Traced Messages Offline..............................................................................................................................99
7.2.5 Managing Tracing Tasks............................................................................................................................................... 101
7.2.6 Managing the Trace File............................................................................................................................................... 101
7.3 Device Commissioning...................................................................................................................................................... 102
7.3.1 Tracing OS Messages..................................................................................................................................................... 102
7.3.2 Emergency Diagnosis..................................................................................................................................................... 103
7.3.3 Capturing Packets........................................................................................................................................................... 104
10 FMA...................................................................................................................................... 225
10.1 Fault Overview.................................................................................................................................................................. 228
10.2 Fast Fault Diagnosis........................................................................................................................................................ 231
10.3 Hierarchical Delimitation...............................................................................................................................................241
10.4 Recovery Confirmation................................................................................................................................................... 244
10.5 Information Collection................................................................................................................................................... 245
10.6 Business Validation.......................................................................................................................................................... 246
10.7 Business Query.................................................................................................................................................................. 252
10.8 Independent Rules Update........................................................................................................................................... 253
10.9 List of Alarms for UMTS Fault Diagnosis.................................................................................................................254
12 FAQ....................................................................................................................................... 266
12.3.3 Corrupted Characters Appearing When the csv File Is Opened in UTF-8 Coding..................................327
12.3.4 Maximum Number of LMT Clients That Can Be Started on One PC Simultaneously..........................330
12.3.5 Any Further Operation Performed When Some LMT Web Pages Fail to Update Causes the Web
Pages to Turn Blank.................................................................................................................................................................. 331
12.3.6 Configuring the HTTPS Login Mode...................................................................................................................... 331
12.3.7 Unable to Save Tracking and Monitoring Data................................................................................................. 332
12.3.8 BTS Nodes Cannot Be Displayed Under Device Navigation Tree.................................................................333
12.3.9 LMT Login Web Page Cannot Be Opened with the PC OMU Installed..................................................... 334
12.3.10 Slow Response During an LMT Login................................................................................................................. 335
12.3.11 Batch Execution of MML Commands Fails Because Some MML Commands Contain Invisible
Carriage Returns or Line Feeds............................................................................................................................................. 336
12.3.12 How to Handle Shortcut Key Invalidation.........................................................................................................337
12.3.13 Tracing File Not Being Uploaded to the Specified Directory...................................................................... 337
12.3.14 Error Dialog Box Displayed When Online Help Is Opened..........................................................................338
12.3.15 Garbled Characters Displayed in the Chinese Names of Files in the File Manager and These Files
Failing to Be Removed............................................................................................................................................................. 338
12.3.16 Failure to Obtain the Verification Code When Users Attempt to Log In to the Web LMT After a
Version Upgrade or Rollback................................................................................................................................................. 339
1 Change History
02 (2019-09-30)
Compared with Issue 01 (2019-06-06) of V100R021C10, this issue includes the
following changes.
Delet None
ed
Editorial Added the description of the command that controls automatic start
change of the FMA function. For details, see 10.2 Fast Fault Diagnosis.
01 (2019-06-06)
Compared with Draft B (2019-04-15), this issue includes the following changes.
Technical Add ● Added the description that "The Java bit version must be
change ed the same as that of the operating system, for example,
32-bit Java for 32-bit operating system." For details, see
2.1 Configuration Requirements of the LMT PC.
Mod ● Changed the Save Result button to Start Save and the
ified Download Report button to Export in the MML
command window. For details, see 4.1.2 Components of
the MML Command Window.
● Changed "The Progress tab page is displayed" to "The
WebLMT dialog box is displayed". For details, see 2.3
Components of the LMT Main Page.
Dele None
ted
Editorial Revised descriptions about how to delete temporary Java files. For
change details, see 12.2.1 Help for Installing and Using the Java Plug-in.
Draft B (2019-04-15)
Compared with Draft A (2018-12-31), this issue includes the following changes.
Technical Add ● Added the following description: "When you log in to the
change ed LMT or click other Java functions, the WebLMT dialog box
is not displayed. Instead, a message dialog box is
displayed." For details, see 2.2 Logging In to and Logging
Out of the LMT.
● Added descriptions about the Download Report
parameter in the "MML command window" table. For
details, see 4.1.2 Components of the MML Command
Window.
● Added the following description in Procedure: "In the
WebLMT dialog box that is displayed, click the Batch
tab." For details, see 4.3 Batch Processing of MML
Commands.
● Added the path for saving message tracing files. For
details, see 7.2.3 Saving Traced Messages.
● Added the path for saving monitoring result files. For
details, see 8.2.3 Saving Monitoring Data.
Draft A (2018-12-31)
Compared with Issue 01 (2018-03-31) of V100R020C10, this issue includes the
following changes.
Editorial ● Added the following operation: On the Business tab page, set
change the time to query the alarm status. For details, see 10.7
Business Query.
● Added a caution about accessing LMT on a Firefox browse.
For details, see 2.2 Logging In to and Logging Out of the
LMT.
2 Introduction to LMT
Hardware Requirements
Table 2-1 describes the hardware requirements of the LMT PC.
RA 1 1 GB 512 MB
M
Ha 1 80 GB 10 GB
rd
dis
k
CD 1 - -
dri
ve
Software Requirements
NOTICE
● You are advised to run the LMT on a PC with the recommended configurations
to ensure stable operation.
● The LMT in the current version is compatible with 32-bit/64-bit operating
systems and 32-bit/64-bit web browsers.
● When using the LMT, ensure that the IE window is zoomed at 100% level.
Otherwise, the layout of the LMT graphical user interface (GUI) may be
abnormal. To check whether the IE window is zoomed at 100% level, view the
scaling icon at the lower right corner of the IE window.
● Port 80 is the default Hypertext Transfer Protocol (HTTP) port, which is used for web
page browsing.
● Ports 20 and 21 are File Transfer Protocol (FTP) ports.
● Port 443 is the default Hypertext Transfer Protocol Secure (HTTPS) port, which is used
for HTTPS login mode.
● The speed of web page browsing speed is highly dependent on bandwidth. An LMT PC
with the recommended configuration can speed up browsing, thereby improving your
browsing experience. If you use an LMT with the minimum configuration, you can use
all LMT functions. The browsing speed, however, will be relatively slow.
● Effective bandwidth indicates the bandwidth available for the LMT. If many programs
compete with the LMT for bandwidth resources, a serious delay occurs despite a
bandwidth of 2 Mbit/s.
Context
● You have installed the JAVA Platform Standard Edition Runtime Environment
(JRE) program before using the LMT. If no JRE plug-in is installed, a message
is displayed when you log in to the LMT, prompting you to install the plug-in.
Follow the instructions to install the plug-in. If the JRE plug-in on the LMT PC
is not the latest version, a message is displayed, prompting you to upgrade
the plug-in version. In this case, you are advised to uninstall the existing JRE
plug-in and then install a new version. If you cannot log in to the LMT after
you upgrade the JRE program, restart the web browser and retry.
● If the Java Update Needed popup is displayed when you log in to the LMT,
select Update (recommended) to install the latest version.
● A maximum of 32 local users and EMS users can log in to the LMT.
● You can log in to the BSC6910 LMT as a Local user or an EMS user.
– Local users:
Managed independently by the BSC6910 LMT. You can log in to the
BSC6910 when you are installing the BSC6910 system or when the OMU
is disconnected from the U2020. User admin is a default local user.
– EMS users:
Managed by the U2020. They are created, modified, authenticated, and
authorized by the U2020. Only authorized EMS users can log in to the
BSC6910 using the LMT. For BSC6910 operations, authorized EMS users
can also log in to the U2020 server through the U2020 client.
When the LMT is running, do not modify the system time and time zone.
Otherwise, severe errors may occur in the system. Close the LMT window before
you modify the system time and time zone.
NOTICE
● Do not use refresh the browser on the LMT. Refreshing the main page, you will
be logged out of the LMT. Refreshing the tracing or monitoring page, a
message indicating a script error will be displayed.
● If you log in to the LMT through the IE browser, do not modify any file folder
properties. Otherwise, the IE browser is automatically refreshed, and error
occurs on the LMT.
● Before logging in to the LMT through the IE browser, enable the IE browser to
support HTTP 1.1 as follows: In the IE browser, choose Tools > Internet
Options > Advanced > HTTP 1.1 Setting and select Use HTTP 1.1. If the IE
browser is configured with login to the LMT through a proxy server, select Use
HTTP 1.1 through proxy connection.
● Before logging in to the LMT in the Internet Explorer (IE) browser, perform the
following operations:
● Choose Tools > Internet Options in the IE browser and click the Privacy
tab in the Internet Options dialog box. On the Privacy tab page, move
the slider in the Settings field to the middle until Medium is displayed on
the right of the slider. Then, click Sites. The Per Site Privacy Actions
dialog box is displayed. In the Address of Web site text box, enter the IP
address of each website that is allowed to use cookies, and click Allow.
● You are also advised to perform the following operations: Choose Tools >
Internet Options in the IE browser and click the General tab in the
Internet Options dialog box. Clear the Delete browsing history on exit
check box on the General tab page.
● If AVG Internet Security is installed on an LMT PC, the web shield function
must be disabled. Otherwise, a dialog box will be displayed, showing
"Disconnected. Please log in again."
● The default policy to log in to the LMT can be specified by the WebLMT Login
Policy parameter in the SET WEBLOGINPOLICY command. The parameter can
be set to any of the following values. (1) COMPATIBLE(Compatible): Either
HTTP or HTTPS can be used to log in to the LMT. (2)
HTTPS_ONLY(Https_only): Only HTTPS can be used to log in to the LMT. (3)
LOGIN_HTTPS_ONLY(Login_https_only): When HTTP is used to log in to the
LMT, HTTP is changed to HTTPS before login, then HTTPS returns to HTTP after
login. Data over HTTP is transmitted in plaintext and prone to disclosure.
Therefore, the value HTTPS_ONLY(Https_only) is recommended.
● If LMT Login Policy is set to HTTPS_ONLY(Https_only) and the LMT login
policy set on the U2020 GUI is HTTP, the U2020 will fail to log in to the LMT
using the proxy server.
● By default, the LMT supports TLS1.0, TLS1.1, and TLS1.2. You can set the
supported SSL/TLS protocol type by running the SET WEBLOGINPOLICY
command. The SSL/TLS protocol with a higher security level is recommended,
and SSL3.0 or TLS1.0 is not recommended. The LMT always supports TLS1.2,
which cannot be disabled.
● The Java plug-in is incompatible with the IE browser. As a result, when you
open the Save window while creating a window to log in to the WebLMT
(using the windows.open algorithm), the new window is delayed. This problem
occurs only in IE 8 and IE 9, not in IE 10 and later versions. In addition, this
problem does not occur in a WebLMT later than RAN20.0.
Procedure
Step 1 Enter the LMT login page by using one of the following modes:
Mode Mode Operation
Description
Mode 1: The LMT directly Type the external virtual IP address of the
direct connects to the OMU in the Address bar of the IE browser.
connection OMU without Press Enter on the keyboard, or click Go
using any proxy next to the Address bar to enter the login
server. window of the BSC6910.
NOTE
If another proxy server is already set, you need to
add OMU_IP to the IP addresses that do not use
the proxy server under Exceptions. Set the IP
addresses under Exceptions by using the
following method: Choose Tool > Internet
Options on the tool bar of the IE browser. In the
Connection tab page, click LAN Settings. In the
displayed window, click Advanced. In the
displayed Proxy Settings window, specify an IP
address that does not use the proxy server under
Exceptions. For example, OMU_IP or U2020_IP.
Mode 2: The LMT 1. You can set the U2020 proxy server in the
connection connects to the browser by using the following method:
through the OMU through Choose Tool > Internet Options on the tool
U2020 that is the U2020 that bar of the browser. In the Connection tab
configured as is configured as page, click LAN Settings. Then specify the
the proxy the proxy server IP address and port number of the U2020
server for the browser. server in the Proxy server area. The default
NOTE port number is 8080.
This mode is NOTE
recommended After the IP address and port No. of the U2020
when the U2020 proxy server are specified, you need to select the
proxy server Use the same proxy server for all protocols
needs to be used option.
to connect to the
OMU. 2. Type the external virtual IP address of the
OMU in the Address bar of the browser.
Press Enter on the keyboard, or click Go
next to the Address bar to enter the login
window of the BSC6910.
● When you are logging in to the LMT using the second or third method, settings on the
U2020 and on the NE side must be consistent with the setting mapping listed in the
following table. Otherwise, the login fails.
● You can run the LST WEBLOGINPOLICY command to query the policy for login to LMT and
data transmission.
● For details about how to set the policy for logging in to the LMT on the U2020 GUI, see
section Setting Web LMT Options in U2020 Data Management User Guide.
U2020 Security Connection Mode Policy for Login to LMT and Data
Transmission
● If port 8080 is used as the U2020 proxy port, enter the user name and
password of the proxy server when you open the LMT main page, Trace,
Monitor, Batch, Device Maintenance, or FMA tab page, and so on. The default
user name and password of the proxy server are proxyuser and
Changeme_123, respectively.
● You need to change the password upon the first login to LMT (including the
first login after the password is reset by the administrator) only when the
switch First Login Must Modify Password Switch is turned on. You can set
the switch parameter by running the SET PWDPOLICY command.
● It is recommended that you change the password at your first login and then
change the password every three months.
● You can view the LMT main page after a successful login. In the lower right part of the
LMT main page, the fields related to the latest login are displayed, including Use
Default Password, Last Login IP, and Last Login Time.
● After a successful login to the LMT main page, when you click the batch processing,
tracing, monitoring, or device maintenance function, the Local Maintenance Terminal
window is opened for you to execute commands or view data and results. For details
about how to open the Local Maintenance Terminal, see How to Open the Local
Maintenance Terminal.
● Before logging in to the BSC6910 as an EMS user, you need to set up a connection
between the BSC6910 and the U2020 server.
● If the login fails, click Reset. Specify User Name, Password, and Verification Code
again to log in. If the login fails again, check whether the connection between the LMT
and the OMU is normal.
Step 4 Optional: To lock the LMT window, click Lock in the top right corner of the LMT
main page.
Step 5 To exit the LMT, click Logout in the top right corner of the LMT main page.
● After logout, the login interface for User type of Local is displayed. On this login interface, if
you want to re-log in to the LMT on the EMS, you must set User type to EMS.
● HTTPS is the default mode. You can log in to the LMT through the HTTP Secure (HTTPS)
mode. Based on HTTP, HTTPS introduces SSL or TLS to ensure security.
● Before logging in to the LMT through HTTPS, configure the HTTPS login mode and
certificate files by referring to 12.3.6 Configuring the HTTPS Login Mode.
● In HTTPS mode, if you need to connect to the OMU with the U2020 as the proxy server, you
are advised to adopt mode 2. Visiting the OMU by adopting mode 3 takes four times the
time taken by adopting mode 2.
● To log in to the LMT through HTTPS, enter https://the external virtual IP address of the
OMU, for example, https://10.141.115.219, in the Address bar of the browser.
● Correct errors displayed during the login by referring to 12.1.8 The Error "Certificate
Invalid" Is Displayed During an HTTPS Login and 12.1.9 The Error 'Mismatched Address'
Is Displayed During an HTTPS Login.
● After entering the HTTPS login page, which is the same as the HTTP login page, perform the
same operations for a login.
----End
GUI
Figure 2-1 shows the LMT main page.
Alarm/Event You can query active alarms, alarm logs, and alarm
configuration on this tab page. For details, see 5 Alarm/
Event Management.
Trace You can manage message tracing tasks on this tab page.
For details, see 7 Trace Management.
Monitor You can monitor performance data on this tab page. For
details, see 8 Performance Monitoring.
Device You can maintain the device panel on this tab page. For
Maintenance details, see 9 Device Panel.
Component Description
MML You can run MML commands on this tab page. For
details, see 4.1.2 Components of the MML Command
Window.
Progress You can view the progress of a task on this tab page. The
eGBTS does not support this function.
NOTE
Click Progress. The WebLMT dialog box is displayed. Double-
click an entry to view the detailed information in the displayed
Progress Management dialog box.
FTP Tool Click FTP Tool on the toolbar. The FTP tool help page is
displayed.
System Settings You can click it to modify the auto lock time and path for
saving result files.
● Auto Lock Time(s): You can specify a time period as
required. If there are no mouse or keyboard operations
during the specified time period, the LMT
automatically goes to the locked page. The setting
prevents unauthorized users from using others'
accounts to perform unauthorized configuration and
maintenance.
● Result File Save Path: You can specify a path for
saving operation result files. The default path is C:
\Web LMT\MBSC\output.
● Security Instructions: deselected by default. Once
selected, security instructions are prompted on the
login page.
File Manager You can click it to upload files from the LMT to the OMU
and download files from the OMU to the LMT. For
details, see 2.5 File Manager.
About You can click it to display the current version of the LMT.
Component Description
Lock You can click it to lock the current operation page for
security purposes.
NOTE
● After you click Lock on the toolbar, the LMT is locked.
● You can click in the blank area on the web page or press
Enter, type the password, and then click OK or press Enter to
log in to the LMT workspace again.
Logout You can click it to log out the current user without exiting
from the LMT. Logout of one user facilitates login of
another user.
Online Help
The LMT provides the following two types of online help:
● Online help system
● MML help
Table 2-5 describes the contents and startup method of the LMT online help.
Startup Method
On the toolbar of the LMT, click Obtain Documentation List.
GUI
● Library Name: Name of a documentation package of the current product
version.
● Product Version: Current product version number.
● Library Version: Version number of the documentation package of the
current product version.
● Available at support.huawei.com:
– Yes indicates that the documentation package has been released globally,
and you can obtain it from http://support.huawei.com.
– No indicates that the documentation package has not been released at
http://support.huawei.com and you can contact Huawei engineers to
obtain it.
Function
You can use either of the following methods to download a documentation
package:
NOTICE
Startup Method
On the toolbar of the LMT, click File Manager in the WebLMT dialog box that is
displayed.
Users' operation rights to the File Manager depend on their rights settings. For descriptions of
the operation rights, see 3.1.4 Operation Rights.
● ADMINISTRATOR-level and admin-level users have full operation rights to the File Manager.
● Users at other levels can only use the File Manager to download files. They are not
authorized to upload or delete files.
GUI
Figure 2-2 shows the window of the File Manager.
● You can only type a path under the root directory on the File Manager server (for
example, /bam/common/log).
● A slash (/) in front of the root directory is optional.
– Modified time: You can specify a time from the year 2000 to 2038. If
both Start time and End time are set, End time must be later than Start
time.
– Files can be searched by File name. The file name has a maximum of 50
bytes containing only English letters, numbers, dots, and underscores.
● For easy differentiation, the icon of the folder for which the search criteria has
File List
This area displays files in a selected folder.
Only files meeting specific search criteria are displayed under a folder that is configured
with search criteria.
You can select a file, right-click it, and choose Refresh, Upload, Download, or
Delete from the shortcut menu.
If a target directory has been specified and the File Manager has been running before the target
directory is specified, the target directory for saving downloaded files does not change.
When the bandwidth is 2 Mbit/s, you are advised to concurrently download a maximum of 1000
files and upload a maximum of 50 files.
Task List
This area displays information about current tasks. You can perform the following
operations on the tasks:
● Clear Finished Task:
Right-click the blank area in the task list and choose Clear Finished Task
from the shortcut menu to clear all finished tasks from the task list.
● Clear Selected Task:
Select a task, right-click it, and choose Clear Selected Task from the shortcut
menu to remove the task from the task list.
● Pause Selected Task:
Select an ongoing upload/download task in the task list, right-click it, and
choose Pause Selected Task from the shortcut menu to suspend the current
upload/download task.
● Continue Selected Task:
Select a suspended upload/download task in the task list, right-click it, and
choose Continue Selected Task from the shortcut menu to resume the
upload/download task.
● Clear Failed Task: Right-click the blank area in the task list and choose Clear
Failed Task from the shortcut menu to clear all failed tasks from the task list.
● Download Selected Task: Select a task to be downloaded, right-click it, and
choose Download Selected Task from the shortcut menu to download the
task.
● Set Display Columns:
Right-click the blank area in the task list, choose Set Display Columns from
the shortcut menu, and select information to display in the submenu.
Startup Method
On the toolbar of the LMT, click User-defined Command Group, as shown in
Figure 2-4.
Only the admin, ADMINISTRATOR-level, and authorized CUSTOM-level users are allowed to
perform this operation.
If an authority-limited user performs this operation, an error message will be displayed,
indicating an operation failure.
GUI
Figure 2-5 shows the User-defined Command Group dialog box.
Table 2-7 describes the components of the User-defined Command Group dialog
box.
Prerequisites
● A valid serial number for the LMT software has been obtained.
● The PC for installing the LMT Offline Tools complies with the specifications
described in 2.1 Configuration Requirements of the LMT PC.
● When the LMT Offline Tools of the current version have been installed:
– If the LMT Offline Tools of a later version is required, install it directly.
– If the LMT Offline Tools of an earlier version is required, uninstall the
current version, install the earlier version, and reinstall the current
version.
These operations do not apply to patch versions of the same R version.
Procedure
● Using an installation CD-ROM
a. Log in to the LMT PC as an administrator.
b. Insert the installation CD-ROM into the CD-ROM drive.
NOTICE
----End
Startup Method
To start the LMT offline MML server, choose Start > All Programs > HUAWEI
Local Maintenance Terminal > WebLMT OffLine MML on an LMT PC.
GUI
Figure 2-6 shows the dialog box of the LMT offline MML server.
If the LMT offline MML server has been started and minimized, double-click the icon on
the system tray of the LMT PC to display the dialog box of the LMT offline MML server.
Component Description
Routine tab page Displays the status of the LMT offline MML server.
NOTE
● Click Hide to minimize the LMT offline MML server to the
system tray of the LMT PC.
● Click Stop to stop the LMT offline MML server.
● Click Start to start the LMT offline MML server.
● Click Open Browser to display the login window of the LMT
offline MML tool.
About tab page Displays information about the LMT offline MML tool.
Prerequisites
The LMT offline MML server has been started.
Procedure
Step 1 Install and start the LMT offline MML tool on the LMT PC.
Step 2 Enter http://127.0.0.1:Port into the address bar of the web browser. The login
window of the LMT offline MML tool is displayed.
● Port specifies the port number of the LMT offline MML server. The default port number
is 810.
● You can change the default port number on the Config tab page of the server. The new
port number takes effect only after the LMT offline server is restarted.
Step 3 Specify OMType, Version, and Pattern in the login window and click Login.
● To switch display language between English and Chinese, click the language-switching
button at the top right corner of the login window.
● To restore the default setting used during installation, click Reset.
Step 4 To exit from the LMT offline MML tool, click Logout at the top right corner of the
LMT main page.The Confirm dialog box is displayed and click Yes
----End
GUI
Figure 2-7 shows the LMT offline MML window.
Table 2-9 describes the components of the LMT offline MML window.
Manual editing area Displays manually input MML commands and their
parameters.
History Command Displays all commands executed during the current login
field and relevant parameters.
Command Input Displays all the MML commands available on the system
field in the drop-down list. You can select an MML command
from the drop-down list or enter an MML command.
Component Description
Procedure
Step 1 Log in to the LMT offline MML tool.
Step 2 In the LMT offline MML window, enter an MML command in the Command Input
text box and click Assist to set related parameters.
The LMT offline MML tool provides an association function. When you are typing a
command in the Command Input field, related commands are displayed for reference.
● The command input and parameter settings saved to the local file by clicking Save do
not overwrite the existing information saved in the local file.
● You can select an MML command in the Operation Records area, right-click it, and
choose the related option to clear the selected or all records.
----End
Function
The Convert Management System provides the following functions:
● Forwards alarm operation instructions from the LMT.
Startup Method
If Microsoft Visual C++ 2005 SP1 Redistributable Package (X86) is not installed on the LMT
PC, the Convert Management System cannot start. Download this package from
www.microsoft.com.
On the LMT PC, choose Start > All Programs > HUAWEI Local Maintenance
Terminal > Convert Management System.
GUI
Figure 2-8 shows the window of the Convert Management System.
Startup Method
On the LMT PC, choose Start > All Programs > HUAWEI Local Maintenance
Terminal > Performance Browser Tool.
GUI
Figure 2-9 shows the window of the Performance Browse Tool.
The Table 2-11 describes the components of the Performance Browse Tool
window.
Startup Method
On the LMT PC, choose Start > All Programs > Huawei Local Maintenance
Terminal > TrafficRecording Review Tool.
GUI
Figure 2-10 shows the window of the TrafficRecording Review Tool.
This chapter describes principles of managing operation rights, user accounts, and
command groups.
The operation and maintenance (O&M) subsystem of the BSC6910 allows multiple
users to perform operations concurrently. For system security reasons, the
following aspect of operation rights must be managed and controlled:
● User identities:
A user must enter a correct user name and password to log in to the system.
● User rights:
Users of different levels are permitted to use different command groups for
GUI or MML command operations.
● Operation time limits:
An operation limit specifies the times when a user is permitted to perform
operations.
ADMINISTRATOR-level users can set password complexity. For details, see Setting
Password Policies.
For details, see 3.3.3 Changing the Password of the Active User Account and
3.3.4 Changing the Password of an External User Account.
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the ADD OP command to create an external user account.
NOTICE
The new external user account must be different from any of the existing user
accounts.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the MOD OP command to modify the attributes of an external user account.
----End
Context
NOTICE
User admin is the permanent built-in user account and cannot be deleted.
Procedure
Step 1 Run the RMV OP command to delete an external user account.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the SET PWDPOLICY command to define policies for setting login passwords.
----End
Procedure
Step 1 Run the LST PWDPOLICY command to query policies for setting login passwords.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 On the toolbar of the LMT main page, click Password. The Password dialog box is
displayed.
Step 2 In the displayed Password dialog box, enter the current password in the Old
Password field, enter the new password in the New Password and Confirm
Password fields, and click OK.
You are advised to change the password at your first login and then change the password every
three months.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the MOD OP command to change the password of an external user account.
----End
Prerequisites
You have logged in to the LMT with an account authorized for this operation.
Procedure
Step 1 Run the LST CCG to query the command groups.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the LST CCGN command to query the name of a command group.
Step 2 Run the SET CCGN command to rename the command group.
----End
Procedure
● Run the ADD CCG command to add commands to a command group.
● Run the RMV CCG command to remove commands from a command group.
----End
Function Command
● A local administrator-level user can query default FTP rights of all local users and domain
users who have logged in to FTP.
● A local non-administrator-level user can query default FTP rights of itself after logging in
to FTP.
● A domain user can query default FTP rights of domain users who have logged in to FTP.
Function Command
● Setting FTP Directory Permission Enhancement Switch affects the default FTP rights of
different levels of accounts.
● Modifying FTP Directory Permission Enhancement Switch affects only new FTP connection
or new Web LMT user login.
Function Command
Function Command
Function Command
Modifying FTP access control rules affects only new FTP connection or new Web LMT user login.
This chapter describes how to run MML commands on the LMT for operation and
maintenance of the BSC6910.
An MML command consists of two parts, an action and an object. For example,
ADD OP, wherein ADD is the action part and OP is the object part. Table 4-1
describes actions that can be performed by MML commands.
Action Description
ACT Activate
ADD Add
ADT Audit
BEG Begin
BKP Back up
BLK Block
CHK Check
CLR Clear
CMP Compare
COL Collect
CON Confirm
DEA Deactivate
DLD Download
DSP List
EST Establish
EXP Export
FMT Format
FOC Obtain
HO Hand over
Action Description
INH Inhibit
INS Install
LCK Lock
LOD Load
LST List
MOD Modify
PING Ping
REL Release
REQ Request
RUN Run
RMV Remove
RST Reset
SET Set
STR Start/Open
STP Stop/Close
SWP Swap
SYN Synchronize
TRC Trace
UBL Unblock
UIN Uninhibit
ULD Upload
ULK Unlock
For details of MML commands and parameters, see the MML help.
Manage the OMU data configuration rights by following the steps provided in 4.7
Obtaining Data Configuration Rights
When data configuration rollback is required, you can select a rollback point to
restore the system to a specific configuration status as required.
NOTICE
A user cannot perform data configuration rollback in any of the following cases:
● The user does not obtain the data configuration rights because another user
who has occupied exclusive data configuration rights does not release the
data configuration rights by running the ULK CMCTRL command.
● The quick configuration mode has been enabled by running the SET
QUICKCFG command.
● Batch configuration is performed by running the RUN BATCHFILE command.
Context
To run an MML command, you can:
● Enter an MML command in the Command Input field.
● Select a previously executed command from the History Command drop-
down list.
● Select an MML command from the MML Command navigation tree.
● Enter or Copy an MML command script to the Manual Editing area.
Procedure
● Entering an MML command in the Command Input field
a. Enter an MML command in the Command Input field. When you are
entering a command, related commands are displayed in a drop-down
list. You can select the required command from the drop-down list.
b. Press Enter or click Assist to display parameters associated with the
command.
c. Specify parameter values.
d. Press F9 or click Exec to run the command. The command result is
displayed on the Common Maintenance tab page.
● Selecting a previously executed command from the History Command drop-
down list
a. Select a previously executed command from the drop-down list of history
commands. (Press F7 or click to select the previous command.
Press F8 or click to select the next command.)
b. (Optional) Change parameter values in the command parameter area.
Context
A batch file (also called data script file) is a plain text file, which contains a group
of command scripts used for conducting a specific task. The command scripts in a
batch file are executed in sequence.
The following two batch processing modes are available:
● Immediate batch processing:
A batch file is run immediately.
● Scheduled batch processing:
A batch file is automatically run at a specific time set by users in advance.
When the LMT locks its operation screen, the following commands will fail:
● ADD OP, RMV OP, and MOD OP
● SET OPLOCK
● SET OPSW
● SET PWDPOLICY
● ULK USR
● SET WEBLOGINPOLICY
Prerequisites
● You have obtained the required data configuration rights. For details, see 4.7
Obtaining Data Configuration Rights.
Procedure
Step 1 On the LMT main page, click Batch to access the Batch tab page in the WebLMT
dialog box that is displayed.
Step 2 In the editing area, click New and enter the MML commands to be executed at a
time, or click Open... to select the prepared batch file.
If an encrypted .ecf file is selected, enter the password of the file to import the file for batch
processing.
You can set Execution Type. By default, Prompt when an error occurs is selected. You are
advised to retain the default setting.
----End
Prerequisites
● You have obtained FTP user name and password.
● You have obtained the data configuration rights. For details, see 4.7
Obtaining Data Configuration Rights.
Procedure
Step 1 Edit a batch file.
1. On the LMT main page, click Batch to access the Batch tab page in the
WebLMT dialog box that is displayed.
2. Click New and type a batch of MML commands in the input box.
3. Click Save to save the edited batch file.
Step 2 Upload the MML command script file to the /ftp directory in the OMU active work
area. Assume that the MML command script file BATCHFILE.txt saved in disk D is
The FTP user name must be the fixed value FtpUsr. The FTP password was set during
installation of product software. You can run the MOD FTPPWD command to change
the password.
e. Enter the cd /bam/version_a/ftp command to switch to the directory of
OMU active work area.
f. Enter the put BATCHFILE.txt command to upload the file.
g. Enter the quit command to disconnect FTP connection when the file
upload is complete.
Step 3 Add scheduled batch processing tasks by running the ADD SCHTSK and ADD
SUBTSK commands.
----End
Prerequisites
● A batch file is available.
Context
The syntax check can locate the following errors:
● Missing colon
● Missing semicolon
● Incorrect MML command
● No authority to execute a correct MML command
● Redundant parameters
● Incorrect parameters
Procedure
Step 1 Click New to create a batch file and input MML commands in the manual editing
area.
Step 2 Click Analyze Syntax to check the syntax of the batch file.
● If no errors occur, the Information dialog box is displayed, indicating that no syntactical
errors occur. If an error occurs, the Result dialog box is displayed, indicating a line
number for locating the error and error reasons for correcting the error.
● To go to the command line with a syntactical error, double-click the information in the
Result dialog box.
Step 3 In the Result dialog box, click Save As... to save the result.
----End
Follow-up Procedure
To clear all syntactical analysis marks in a batch file, right-click in the batch file
and choose Clear Analyze Mark from the shortcut menu.
Procedure
Step 1 On the Common Maintenance tab page in the MML window, click Settings. The
Settings dialog box is displayed, as shown in Figure 4-2.
The parameter settings in System and MML Command are stored on the server and client,
respectively. Therefore, after the BSC resets or restarts, the parameter setting in System is
restored to the default value but the parameter settings in MML Command remain unchanged.
----End
Context
When a BSC6910 system is in effective mode, data configured for the BSC6910
system takes effect immediately.
You can use menus or MML commands to query the data configuration mode.
Procedure
● Using menus
a. On the LMT main page, check the configuration mode of the BSC6910
system, as shown in Figure 4-3.
----End
Context
You can use menus or MML commands to query the status of data configuration
rights.
Procedure
● Using menus
a. Check the status of data configuration rights displayed at the top right
corner of the LMT main page.
● Using MML commands
a. Run the LST CMCTRL command to query the status of data configuration
rights.
----End
Prerequisites
● You have logged in to the LMT.
Context
● By default, all users have data configuration rights. They can use the LMT or
U2020 to configure data for the BSC6910.
● Only one user can use the data configuration rights at any given time. You
can run the LCK CMCTRL command to obtain exclusive data configuration
rights.
● After the data configuration is complete, you can run the ULK CMCTRL
command to make the data configuration rights available to all users so that
another user can run the LCK CMCTRL command obtain exclusive data
configuration rights.
● If a user who had exclusive data configuration rights exits from the LMT, the
data configuration rights will be automatically made available to all users. In
this case, another user can also run the LCK CMCTRL command to obtain
exclusive data configuration rights.
Procedure
Step 1 Check whether the data configuration rights are available. For details, see 4.6
Querying Data Configuration Rights.
● If no user has exclusive data configuration rights, go to Step 2.
● If a user has exclusive data configuration rights, once that user releases those
configuration rights, go to Step 2.
Step 2 Run the LCK CMCTRL command to obtain the data configuration rights.
If an LMT user has exclusive data configuration rights of the BSC6910, other LMT users
cannot obtain the data configuration rights. In this case, user admin or ADMINISTRATOR-
level users can run the FOC CMCTRL command to forcibly release the locked data
configuration rights.
----End
Prerequisites
● You have logged in to the LMT.
● You have obtained data configuration rights by running the LCK CMCTRL
command.
● The quick configuration mode has been disabled by running the SET
QUICKCFG command.
● No batch commands have been executed.
Context
● You can undo or redo a data configuration action to fine-tune data
configuration. These operations, however, can decrease the efficiency of
running MML commands. Therefore, when the quick configuration mode is
enabled or when batch MML commands are running, do not undo or redo
data configuration actions.
● To prevent data conflicts, a user can undo or redo a data configuration action
only if the user has obtained exclusive data configuration rights.
● Certain MML commands cannot be undone or redone. If you run such an
MML command, the Undo and Redo buttons on the top of the LMT window
becomes unavailable and configuration actions performed before running the
MML command also cannot be undone or redone. For a list of MML
commands that can be undone or redone, see the description of the ADD
ROLLBACKPOINT command.
● The most recent 10 effective single configuration actions can be undone one
at a time. Likewise, the 10 most recent undone operations can be redone in
the same manner.
Procedure
● Undoing a single configuration action
a. Use either of the following methods to undo the latest configuration
action:
----End
Prerequisites
● You have obtained data configuration rights by running the LCK CMCTRL
command.
● The quick configuration mode has been disabled by running the SET
QUICKCFG command.
● No batch commands have been performed.
Context
● You can undo or redo multiple data configuration actions simultaneously to
fine-tune data configuration. These operations, however, can decrease the
efficiency of running MML commands. Therefore, when the quick
configuration mode is enabled or when batch MML commands are running,
do not undo or redo multiple data configuration actions.
● To prevent data conflicts, a user can undo or redo multiple data configuration
actions simultaneously only if the user has exclusive data configuration rights.
● Certain MML commands do not support undoing or redoing multiple data
configuration actions at a time. If you run such MML commands, the rollback
point specified by running the ADD ROLLBACKPOINT command will become
invalid and undoing multiple data configuration actions at a time will fail.
Therefore, before running such MML commands, remove the configured
rollback point. For a list of MML commands that support undoing or redoing
multiple configuration actions, see the description of the ADD
ROLLBACKPOINT command.
● Multiple configuration actions can be undone simultaneously. After a multiple
undo operation is applied, the system is restored based on the configuration
status from a specified rollback point.
● Multiple configuration actions can be redone simultaneously. After the
multiple actions have been redone, the system is restored based on either the
configuration status at the specified rollback point or the final configuration
status from before undoing the configuration actions.
An initial rollback point is the first rollback point set by a user. The final rollback point is
automatically set to the latest configuration command successfully executed. The LMT
allows you to undo a maximum of 10,000 configuration commands from the initial rollback
point to the final rollback point at a time. If there are more than 10,000 commands from
the initial rollback point to the final rollback point, the undoing operation will fail and the
LMT will display a failure message.
A user who has obtained the data configuration rights can set a maximum of five rollback
points. If the user releases the data configuration rights, the active workspace of the OMU
will clear the information about the rollback stack and rollback points.
Procedure
Step 1 To undo/redo multiple data configuration actions simultaneously, before running
configuration commands, run the ADD ROLLBACKPOINT command to set
rollback points as required.
Step 2 Run the BEG ROLLBACK command to restore the system to the configuration
status at a specified rollback point.
Step 3 Run the BEG FORWARD command to restore the system to the final configuration
status before undoing the configurations.
----End
5 Alarm/Event Management
This section describes how to use the LMT to manage BSC6910 alarms/events.
Alarm/event management helps you analyze alarms/events efficiently, thereby
facilitating troubleshooting.
Fault alarm Fault alarms are caused by hardware faults or failures of major
functions, for example, board fault or link fault. Fault alarms
are of higher severity than event alarms and are classified into
active and cleared alarms according to the fault status.
Event alarm Event alarms record predefined events occurring during the
operation of the system. An event alarm reflects the system
condition (for example, congestion) at a specific time, which is
not necessarily a fault. Some event alarms are generated
repeatedly and regularly.
● Cleared alarms are stored in the OMU database and can be queried.
● In engineering and maintenance scenarios, such as site deployment, equipment
commissioning, upgrades, capacity expansion, swapping, and cutover, a large number of
alarms are reported in a short period of time. Due to the absence of the mechanism for
handling such alarms, the alarm burst makes it hard for users to identify real fault
alarms, thereby disturbing network monitoring. To solve this problem, Huawei puts
forward the concept of "maintenance mode alarms". Alarms triggered by engineering
and maintenance operations are considered as maintenance mode alarms and handled
in a special way. This mechanism streamlines alarm management and facilitates
operation and maintenance.
● Software:
Alarms related to software
● Running:
Alarms generated during the operation of the BSC
● Communication:
Alarms related to the communication system, such as alarms between the
BSC6910 host and the OMU
● QoS:
Alarms related to QoS
● Integrity:
Alarms generated when information is repeated, lost, distorted, disordered, or
unexpected
● Operational:
Alarms related to refusal of operations that are generated when a service is
refused or unavailable, or when an operation procedure is improper
● Physical:
Alarms related to cable interference or detection of invasion
● Security:
Alarms related to violation of security such as failed authentication, breach of
confidentiality, failed non-repudiation, and unauthorized visit
● Time domain:
Alarms related to timeout such as information delay and password expiration
● Processing error:
Alarms caused by other abnormal conditions
To-Alarm-Box Flag
The to-alarm-box flag controls whether alarms are reported to the alarm box. This
flag can be set to either of the following values:
● Report
When alarms are generated, they are reported to the alarm box, which
provides audible and visual indications for the alarms.
● Not report
When alarms are generated or when the alarm status changes, the alarms
and the change of alarm status are not reported to the alarm box.
The to-alarm-box flag is applicable only to fault alarms. Event alarms are not reported to
the alarm box.
Whether an alarm is reported to the alarm box depends on the to-alarm-box flag
of the alarm and the alarm suppression level of the alarm box. Alarms are
reported to the alarm box only when the to-alarm-box flag is set to Report and
the alarm severity is higher than or equal to the alarm suppression level of the
alarm box.
Shield Flag
The shield flag controls whether alarms are suppressed as required. This flag can
be set to either of the following values:
● Shielded
A board does not report alarms whose shield flags are set to Shield to the
element management system (EMS) or the alarm box. The OMU does not
save the logs of such alarms.
● Unshielded
A board reports alarms whose shield flags are set to Unshield to the EMS or
the alarm box. The OMU saves the logs of such alarms.
Modification Flag
The modification flag records the modification status of alarm configurations. This
flag can be set to either of the following values:
● Modified
When the configuration of an alarm is modified using a modification
command, the modification flag is set to Modified.
● Unmodified
When an alarm uses its default configuration or is restored to its default
configuration, the modification flag is set to Unmodified.
● Not Cleared
The fault alarm has not been cleared.
● Cleared
The fault alarm has been cleared and a clear alarm has been received.
When the BSC6910 reports a fault alarm to the LMT, the alarm box is activated to
provide audible and visual indications based on the alarm severity. When the LMT
receives the fault alarm, the alarm box generates a sound. The sound stops when
the alarm is cleared. You can also use the LMT to manually stop the sound.
The alarm box does not provide any indication for event alarms.
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the SET ALMCAPACITY command to set the maximum number of alarm logs
that can be stored in the OMU database and the maximum storage duration.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the LST ALMCAPACITY command to query the maximum number of alarm
logs that can be stored in the OMU database and the maximum storage duration.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the ADD OBJALMSHLD command to create an alarm masking condition. The
alarm masking condition successfully created takes effect immediately.
● The name of a new alarm masking condition must be unique. Otherwise, the alarm
masking condition cannot be created.
● A maximum of 100 alarm masking conditions can be created for each BSC6910.
Step 2 Run the LST OBJALMSHLD command and enter required parameters to query
whether the alarm masking condition is successfully created.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Procedure
Step 1 Run the LST OBJALMSHLD command to check whether the alarm masking
condition to be deleted exists.
If... Then...
The alarm masking condition does not exist, No further action is required.
Step 2 Run the RMV OBJALMSHLD command, specify Object Type, and set other
parameters as required to delete an alarm masking condition.
----End
Procedure
Step 1 Run the LST OBJALMSHLD command and specify Query Mode to query an alarm
masking condition.
----End
ON and disable the alarm masking switch by setting it to OFF. Only user admin,
OPERATOR-level users, ADMINISTRATOR-level users, and authorized CUSTOM-
level users can perform this operation.
Prerequisites
● You have logged in to the LMT with an authorized account.
● You have obtained the data configuration rights (see 4.7 Obtaining Data
Configuration Rights).
Procedure
Step 1 Run the SET ALMML command to enable or disable the alarm masking switch of
derived alarms.
----End
Procedure
Step 1 Run the LST ALMML command to query the alarm masking switch of derived
alarms.
----End
Prerequisites
You have logged in to the LMT.
Procedure
Step 1 On the LMT main page, click Alarm/Event. The Browse Alarm/Event tab page is
displayed. The Normal Alarm, Event, and Maintenance mode alarm tab pages
are displayed under the Browse Alarm/Event tab.
----End
Context
You can set the following query criteria:
● Alarm type
● Alarm severity
● Alarm time
● Filtering criteria
● Maintenance mode flag
● Number of logs to be queried
● Cleared time
● NodeB type
● Alarm-managed objects
● Alarm ID
● Alarm serial No.
Procedure
● Using menus
a. On the LMT main page, click Alarm/Event. The Browse Alarm/Event tab
page is displayed.
b. On the Query Alarm/Event Log tab page, click Query Settings. The
Query Settings dialog box is displayed.
c. Set query criteria as required. To reset the query criteria, click Reset. To
reset only the NodeB type, select Filter By NodeB.
After performing query by Filter By NodeB, you can click Filter to reset query
criteria.
d. Click Query. The query result is displayed in the Result area.
e. To view details of an alarm, double-click it. The Detail dialog box is
displayed, presenting detailed information about the alarm.
f. To save an alarm record, select the alarm record, right-click it, and choose
Save Selected from the shortcut menu. To save all alarm records, right-
click any place in the area where alarms are displayed and choose Save
All from the shortcut menu; or click Save All.
You can drag rows on the Query Alarm/Event Log tab page to rearrange the
row order. Within a Cookie validity period, the row order on the Query Alarm/
Event Log tab page is the same as the row order when you closed the tab page
last time.
● Using MML commands
a. Run the LST ALMLOG command to query alarm logs.
----End
Context
The LMT provides the following help information about alarms:
● Alarm/event description
● Impact on the system
● System actions
● Handling suggestions
Procedure
Step 1 On the Alarm/Event tab page, double-click an alarm on the Browse Alarm/Event
or Query Alarm/Event Log tab page. The Detail dialog box is displayed.
Step 2 In the Detail dialog box, click Solution.... The online help window is displayed.
You can also select an alarm, right-click it, and choose Solution from the shortcut menu to
view the online help of this alarm.
Step 3 View the handling suggestions or other required information in the online help.
Step 4 To exit from the online help, close the online help window.
----End
Context
You can set the following query criteria:
● ID:
Specifies Start ID and End ID of alarms/events whose configuration
information is to be queried.
● Severity:
Specifies the alarm severity of alarms/events whose configuration
information is to be queried.
● Modification Flag:
Specifies the modification flag of alarms/events whose configuration
information is to be queried. If All is selected, configuration information of
alarms/events whose Modification Flag is set to Unmodified or Modified is
displayed in the query result.
● Shield Flag:
Specifies the shield flag of alarms/events whose configuration information is
to be queried. If All is selected, configuration information of alarms/events
whose Shield Flag is set to Shielded or Unshielded is displayed in the query
result.
● To Alarm Box Flag:
Specifies the to-alarm-box flag of alarms/events whose configuration
information is to be queried. If All is selected, configuration information of
alarms/events whose To Alarm Box Flag is set to Report or Not Report is
displayed in the query result.
● Return Amount:
Specifies the number of alarms whose configuration information is to be
queried.
Procedure
Step 1 On the LMT main page, click Alarm/Event. The Alarm/Event tab page is
displayed.
Step 2 Click the Query Alarm/Event Configuration tab and click Query Settings. The
Query Settings dialog box is displayed.
Step 4 Click Query. The query result is displayed in the Result area.
To modify the configuration of an alarm, select an alarm and click Modify Configuration,
or right-click the alarm in the Result area and choose Modify Configuration from the
shortcut menu.
----End
Prerequisites
You have logged in to the LMT.
Procedure
Step 1 On the LMT main page, click Alarm/Event. The Alarm/Event tab page is
displayed.
Step 2 On the Browse Alarm/Event tab page, click Filter Settings. The Filter Settings
dialog box is displayed.
Step 3 In the Filter Settings dialog box, specify filtering criteria, such as Alarm Source
and Alarm ID. Then, click OK. Alarms meeting the specified criteria are displayed.
● You can select BSC and NodeB for Alarm Source Type. When you select NodeB for Alarm
Source Type, alarms related to the NodeB are displayed in the filtering result. These alarms
are not generated by the NodeB but the RNC.
● When you specify Alarm Source Type, all alarm sources of the selected type are displayed in
the alarm source type area.
● You can select Alarm Source Type and then enter the alarm source under Alarm Source.
The input box under Alarm Source supports association display. For example, if you enter 3,
all alarm sources whose names start with 3 are displayed.
----End
Context
You can set the following display attributes for alarms/events:
● Colors
● Table columns
● Display tips
Procedure
Step 1 On the LMT main page, click Alarm/Event. The Alarm/Event tab page is
displayed.
Step 2 Click Settings on the upper right of the Alarm/Event tab page. The Settings
dialog box is displayed.
Step 3 In the Settings dialog box, set Color, Table Columns, Auto-deletion, and Tips.
● Color:
You can set background colors for the following alarm/event types: Critical,
Major, Minor, Warning, and Cleared.
● Auto-deletion:
You can select Enable auto-deletion and specify the period for automatic
deletion of cleared alarms.
● Tips:
Two options are available: Enable and Disable. If you select Enable, details
about an alarm/event are displayed when you put the cursor on the alarm/
event. If you select Disable, details about an alarm/event are displayed only
when you double-click the alarm/event.
● Table Columns:
You can specify the information to be displayed in the alarm/event table. The
following table describes all fields for an alarm.
Field Description
Name
Serial No. Specifies the alarm generating sequence. This field identifies
an alarm record in an alarm log.
Name Specifies the alarm name. For a product, this field identifies an
alarm and has a one-to-one mapping relationship with the
alarm ID.
Changed Specifies the time when Severity of the alarm or Serial No. of
Time the root alarm is changed.
Field Description
Name
Cleared Specifies the way in which the alarm is cleared. Alarms can be
Type cleared in any of the following ways:
– Normal clear:
Alarms are normally cleared.
– Reset clear:
After the system is restarted, alarms are automatically
cleared.
– Manual clear:
Alarms are manually cleared.
– Configuration clear:
After the configuration of a board is deleted, alarms related
to the board are automatically cleared.
– Correlation clear:
After receiving the root alarm of an active alarm, the fault
management system reports the root alarm and
automatically clears the active alarm.
– Override clear:
Earliest alarms are removed to free disk space. If some
earliest alarms are still active, they are automatically
cleared.
– State switchover clear:
If a device switches from one state to another, the active
alarm reported by the device in the former state is
automatically cleared. The device in the latter state reports
the alarm again.
Sync Specifies the sequence for sending alarm report messages. The
Serial No. synchronization serial number ensures data synchronization
between the element management system (EMS) and network
elements (NEs). The alarm generating message and alarm
clearing message have different synchronization serial
numbers.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Context
You can clear an alarm/event using menus or MML commands.
Procedure
● Using menus
a. On the LMT main page, click Alarm/Event and select an active alarm to
be cleared on the Browse Alarm/Event or Query Alarm/Event Log tab
page. Click Clear Alarm. The Confirm dialog box is displayed.
b. Click OK in the Confirm dialog box. Manually cleared is displayed in the
Cleared Type column.
You can also right-click an alarm to be cleared and choose Clear Alarm from the shortcut
menu.
● Using MML commands
a. Run the RMV ALMFLT command to manually clear an alarm.
----End
Procedure
Step 1 On the Browse Alarm/Event or Query Alarm/Event Log tab page under the
Alarm/Event tab, click Delete Selected Cleared Alarms or Delete All Cleared
Alarms to delete the alarms/events as required. Table 5-3 describes the functions
of the buttons.
Button Description
Delete Selected Deletes cleared alarms that are selected in the active
Cleared Alarms window. This button is available on the Browse Alarm/
Event and Query Alarm/Event Log tab pages.
Delete All Cleared Deletes all cleared alarms that are displayed in the
Alarms active window. This button is available on the Browse
Alarm/Event and Query Alarm/Event Log tab pages.
----End
Procedure
Step 1 On the Browse Alarm/Event or Query Alarm/Event Log tab page under the
Alarm/Event tab, click Refresh or choose Refresh from the shortcut menu.
● On the Browse Alarm/Event tab page, alarm information is updated in real time.
Cleared alarms are displayed in gray and newly generated alarms are added to the top
of the alarm list. When you manually refresh the tab page, cleared alarms are removed
from the Browse Alarm/Event tab page.
● On the Query Alarm/Event Log tab page, alarm information is not updated in real
time. When you manually refresh the tab page, the query result on the tab page is
updated according to the previously set query criteria.
----End
Prerequisites
● The BSC6910 has been connected to the alarm box.
● The Convert Management System has been started and can communicate
with the OMU properly.
Procedure
● Run the LST BOXVER command to query the version information of the
alarm box.
● Run the LST BOXALM command to query active alarms that drive the alarm
box.
----End
Prerequisites
● The BSC6910 has been connected to the alarm box.
● The Convert Management System has been started and can communicate
with the OMU properly.
Context
When the BSC6910 reports one or more fault alarms of the same severity to the
LMT, the LED corresponding to the severity flashes on the alarm box. Users,
however, cannot identify the number of alarms of the severity from the flashing
LED.
Procedure
Step 1 Run the LST BOXLGT command to query the number of the alarms of a specific
severity.
----End
Prerequisites
● The BSC6910 has been connected to the alarm box.
● The Convert Management System has been started and can communicate
with the OMU properly.
Procedure
● Run the RST ALMBOX command to reset the alarm box.
● Run the CLR BOXLGT to manually turn off the alarm LEDs.
● Run the STP BOXSND command to stop the alarm sound.
----End
Prerequisites
● The BSC6910 has been connected to the alarm box.
Context
Only user admin, OPERATOR-level users, ADMINISTRATOR-level users, and
authorized CUSTOM-level users are authorized to set the alarm suppression level.
Procedure
● Run the LST ALMSCRN command to query the alarm suppression of the
alarm box.
● Run the SET ALMSCRN command to set the alarm suppression of the alarm
box.
----End
6 Log Management
This section describes how to use the LMT to manage the BSC6910 logs, which
can be saved in .txt, .html, and .csv files. Only user admin, ADMINISTRATOR-level
users, and authorized CUSTOM-level users can manage the logs.
6.1 Logs
Logs are classified into operation logs, security logs, and running logs.
6.2 Setting Log Storage Limitations
This section describes how to set storage limitations on operation logs and
security logs, such as the maximum storage duration and the maximum number
of records. If some operation logs and security logs are stored for a period longer
than the maximum storage duration, the OMU database automatically deletes
these logs. If the number of records stored exceeds the allowed maximum value,
the OMU database automatically deletes the earliest records.
6.3 Querying Operation/Security Logs
This section describes how to query operation and security logs of the BSC6910
from the OMU database.
6.4 Obtaining Operation/Security Logs
This section describes how to export operation logs and security logs from the
OMU to the directory OMU active workspace installation directory\ftp
\operator_log\exp_log and use the File Manager or FTP Client tool to download
the logs to the LMT PC.
6.5 Obtaining Running Logs
This section describes how to upload running logs to the directory bam\common
\fam\famlog and use the File Manager or FTP Client to download the running logs
to the LMT PC.
6.6 Collecting Logs
This section describes how to collect logs for fault analysis. There are several types
of logs, such as host logs, OMU logs, database logs, system event logs, operation
logs, OMU installation logs, remote upgrade logs, security logs, and alarm logs.
6.1 Logs
Logs are classified into operation logs, security logs, and running logs.
Operation Logs
Operation logs record the information about operations on the BSC6910 in real
time and are saved on the OMU database.
The operation logs are used to analyze the association between device faults and
operations.
Security Logs
Security logs record information about security events occurring on network
elements (NEs) or the element management system (EMS).
The security logs are used to audit and trace security events, such as login, logout,
and authorization.
Running Logs
Running logs record the operating information of the BSC6910 host in real time.
The running logs are used for fault location, routine inspection, and device
monitoring.
Procedure
Step 1 Run the SET LOGLIMIT command and specify Time Limit, Counts Limit, and Log
Type.
Run the LST LOGLIMIT command to query the storage limitations. For storage
limitations on other logs, see "OMU Folder Size List" in OMU Administration
Guide.
----End
Procedure
Step 1 Run the LST OPTLOG command and set query criteria as required to query
operation logs.
If no query criteria are set, the LMT displays the latest 64 operation records.
Step 2 Run the LST SECLOG command and set query criteria as required to query security
logs.
If no query criteria are set, the LMT displays the security logs generated on the current day.
----End
Prerequisites
● You have logged in to the LMT with an ADMINISTRATOR-level account
authorized to perform this operation.
● You are authorized to download files from the OMU to the LMT PC.
Procedure
● Using the File Manager
a. Run the EXP LOG command, set Log Type to OPTLOG(Operation Log)
or SECLOG(SECURITY LOG), and set other parameters as required.
The default path for saving the exported log is OMU active workspace installation
directory\ftp\operator_log\exp_log on the active workspace of the OMU.
b. On the LMT main page, click File Manager to start the File Manager.
c. In the File Navigation Area, type OMU active workspace installation
directory\ftp. In the File List Area, select the operation log exported in a.
Then, click Download to download the log to the LMT PC.
● Using the FTP Client
a. Run the EXP LOG command, set Log Type to OPTLOG(Operation Log)
or SECLOG(SECURITY LOG), and set other parameters as required.
The default path for saving the exported log is OMU active workspace installation
directory\FTP on the OMU active workspace.
b. Choose Start > All Programs > Huawei Local Maintenance Terminal >
FTP Client. The FTP Client is started.
c. In the server entry bar on the FTP Client, enter the external virtual IP
address of the OMU, the FTP user name, and the password.
The FTP user name and password are set when the OMU is being installed. By
default, the FTP user name is FtpUsr.
d. Click Enter to connect to the OMU. The connection status is displayed in
the Connection tips pane.
e. When the connection is successful, double-click OMU active workspace
installation directory\ftp in the server file list. Files in the directory are
displayed in the server file list pane.
f. Double-click the file to download it to the LMT PC.
g. When the file is successfully downloaded, choose System > Exit on the
FTP Client or close the FTP Client window to exit from the FTP Client.
----End
Context
● Running logs are named in the format BSCID_subrack number/Log/
yyyy/mm/dd/hh/mm/ss.zip. For example, if a running log of Extended
Processing Subrack (EPS) 3 is uploaded to the OMU of BSC 1 at 17:19:47 of
November 7, 2011, the log is named BSC0001_03Log20111107171947.zip.
BSC0001_03Log20111107171947.zip indicates that the log has been
successfully uploaded and compressed.
BSC0001_03Log20111107171947.tmp indicates that the log is being
uploaded.
● By default, running logs are uploaded to and saved in the directory bam
\common\fam\famlog on the OMU.
Procedure
● Using the File Manager
a. Run the ULD LOGTOOMU command and enter the number of the
subrack whose running log is to be uploaded to the OMU.
b. On the LMT main page, click File Manager to start the File Manager.
c. In the File Navigation Area, double-click bam\common\fam\famlog. In
the File List Area, select the running log uploaded in Step 1. Then, click
Download to download the log to the LMT PC.
● Using the FTP Client
a. Run the ULD LOGTOOMU command and enter the subrack number to
upload the corresponding running log to the OMU.
b. Choose Start > All Programs > Huawei Local Maintenance Terminal >
FTP Client. The FTP Client is started.
c. In the server entry bar on the FTP Client, enter the external virtual IP
address of the OMU, the FTP user name, and the password.
The FTP user name and password are set when the OMU is being installed. By
default, the FTP user name is FtpUsr.
d. Click Enter to connect to the OMU. The connection status is displayed in
the Connection tips pane.
e. When the connection is set up successfully, double-click bam\common
\fam\famlog in the server file list. Files in the path are displayed in the
server file list pane.
f. Double-click the running log to download it to the LMT PC.
g. When the running log is successfully downloaded, choose System > Exit
or close the FTP Client window to exit from the FTP Client.
----End
Procedure
Step 1 Run the COL LOG command and set parameters as required to collect logs. For
more description about logs, see Table 6-1.
● The path for saving logs depends on the active workspace of the OMU. When the active
workspace of the OMU is version_a, the path for saving logs is version_a. When the active
workspace of the OMU is version_b, the path for saving logs is version_b.
● Log files that are not compressed into the BZ2 format in the OMU active workspace
installation directory\common\fam\famlog and the OMU active workspace installation
directory\common\fam\famlogfmt directories will not be collected.
----End
7 Trace Management
7.1 Concepts
This chapter describes tracing principles, tracing modes, and required operation
rights. Do not start excessive tracing tasks in heavy traffic scenarios, because
starting excessive tracing tasks slows the LMT responses. In this case, set Trace
Mode to Save To OMU before starting a tracing task.
7.2 Basic Tracing Operations
The basic operations of message tracing apply to all BSC6910 message tracing
tasks.
7.3 Device Commissioning
This section describes how to perform routine device commissioning.
7.4 UMTS Services
This section describes how to perform tracing tasks related to UMTS services.
7.1 Concepts
This chapter describes tracing principles, tracing modes, and required operation
rights. Do not start excessive tracing tasks in heavy traffic scenarios, because
starting excessive tracing tasks slows the LMT responses. In this case, set Trace
Mode to Save To OMU before starting a tracing task.
Procedure for the Service Module to Report Traced Messages to the LMT
1. The service module compares the collected messages against the local filter
table and reports the qualified messages to the OMU.
2. The OMU forwards the traced messages to the LMT that creates the task
according to the task ID.
3. The LMT parses the messages and displays them on the tracing window.
The users at the following levels can perform the tracing tasks online: admin,
USER, OPERATOR, ADMINISTRATOR, and CUSTOM entitled to use command
group G_10.
That is, only the GUEST-level users and CUSTOM-level users who are not entitled
to use command group G_10 cannot perform tracing tasks online.
Group G_10 consists of binary commands for creating tracing and monitoring tasks.
Only G_1 command group users (ADMINISTRATOR and CUSTOM users with G_1 command
group permission) are allowed to perform a single-user CS tracing task.
Only G_1 command group users (ADMINISTRATOR and CUSTOM users with G_1 command
group permission) are allowed to perform a single-user PS tracing task.
Iu Interface Trace 6
Uu Interface Trace 6
MNCDT Trace 3
Iur-p Trace 6
Cell Trace 6
IOS Trace 2
NOTE
A maximum of 100 calls can be traced in all tasks.
UE Trace 12
NOTE
A maximum of six tasks in the debug mode can be
performed simultaneously.
Sr Interface Trace 6
Prerequisites
● A tracing task is successfully created.
● Traced messages are reported.
Context
● By default, each message browser is displayed in maximized mode. To
compare results displayed in multiple message browsers, set Layout to
Cascade, Tile Horizontal or Tile Vertical.
Each of the windows is configured with a default minimum width when
multiple windows are tiled vertically. This ensures clear comparison. With this
configuration, a maximum of six windows can be displayed in a monitor with
the resolution of 1280x1024. Other windows are hidden behind the displayed
windows.
The cascaded or tiled window arrangements take effect only at every setting
of Layout to Cascade, Tile Horizontal, or Tile Vertical. After such a setting,
a new message browser will still be displayed in maximized mode.
● A maximum of 2000 messages can be displayed in a message browser. Newly
traced messages will replace old ones if 2000 messages are already displayed
in a message browser.
Procedure
Step 1 Browse or view traced messages in a message browser in real time. Right-click in
the message browser and choose an item from the shortcut menu to perform the
associated operation as described in Table 7-1.
Shortcut Description
Save All Messages Save all traced messages displayed in the message
browser.
Step 2 To view details of a message, double-click it. The Message Browser window is
displayed, showing details of the message.
During multi-user tracing or inter-RNC tracing, the display order of messages traced in real time
may be inaccurate because those messages are reported by multiple nodes in the system at the
same time. You can click the Time column to sort the messages by the time when the RNC
receives the messages.
----End
Prerequisites
● A tracing task is successfully created.
Procedure
Step 1 In the message browser of the WebLMT, double-click the trace message.
Step 2 The Message Browser window is displayed, showing the details and meaning of
the message in protocol translation format, as shown in Figure 7-2.
----End
Prerequisites
● A tracing task is started.
● Traced messages are reported.
Context
The name of the file containing saved messages cannot exceed 100 characters,
including the file name extension.
Procedure
● Automatic saving of traced messages
Select Save File when creating a tracing task. All traced messages to be
displayed in the message browser will be automatically saved in .tmf format.
● The LMT saves every 5,000 messages in a file. Messages starting from 5,001 are
saved in another file with a serial number and the serial number is increased by
one for every subsequent 5,000 messages. For example, the 5001st to 10000th
messages traced on the interface are saved in file's name_1.tmf format by
default. YYYY, MM, DD, HH, MM, and SS represent the year, month, day, hour,
minute, and second, respectively.
● The file saving messages traced by a UE tracing task are named in a different
way from the file saving messages traced by other types of tracing task. The last
four digits of the traced number (IMSI, TMSI, IMEI, or MSISDN) are saved in the
file name. If there are fewer than four digits, use the digits in the file name
without adding more digits to reach four digits. For example, if the least
significant four digits of a UE IMSI are 1234, messages traced by a UE tracing
task of this UE are saved in a file named UE_YYYY-MM-DD-HH-MM-
SS-1234_Serial number.tmf.
● You can use the Traffic Recording Review Tool to browse messages saved in .tmf
format offline. For details, see 7.2.4 Browsing Traced Messages Offline.
● Manual saving of traced messages
When a tracing task is running, you can manually save all or some of the
messages in the message browser in .tmf, .txt, or .csv format.
a. To save all messages, right-click in the message browser and choose Save
All Messages from the shortcut menu. To save only the selected
messages displayed in the message browser, select the messages you
wish to save, right-click, and choose Save Selected Messages from the
shortcut menu. The Save dialog box is displayed.
b. Enter a file name, and specify the file type.
On the toolbar of the LMT main window, click System Settings to change the
save path of the file.
c. Click Save to save the file in the specified path.
----End
Prerequisites
The traced messages are saved in .tmf format.
Context
You can find the .txt or .csv files in the saved directory. Double-click them to view
the traced messages.
Procedure
Step 1 Choose Start > All Programs > Huawei Local Maintenance Terminal >
TrafficRecording Review Tool.
Step 2 The Open dialog box is displayed, prompting you to select the target file. Browse
to the folder where the trace files are saved, and select the target file.
Step 3 Click Open or double-click the file. The contents of the file are displayed in the
TrafficRecording Review Tool window.
Step 4 Browse the messages or double-click a specific one to read the details.
Step 5 To view the contents of more files, choose File > Open. In the Open dialog box,
select and open files to view the traced messages that are saved in the files.
Step 6 You can further perform the following operations by right-clicking in the
TrafficRecording Review Tool window.
If... Then...
You choose Save All Messages from All the messages are saved in the
the shortcut menu, window in .tmf or .txt format.
You choose Save Selected Messages The selected messages are saved
from the shortcut menu, in .tmf or .txt format.
You choose Filter By Byte from the Set the filter to selectively display the
shortcut menu, information.
You choose Filter By Column from the Filter the information by column to
shortcut menu, selectively display the information.
You choose Find from the shortcut Locate the message that you want.
menu,
During multi-user tracing or inter-RNC tracing, the order in which messages traced in real time
are displayed may be inaccurate because those messages are reported by multiple nodes in the
system at the same time. You can click the Time column to sort the messages by the time when
the RNC receives the messages.
----End
Prerequisites
● A tracing task is successfully created.
● Trace messages are reported.
Procedure
● Through menu operations
a. Click Trace on the LMT main page. The Trace tab page is displayed.
b. On the Trace Navigation Tree pane, choose the Manage Trace Task.
The Manage Trace Task dialog box is displayed.
c. In the displayed Manage Trace Task tab page, set the parameters as
required, and click Query to query the information about the trace tasks.
d. To stop, restart, or delete a trace task, select the target task listed in the
Result area, and then click Stop, Restart, or Delete, respectively.
● The tasks whose Trace Mode is Report Messages listed in the query result
can only be deleted on the LMT where it was started.
● If Trace Mode is set to Save to OMU, you can specify the tracing start time
and tracing end time. After the duration is specified, the tracing tasks in this
duration will be displayed in the area below. You do not need to set Time
Settings in other trace modes.
● The tasks whose Create By is Network listed in the query result are created
by the OMU according to the command from the BSC. Such tasks can only be
deleted by the admin or ADMINISTRATOR-level users.
● Through MML commands
a. Run the LST TRCTASK command to query the trace tasks.
----End
Prerequisites
● A tracing task is successfully created.
● Traced messages are reported.
Procedure
● Through menu operations
a. Click Trace on the LMT main page. The Trace tab page is displayed.
b. On the Trace Navigation Tree pane, choose the Manage Trace File
node. The Manage Trace File dialog box is displayed.
c. In the displayed Manage Trace File dialog box, set the parameters in the
Search Configure area, and then click Query to view the information
about the trace files saved on the OMU.
d. To upload a trace file to the local PC, select the target file listed in the
Result area, set the parameters in the Upload Settings area, and then
click Upload.
● Through MML commands
a. Run the LST TRCRST command to query the trace files.
----End
Context
This task can be performed to trace the sent and received messages between two
modules or messages sent from and received by the same module.
NOTICE
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 On the Trace Navigation Tree pane, choose Trace > Device Commissioning.
Double-click OS Trace.
Step 3 In the OS Trace dialog box, set the parameters as required, and click Submit. The
trace data pane displays the traced message flow on the Trace tab page on the
WebLMT.
Parameter Description
Parameter Description
Sender When tracing the messages exchanged between the OMU and
Parameter other boards, you must set IP Type to OMU rather than
Receiver Specified IP.
Parameter IP Type cannot be set to OMU for the sender and the receiver
simultaneously, that is, the messages exchanged between the
internal modules of an OMU cannot be traced.
----End
Context
NOTICE
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 On the Trace Navigation Tree pane, choose Trace > Device Commissioning.
Double-click Emergency Diagnosis.
Step 3 In the Emergency Diagnosis dialog box, set the parameters as required, and click
Submit. The trace data pane displays the traced message flow on the Trace tab
page on the WebLMT.
● Reason of starting this tracing task.
● Pressing the Enter key and the following are not supported: @ ; '. Letters,
digits, spaces and the following special characters are supported: ! # $ % ^ &
*()_+-=`~:",.|\<>?/{}[]
----End
Prerequisites
The communication between the LMT and the BSC is normal.
Context
● The following problems can be located by capturing packets:
– The base station controller does not receive the packet.
– After entering the interface board, the packet is discarded by the board
without being sent to other boards in the system.
– The packet is sent to non-interface boards, which then discard the packet.
● When packets are discarded between two boards or connection cannot be
established between two boards, you can check whether the correct packets
are sent to and received by interface boards and other boards in the system
by capturing backplane packets. Then you can quickly locate the problem,
which may be in an interface board or any other board in the system.
● The following types of packet capturing are supported:
– Panel Ethernet packet capturing
– Backplane Ethernet packet capturing
– Panel Ethernet + backplane Ethernet packet capturing
● Only one packet tracing task can be started for each interface board at a
time. Tracing of multiple interface boards can be started simultaneously.
● Only the header of the user plane packet (not including the payload of the
packet) can be captured.
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab is displayed.
Step 2 In the Trace Navigation Tree pane, choose Trace > Device Commissioning >
Packet Capture. The Packet Capture dialog box is displayed.
Step 3 In the Packet Capture dialog box, set parameters as required.
Step 4 Click Submit, to start capturing packets in the WebLMT dialog box that is
displayed. For the specific capturing duration, see the value of Trace Time (OMU
time) in the Packet Capture interface.
● Panel Ethernet packet capture and backplane Ethernet packet capture can be supported
simultaneously. If you only need to capture the panel Ethernet packet, set PortType (Inner)
to Inner Invalid or set PortType (Outer) to Outer Invalid.
● To capture panel Ethernet packets, set PortType (Outer) to Ethernet Frame, and set the
parameters in the Outer tab.
● To capture panel Ethernet packets, set PortType (Inner) to Ethernet Frame, and set the
parameters in the Inner tab.
● Basic Mode: Enter basic parameters (subrack number and physical slot
number) to start the packet capturing function. Therefore, this is defined as
the basic mode. Under the basic mode, only Panel Ethernet packet capturing
is supported, and backplane Ethernet packet capturing is not supported.
Interface Description
Parameter
Physical Slot Indicates the number of the physical slot which houses the
No interface board.
Interface Description
Parameter
Scene Select Indicates the scene under which packets are captured are
differentiated by protocol type. For descriptions about
protocol types, see Table Protocol Types
VLAN Tag Indicates whether the data packet carries a VLAN ID.
Tagged: The data packet carries a VLAN ID.
Tagged&Untagged: The data packet carries or does not
carry a VLAN ID.
Trace Time Start Time: The start time and end time of the trace task.
Trace Time (minute): Duration of the tracing task in
minutes.
Protocol Description
Types
PTRAU Packet Packets whose protocol type is Packet Transcoder and Rate
Adapter Unit (PTRAU).
Protocol Description
Types
UMTS IURCFP Packets whose protocol type is UMTS IUR Common Frame
Packet Protocol. To capture these packets, set Peer IP Address to
an appropriate value.
Outer Port Indicates the number of the port on the interface board panel.
Number
Outer Trace ● In: tracing packets entering the port of the interface board
Direction panel from the outside.
● Out: tracing packets sent from the port of the interface
board panel.
● Both: tracing packets in the two directions simultaneously.
Outer Peer Specifies the peer MAC address of the Ethernet frame to be
MAC Address captured.
This is the destination MAC address of the packet when "Out"
is selected for the "outer trace direction"; or the source MAC
address when "In" is selected for the "outer trace direction".
If left blank, it indicates capturing of all packets at the peer
MAC address.
Interface Description
Parameter
Local User Specifies the local User Datagram Protocol (UDP) port
Datagram number of the IP packet to be captured.
Protocol (UDP) This is the source User Datagram Protocol (UDP) port number
Port No of the packet when the "Out" is selected for the "outer trace
direction"; or the destination User Datagram Protocol (UDP)
port number when the "In" is selected for the "outer trace
direction".
If left blank, it indicates capturing of all packets at the local
User Datagram Protocol (UDP) port.
Peer User Specifies the peer User Datagram Protocol (UDP) port number
Datagram of the IP packet to be captured.
Protocol (UDP) This is the destination User Datagram Protocol (UDP) port
Port No number of the packet when the "Out" is selected for the
"outer trace direction"; or the source User Datagram Protocol
(UDP) port number when the "In" is selected for the "outer
trace direction".
If left blank, it indicates capturing of all packets at the peer
User Datagram Protocol (UDP) port.
Inner Port The number of the port on the interface board backplane.
Number
Inner Trace ● In: tracing the packets entering the interface board
Direction backplane from the SCU board.
● Out: tracing packets sent from the interface board
backplane to the SCU board.
● Both: tracing packets in the two directions simultaneously.
Inner Peer MAC Specifies the peer MAC address of the Ethernet frame to be
Address captured.
This is the destination MAC address of the packet when the
"Out" is selected for the "inner trace direction"; or the source
MAC address when the "In" is selected for the "inner trace
direction".
If left blank, it indicates capturing of all packets at the peer
MAC address.
----End
Follow-up Procedure
● You can manage packet capture in Manage Trace Task on the Trace tab. You
can query, stop, delete or restart a packet capture task.
● After packet capturing is complete, packet capturing log files (for
example, /bam/common/fam/trace/16778026_ packet capturing
_20120927_201909.log.zip or /bam/common/fam/trace/16778026_ packet
capturing _20120927_201909.pcap.zip) are created and saved on the OMU.
7.3.4 AC Tracing
This section describes how to trace signaling messages over the interface between
the base station controller and access controller (AC).
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 In the Trace Navigation Tree, choose Trace > Device Commissioning and
double-click AC Trace. The AC Trace dialog box is displayed, as shown in Figure
7-5.
Step 3 In the AC Trace dialog box, set parameters as required and click Submit to start
the tracing task in the WebLMT dialog box that is displayed.
----End
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 In the Trace Navigation Tree, choose Trace > Device Commissioning and
double-click DHCP Trace. The DHCP Trace dialog box is displayed, as shown in
Figure 7-6.
Step 3 In the DHCP Trace dialog box, set parameters as required and then click Submit
to start the tracing task in the WebLMT dialog box that is displayed.
Subrack No. Indicates the number of the subrack housing the board to
be traced.
Slot No. Indicates the number of the slot housing the board to be
traced. Specify the slot number in scenarios with
independent boards. In scenarios with active and standby
boards, the slot number should be an even number.
Board Type Indicates the type of the board to be traced. The board
type is automatically displayed after the slot number is
specified. It can also be queried by running the LST BRD
command.
Parameter Description
Port No./Link No./ Indicates the number of the port, link, or port group to
Group No. be traced. If this field is not specified, the entire board
will be traced. It is recommended that users should not
specify this field.
DHCP Product ID Indicates the type of base station to be traced. There are
four options: BTS, NodeB, SRAN, and Other.
● BTS: indicates the GSM base station.
● NodeB: indicates the UMTS base station.
● SRAN: indicates the SRAN base station.
NOTE
To trace SRAN base station, select NodeB and SRAN.
● Other: indicates other base stations.
----End
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > Iu Interface
Trace. The Iu Interface Trace dialog box is displayed, as shown in Figure 7-7.
Step 3 In the Iu Interface Trace dialog box, set parameters and click Submit to start the
tracing task in the WebLMT dialog box that is displayed.
Basic RNC ID indicates the RNC ID of the cell to be traced. To query it,
run the LST URNCBASIC command.
Parameter Description
Trace You can select IU, SCCP, MTP3, QAAL2, SAAL, SCTP or
Type M3UA.
SCCPFLG becomes available if SCCP is selected.
● If SCCPFLG is selected, SCCP messages compliant with
the current interface protocol are reported in tracing
results.
● If SCCPFLG is not selected, SCCP messages complaint
with all interface protocols are contained in tracing
results.
MTP3 MTP3 Set this parameter to Specified Link or Link Set. If this
Trace parameter is set to Link Set, a large number of messages
Type are traced.
Signali Index of an MTP3 link in the specified link set, which can
ng Link be queried by running the LST MTP3LNK command.
Code
SAAL Signali indicates the number of an signaling link. To query it, run
ng Link the LST SAALLNK command.
ID
SCTP SCTP indicates the number of an SCTP link. To query it, run the
Link ID LST SCTPLNK command.
M3UA M3UA Set this parameter to Specified Link or Link Set. If this
Trace parameter is set to Link Set, a large number of messages
Type are traced.
Parameter Description
----End
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 On the Trace Navigation Tree pane, choose Trace > UMTS Services > Iupc
Interface Trace. The Iupc Interface Trace dialog box is displayed, as shown in
Figure 7-8.
Step 3 In the Iupc Interface Trace dialog box, set parameters and click Submit to start
the tracing task in the WebLMT dialog box that is displayed.
----End
Result
In the message browse window of Iupc Interface Tracing, the number in the Information
Source column represents the DPC of the neighboring RNC. You can query more
information about the DPC by running the command LST N7DPC.
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > Iur Interface
Trace. The Iur Interface Trace dialog box is displayed, as shown in Figure 7-9.
Step 3 In the Iur Interface Trace dialog box, set parameters and click Submit to start the
tracing task in the WebLMT dialog box that is displayed.
Trace Type You can select IUR, SCCP, MTP3, QAAL2, SAAL,
SCTP or M3UA.
SCCPFLG becomes available if SCCP is selected.
● If SCCPFLG is selected, SCCP messages
compliant with the current interface protocol are
reported in tracing results.
● If SCCPFLG is not selected, SCCP messages
complaint with all interface protocols are
contained in tracing results.
IUR IUR_G In the IUR tab page, if you select IUR_G, the Iur-g
InMbsc interface messages between BSC6910s or in a
BSC6910 are traced. If you select InMbsc, the Iur-g
interface messages between the GSM and UMTS in
a BSC6910 are traced.
MTP3 MTP3 Trace Set this parameter to Specified Link or Link Set. If
Type this parameter is set to Link Set, a large number of
messages are traced.
Parameter Description
----End
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > Iub Interface
Trace. The Iub Interface Trace dialog box is displayed, as shown in Figure 7-10.
Step 3 In the Iub Interface Trace dialog box, set parameters and click Submit to start
the tracing task in the WebLMT dialog box that is displayed.
Parameter Description
SAAL SAAL Link ID indicates the number of an SAAL link. To query it,
Signaling Link run the LST SAALLNK command.
ID
SCTP SCTP Link ID indicates the number of an SCTP link. To query it, run
the LST SCTPLNK command.
----End
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > Uu Interface
Trace. The Uu Interface Trace dialog box is displayed, as shown in Figure 7-11.
Step 3 In the Uu Interface Trace dialog box, set the parameters as required. Then click
Submit to start the tracing task in the WebLMT dialog box that is displayed.
Parameter Description
Cell Settings needs to be set to the ID of the cell sending and receiving
messages. The parameter can be queried by running the
LST UCELL command.
NOTE
A maximum of 32 cells can be traced simultaneously.
Parameter Description
----End
Prerequisites
The parameter switch for detecting missing neighboring cell relationship is set to
ON. The setting can be queried by running the LST UNCELLDETECTSWITCH
command.
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > MNCDT Trace.
The MNCDT Trace dialog box is displayed, as shown in Figure 7-12.
Step 3 Set parameters in the MNCDT Trace dialog box and then click Submit to start the
tracing task in the WebLMT dialog box that is displayed.
End of NCC indicates the end of the NCC for the cell to be
traced for detecting missing neighboring cell
relationship. The parameter value ranges from 0 to
7. End of NCC must be greater than or equal to
Start of NCC.
Parameter Description
End of BCC indicates the end of the BCC for the cell to be
traced for detecting missing neighboring cell
relationship. The parameter value ranges from 0 to
7. End of BCC must be greater than or equal to
Start of BCC.
----End
Context
NOTICE
There is no way to avoid that some user data such as IMSI, IMEI, TMSI, MSISDN,
and CELLID will be used during tracing. This function provides a pseudonymous
data processing method to encrypt such data as IMSI and IMEI using irreversible
HASH algorithm that provides a random key. You are recommended to comply
with local laws when executing the task and take ample measures to fully protect
user data, such as enabling the pseudonymous function and deleting the folder
that saves track records after you finish processing data. For details about personal
data description, see BSC6900&BSC6910 UMTS personal data description.
● When entering IMSI, check whether IMSI data to be entered must be pseudonymous by
running the LST USERIDANONSWITCH command and querying User Identity
Pseudonymization Switch.
● If User Identity Pseudonymization Switch is ON, the pseudonymous policy is enabled,
and pseudonymous IMSI data must be entered in IMSI. The pseudonymous IMSI data is
the IMSI data encrypted by the HMACUtil using the cipher key.
● If User Identity Pseudonymization Switch is OFF, the pseudonymous policy is disabled,
and user IMSI data is directly entered in IMSI.
● Change the pseudonymous policy and cipher key on the U2020 by choosing Trace and
Maintenance > Signaling Trace > Pseudonymization Policy Management >
Pseudonymization Key Management (application style) or Trace and Maintenance >
Monitor > Signaling Trace > Pseudonymization Policy Management > Pseudonymization
Key Management (traditional style). For details, see U2020 Fault Management User Guide.
● If you change the pseudonymous policy or cipher key of a started tracing task, you need to
restart the tracing task. Otherwise, the tracing task becomes invalid.
● For details about how to obtain the HMACUtil, contact Huawei technical support.
● To view detailed description of TXT (Command Code) messages, right-click in the blank area
on the right part of the window and choose Update Text from the shortcut menu. The text
messages update once each time users choose Update Text. They do not automatically
update.
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
NOTICE
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > UE Trace. The UE
Trace dialog box is displayed.
Step 3 In the displayed UE Trace dialog box, set the parameters as required. Then click
Submit to start the tracing task in the WebLMT dialog box that is displayed.
RNC ID indicates the RNC ID of the cell to be traced. To query it, run the
LST URNCBASIC command.
Parameter Description
Parameter Description
Trace Config Commonly used tracing items are combined to form various
Template templates, so that users can start a tracing task conveniently.
Following describe the meanings of various parameters in
different templates:
● User-defined Mode: Users can set parameters on each tab
page in the UE Trace dialog box.
● Standard UE CDT Trace Method: When this template is
selected, all standard signaling messages on the IUR, IUB, IU,
IUPC, and UU tab pages are traced. Debug Mode is
unavailable.
● UE CDT Trace Method (Debug + Internal Event): When this
template is selected, the following messages are traced: all
standard signaling messages on the IUR, IUB, IU, IUPC, and
UU tab pages and Internal Event on the Other1 tab page.
● UE CDT Trace Method (Debug + Internal Event + L2
Statistics): When this template is selected, the following
messages are traced: all standard signaling messages on the
IUR, IUB, IU, IUPC, and UU tab pages, Internal Event on the
Other1 tab page, and Layer 2 data transfer periodic report
on the Other tab page.
● UE CDT Trace Method (Debug + Internal Event + L2
Statistics + SRB): When this template is selected, the
following messages are traced: all standard signaling
messages on the IUR, IUB, IU, IUPC, and UU tab pages,
Internal Event on the Other1 tab page, Layer 2 data
transfer periodic report on the Other tab page, and L2 SRB
Data Report.
● UE CDT Trace Method (Debug + Internal Event + L2
Statistics + SRB + TRB): When this template is selected, the
following messages are traced: all standard signaling
messages on the IUR, IUB, IU, IUPC, and UU tab pages,
Internal Event on the Other1 tab page, Layer 2 data
transfer periodic report on the Other tab page, L2 SRB Data
Report, L2 TRB packet header report (Iub interface), and L2
TRB packet header report (Iu interface).
● UE CDT Trace Method (Debug + Internal Event + L2
Statistics + SRB + TRB + MOS): When this template is
selected, the following messages are traced: all standard
signaling messages on the IUR, IUB, IU, IUPC, and UU tab
pages, Internal Event on the Other1 tab page, Layer 2 data
transfer periodic report on the Other tab page, L2 SRB Data
Report, L2 TRB packet header report (Iub interface), L2
TRB packet header report (Iu interface), and Voice
Analysis.
Parameter Description
AMR Mode Selecting the counter starts monitoring of AMR mode during
tracing of a single UE. The counter is reported periodically. If
AMR mode changes, the current mode is reported.
Parameter Description
Report Indicates the period for reporting Layer 2 data transfer periodic
Period report.
Parameter Description
Auto Ping Selecting it enables the RAN to send the UE Internet Control
Message Protocol (ICMP) packets. This function helps users to
determine whether data disconnection exists between a server
and the RNC or a low rate on the server side causes the low UE
rate.
● Ping Interval (0.1 ms): indicates the interval at which ICMP
packets are sent.
● Packet Length (bytes): indicates the payload length of the
ICMP packets.
Parameter Description
Voice When this check box is selected, the LMT records the test results
Analysis of voice frames over the Iu interface, for example, the frame
type, mean opinion score (MOS), and speech noise detection
result. Based on the recorded test results, the maintenance
personnel can judge the voice quality. The MOS is saved in the
following path by default:/bam/common/fam/speechmos/.
● Sampling No.: This parameter indicates the voice quality
sample to be used. Currently, the valid value range of this
parameter is 0 and 10. The value of this parameter depends
on the selected test tool. It is set to 0 only when no voice
quality sample is used. In this case, no test tool is required.
Parameter Description
IUUP Uplink Selecting it enables Iu user plane (IuUP) data that would be
Loop transmitted to the CN to be transmitted in the downlink
direction. This function is used for isolating other network
elements during problem analysis, which facilitates location of
speech quality problems.
NOTE
When this operation is performed, the traced user can only hear the voice
of itself rather than that of the peer end.
TCP Proxy When the TCP proxy function is enabled, protocol parameters
Protocol about user-plane TCP packets can be reported to the LMT.
Trace Report
Flow Trace Selecting it enables specified data flow of the UE on the interface
board to be reported in packets to the LMT. If RNC data flow is
blocked, the problem may lie in the RNC, the interface board, or
the peer end. You can use this function to exclude some
problems.
● Flow Trace Interface Type: indicates the interface to have its
data flow traced.
● Flow Trace Bearer Type: indicates the channel to have its
data flow traced.
● Flow Trace Service Type: indicates the service to have its data
flow traced.
● RearPanel trace: traces data flows sent or received on the
backplane of the interface board.
● FrontPanel trace: traces data flows sent or received on the
panel of the interface board.
NOTICE
Note that selecting Rear panel trace or Front panel trace may lead to
flow control, so exercise caution in this selection.
Parameter Description
Iub ● Path ANI No.: indicates the Adjacent Node Identifier (ANI)
corresponding to the Iub path.
● Type: indicates the transport type of the Iub path.
● Path ID: indicates the number of the Iub path.
● CID/UDP PORT(I1,I2,I3...): indicates the bound channel
identifier (CID) on the Iub path in ATM transmission mode or
the number of the bound User Datagram Protocol (UDP) port
in IP transmission mode.
Iucs ● Path ANI No.: indicates the ANI corresponding to the Iu-CS
path.
● Type: indicates the transport type of the Iu-CS path.
● Path ID: indicates the number of the Iu-CS path.
● CID/UDP PORT(I1,I2,I3...): indicates the bound CID on the Iu-
CS path in ATM transmission mode or the number of the
bound UDP port in IP transmission mode.
Iur ● Path ANI No.: indicates the ANI corresponding to the Iur path.
● Type: indicates the transport type of the Iur path.
● Path ID: indicates the number of the Iur path.
● CID/UDP PORT(I1,I2,I3...): indicates the bound CID on the Iur
path in ATM transmission mode or the number of the bound
UDP port in IP transmission mode.
Iups ● Path ANI No.: indicates the ANI corresponding to the Iu-PS
path.
● Type: indicates the transport type of the Iu-PS Pool IP.
● IP Pool IP Address: indicates the number of the Iu-PS Pool IP.
Parameter Description
----End
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > Cell Trace. The
Cell Trace dialog box is displayed, as shown in Figure 7-13.
Step 3 Set parameters in the Cell Trace dialog box and then click Submit to start the
tracing task in the WebLMT dialog box that is displayed.
Bind: Binding the UE to a UP. This helps users to determine whether a UP fault
exists.
SIG Trace Event includes internal transport events of the RNC to be traced.
----End
Context
NOTICE
The IOS tracing task involves a large amount of trace information, which affects
the system operation. Therefore, the maximum number of simultaneously traced
calls set in the Max calls simultaneously traced area in the IOS dialog box
should not be too high. In addition, you are advised not to trace all events at a
time. Furthermore, you should minimize the frequencies of performing this task
and the number of tasks performed simultaneously.
● You need to specify the number of successive calls to be traced, tracing cell
range, sampling criteria, and tracing time. The calls that meet the sampling
criteria are traced within the specified tracing time.
– When creating a call tracing task, you can define the sampling criteria by
setting the RAB parameter constraints and the RRC Est Cause. Once the
call meets the criteria, the tracing of the call is not stopped even if the
RAB parameters of the RRC establishment cause are changed during the
call. If the initial settings of the RAB parameters or the RRC establishment
cause value of a call does not meet the criteria, the BSC6910 does not
trace the call even if these parameters are modified to meet the criteria
during the call.
– You can specify the message types to be traced by selecting the event
types.
● Assume that the specified number of continuous calls is N. If N calls are
already being traced, the system does not trace any newly accessed calls. If
the number becomes less than N because of the termination of a traced call,
the system automatically traces a new call.
● If multiple IOS tracing tasks with the same parameter settings are started,
one task can trace and display the tracing messages of only one user, because
each user is traced by a specific tracing task.
● To view detailed description of TXT (Command Code) messages, right-click in
the blank area on the right part of the window and choose Update Text from
the shortcut menu. The text messages update once each time users choose
Update Text. They do not automatically update.
Procedure
Step 1 Click Trace on the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > IOS Trace. The
IOS Trace dialog box is displayed, as shown in Figure 7-14.
Step 3 In the displayed IOS Trace dialog box, set parameters and filter traced messages
in other tab pages. Then click Submit to start the tracing task in the WebLMT
dialog box that is displayed.
RNC ID RNC ID of the cell to be traced. To query it, run the LST
URNCBASIC command.
Call Count Per Maximum number of calls that single cell can be traced
Cell simultaneously after a tracing task is started. The value ranges
from 1 to 30.
Cell ID You can type the ID of one cell or IDs of multiple cells.
NOTE
A maximum of 32 cells can be traced simultaneously.
VIP IMSI Run the ADD UVIPIMSI command to add the VIP IMSI.
Parameter Description
Trace only When this switch is turned on, only users with control plane
inter- load sharing are traced.
subsystem
users
IMEI IMEI TAC of the user to be traced. You can enter a maximum
TAC(TAC1,TAC2 of eight IMEI TACs. An IMEI TAC can be a decimal number of 1
,...TAC8) to 8 digits. IMEI is short for international mobile equipment
identity and TAC is short for type allocation code.
NOTE
This parameter is valid only when the IMEI query function is enabled
on the CN or RNC side.
To enable the IMEI query function on the RNC side, run the following
command SET URRCTRLSWITCH:
SET URRCTRLSWITCH:
PROCESSSWITCH2=RNC_CS_QUERY_UE_IMEI_SWITCH-1&RNC_PS_QUE
RY_UE_IMEI_SWITCH-1,
PROCESSSWITCH4=SEND_MSG_NULL_SWITCH-1;
Event Type Types of event to be traced. The event types classify all
messages related to calls. You can select or clear all event
types by clicking Select All or Clear All. You can restore the
setting to the original one by clicking Reset.
Parameter Description
Trace Config Commonly used tracing items are combined to form various
Template templates, so that users can start a tracing task conveniently.
Following describe the meanings of various parameters in
different templates:
● User-defined Mode: Users can set parameters on each tab
page in the IOS Trace dialog box.
● Standard IOS Trace Method: When this template is
selected, all standard signaling messages generated by RRC
Est Cause on the RRC tab page are traced. Debug Mode is
unavailable.
● IOS Trace Method (Debug + Internal Event): When this
template is selected, the following messages are traced: all
standard signaling messages generated by RRC Est Cause
on the RRC tab page and Internal Event on the Other1
tab page.
● IOS Trace Method (Debug + Internal Event + L2
Statistics): When this template is selected, the following
messages are traced: all standard signaling messages
generated by RRC Est Cause on the RRC tab page, Internal
Event on the Other1 tab page, and Layer 2 data transfer
periodic report on the Other tab page.
● IOS Trace Method (Debug + Internal Event + L2
Statistics + SRB): When this template is selected, the
following messages are traced: all standard signaling
messages generated by RRC Est Cause on the RRC tab
page, Internal Event on the Other1 tab page, Layer 2
data transfer periodic report on the Other tab page, and
L2 SRB Data Report.
● IOS Trace Method (Debug + Internal Event + L2
Statistics + SRB + TRB): When this template is selected,
the following messages are traced: all standard signaling
messages generated by RRC Est Cause on the RRC tab
page, Internal Event on the Other1 tab page, Layer 2
data transfer periodic report on the Other tab page, L2
SRB Data Report, L2 TRB packet header report (Iub
interface), and L2 TRB packet header report (Iu
interface).
Parameter Description
CELL CHANGE CELL CHANGE ORDER: Traced messages of the cell change
ORDER order procedure.
PCH CELL Traced messages of the cell update procedure for UEs in the
UPDATE CELL_PCH and URA_PCH states.
RRC Located Period for reporting UE locating results during IOS tracing.
Cycle (ms)
RRC Est Cause Call establishment causes and filters UEs to be traced in the
cell based on the call establishment causes.
Downlink BLER Selecting the counter starts monitoring of Block Error Rate
(BLER) during tracing of a single UE. The counter is reported
periodically. The period of reporting the monitoring reports
ranges from 0.25s to 64s.
PCPICH Ec/No Selecting the counter starts monitoring of PCPICH Ec/No and
RSCP Received Signal Code Power (RSCP) during tracing of a single
UE. The counter is reported periodically. The period of
reporting the monitoring reports ranges from 0.25s to 64s.
AMR Mode Selecting the counter starts monitoring of AMR mode during
tracing of a single UE. The counter is reported periodically. If
AMR mode changes, the current mode is reported.
Parameter Description
Parameter Description
IUUP Uplink Selecting it enables Iu user plane (IuUP) data that would be
Loop transmitted to the CN to be transmitted in the downlink
direction. This function is used for isolating other network
elements during problem analysis, which facilitates location of
speech quality problems.
NOTE
When this operation is performed, the traced user can only hear the
voice of itself rather than that of the peer end.
Parameter Description
Iucs Path ● Path ANI No.: ANI corresponding to the Iu-CS path.
● Path Type: Transport type of the Iu-CS path.
● Path ID: ID of an Iu-CS path.
● CID/UDP PORT(I1,I2,I3...): Bound CID on the Iu-CS path in
ATM transmission mode.
Iur Path ● Path ANI No.: ANI corresponding to the Iur path.
● Path Type: Transport type of the Iur path.
● Path ID: ID of an Iur path.
● CID/UDP PORT(I1,I2,I3...): Bound CID on the Iur path in
ATM transmission mode.
Iups GTPU ● Path ANI No.: ANI corresponding to the Iu-PS GTPU.
● IP Pool IP Address: IP pool IP address corresponding to the
Iu-PS GTPU.
----End
Context
Physical RNCs of logical RNC communicate with each other through the Iurp
interface.
Procedure
Step 1 ClickTraceon the LMT main page. The Trace tab page is displayed.
Step 2 Under Trace Navigation Tree, choose Trace > UMTS Services > Iur-p Trace. The
Iur-p Trace dialog box is displayed, as shown in Figure 7-15.
Step 3 In the displayed Iur-p Trace dialog box, set the parameters as required. Click
Submit to start the tracing task in the WebLMT dialog box that is displayed.
Parameter Description
Basic External You can select All External Node or Specified External
Node Node. When you select Specified External Node, you
Configur need to type Specified External Node.
ation
Parameter Description
IURP Frame You can select All, Control Frame, Data Frame or OM
Type Frame.
----End
Procedure
Step 1 Click Trace on the LMT home page. The Trace tab page is displayed.
Step 2 In the Trace Navigation Tree, choose Trace > UMTS Services > Sr Interface
Trace. The Sr Interface Trace dialog box is displayed, as shown in Figure 7-16.
Step 3 On the Sr Interface Trace dialog box, set parameters and click Submit to start the
tracing task in the WebLMT dialog box that is displayed.
SCTP SCTP Link indicates the number of an SCTP link. To query it, run
ID the LST SCTPLNK command.
----End
8 Performance Monitoring
8.1 Concepts
This section describes the concepts related toBSC6910 performance monitoring,
monitoring principles, and monitoring rights management.
8.2 General Operations
This section describes the general operations applicable to all performance
monitoring tasks performed on the BSC6910.
8.3 Common Monitoring
This section describes common performance monitoring.
8.4 UMTS Monitoring
This section describes performance monitoring of UMTS services.
8.1 Concepts
This section describes the concepts related toBSC6910 performance monitoring,
monitoring principles, and monitoring rights management.
1. When you use the LMT to create a task for monitoring CPU usage, the LMT
periodically sends a binary command to the OMU maintenance module to
query CPU usage.
2. The OMU sends the corresponding command to the configuration and
maintenance module of a specified board.
3. The board collects data according to the commands and reports it to the
OMU.
4. The OMU forwards the data to the LMT.
5. The BSC supports CPU usage monitoring by subrack No. or by slot No.
The process when the LMT creates a real-time monitoring task, other than CPU
usage monitoring, is as follows:
1. The LMT sends a binary command to the OMU to create the task.
2. The OMU assigns a task ID to the task and sends the command to the
debugging module of a specified board.
3. Upon receiving the command, the debugging module records the filter
parameters in the filter table and notifies the service module of the
information.
4. The service module updates the local filter table in accordance with the
messages from the debugging module.
The process when the LMT stops a real-time monitoring task is as follows:
1. When you stop a monitoring task on the LMT, the LMT sends a binary
command to the OMU to delete the task.
2. The OMU sends the command to the specified board based on the task ID.
3. The debugging module and service module delete the task from the filter
table.
The process when the LMT reports real-time monitoring data is as follows:
1. The service module compares the collected data with data in the local filter
table. If the data is the same, the service module reports the collected data to
the OMU.
2. Upon receiving the data, The OMU forwards it to the LMT that creates the
task based on the task ID.
3. The LMT displays the data in a chart or a list.
Group G_10 consists of binary commands used for tracing and monitoring.
Prerequisites
● A performance monitoring task has been started.
● Monitoring data has been reported.
Procedure
● Right-click on the Chart tab page in the real-time performance monitoring
window of the WebLMT. Then, you can perform the following operations by
selecting an appropriate option from the shortcut menu:
– Auto Scroll
– Show Grid
– Switch Display Mode
When the number of real-time monitoring tasks is greater than 60, right-click on the
Chart tab page and choose Switch Display Mode from the shortcut menu:
● If the bar chart has been displayed, you can switch it to the sequence diagram.
● If the sequence diagram has been displayed, you cannot switch it to the bar
chart.
– Auto Adjust
● Right-click on the List tab page in the real-time performance monitoring
window. Then, you can perform the following operation by selecting an
appropriate option from the shortcut menu:
----End
Prerequisites
● A performance monitoring task has been started.
● Monitoring data has been reported.
Procedure
Step 1 In the task information pane of the real-time performance monitoring window,
click Line Color, Line Type, or Line Width.
● The chart display attribute settings apply only to the current monitoring task.
● You can set the chart display mode. If data is displayed on the List tab page but no
chart is displayed on the Chart tab page during the real-time monitoring.
----End
Prerequisites
● A performance monitoring task has been started.
● Monitoring data has been reported.
Procedure
Step 1 When you create a monitoring task, select the Save File check box and specify the
save path. By default, the Save File check box is selected and the save path is
C:/Web LMT/MBSC/output/monitor.
On the toolbar of the LMT main window, click System Settings to change the save path of
the file.
----End
Prerequisites
The monitoring data has been saved as files.
Procedure
Step 1 Choose Start > All Programs > Huawei Local Maintenance Terminal >
TrafficRecording Review Tool.
Step 2 Open save path of monitoring data files. The default save path is C:/Web LMT/
MBSC/output/monitor. Select the file to be browsed.
Step 3 Click Open or double-click the file. The TrafficRecording Review Tool window is
displayed, showing the monitoring data in a chart or a table.
Step 4 Click the List or Chart tab to view the data in different modes.
Step 5 To view other files, choose File > Open. In the Open dialog box, select and open
the target files to browse them.
----End
Prerequisites
The board to be monitored is running properly.
Context
The OMU and SAU boards do not support this function.
NOTICE
This function increases the CPU usage. Therefore, if the CPU usage reaches 80% or
higher, set the monitoring period to 5s.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Board CPU Usage Monitoring. The Board CPU Usage Monitoring dialog box is
displayed.
Step 3 In the Board CPU Usage Monitoring dialog box, set parameters according to
actual situations, and click Submit to start the monitoring task in the WebLMT
dialog box that is displayed.
● NE Time displayed in the status bar may be different from the actual NE
time, but the difference does not affect services.
----End
Prerequisites
● You have logged in to the LMT with an account authorized for this operation.
● The subsystem under monitoring is running properly.
Context
NOTICE
This function increases the CPU usage. Therefore, if the CPU usage reaches 80% or
higher, set the monitoring period to 5s.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Subsystem CPU Usage Monitor. The Subsystem CPU Usage Monitor dialog
box is displayed.
Step 3 In the Subsystem CPU Usage Monitor dialog box, set the parameters to
appropriate values, and click Submit to start the monitoring task in the WebLMT
dialog box that is displayed.
----End
Prerequisites
The board under monitoring is functional.
Procedure
Step 1 Click Monitor on the LMT main page. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Transport Resource Real-Time Monitoring. The Transport Resource Real-Time
Monitoring dialog box is displayed.
Step 3 In the Transport Resource Real-Time Monitoring dialog box, set the parameters
as required, and click Submit to start the monitoring task in the WebLMT dialog
box that is displayed.
● Statistic Period(s): Specifies the duration of the measurement period for
monitoring.
● Transport Object Type: Specifies the type of the transport object to be
monitored. It can be set to IP Logic Port, Physical Port. For detailed settings,
see Table 8-1.
● Subrack No.: Indicates the number of the subrack where the transport object
to be monitored is located.
● Slot No.: Indicates the number of the slot where the transport object to be
monitored is located.
● OP Index No.: Indicates the monitored operator of the transport object.
● Statistic Type: Indicates the statistic type displayed in the monitoring report.
It can be set to Bandwidth(Original) or Bandwidth(Statistic). Then, you can
select Uplink or Downlink to view the uplink or downlink statistics. If you
have selected Bandwidth(Original), the bandwidths allocated to different
services are displayed. If you have selected Bandwidth(Statistic), the total
bandwidth used by all services is displayed.
– Bandwidth(Original): Displays the actual bandwidths allocated to
different services when the UE is performing a voice service or data
service. Table 8-2 shows the related statistic items.
– Bandwidth(Statistic): Displays the total bandwidths of those allocated
to different services. Table 8-3 shows the related statistic items.
– Uplink/Downlink: Displays the statistics of the bandwidths in the uplink
or downlink.
Statistic Description
Item(Original)
Statistic Description
Item(Statistic)
Statistic Description
Item(Statistic)
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> BERS Monitoring. The BERS Monitoring dialog box is displayed.
Step 3 In the BERS Monitoring dialog box, set parameters according to actual situations,
and click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
----End
Context
● Using this function interrupts IMA groups, UNI links, fractional ATM links,
carried on a board. As a result, services on the corresponding port are
interrupted.
● Before monitoring the BER, configure the local loopback or remote loopback,
or use a loopback connector to short-circuit the TX end and the RX end.
● BER monitoring test and loopback test cannot be performed simultaneously
because the result and principles of these tests are the same.
● Only one BER monitoring test can be started for a board at a time.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> BER Monitoring. The BER Monitoring dialog box is displayed.
Step 3 In the BER Monitoring dialog box, set parameters according to actual situations,
and click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
----End
IMA Group IMA Group No. Indicates the number of the IMA group. To
query the IMA group, run the LST IMAGRP
command.
UNI link UNI Link No. Indicates the number of the UNI link. To query
the UNI link, run the LST UNILNK command.
Fractional FRAC Link No. Indicates the number of the fractional ATM
ATM Link link. To query the number of the fractional
ATM link, run the LST FRALNK command and
set Link type to FRAATM.
SAAL Link SAAL Link No. Indicates the number of the SAAL link. To
query the SAAL link, run the LST SAALLNK
command.
IPOA PVC IP Address Indicates the local and peer IP addresses of the
Ping Peer IP IPOA PCV. To query these IP addresses, run the
Address LST IPOAPVC command.
FE/GE FE/GE Port No. Indicates the number of the FE/GE port. To
query the number of the FE/GE port, run the
LST ETHPORT command.
10GE 10GE Port No. Indicates the number of the 10GE port. To
query the number of the 10GE port, run the
LST ETHPORT command.
SCTP Link SCTP Link No. Indicates the number of the SCTP link. To
query the SCTP link, run the LST SCTPLNK
command.
IPPOOL Local IP Address To query the local IP address, run the LST
LOCAL IP IPPOOLIP command.
IURPLINK IURP Link No. To query the IURP Link, run the LST IURPLNK
command.
Context
NOTICE
The IMA group must be successfully set up and connected to the peer link before
this task is performed. This task is stopped if the monitored IMA group is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to IMA Group
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The UNI link must be successfully set up and connected to the peer link before
this task is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to UNI Link
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The fractional ATM link must be successfully set up and connected to the peer link
before this task is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to Fractional
ATM Link and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The SAAL must be successfully set up and connected to the peer link before this
task is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to SAAL Link
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The IPOA PVC link must be successfully set up and connected to the peer link
before this task is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to IPOA PVC
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The AAL2 path must be successfully set up and connected to the peer link before
this task is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to AAL2 Path
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The FE/GE port must be successfully configured and connected to the peer port
before this task is performed. This task is stopped if the monitored link is deleted.
For FG2c, FG2e, GOUc, GOUe boards, if the physical port carries a logical port and
Monitor Type is set to QoS for this task, the queue statistics of the physical port
does not include the service data traffic on the logical port but includes only the
service data traffic on the physical port.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to FE/GE and
set other parameters according to actual situations. Then, click Submit to start the
monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The SCTP link must be successfully set up and connected to the peer link before
this task is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to SCTP Link
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to Logical
Port and set other parameters according to actual situations. Then, click Submit
to start the monitoring task in the WebLMT dialog box that is displayed.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to OAM and
set other parameters according to actual situations. Then, click Submit to start the
monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The specified non-channelized ATM optical port must be connected to the peer
port using links.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to Non-
Channelized ATM Optical Port and set other parameters according to actual
situations. Then, click Submit to start the monitoring task in the WebLMT dialog
box that is displayed.
----End
Context
NOTICE
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to IPPOOL
PM and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to TRUNK
Group and set other parameters according to actual situations. Then, click Submit
to start the monitoring task in the WebLMT dialog box that is displayed.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to IPPOOL
LOCAL IP and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
----End
Context
NOTICE
The Iur-p link must be configured and connected to the peer port before this task
is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to IURPLNK
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Prerequisites
You have logged in to the LMT with an authorized account.
Context
NOTICE
The 10GE port must be configured and connected to the peer port before this task
is performed. This task is stopped if the monitored link is deleted.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > Common Monitoring
> Link Performance Monitoring. The Link Performance Monitoring dialog box is
displayed.
Step 3 In the Link Performance Monitoring dialog box, set Monitor Item to 10GE and
set other parameters according to actual situations. Then, click Submit to start the
monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
and related parameters are displayed in the title bar of the window and the monitoring result is
displayed in lists and charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
RX and TX traffic in bit/s.
----End
Context
NOTICE
Before running this monitoring task, perform either of the following operations:
● Run SET UCORRMALGOSWITCH to set Handover algorithm switch. Ensure
that SOFT_HANDOVER_SWITCH is selected for this parameter.
● Run MOD UCELLMEAS to set Intra-freq Meas Ctrl Info Ind to REQUIRE.
● There is no way to avoid that some user data such as IMSI, IMEI, TMSI,
MSISDN, and CELLID will be used during tracing. This function provides a
pseudonymous data processing method to encrypt such data as IMSI and IMEI
using irreversible HASH algorithm that provides a random key. You are
recommended to comply with local laws when executing the task and take
ample measures to fully protect user data, such as enabling the pseudonymous
function and deleting the folder that saves track records after you finish
processing data. For details about personal data description, see
BSC6900&BSC6900 UMTS personal data description.
● This task is used only to monitor connections on dedicated channels. An ongoing task is
stopped if the monitored connection is released or relocated from the dedicated channel to a
common channel. The task is restarted if the monitored connection is relocated from the
common channel to a dedicated channel.
● This task is used only to monitor the real-time data of the cells in the active set. The data of
other cells is not reported. Therefore, the monitoring results reflect the changes in the
number of cells in the active set in real time.
● A maximum of three cells in the active set can be monitored in a task.
● When entering IMSI, check whether IMSI data to be entered must be pseudonymous by
running the LST USERIDANONSWITCH command and querying User Identity
Pseudonymization Switch.
● If User Identity Pseudonymization Switch is ON, the pseudonymous policy is enabled,
and pseudonymous IMSI data must be entered in IMSI. The pseudonymous IMSI data is
the IMSI data encrypted by the HMACUtil using the cipher key.
● If User Identity Pseudonymization Switch is OFF, the pseudonymous policy is disabled,
and user IMSI data is directly entered in IMSI.
● Change the pseudonymous policy and cipher key on the U2020 by choosing Trace and
Maintenance > Signaling Trace > Pseudonymization Policy Management >
Pseudonymization Key Management or Trace and Maintenance > Monitor > Signaling
Trace > Pseudonymization Policy Management > Pseudonymization Key Management.
For details, see U2020 Fault Management User Guide.
● If you change the pseudonymous policy or cipher key of a started tracing task, you need to
restart the tracing task. Otherwise, the tracing task becomes invalid.
● For details about how to obtain the HMACUtil, contact Huawei technical support.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to
PCPICH Ec/No RSCP and set other parameters according to actual situations.
Then, click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In the chart, the X-coordinate represents the hour: minute: second. The Y-coordinate represents
the reported P-CPICH Ec/No (unit: dB) and RSCP (unit: dBm).
● RSCP refers to the received signal code power measured on a P-CPICH. The reference point
for RSCP measurement is at the antenna connector of a UE. If the P-CPICH uses transmit
diversity, you need to measure the RSCP of each antenna and sum up all of the RSCP values
to obtain the total RSCP of the P-CPICH.
● Ec/No refers to the ratio of received energy per chip to noise spectral density. Like RSCP/RSSI,
Ec/No is also measured on the P-CPICH. The reference point for Ec/No measurement is also
at the antenna connector of the UE. If the P-CPICH uses transmit diversity, you need to
measure the Ec/No of each antenna and sum up all of the Ec/No values to obtain the total
Ec/No of the P-CPICH.
----End
Context
A task can be started for a UE. The monitoring result includes the number of cells in the
active set and the signal strength of each cell. Based on the monitoring result, you can
know whether the current connection is at the edge or the center of the cell.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to UL
SIR and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts. The monitoring result can reflect the changes in the number of the RLSs in real time.
In the chart, the X-coordinate represents the hour: minute: second. The Y-coordinate represents
the reported SIR of the UL RLSs (unit: dB).
The SIR is calculated using the formula (RSCP/ISCP) x SF, where:
● RSCP is short for Received Signal Code Power and reflects the received power on one code.
● ISCP is short for Interference Signal Code Power and reflects interference to the received
signal. Only the non-orthogonal interference is measured for ISCP.
● SF is short for the spreading factor of a DPCCH.
This task is performed on the DPCCH after radio links are combined on the NodeB. In
compressed mode, the SIR is not measured during the transmit intervals. The NodeB reports the
measured uplink SIR values to the BSC6910.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to
OLPC and set other parameters according to actual situations. Then, click Submit
to start the monitoring task in the WebLMT dialog box that is displayed.
If Monitor Period(s) is set to OLPC, the monitor period is set to the value specified by the
OLPC adjustment period parameter in the ADD UTYPRABOLPC or MOD UTYPRABOLPC
command.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts. In charts, the X-coordinate represents the hour: minute: second. Two charts are used to
describe five monitoring items.
● The first chart shows the output interface of the OLPC SIR target value, OLPC UL BLER,
and OLPC UL BER. The left Y coordinate represents OLPC SIR Target (range: -10 to 18;
unit: dB). The right Y coordinate represents OLPC UL BLER (range: 0 to 1; unit: none) and
OLPC UL BER (range: 0 to 1; unit: none).
● The second chart shows the output interface of E-DCH Average Transmission Number
and E-DCH Residual BLER. The left Y coordinate represents E-DCH Average Transmission
Number (default value range: 0 to 16; unit: none). The coordinate value range can be
dynamically adjusted based on the actual value. The right Y coordinate represents E-DCH
Residual BLER (range: 0 to 1; unit: none).
----End
Context
This task is used only to monitor connections on dedicated channels. An ongoing
task is stopped if the monitored connection is released or relocated from the
dedicated channel to a common channel. The task is restarted if the monitored
connection is relocated from the common channel to a dedicated channel.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to UL
SIR Error and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported SIR error values (SIRerror) of the UL RLSs.
● SIRerror (unit: dB) is reported from the NodeB to the BSC6910. The formula is as follows:
SIRerror = SIR - SIRtarget_ave.
● Where, SIRtarget_ave represents the average of SIRtarget within a period that is equal to the
time for calculating the SIR in the preceding formula for calculating SIRerror.
● In compressed mode, SIRtarget equals to SIRcm_target. The SIRtarget_ave is not calculated during
transmission intervals. The average of SIRtarget is an arithmetical average. The unit of
SIRtarget_ave is dB.
----End
Context
This task is used only to monitor connections on dedicated channels. An ongoing
task is stopped if the monitored connection is released or relocated from the
dedicated channel to a common channel. The task is restarted if the monitored
connection is relocated from the common channel to a dedicated channel.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to DL
Tx Code Power and set other parameters according to actual situations. Then,
click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts. The monitoring results reflect the changes in the number of the radio links involved in
the current connection in real time.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported DL code TX power (unit: dBm).
Code TX power refers to the NodeB TX power on one channelization code that is on one given
scrambling code on one given carrier. The DL code TX power can be measured on the DPCCH of
any radio link outgoing from the UTRAN and indicates the pilot bit power of the DPCCH.
In compressed mode, the TX power measurement should cover all timeslots, including those
during the transmit intervals. The reference point for measurement is at the antenna connector.
If transmit diversity is used, the DL code TX power is the total of the code TX powers of all
antennas.
----End
Context
UE TX power refers to the transmit power of a UE on a carrier. The reference point
for measurement of the UE TX power is at the antenna connector of the UE.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to UE
Tx Power and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported UE TX power (unit: dBm).
----End
Context
Traffic volume refers to the Buffer Occupy (BO) value. BO is the number of data
bytes to be transmitted or retransmitted from the RLC entity on a logical channel.
If RLC is in AM mode, the BO value includes the control Protocol Data Unit (PDU)
and the PDU outside the transmit window, excluding the PDUs for which no ACK is
received.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to UL
Traffic Vol and set other parameters according to actual situations. Then. click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported UL traffic volume on the UL physical channel (unit: byte).
----End
Context
Traffic volume refers to the Buffer Occupy (BO) value. BO is the number of data
bytes to be transmitted or retransmitted from the RLC entity on a logical channel.
If RLC is in AM mode, the BO value includes the control Protocol Data Unit (PDU)
and the PDU outside the transmit window, excluding the PDUs for which no ACK is
received.
This task can be used to monitor the connections of PS interactive and
background services on common channels or dedicated channels.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to DL
Traffic Vol and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported DL traffic volume (unit: byte).
----End
Context
Throughput refers to the amount of data transmitted on a transport channel in
units of time and is measured on the MAC-d. Bandwidth refers to the maximum
rate calculated based on the RLC payload. The bandwidth changes during RB
reconfiguration. The throughput measurement involves RLC headers, and therefore
the measured peak throughput is greater than the bandwidth.
This task can be used to monitor the connections of PS interactive and
background services on common channels or dedicated channels.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to UL
Throughput Bandwidth and set other parameters according to actual situations.
Then, click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported UL throughput and UL bandwidth (unit: bit/s).
● Observe the variations of the UL throughput and bandwidth during verification of dynamic
channel configurations. If the UL bandwidth varies with the UL throughput, dynamic channel
configuration is normal.
● If dynamic channel configuration is not used, observe the variation of UL throughput to
verify service source rate variations.
----End
Context
Throughput refers to the amount of data transmitted on a transport channel in
units of time and is measured on the MAC-d. Bandwidth refers to the maximum
rate calculated based on the RLC payload. The bandwidth changes during RB
reconfiguration. The throughput measurement involves RLC headers, and therefore
the measured peak throughput is greater than the bandwidth.
This task can be used to monitor the connections of PS interactive and
background services on common channels or dedicated channels.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to DL
Throughput Bandwidth and set other parameters according to actual situations.
Then, click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported DL throughput and DL bandwidth (unit: bit/s).
● Observe the variations of the DL throughput and bandwidth during verification of dynamic
channel configurations. If the DL bandwidth varies with the DL throughput, dynamic channel
configuration is normal.
● If dynamic channel configuration is not used, observe the variation of DL throughput to
verify service source rate variations.
----End
Context
Handover delay refers to the time taken by each handover. During this period of
time, the BSC6910 makes a handover decision, initiates the handover (including
the soft handover and the hard handover), and completes the handover.
This task is used only to monitor the handover delay of a UE in the CELL_DCH
state. An ongoing task is stopped if the UE transits from the CELL_DCH state to
the CELL_FACH state or idle mode. The task is restarted if the UE transits from the
CELL_FACH state or idle mode back to the CELL_DCH state.
A maximum of five tasks can be simultaneously started on the LMT. This task can
monitor the delay of an intra-frequency or inter-frequency handover but not an
inter-RAT handover.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to
Handover Delay and set other parameters according to actual situations. Then,
click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
Monitoring Description
Results
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents
handover delay and interval (unit: ms).
----End
Context
The BLER of the DL transport channel is measured on the UE and used for outer
loop power control.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to DL
BLER and set other parameters according to actual situations. Then, click Submit
to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts. The monitoring results reflect the changes in the number of traffic transport channels in
real time. The number of signaling transport channels is always 1.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
reported BLER of the DL transport channel (unit: %).
When Monitor Item is DL BLER, Monitor Period (s) must be set to 2s or a greater value.
----End
Context
This task can be started only if the traced UE is processing AMR services.
The narrowband AMR has eight available rates, that is, eight AMR modes: 12.2
kbit/s, 10.2 kbit/s, 7.95 kbit/s, 7.4 kbit/s, 6.7 kbit/s, 5.9 kbit/s, 5.15 kbit/s, and 4.75
kbit/s.
The wideband AMR has nine available rates, that is, nine AMR modes: 23.85 kbit/s,
23.05 kbit/s, 19.85 kbit/s, 18.25 kbit/s, 15.85 kbit/s, 14.25 kbit/s, 12.65 kbit/s, 8.85
kbit/s, and 6.60 kbit/s.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to
AMR Mode and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
maximum AMR rate in the uplink and downlink (unit: kbit/s).
----End
Context
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to
AMR EVQI and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task
name is displayed in the title bar of the window and the monitoring result is displayed in
lists and charts.
In charts, the X-coordinate represents the hour:minute:second. The Y-coordinate represents
the maximum UL and DL data rates of AMR services (unit: kbit/s).
As specified in protocols, The EVQI value ranges from 0 to 5. In the performance monitoring
window of the LMT, the EVQI value is 100 times the actual value (ranging from 0 to 500).
----End
Context
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Connection Performance Monitoring. The Connection Performance Monitoring
dialog box is displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to
AMR PSPELQ and set other parameters as required. Then, click Submit to start
the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task
name is displayed in the title bar of the window and the monitoring result is displayed in
lists and charts.
In charts, the X-coordinate represents the hour:minute:second. The Y-coordinate represents
the maximum UL and DL data rates of AMR services (unit: kbit/s).
As specified in protocols, the PSPELQ value ranges from 1 to 5. If the PSPELQ value is 0, the
evaluation resources have been occupied. In the performance monitoring window of the
LMT, the PSPELQ value is 100 times the actual value (ranging from 0 to 500).
----End
Context
You can run the LST UPCPICH command to query the automatic adjustment
range of the P-CPICH TX power. The power is abnormal if it is beyond the range.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to PCPICH
TxPower and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
P-CPICH power (unit: dBm).
----End
Context
The CAC procedure measures the UL load based on the UL load factor. The UL
load factor is calculated using the following formula: UL load factor = 1 - Cell
background noise/UL RTWP. The cell background noise is a constant and set using
the ADD UCELLCAC or MOD UCELLCAC command. Therefore, the UL RTWP can
also be used to measure the relative UL load of the cell.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to RTWP and
set other parameters according to actual situations. Then, click Submit to start the
monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents hour: minute: second. The Y-coordinate represents the cell
UL RTWP (unit: dBm).
----End
Context
The CAC procedure uses the ratio of the DL carrier TX power to the maximum TX
power of the cell to measure the cell DL load. When setting up a cell, you can run
ADD UCELLSETUP to set the maximum TX power. After the cell is set up, you can
run MOD UCELL to modify it.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to Cell DL
Carrier TX Power and set other parameters according to actual situations. Then,
click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
ratio of the DL carrier TX power to the maximum TX power of the cell (unit: %).
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to Cell User
Number and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
number of UEs in a cell.
HSDPA User Number and HSUPA User Number are measured during user access while DCH
User Number is measured after user access. Therefore, the value of HSDPA User Number or
HSUPA User Number may be greater than that of DCH User Number.
UL L2 Enhanced User Number measures only the number of users enabled with UL Layer 2
enhancement in the CELL_DCH state. Therefore, the value of UL L2 Enhanced User Number may
be less than that of E-RACH User Number.
DL L2 Enhanced User Number measures only the number of users enabled with DL Layer 2
enhancement in the CELL_DCH state. Therefore, the value of DL L2 Enhanced User Number may
be less than that of EFACH User Number.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to Node Sync
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
time difference between RFN and BFN and the time taken by the NodeB to complete node
synchronization (unit: ms).
----End
Context
The methods for measuring the cell load vary with CAC algorithms (CAC
algorithm 1 and CAC algorithm 2). You can run the MOD UCELLALGOSWITCH
command to set the UL CAC algorithm of a cell and run the LST
UCELLALGOSWITCH command to query the UL CAC algorithm of a cell.
● CAC algorithm 1 uses the UL load factor to measure the UL load. The UL load
factor is calculated using the following formula: UL load factor = 1 - Cell
background noise/UL RTWP. You can run the command ADD UCELLCAC or
MOD UCELLCAC to set the cell background noise.
● CAC algorithm 2 uses the ratio of the current number of UL equivalent UEs to
the maximum number of UL equivalent UEs to measure the cell load. By
default, algorithm 2 is used.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to UL CAC
Monitor and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
predicted values and measured values of the load (unit: %).
----End
Context
The methods for measuring the cell load vary with CAC algorithms (CAC
algorithm 1 and CAC algorithm 2). You can run the MOD UCELLALGOSWITCH
command to set the DL CAC algorithm of a cell and run the LST
UCELLALGOSWITCH command to query the DL CAC algorithm of a cell.
● CAC algorithm 1 uses the ratio of the DL carrier TX power to the maximum
TX power of the cell to measure the DL load of the cell. By default, algorithm
1 is used. The maximum TX power is a constant and set using the ADD
UCELLSETUP command.
● CAC algorithm 2 uses the ratio of the current number of DL equivalent UEs to
the maximum number of DL equivalent UEs.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to DL CAC
Monitor and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
predicted values and measured values of the load (unit: %).
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to UL Total
Equivalent User Number and set other parameters according to actual situations.
Then, click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
predicted and measured number of UL equivalent UEs.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to DL Total
Equivalent User Number and set other parameters according to actual situations.
Then, click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
predicted and measured number of DL equivalent UEs.
----End
Procedure
Step 1 On the LMT main page, click Monitor on the LMT main page. The Monitor tab
page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to Cell Code
Tree Monitor and set other parameters according to actual situations. Then, click
Submit to start the monitoring task in the WebLMT dialog box that is displayed.
A monitoring window is displayed, showing the real-time monitoring results in chart. The task
name is indicated in the title bar of the window.
----End
Context
When this task is performed, if HSDPA_GBP_MEAS is set to 0 for the cell, the minimum
power required for the HS-DSCH is not reported. HSDPA_GBP_MEAS specifies whether to
perform an HSDPA GBR measurement.
Run the LST UCELLALGOSWITCH command to query the value of HSDPA GBP Meas
Algorithm. If the value is OFF, run the MOD UCELLALGOSWITCH command to set it to 1.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to HS-DSCH
Min Power Requirement and set other parameters according to actual situations.
Then, click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
ratio of the required power to the maximum TX power of the cell (unit: ‰).
----End
Context
When this task is performed, if HSDPA GBP Meas Algorithm is set to 0, the HS-DSCH bit
rate of the cell is not reported. HSDPA GBP Meas Algorithm specifies whether to perform
an HSDPA PBR measurement.
Run the LST UCELLALGOSWITCH command to query the value of HSDPA GBP Meas
Algorithm. If the value is OFF, run the MOD UCELLALGOSWITCH command to set it to 1.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to HS-DSCH
Provided Bitrate and set other parameters according to actual situations. Then,
click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
bit rate (unit: bit/s).
----End
Context
When this task is performed, if HSUPA GBP Meas Algorithm is set to 0, the E-DCH bit rate
of the cell is not reported. HSUPA GBP Meas Algorithm specifies whether to perform an
HSUPA PBR measurement.
Run the LST UCELLALGOSWITCH command to query the value of HSUPA GBP Meas
Algorithm. If the value is OFF, run the MOD UCELLALGOSWITCH command to set it to 1.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to E-DCH
Provided Bitrate and set other parameters according to actual situations. Then,
click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
bit rate (unit: bit/s).
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to Cell
UL Throughput and set other parameters according to actual situations. Then,
click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
UL throughput of the cell.
----End
Procedure
Step 1 On the LMT main page, click Monitor on the LMT main page. The Monitor tab
page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Connection Performance Monitoring dialog box, set Monitor Item to Cell
DL Throughput and set other parameters according to actual situations. Then,
click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
DL throughput of the cell.
----End
Context
The number of ACK messages is reported to the RNC through common
measurement messages over the Iub interface.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to Number of
acknowledged random access and set other parameters according to actual
situations. and then click Submit to start the monitoring task in the WebLMT
dialog box that is displayed.
● You can run the ADD UCELLALGOSWITCH and MOD UCELLALGOSWITCH commands
to set whether to report the number of ACK messages per second in a cell. This function
is disabled by default.
● You can run the SET ULDM command to set the report interval and filter window size.
● After the monitoring task is started, a real-time monitoring window is displayed. The
task name is displayed in the title bar of the window and the monitoring result is
displayed in lists and charts. In charts, the X-coordinate represents hour: minute: second.
The Y-coordinate represents the number of ACK messages per second in a cell.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to Cell Credit
and set other parameters according to actual situations. Then, click Submit to
start the monitoring task in the WebLMT dialog box that is displayed.
----End
Result
The following table lists the items shown in the monitoring result.
When the CE Overbooking feature is enabled, the RNC performs admission control based on the
values of Adjusted UL Local Cell Group Credit usage (Permillage) and Adjusted UL NodeB
Credit used. The following items are not involved in admission control: UL local cell Credit
used, UL local cell group Credit used, and UL NodeB Credit used.
DL local cell total Credit Downlink credit capability of a local cell. The
NodeB reports the item value to the RNC using a
message.
UL local cell total Credit Uplink credit capability of a local cell. The NodeB
reports the item value to the RNC using a message.
DL local cell group total Downlink credit capability of a local cell group. The
Credit NodeB reports the item value to the RNC using a
message.
UL local cell group total Uplink credit capability of a local cell group. The
Credit NodeB reports the item value to the RNC using a
message.
DL local cell Credit used Downlink credit used by a local cell, that is, the
total downlink credit used by all UEs in the local
cell.
UL local cell Credit used Uplink credit used by a local cell, that is, the total
uplink credit used by all UEs in the local cell.
DL local cell group Credit Downlink credit used by a local cell group, that is,
used the total downlink credit used by all UEs in the
local cell group.
UL local cell group Credit Uplink credit used by a local cell group, that is, the
used total uplink credit used by all UEs in the local cell
group.
DL NodeB Credit used Downlink credit used by a NodeB, that is, the total
downlink credit used by all UEs served by the
NodeB.
UL NodeB Credit used Uplink credit used by a NodeB, that is, the total
uplink credit used by all UEs served by the NodeB.
Adjusted UL Local Cell The NodeB reports the actually used uplink credit
Group Credit usage of a local cell group per second. The RNC divides
(Permillage) this value by the value of UL local cell group total
Credit and converts the specific value into a
permillage.
Adjusted UL NodeB Credit Uplink credit actually used by a NodeB. The NodeB
used reports the item value to the RNC per second.
Context
The F-DPCH carries the Transport Power Control (TPC) information of HSDPA
services and uses the spreading factor SF256.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Cell Performance Monitoring. The Cell Performance Monitoring dialog box is
displayed.
Step 3 In the Cell Performance Monitoring dialog box, set Monitor Item to FDPCH
SYMBOL monitoring and set other parameters according to actual situations.
Then, click Submit to start the monitoring task in the WebLMT dialog box that is
displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
is displayed in the title bar of the window and the monitoring result is displayed in lists and
charts.
● In the FDPCH SYMBOL monitoring window, you can view the usage of the SYMBOL
corresponding to the F-DPCH code. The numbers in the grids indicate the timeslot formats.
----End
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
System Resource Monitoring. The System Resource Monitoring dialog box is
displayed.
Step 3 In the System Resource Monitoring dialog box, set the parameters according to
actual situations, and click Submit to start the monitoring task in the WebLMT
dialog box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
and related parameters are displayed in the title bar of the window and the monitoring result is
displayed in lists and charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
usage of the license. (Unit: Erl and kbit/s)
----End
Context
● When RNC in Pool Load Sharing is enabled, the Iur-p one-way transmission
delay must be less than or equal to 10 ms.
● When RNC in Pool Node Redundancy is enabled, the Iur-p one-way
transmission delay must be less than or equal to 100 ms.
● If the delay exceeds either of the preceding values, the Iur-p delay is too large.
Procedure
Step 1 On the LMT main page, click Monitor. The Monitor tab page is displayed.
Step 2 On the Monitor Navigation Tree pane, choose Monitor > UMTS Monitoring >
Iur-p Monitoring. The Iur-p Monitoring dialog box is displayed.
Step 3 In the Iur-p Monitoring dialog box, set the parameters according to actual
situations, and click Submit to start the monitoring task in the WebLMT dialog
box that is displayed.
After the monitoring task is started, a real-time monitoring window is displayed. The task name
and related parameters are displayed in the title bar of the window and the monitoring result is
displayed in lists and charts.
In charts, the X-coordinate represents the hour: minute: second. The Y-coordinate represents the
Iur- delay. (Unit: 0.125 ms)
----End
9 Device Panel
This chapter describes how to manage the BSC6910 using the device and
emulation panels. You can use these panels to query information about boards,
ports, links, and alarms.
Alarm indicators indicate the board alarm status, and board indicator colors
indicate the board running status. For details, see the descriptions shown in the
right side of the device pane.
● If the tab page under Device Maintenance is not in full view, click . The
drop-down list is displayed. Select the required item from the drop-down list
to view the corresponding tab page.
● You can right-click the peripheral frame of a rack, and choose Refresh Shelf
from the shortcut menu to refresh the rack.
● If you select Show logical function under the color descriptions of the board,
the logic functions of boards are displayed on the device panel.
● If a BSC6910 has built-in NEs, each of the EOMUa, EOMUb, EOMUc, EGPUa
whose logical function is GASP, EGPUb whose logical function is GASP, and
interface boards on the device panel is marked with b on the lower right
corner, indicating that the built-in NEs use the board at the moment.
● When you use the mouse pointer to point to a board marked with b, the Tip
window is displayed, showing information about the built-in NEs that use this
board.
Procedure
Step 1 On the LMT main page, click Device Maintenance. The Device Maintenance tab
page is displayed. The device panel is displayed in the BSC Device Panel tab page.
----End
Prerequisites
● The boards are in position.
Procedure
Step 1 Start the BSC device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
Step 2 On the device panel or emulation panel, right-click the E1/T1 interface board to
be queried, and choose Query E1/T1 Port Status from the shortcut menu. The
Query E1/T1 Port Status dialog box is displayed, showing detailed information
about the E1/T1 port.
----End
Prerequisites
● The boards are in position.
Context
The OMU and SAU do not support this operation.
You can query the CPU usage using menus or MML commands.
Procedure
● Using menus
a. Start the BSC device panel (see 9.1.2 Starting the Device Panel) or start
the emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose CPU Usage Query from the shortcut menu. The CPU Usage
window is displayed, showing the real-time CPU usage.
● Using MML commands
a. Run the DSP CPUUSAGE command to query the CPU usage.
----End
Context
You can query the clock status of a BSC board using menus or MML commands.
Procedure
● Using menus (1)
a. Open the device panel (see 9.1.2 Starting the Device Panel) or open the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Query BSC Board Clock Status from the shortcut menu. The
Query BSC Board Clock Status dialog box is displayed.
c. In the Query BSC Board Clock Status dialog box, set the parameters
according to actual situations, and click Query.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Query BSC Board Clock Status. The Query BSC
Board Clock Status dialog box is displayed.
c. In the Query BSC Board Clock Status dialog box, set the parameters
according to actual situations, and click Query.
----End
Prerequisites
● The boards are in position.
Context
You can query the status of a board using menus or MML commands.
Procedure
● Using menus (1)
a. Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Query BSC Board Information from the shortcut menu. The
Query BSC Board Information dialog box is displayed, showing the
detailed board information.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Query BSC Board Information. The Query BSC
Board Information dialog box is displayed.
c. In the Query BSC Board Information dialog box, set the parameters
according to actual situations, and click Query.
----End
Prerequisites
● The boards are in position.
Context
NOTICE
● If the standby board is not available or is faulty, resetting the board will
interrupt the ongoing services. Therefore, perform this operation with caution.
● Resetting the board may affect the ongoing services. Therefore, you are advised
to perform this operation during off-peak hours, for example, in the early
morning.
Procedure
● Using menus (1)
a. Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Reset BSC Board from the shortcut menu.
c. In the Reset BSC Board dialog box, set the parameters according to
actual situations, and click Reset.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Reset BSC Board. The Reset BSC Board dialog box is
displayed.
c. In the Reset BSC Board dialog box, set the parameters according to
actual situations, and click Reset to reset the board. The operation result
is displayed, as shown in Figure 1.
Prerequisites
● Before you perform a board switchover, ensure that the standby board is
available and properly running without any critical or major alarms.
Context
NOTICE
● If the board switchover fails, the board configuration data is not lost but
services on the board will be interrupted. Therefore, perform this task with
caution.
● Board switchover may affect the ongoing services. Therefore, you are advised to
perform the switchover during off-peak hours, for example, in the early
morning.
● All boards configured in active/standby mode support switchover operations.
Only the active board can initiate the switchover, except the OMU board. The
OMUU board supports switchover initiated by the standby board.
Procedure
● Using menus (1)
a. Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Switch BSC Board from the shortcut menu.
c. In the Switch BSC Board dialog box, set the parameters as required, and
then click Switch to switch over the boards.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Switch BSC Board. The Switch BSC Board dialog box
is displayed.
c. In the Switch BSC Board dialog box, set the parameters according to
actual situations, and click Switch to switch over the boards. The
operation result is displayed, as shown in Figure 1.
----End
Prerequisites
● The boards are in position.
Procedure
Step 1 Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
Step 2 Right-click a board in position in the device panel or the emulation panel, and
choose Query Board Alarm from the shortcut menu. The alarm information is
displayed.
----End
Procedure
Step 1 On the LMT main page, click Device Maintenance. The Device Maintenance tab
page is displayed.
Step 2 Click BSC6910 under Device Navigation Tree. The BSC Device Panel is displayed
on the right pane.
Step 3 Select the corresponding rack and double-click the peripheral of the subrack to
view the emulation panel of a subrack, as shown in Figure 9-7.
----End
Prerequisites
● The boards are in position.
Procedure
Step 1 Start the BSC device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
Step 2 On the device panel or emulation panel, right-click the E1/T1 interface board to
be queried, and choose Query E1/T1 Port Status from the shortcut menu. The
Query E1/T1 Port Status dialog box is displayed, showing detailed information
about the E1/T1 port.
----End
Prerequisites
● The boards are in position.
Context
The OMU and SAU do not support this operation.
You can query the CPU usage using menus or MML commands.
Procedure
● Using menus
a. Start the BSC device panel (see 9.1.2 Starting the Device Panel) or start
the emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose CPU Usage Query from the shortcut menu. The CPU Usage
window is displayed, showing the real-time CPU usage.
● Using MML commands
a. Run the DSP CPUUSAGE command to query the CPU usage.
----End
Context
You can query the clock status of a BSC board using menus or MML commands.
Procedure
● Using menus (1)
a. Open the device panel (see 9.1.2 Starting the Device Panel) or open the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Query BSC Board Clock Status from the shortcut menu. The
Query BSC Board Clock Status dialog box is displayed.
c. In the Query BSC Board Clock Status dialog box, set the parameters
according to actual situations, and click Query.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Query BSC Board Clock Status. The Query BSC
Board Clock Status dialog box is displayed.
c. In the Query BSC Board Clock Status dialog box, set the parameters
according to actual situations, and click Query.
Prerequisites
● The boards are in position.
Context
You can query the status of a board using menus or MML commands.
Procedure
● Using menus (1)
a. Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Query BSC Board Information from the shortcut menu. The
Query BSC Board Information dialog box is displayed, showing the
detailed board information.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Query BSC Board Information. The Query BSC
Board Information dialog box is displayed.
c. In the Query BSC Board Information dialog box, set the parameters
according to actual situations, and click Query.
Prerequisites
● The boards are in position.
Context
NOTICE
● If the standby board is not available or is faulty, resetting the board will
interrupt the ongoing services. Therefore, perform this operation with caution.
● Resetting the board may affect the ongoing services. Therefore, you are advised
to perform this operation during off-peak hours, for example, in the early
morning.
Procedure
● Using menus (1)
a. Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Reset BSC Board from the shortcut menu.
c. In the Reset BSC Board dialog box, set the parameters according to
actual situations, and click Reset.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Reset BSC Board. The Reset BSC Board dialog box is
displayed.
c. In the Reset BSC Board dialog box, set the parameters according to
actual situations, and click Reset to reset the board. The operation result
is displayed, as shown in Figure 1.
Prerequisites
● Before you perform a board switchover, ensure that the standby board is
available and properly running without any critical or major alarms.
Context
NOTICE
● If the board switchover fails, the board configuration data is not lost but
services on the board will be interrupted. Therefore, perform this task with
caution.
● Board switchover may affect the ongoing services. Therefore, you are advised to
perform the switchover during off-peak hours, for example, in the early
morning.
● All boards configured in active/standby mode support switchover operations.
Only the active board can initiate the switchover, except the OMU board. The
OMUU board supports switchover initiated by the standby board.
Procedure
● Using menus (1)
a. Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
b. Right-click a board in position in the device panel or emulation panel,
and choose Switch BSC Board from the shortcut menu.
c. In the Switch BSC Board dialog box, set the parameters as required, and
then click Switch to switch over the boards.
● Using menus (2)
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. On the BSC Maintenance tab page, choose BSC Maintenance >
Maintain Device > Switch BSC Board. The Switch BSC Board dialog box
is displayed.
c. In the Switch BSC Board dialog box, set the parameters according to
actual situations, and click Switch to switch over the boards. The
operation result is displayed, as shown in Figure 1.
Prerequisites
● The boards are in position.
Procedure
Step 1 Start the device panel (see 9.1.2 Starting the Device Panel) or start the
emulation panel (see 9.2.2 Starting the Emulation Panel).
Step 2 Right-click a board in position in the device panel or the emulation panel, and
choose Query Board Alarm from the shortcut menu. The alarm information is
displayed.
----End
Prerequisites
● The boards are in position.
Context
You can query the FE/GE/10GE port status using menus or MML commands.
Procedure
● Using menus
a. Start the emulation panel (see 9.2.2 Starting the Emulation Panel).
b. On the emulation panel of the subrack, right-click the FE/GE/10GE port
to be queried, and choose Display Ethernet Port Status from the
shortcut menu. The Display Ethernet Port Status window is displayed,
showing the FE/GE/10GE port status.
● Using MML commands
– Run the DSP ETHPORT to query the FE/GE/10GE port status of interface
boards.
– Run the DSP GEPORT command to query the GE/10GE port status of
SCU boards.
----End
Prerequisites
● The boards are in position.
Context
You can query the optical port status using menus or using MML commands.
Procedure
● Using menus
a. Start the emulation panel (see 9.2.2 Starting the Emulation Panel).
b. On the emulation panel, right-click the optical port to be queried, and
choose Query Optical Port Status and Performance from the shortcut
menu. In the Query Optical Port Status and Performance window, set
parameters according to actual situations, and click Submit to query the
optical port status.
● Using MML commands
a. Run the DSP OPT to query the optical port status.
----End
Prerequisites
● The boards are in position.
Procedure
Step 1 Start the emulation panel (see 9.2.2 Starting the Emulation Panel).
Step 2 On the emulation panel, right-click the alarm LED to be queried, and choose
Query Alarm Indicator Info from the shortcut menu. The Query Alarm Indicator
Info window is displayed, showing the detailed information about alarms
indicated by the alarm LED.
----End
10 FMA
This function helps users handle network faults. It includes the following
functions: fast fault diagnosis, hierarchical delimitation, information collection,
business validation, and business query. The fast fault diagnosis and hierarchical
delimitation functions analyze faults that are not rectified within eight hours from
the fault occurrence to the current time. The faults that have been rectified will
not be re-analyzed.
● The following rights are required to perform the fast fault diagnosis and
hierarchical delimitation functions.
– Administrators
– Operators
– Users
– Customers that have permissions to execute commands in command
groups G_2 and G_9
● The following rights are required to perform the information collection
function:
– Administrators
– Operators
– Users
– Customers that have permissions to execute commands in command
groups G_2, G_8, G_9, and G_NIC
● The following rights are required to perform the business validation function:
– Administrators
– Operators
– Users
– Customers that have permissions to execute commands in command
groups G_1 and G_9
● The following rights are required to perform the business query function:
– Administrators
– Operators
– Users
Context
This function allows field O&M engineers to quickly obtain fault information and
start fault troubleshooting when a network fault occurs.
Procedure
Step 1 On the LMT main page, click FMA. The FMA tab page is displayed.
Step 2 In the Fault Overview window, wait for viewing the KPI trend.
● During the KPI trend loading process, Scenario Options under the Fault
Diagnosis cannot be manually selected. The dialog box will pop up if Scenario
Options is selected. Automatic selection is not complete, and manual
selection is invalid.
● When the KPI trend loading completes, default selected fault scenarios will be
displayed in Scenario Options under Fault Diagnosis.
----End
Result
Successful operation
● The KPI trend chart is displayed in the Fault Overview window.
Table 10-1 Information that O&M engineers can obtain using the fault overview
function
Category Details
Category Details
Category Details
Unsuccessful operation
● A dialog box is displayed with the failure cause.
Context
According to the diagnosis rules, this function comprehensively analyzes the
counters, alarm, and logs related to the fault and provides analysis reports to
users. It helps users perform recovery operations, thereby shortening the fault
recovery period.
● This function is implemented on the OMU and can be used with tracing and
monitoring functions on the LMT.
● This function occupies resources of the OMU board. The DSP OMUSRV
command can be executed to query the disk space, memory usage, and CPU
usage of the OMU board. This function cannot be started or is stopped if any
of the following conditions is met:
– Free space on the OMU board is less than 500 MB.
– More than 95% of OMU memory is occupied and this function occupies
more than 500 MB OMU memory.
– When the OMU CPU usage reaches 100%, the operating system
schedules processes on the OMU by priority. The initial priority of the
fault analysis task using the fault diagnosis function is set to low.
According to the measured CPU usage statistics, when the OMU CPU
usage is lower than the minimum threshold (10%), increase its priority.
When the CPU usage is higher than the minimum threshold, decrease its
priority.
When a fault occurs, it is recommended that you use this function to analyze the fault and then
run the COL LOG command to collect logs.
Procedure
Step 1 Optional: (Optional) Run the SET FMATH command to set the fault diagnosis
threshold.
When the default fault diagnosis threshold is not used, run the SET FMATH command to set
the threshold.
To query the specified fault diagnosis threshold, run the LST FMATH command.
Step 2 On the LMT main page, click FMA. The FMA tab page is displayed.
Step 3 Select a logical NE for fault diagnosis from the drop-down list box in the upper
left corner.
Step 4 The system automatically selects the fault scenario, starts a detection, collects
information, and generates a diagnosis report. You can click Query Result to
obtain the diagnosis report. If a manual detection is required, refer to steps 5 and
6.
Step 5 (Optional) Select the fault scenarios requiring fault management on the Fault
Diagnosis tab page.
Step 6 Click Base Station Selection and enter the ID of the base station in the displayed
dialog box to detect the base station on the FMA and obtain the key interface
status of the base station.
A maximum of five IDs of base stations working only in IP transmission mode can be
entered.
Step 7 (Optional) Click Start and wait for the fault diagnosis report.
For a manual detection, a folder named by the operation date and time is generated in the
bam/version_x/ftp/fma_data/FaultDiagnosis directory each time this function is implemented,
for example, /bam/version_x/ftp/fma_data/FaultDiagnosis /201501010101. For an automatic
detection, a folder named after the operation date and time is generated in the bam/
version_x/ftp/fma_data/FaultDiagnosis directory each time this function is implemented, and
auto is added in the folder name, for example, /bam/version_x/ftp/fma_data/FaultDiagnosis /
201501010101_auto. The sub-folders and files contained in the folder are described as follows:
● Alarm_data: Contains the active alarms and cleared alarms for the last 24 hours.
For details about the UMTS alarm list, see List of Alarms for UMTS Fault Diagnosis.
● Opt_data: Contains the operation data for the last 24 hours.
● Report: Contains the analysis report generated using the fault diagnosis function.
● FmaData_201501010101_auto.zip: Contains data related to the alarms, operations,
configurations, and more.
When KPI faults occur or alarms are reported, the FMA is automatically started for fault
diagnosis. You can set AutoStartFMASW in the SET OMUPARA command to control whether to
automatically start FMA for fault diagnosis. By default, this function is enabled for both new
networks and upgrade scenarios.
All historical folders are stored in the bam/version_x/ftp/fma_data/FaultDiagnosis directory.
The maximum size of these folders is 500 MB. If the size exceeds 500 MB, the system deletes
the earliest folder. Therefore, you must save required historical analysis results in a timely
manner.
Before using this function, save the FMA diagnosis report to ensure fast report backhaul. Then,
download original diagnosis data related to FMA.
Click Diagnosis_Collection to start fault diagnosis and quick information collection
simultaneously.
Analysis on system
configuration errors
Table 10-3 lists the fault diagnosis scenarios for RNC in Pool. The system
automatically determines the application scenario based on the load sharing type,
redundancy type, and host status. You can query the load sharing type by running
the LST URNCBASIC command and query the host status by running the DSP
UHOSTRNC command.
RRC √ × √ × √ × √
connect
ion
setup
CS √ × √ × √ × √
service
setup
CS call √ × √ × √ × √
drop
PS √ × √ × √ × √
service
setup
PS call √ × √ × √ × √
drop
CS √ × √ × √ × √
Erlang
PS √ × √ × √ × √
through
put
Paging √ × √ × √ × √
A large √ × √ × √ × √
number
of
unavail
able
cells
Equipm √ √ √ √ √ √ √
ent
Health
Check
Scenari RNC in Pool Load RNC in Pool RNC in Pool Load Sharing
o Sharing Redundancy and Redundancy
Option
Load Load Host Host Load Load Load
Sharing Sharing Status= Status= Sharing Sharing Sharing
Type= Type=O MASTE BACKU Type= Type=O Type=O
MASTE VERFL R P MASTE VERFL VERFL
R OW R and OW OW
Host and and
Status= Host Host
MASTE Status= Status=
R BACKU MASTE
P R
RNC in √ × × × √ × ×
Pool
Load
Sharing
----End
Result
● Successful operation
– A new browser window is displayed with the fault analysis report
displayed on a web page.
Item Description
Item Description
Item Description
▪ Click Query Result on the fault diagnosis page. In the Query Result
dialog box, select a query time to query the analysis report at this
time point. If Auto is displayed, the system generates reports
automatically.
Context
This function decomposes faults based on standard protocol layers from the KPIs
of the faulty network, until the smallest identifiable objects are obtained. The
counters, alarms, status, and operations of these objects are displayed and
identified to provide a fault analysis report for users.
Procedure
Step 1 On the LMT main page, click FMA. The FMA window is displayed.
Step 2 On the FMA tab page, click Hierarchical Delimitation. The Hierarchical
Delimitation tab page is displayed.
Step 3 Set parameters on the Hierarchical Delimitation tab page.
Step 4 Click Analyze and wait for the fault analysis report.
Select the KPI Set this parameter based on the abnormal KPIs by observing
items the KPI trend curve.
History Analyze In the drop-down list, select the time of saving historical
analysis reports, and click Query.
----End
Result
● Successful operation
– A new browser window is displayed with the fault analysis report
presented on a web page.
Item Description
● Unsuccessful operation
– A dialog box is displayed with the failure cause.
Context
When faults occur, the information needs to be collected at the site. However,
there are various types of BSC logs, and the procedure for collecting these logs is
complex. In this situation, it is easy to make mistakes in collecting logs, which
leads to repeated collection of logs at the site and prolongs fault troubleshooting.
This function is introduced to simplify the procedure for collecting logs.
This function can be enabled only by the system administrator admin and an administrator-
level, operator-level, or user-level account.
Procedure
Step 1 Information Quick-Collection
1. On the LMT main page, click FMA. The FMA window is displayed.
2. On the FMA tab page, click Information Collection. Click the Information
Collection tab in the WebLMT dialog box that is displayed.
3. Set parameters on the Information Quick-Collection tab page. Specify
Current Time and File Path.
4. Click Collection to start collecting fault information.
After you click Collection, the progress bar may fail to show the progress, and this
status lasts for several minutes.
Current Time You are advised not to modify the current time.
– In the first batch, this function collects historical alarm files (48 hours),
operation logs (48 hours), BSC data configuration files, UKPI snapshot
(with the granularity of 5 minutes and 24 hours) generated when the
problem occurs, and last word log file (20 minutes), GCSR log (one file of
subrack 0).
– In the second batch, this function collects performance counter result files
(2 hours), UMTS CHR logs (one file for each subrack), common debug
log files (one file for each subrack), and call fault logs (one file for each
subrack).
The time in the brackets following the collected files indicates the time during which the
files are collected in the specific fault diagnosis scenario. For example, historical alarm
files (12 hours) indicates historical alarm files collected for 12 hours including the time
when the fault occurs.
----End
Result
● Quickly collecting information
After the collection is complete, the collected data can be obtained from the
directory specified by the user. Each batch of data is automatically saved in a
sub directory of the specified directory. For example, the directory specified by
the user is E:\DATA, the first and second batches of collected data will be
saved in E:\DATA\BATCH1_YYYYMMDDHHMMSS and E:\DATA
\BATCH2_YYYYMMDDHHMMSS, respectively. YYYYMMDDHHMMSS indicates
the time when data collection starts. The letters stand for Year, Month, Date,
Hour, Minute, and Second, respectively. In this manner, even if the whole data
collection is incomplete, the data collection progress can be viewed according
to the progress bar and the file collection progress in the Result box, and the
collected data can be obtained and retransmitted. This improves the data
collection efficiency.
● Collecting customized information
After the collection is complete, the collected data can be obtained from the
directory specified by the user. Data collected each time is automatically
saved in a sub directory of the specified directory. For example, the directory
specified by the user is E:\DATA, data collected each time will be saved in E:
\DATA\COLDAT_YYYYMMDDHHMMSS. YYYYMMDDHHMMSS indicates the
time when data collection starts. The letters stand for Year, Month, Date,
Hour, Minute, and Second, respectively.
Context
This function provides users comprehensive network status comparison results
(including comparison results of traffic statistics and alarms) before and after
Procedure
Step 1 On the LMT main page, click FMA. The FMA tab page is displayed.
Step 2 On the left options, select a logical RNC for business validation.
Step 3 Click Business Validation to open the Business Validation tab page.
Step 4 Select corresponding network reconstruction scenario (multiple choices are not
allowed). Enter the time segment (maximum value: 2 hours), the interval
(maximum value: 7 days, 1 indicating yesterday, 2 indicating the day before
yesterday, and so on.), cell, and BTS (only in BTS cutover scenarios).
Step 5 Click Start to validate the service and wait for the validation report.
A folder named by the operation date and time is generated in the bam/version_x/ftp/
fma_data/BusinessCheck directory each time business validation is performed, for
example, /bam/version_x/ftp/fma_data/BusinessCheck/20150804080339. This folder
contains four sub-folders which are described in the following.
● Alarm_data: Contains the active alarms and cleared alarms for the last 24 hours.
● Opt_data: Contains the operation data for the last 24 hours.
● Report: Contains the analysis report generated using the fault diagnosis function.
Whether the
Transmission Link Is
Normal
Whether the
Transmission Link Is
Normal
Whether the
Transmission Link Is
Normal
Whether the
Configuration Is Intact
Business validation can be performed only for items in the same User interface (UI).
In some business validation scenarios, not all parameters to be checked are required to be
entered. In these scenarios, these parameters are dimmed and become unavailable
automatically.
----End
Result
● Successful operation
– A new browser window is displayed with the fault diagnosis report
presented on a web page.
Context
Regular-period KPI check on service restoration requires a longer period of time.
Add this function to quickly check fault recovery results and reduce customers'
losses.
Procedure
Step 1 On the LMT main page, click FMA, and the FMA tab page is displayed.
Step 2 In the FMA tab page, click Business Query. The Business Query tab page is
displayed.
Step 3 On the Business tab, select the Time Settings checkbox, and set the start time to
query the alarm status. The start time for querying the alarm status cannot be
earlier than the current OMU time.
● If the query results are abnormal, an error message is displayed, and the automatic
refreshing stops. In this case, close the Page Query tab page and open it again and the
refreshing function automatically starts.
----End
Result
● The operation succeeds.
– The interface lists the service restoration results. The results are refreshed
regularly.
– KPI information is listed in a table and updated periodically.
● The operation fails.
– The dialog box is displayed to indicate the failure cause and the
automatic refreshing stops.
Prerequisites
Contact Huawei engineers to obtain the FMA rules update packet. Huawei
engineers can obtain the update packet based on the BSC/RNC version at:
Support > Software > Wireless Network > Wireless Network Common >
SingleRAN > SingleRAN_O&M tools > FMA Rules Update Packet.
NOTICE
Context
FMA rules can be updated independently using MML commands, eliminating the
need to update the BSC/RNC version and avoiding service interruptions.
Procedure
Step 1 On the LMT main page, click File Manager. The File Manager tab page is
displayed.
Step 2 Upload the FMA rules update packet to the directory /mbsc/upgrade.
Step 3 On the LMT main page, click MML. The MML tab page is displayed.
Step 4 Run the INS FMA command to install the FMA rules update packet.
Step 5 Run the LST FMAVER command to check whether the FMA version is correct.
----End
ALM-20739 No License
11 BSC Maintenance
This chapter describes how to maintain BSC equipment, back up and restore data,
and implement fast fault diagnosis.
Context
● When the database system crashes or an upgrade fails, start the tool used for
backing up and restoring system data in the mbsc\bam\common\services
\omu_backup_linker directory. With the latest backup data, you can recover
the system.
● If you need to recover only OMU configuration data, run the RTR DB
command and select the corresponding data backup file for data recovery.
Procedure
● Using menus
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. In the Device Navigation Tree, right-click BSC and choose Backup Data
from the short-cut menu. The dialog box is displayed with information
about backup files saved in the OMU active workspace installation
directory\data\backup directory.
c. In the dialog box, click Backup to back up system data on the OMU.
● A dialog box is displayed by clicking Backup Data, informing the user of whether
to encrypt the file before backing up it. If you select Yes, enter a password.
● The default save path of backup files is OMU active workspace installation
directory\data\backup. If this save path does not exist, it will be created
automatically.
● If the name of a backup file is not typed, the file is named BKPDB_#_*.bak
automatically. Here, "#" stands for the detailed version information of the working
OMU and "*" stands for the current system time when the backup is performed.
When the number of backup files in the backup directory exceeds 30, the earliest
backup file is automatically deleted.
● The following special characters are forbidden in the file name: \\ / : * ? \" < > | ( )
& $ , %% +++ = ; blank character
● Backup files cannot be saved in a network path, for example, \\10.161.162.25.
● No space is allowed in the file name or the saving directory. For example, "BK2009
09 08.bak" is an illegal file name.
d. In the Backup Data dialog box, select a backup file and click Download
to download the backup file to a local path on the LMT PC.
Click Refresh to refresh backup files saved in the OMU active workspace
installation directory\data\backup directory in the Backup Data dialog box.
● Using MML commands
a. Run the LST BKPFILE command to query data backup files saved in the
OMU active workspace installation directory\data\backup directory.
b. Run the BKP DB command to back up system data on the OMU.
----End
Context
NOTICE
● Restore data with caution because data restore will overwrite OMU data.
● Versions of data backup files must be the same as the OMU version.
● Alarm information and operation logs are not restored. Their data remains
unchanged.
● After restoring OMU data, run the RST BSC command to reset the BSC.
Procedure
● Using menus
a. On the LMT main page, click Device Maintenance. The Device
Maintenance tab page is displayed.
b. Under Device Navigation Tree, right-click the BSC node and choose
Restore Data from the short-cut menu. The dialog box is displayed with
information about data backup files saved in the OMU active workspace
installation directory\data\backup directory.
c. Optional: In the displayed dialog box, click Upload to upload a backup
file on the LMT PC to the OMU.
Click Refresh to refresh backup files saved in the OMU active workspace
installation directory\data\backup directory in the Restore Data dialog box.
d. In the Restore Data dialog box, click Restore Data to restore
configuration data on the OMU.
If an .ecf encrypted file is selected after you click Restore Data, enter a password to
restore the backup file.
● Using MML commands
a. Run the LST BKPFILE command to query data backup files saved in the
OMU active workspace installation directory\data\backup directory.
b. Run the RTR DB command to restore configuration data on the OMU.
----End
Prerequisites
● You have logged in to the LMT.
● The LMT properly communicates with the BSC.
Context
● Batch configuration is based on the functions of the CME script executor and
aims at quickly validating and browsing patch configuration files.
● Batch configuration includes the Preactivate, Activate and Browse functions.
– Preactivate is used to check whether the data in the configuration scripts
is valid and whether the data conflicts with that on the live network
before data activation. This helps users rectify script problems in advance
and prevents activation failures.
– Activate includes the check functions of Preactivate. It is also used to
validate configuration scripts on the NE.
– You can browse, modify, and save the batch configuration files in the
XML Browse area. The execution results of the batch configuration files
are also displayed in this area.
● Compared with batch processing, batch configuration can validate
configuration scripts in a shorter time. The validating speed of batch
configuration is the same as that of the RUN BATCHFILE command.
● During batch configuration, the BSC is managed independently and the MML
commands from other LMT cannot be executed.
Procedure
Step 1 On the LMT main page, click Device Maintenance. The Device Maintenance tab
page is displayed.
Step 2 Under Device Navigation Tree, right-click a BSC node and select Batch
Configuration from the shortcut menu. The WebLMT dialog box is displayed.
Step 3 In the dialog box, select a batch configuration script file.
If an .ecf file is selected, enter a password to import files for batch configuration.
Step 4 Click Activate or Preactivate and wait until the configuration command takes
effect on the BSC.
----End
Result
● Successful operation:
– The progress of the activation and pre-activation related commands is
displayed in the progress bar.
– The execution results of the batch configuration files are displayed in the
message area.
● Failed operation: The failure cause is displayed in the message area.
The failure cause is displayed only for a batch configuration script file with the .xml file name
extension.
12 FAQ
This chapter describes some frequently asked questions (FAQs) and the
corresponding solutions.
Procedure
Step 1 Start the Firefox, choose Tool > Add-ons. The Add-ons window is displayed.
Step 2 In the Extensions tab page, select Live Margins, and click Disable. The message
"Restart Firefox to complete your changes" is prompted.
----End
Procedure
Step 1 Choose Tool > Internet Options on the tool bar of the IE browser. The Internet
Options dialog box is displayed.
Step 2 On the General tab page, click Accessibility. The Accessibility dialog box is
displayed.
Step 3 In the Formatting area, deselect Ignore colors specified on webpages, and then
click OK.
Step 4 In the Internet Options dialog box, click OK to exit the dialog box.
----End
Context
If the protected mode is enabled for the IE browser in Windows Server 2008 or
Windows Vista, many security restrictions are imposed. For example, JavaScript
and Applet cannot be run. Therefore, you must disable the protected mode.
Otherwise, the LMT web page cannot be displayed.
Procedure
Step 1 Enter the external virtual IP address of the OMU in the address box of the IE
browser. Press Enter on the keyboard, or click Go next to the address bar to
display the login window of the BSC6910.
Step 2 Check whether "Internet | Protected Mode: Off" is displayed in the bottom right
corner of the window.
● If yes, the task is complete.
● If no, go to Step 3.
Step 3 Choose Tool > Internet Options on the tool bar of the IE browser. The Internet
Options dialog box is displayed.
Step 4 On the Security tab page, select Trusted sites in the Select a zone to view or
change security settings area.
Step 5 Clear Enable Protected Mode in the Security level for this zone area. Click Sites.
The Trusted sites dialog box is displayed.
Step 6 Type the external virtual IP address of the OMU in the Add this website to the
zone text box, and then click Add. The external virtual IP address of the OMU is
added to the Trusted sites list.
If the U2020 proxy server is used for the login to the LMT, add the IP address of the U2020
to the Trusted sites list.
Step 7 In the Internet Options dialog box, click OK to exit the dialog box.
----End
Context
Do not modify the settings of the browser when you have logged in to the LMT.
Before you log in to the LMT, set the proxy server when necessary.
Procedure
● IE
a. Choose Tool > Internet Options on the tool bar of the IE browser. The
Internet Options dialog box is displayed.
b. On the Connections tab page, click LAN Settings. The Local Area
Network (LAN) Settings dialog box is displayed.
c. In the Proxy server area, select Use a proxy server for your LAN (These
settings will not apply to dial-up or VPN connections). Type the IP
address and port number of the proxy server in the corresponding text
boxes, and then click Advanced. The Proxy settings dialog box is
displayed.
d. In the Exceptions area, type the external virtual IP address of the OMU in
the text box, and then click OK. Close the Internet Options dialog box.
● Firefox
a. Choose Tools > Options on the tool bar of the Firefox browser. The
Options dialog box is displayed.
b. In the Options dialog box, click Advanced. On the Network tab page,
click Settings. The Connection Settings dialog box is displayed.
Context
You can set the browser under Citrix farm networking in the following ways:
● Script setting: An automatic setting script is placed on the domain control
server. After a Citrix user logs in to the server, the script automatically sets the
browser.
● Manual setting: The browser is set manually.
The Citrix server works in the farm mode. In farm mode, the primary Citrix server
and secondary Citrix servers work in cooperation to achieve load balancing. When
a Citrix user logs in to the Citrix server on a Citrix client, the server in use may
vary. The proxy server of the browser therefore may need to be set again and
again. We therefore recommend setting the browser using the script. With the
script, each time the user visits the server, automatic setting of the browser is
performed.
The following procedure uses Internet Explorer (IE) as an example.
Procedure
● Script Setting
a. Prepare a script.
Type the following script content in a notepad and save it as IE-
unset.bat.
@echo off
setlocal ENABLEDELAYEDEXPANSION
set uu="HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
reg add %uu% /v EnableHttp1_1 /t REG_DWORD /d "1" /f >nul
reg add %uu% /v ProxyHttp1.1 /t REG_DWORD /d "1" /f >nul
setlocal ENABLEDELAYEDEXPANSION
set uu="HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings"
reg add %uu% /v ProxyServer /t REG_SZ /d "10.121.49.213:80" /f >nul
reg add %uu% /v ProxyOverride /t REG_SZ /d "<local>" /f >nul
reg add %uu% /v ProxyEnable /t REG_DWORD /d "1" /f >nul
The IE-unset.bat script file implements automatic setting of the browser for the
domain user. The domain user can change 10.121.49.213:80 in reg add %uu
% /v ProxyServer /t REG_SZ /d "10.121.49.213:80" /f >nul in the script to the
actual IP address of the proxy server and the actual port number.
b. Log in to the primary or a secondary domain control server with the user
name of administrator and place the IE-unset.bat file in the C:
\WINDOWS\SYSVOL\sysvol\citrixtest.com\scripts path on the server.
iii. In the hong01 Properties dialog box, click the Profile tab. Type IE-
unset.bat in Logon script, click Apply, and then click OK. Figure
12-3 shows the window.
Figure 12-3 Applying the script in the hong01 Properties dialog box
● Manual Setting
a. Check the proxy server setting of the browser.
i. Choose Tools > Internet Options on the tool bar of the IE. The
Internet Options dialog box is displayed.
ii. On the Connections tab page, click LAN Settings. The Local Area
Network (LAN) Settings dialog box is displayed.
iii. In the Proxy server area, select Use a proxy server for your LAN
(These settings will not apply to dial-up or VPN connections). Set
Address of the proxy server to the IP address of the U2020 and Port
to 80.
b. Check HTTP 1.1 settings of the browser.
i. Choose Tools > Internet Options on the tool bar of the IE. The
Internet Options dialog box is displayed.
ii. On the Advanced tab page, select Use HTTP 1.1 through proxy
connections under HTTP 1.1 settings, click Apply, and then click
OK. Figure 12-4 shows the window.
----End
Context
● When you try to log in to the LMT by entering the IP address in the IE address
bar, the following web page will be displayed for your wanted page is out of
the trusted site list. Therefore, you may fail to log in to the LMT.
● According to the acceptable IE security level, there are the following two
solutions:
– When lowering the IE security level on the Windows server is
unacceptable, you can add the LMT site to the trusted sites of the IE by
using a configuration startup script. The system automatically loads the
script and configures the IE after a Citrix user logs in.
– When lowering the IE security level on the Windows server is acceptable,
you can remove the Windows component, Internet Explorer Enhanced
Security Configuration.
Procedure
● Setting a configuration startup script
a. Prepare a script.
● The IE-unset.bat script file implements automatic setting of IE trusted sites for
Citrix domain users.
● The domain user can change 10.141.149.193 in reg add %uu% /v :Range
REG_SZ /d "10.141.149.193" /f >nul in the script to the IP address of the network
element or the peer IP address of the network elements that need to be visited.
● If the user needs to set multi-network elements and the network elements do not
exist in a same peer IP address, multi-scripts need to be prepared and loaded
separately.
● Trust in "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Internet Settings\ZoneMap\EscRanges\Trust" can be named as you wish.
b. Load the startup script.
5) Click Add in the dialog box. The Add a Script dialog box is
displayed, as shown in Figure 12-7.
The users need to log in to the Citrix client to validate the configuration in
the single Citrix network.
● If the organization unit has been set, the users which belong to the
organization unit can all succeed in logging in to the LMT.
● You can rename the group policy object.
2) Select the created group policy object and click Edit. In the
displayed dialog box shown in Figure 12-8, choose User
Configuration > Windows Settings > Scripts(Logon/Logoff).
4) In the Logon Properties dialog box, click Add. The Add a Script
dialog box is displayed, as shown in Figure 12-10.
5) Click Browse to select the prepared script and click OK. Then
close the dialog box.
6) In the Logon Properties dialog box, click Apply and confirm to
load the prepared script.
Context
SmartScreen Filter is a new function of IE8 and later versions. It prevents users
from visiting phishing websites and prevents plug-ins from being installed
automatically.
SmartScreen Filter causes an error message to be displayed when users are
downloading the Java plug-in during login to the LMT.
In addition, two file manager windows displays after clicking File Manager.
Procedure
Step 1 On the menu bar of the IE browser, choose Safety > SmartScreen Filter > Turn
Off SmartScreen Filter.
Step 2 In the displayed Microsoft SmartScreen Filter dialog box, select Turn off
SmartScreen Filter and click OK to turn off the SmartScreen filter.
----End
Context
● Using an IE browser
a. After https://the external virtual IP address of the OMU, for example,
https://10.141.115.219, is entered in the Address bar of the browser, the
There is a problem with this website's security certificate dialog box
or Security Alert dialog box is displayed, as shown in Figure 12-13 and
Figure 12-14.
Figure 12-13 Dialog box showing "There is a problem with this website's
security certificate" (IE7 or later versions)
Procedure
Step 1 Using an IE browser
In the Certificate Invalid dialog box, click View certificates to view the current
certificate. If the certificate displays Issued to: MBSC Certificate and Issued by:
Huawei Wireless Network Product CA, as shown in Figure 12-16, perform the
following steps:
The ca.zip file is decompressed into two files: ne.cer and oss.cer. The ne.cer file is the
root certificate of Huawei certificate predefined for the LMT and the oss.cer file is the
root certificate predefined for the U2020 proxy server.
1. Click Install Certificate and Next. A dialog box shown in Figure 12-18 is
displayed.
2. In the Certificate Import Wizard dialog box, select Place all certificates in
the following store and click Browse. In the displayed dialog box, select
Trusted Root Certification Authorities and click OK.
3. In the Certificate Import Wizard dialog box, click Next, Finish, and OK.
4. Restart the browser so that the reconfiguration can take effect.
1. Click Add Exception shown in Figure 12-15. The Add Security Exception
dialog box is displayed, as shown in Figure 12-19.
1. Choose General > Install Certificate in the Certificate dialog box. And
Certificate Import Wizard dialog box is displayed.
2. Click Next in the Certificate Import Wizard dialog box and Certificate Store
dialog box is displayed. Then choose Place all Certificates in the following
store.
3. Click Browse, the Select Certificate Store dialog box is displayed. Then
choose Trusted Root Certification Authorities.
4. Click OK, the Completing the Certificate Import Wizard dialog box is
displayed.
5. Click Finish, the Security Warning dialog box is displayed.
6. Choose Yes in the Security Warning dialog box. The import was successful
message is displayed. Then click OK.
7. Restart the browser to make the reconfiguration takes effect.
----End
Context
1. Enter https://the external virtual IP address of the OMU, for example,
https://10.141.115.219, in the Address bar of the browser. The There is a
problem with this website's security certificate or Security Alert dialog
box is displayed, as shown in Figure 12-21 and Figure 12-22.
Figure 12-21 Dialog box showing "There is a problem with this website's
security certificate"(IE7 or later versions)
Procedure
Step 1 Choose Tools > Internet Options on the Menu bar of the browser. Click the
Advanced tab in the displayed dialog box shown in Figure 12-23.
Step 2 In the Internet Options dialog box, deselect Warn about certificate address
mismatch* and click OK.
----End
Procedure
● If you use HTTPS to log in to the LMT, check that Do not save encrypted
pages to disk is cleared. Selecting this security option causes the file manager
to be unavailable. Therefore, clear this option as follows:
a. Open the Internet Options dialog box, click the Advanced tab, and clear
Do not save encrypted pages to disk. Figure 12-24 shows the dialog
box.
● Check that temporary Java files are saved on the computer. If they are not,
the file manager functions improperly. Perform the following operations:
a. Open Control Panel in the Windows operating system and double-click
Java. The Java Control Panel dialog box is displayed.
b. In the displayed Java Control Panel dialog box, click Setting. The
Temporary Files Settings dialog box is displayed. Select Keep temporary
files on my computer shown in Figure 12-25.
● Check whether the browser agency has been set. If yes, eliminate the setting.
Using IE browser
a. Choose Tools > Internet Options. The Internet Options dialog box is
displayed.
b. In the displayed Internet Options dialog box, choose Connections > LAN
settings.
c. In the displayed Local Area Network(LAN) Settings dialog box, deselect
Use a proxy server for your LAN(These settings will not apply to dial-
up or VPN connections) and Bypass proxy server for local addresses.
d. Click OK. The setting is complete.
Using FireFox browser
a. Choose Options > Advanced > Network > Settings. The Connection
Settings dialog box is displayed.
b. In the displayed Connection Settings dialog box, select No proxy.
c. Click OK. The setting is complete.
● If the file manager fails to be opened and the message Fail to parse
response is displayed, check whether the file names or folder names under
the /mbsc directory contain invalid characters. If there are invalid characters,
rename the files or folders.
----End
browser, a yellow error icon is displayed. The icon says "Class doesn't support
Automation". To solve the problem, perform the following steps:
Context
● This problem occurs because some registration components are missing from
the IE browser. To solve this problem, register the following components
again:
– msscript.ocx
– dispex.dll
– vbscript.dll
– scrrun.dll
– urlmon.dll
Procedure
Step 1 In Windows, choose StartRun and enter RegSvr32 msscript.ocx. To register the
other components again, replace the typed component in italics.
Step 2 After registering all the components again, clear the cache memory of the IE
browser.
Step 3 Log in to the LMT again.
----End
Context
To enhance system security, the client browser uses Cookie to store the session
information of users who have successfully logged in. Due to the session Cookie
mechanism, the user encounters the following problems when using LMT:
● Problem 1: For the same NE, the user desires to log in to multiple LMTs. After
successfully logging in to the first LMT, the user logs in to the second LMT of
the NE, and the interface displays "this user session already exists". This is
because all browser windows opened by the same user share the same
session under the session sharing mechanism of IE8 or IE9 or IE10 or IE11 and
Firefox enabled by default. As a result, when the user attempts to repeatedly
log in to the LMTs of the same NE, the system determines a repeated login of
the same user session. For the IE6/7 browser in which each browser window
uses independent sessions, this problem does not arise.
● Problem 2: The LMT interface displays the error "this user session already
exists", while the user has not carried out the operation described in Problem
1. This is because the previous session information remains valid due to an
abnormal exit from LMT. As a result, the LMT determines a repeated login
attempt when the same user tries to login to the LMT. This problem arises
when the browser automatically recovers from breaking down during use of
the LMT, or when the pop-up LMT window is blocked by the browser pop-up
blocker enabled.
Procedure
● For Problem 1, the following method is used:
a. In the menu bar of the IE browser, click File > New Session, to start a
new IE browser window and log in to the LMT.
This method applies only to the IE8 or IE9 or IE10 or IE11 browser, not Firefox. Users
of the Firefox browser can log in to only one LMT of a single NE.
● For Problem 2, the following method is used:
a. The IE6/7 browser user needs to close the browser window of the current
LMT login interface, and the IE8/9/10/11 and Firefox users need to close
all opened browser windows to invalidate the old sessions.
b. If the pop-up blocker is enabled for the browser, disable it.
c. Restart the browser and log in to LMT.
----End
12.1.13 The "Are You Sure You Want to Quit the Page" Dialog
Box Is Displayed
After successful login to the LMT in the IE8 or IE9 or IE10 or IE11 browser, the "are
you sure you want to quit the page?" dialog box is displayed when the alarm
feature is enabled. Solve the problem by using the method described in the
procedure part.
Procedure
Step 1 Open the Internet Explorer, and then choose Tools > Internet Options from the
menu bar. The Internet Options dialog box is displayed. Click Advanced, and
deselect Automatic Recovery from Page Layout Error.
----End
Context
The grids in the tables are not clear in MML online help, as shown in Figure
12-26.
Figure 12-26 Unclear Grids in the Tables in the MML Online Help
Procedure
Step 1 In the menu of the IE browser, choose Tools > Compatibility View Settings. In
the displayed Compatibility View Settings dialog box, select Display all
websites in Compatibility View.
Step 2 Restart the browser and log in to the LMT to check the MML online help. The
problem is solved.
----End
Procedure
Step 1 On the Firefox browser, choose Tools > Add-ons. The Add-ons Manager page is
displayed.
Step 2 On the Extensions tab page, locate App Center and click Disable. The App Center
will be disabled if you restart Firebox message is displayed.
Step 3 Click Restart now. The settings will take effect after the restart.
----End
Prerequisites
The LMT cannot be visited due to errors in IE. An error message is displayed in the
status bar, as shown in Figure 1.
Context
The causes are as follows:
● The IE settings are modified when you log in to the LMT through IE, such as
the settings of the proxy. In this case, the access rights to the LMT page files
are changed, leading to access failures.
● Automatic configuration in the Local Area Network (LAN) Settings dialog
box is enabled, as shown in Figure 2. If Automatic configuration is enabled,
some uniform resource locators (URLs) will be allocated to other security
domains. Different security domains have different restrictions on access
rights. As a result, access failures occur.
Procedure
● Method 1: Do not modify IE settings when you log in to the LMT through IE.
● Method 2: Log out of the LMT when the Permission Denied or Access
Denied message is displayed. Restart IE and log in to the LMT again.
----End
Context
● When MML commands are executed, the system displays a Please check the
MML macro configure file! message, as shown in Figure 12-29.
Figure 12-29 System message "Please check the MML macro configure file!"
Procedure
Step 1 On the menu bar of the IE browser, choose Tool > Internet Options. The Internet
Options dialog box is displayed.
Step 2 Click General > Browsing history and click Delete. The Delete Browsing History
dialog box is displayed.
Step 3 In the Delete Browsing History dialog box, deselect the Preserve Favorites
website data.
Step 4 Select Cookies and Temporary Internet files, and then click Delete and close the
Delete Browsing History dialog box.
Step 5 Click the General tab and click Setting in Browsing history. The Temporary
Internet Files and History Settings dialog box is displayed.
Step 6 Click View files in the Temporary Internet Files and History Settings dialog box,
remove all displayed files, and close the Internet Options dialog box.
----End
Procedure
Step 1 To clear the cache and cookies in the browser, perform the steps shown in the
following table.
Browser Type Handling Procedure
----End
Procedure
● To clear the cache and cookies in the browser, perform the steps shown in the
following table.
Browser Type Handling Procedure
----End
Context
When the Web LMT is running on the IE for a long period of time, there is a low
probability that the system timer function fails. If this occurs, the Web LMT
becomes abnormal.
Procedure
Step 1 Close the IE. Then, open the IE and log in to the Web LMT again.
----End
Context
When it takes a long time to execute certain scripts, you are prompted with the
message "Stop running this script?", indicating whether to continue the script
execution.
To solve this problem, download the file at http://download.microsoft.com/
download/5/9/5/595D11B8-A0FD-4EA0-BF0D-F113258FC28A/
MicrosoftFixit50403.msi.
Procedure
Step 1 Install the downloaded file.
Step 2 Restart the computer, and then log in to the LMT to check whether this problem
has been solved.
----End
Context
When a user logs in to the LMT, it checks the version of the installed java plug-in.
The following problems may occur when a user logs in to or use the LMT:
1. A tooltip with the message "java plug-in is not found" is displayed on the
login interface.
2. A tooltip with the message "please download and install the recommended
Java plug-in" is displayed on the login interface.
3. LMT modules, including Batch, Trace, Monitor, and Device Maintenance,
cannot be used even after the java plug-in of a recommend version is
installed.
Procedure
● For the first problem, perform the following steps to check whether the java
plug-in is successfully installed:
a. On the windows system, click StartRun, enter CMD in the text box, and
press the Enter key. Enter java -version in the run window and press the
Enter key to view the current java plug-in version.
You can log in to the LMT even if the Java plug-in is not installed, but LMT modules,
including Batch, Trace, Monitor, and Device Maintenance cannot be used. You can
obtain the Java plug-in from the official website of Java.
b. If Java plug-ins of multiple versions are installed on the computer, the
current active Java plug-in version can be viewed on the Java control
panel. Select Control PanelJava, and click the Java icon to display the
Java control panel. Select the Java tab page, click View, and click the
User tab page in the displayed window to view and select the Java plug-
in version.
You may view the Java plug-in version on the Java control panel even when this plug-
in has been uninstalled. Therefore, ensure that the selected Java plug-in version is
available.
When Java plug-ins of more than one version are installed on the computer, they may
be incompatible. You are advised to uninstall the java plug-ins of versions that are not
required and use the recommend version. You can install or uninstall Java plug-ins on
the Windows control panel.
c. If the Java plug-in is successfully installed and you are using the IE
browser, you can ignore the tool tips and continue using the LMT. You
can also try to clear the tool tips using the following methods:
▪ If you are using Firefox browser, open the Add-ons window, select
the Plugins tab page, and ensure that the installed Java plug-in is
enabled.
If the Java plug-in is enabled in the IE browser and the tool tips still exist, choose
ToolsInternet Options, select the Advanced tab page, and click Reset.
● The second problem indicates that you have installed a Java plug-in not
supported by the LMT. You can continue using the LMT, but some modules,
including Batch, Trace, Monitor, and Device Maintenance, may become
abnormal. You are advised to install the Java plug-in of a recommended
version.
When a Java plug-in of a later version has been installed, a java plug-in of an earlier
version installed afterward will not be activated. Tool tips with the message "please
download and install the recommended Java plug-in" will also be displayed on the login
interface even if the earlier version is supported by the LMT. If you need to activate the
Java plug-in version of the earlier version, first uninstall the one of the later versions.
● As for the third problem, the Java applet is forbidden by default because the
security is enhanced in JRE 1.8. Some tool tips will also be displayed before
the applet is executed. You can try the following methods to solve this
problem:
– Click the Java icon in the Windows control panel and select the Security
tab page in the Java control panel. Set Security Level to High and add
the current website to Exception Site List.
– If the Application Blocked by Security Settings dialog box is displayed,
or an error message is displayed on the LMT interface, you can
reconfigure Java security level or Exception Site List.
– When other exceptions occur, perform the following operations to delete
temporary Java files: Close the browser. In the Java Control Panel dialog
box that is displayed, select the General tab and click Settings. In the
dialog box that is displayed, click Delete Files.
----End
Prerequisites
The LMT does not respond or responds incorrectly when users manage progress,
process MML commands in batches, trace messages, or perform monitoring.
Viewing the displayed message on the Java control panel, users find that the
following error is reported:
java.lang.SecurityException: class "com.swimap.lmt.util.mml.MMLHandler"'s signer information does not
match signer information of other classes in the same package at
java.lang.ClassLoader.checkCerts(ClassLoader.java:807) at
java.lang.ClassLoader.preDefineClass(ClassLoader.java:488) .......
Context
Java Runtime Environment (JRE for short) is a compulsory third-party component
for the LMT to run. Mixed code security verification is introduced in version
1.6.0_19 of JRE. With the function, codes are verified. If codes are found to be
untrustable, four operation options displayed in Figure 12-30 are provided.
Changing the default option as described below solves the previous problem.
Procedure
Step 1 Open Control Panel in the operating system and double-click JAVA. The Java
Control Panel dialog box is displayed.
Step 2 In the Advanced tab page, choose Security > Mixed code (sandboxed vs.
trusted) security verification and click Disable verification (not
recommended).
Step 3 Click OK to save the new setting.
----End
Context
When a tracing or monitoring function is performed on the LMT, an error message
"Error. Click for details" is displayed and the Application Error dialog box is
displayed, as shown in Figure 12-31.
After clicking Details, detailed error information is displayed. You need to correct
the error based on the error type as follows:
● If the "java.lang.ClassNotFoundException" error is displayed, perform steps 1
and 2.
● If this problem occurs in Citrix Farm networking, you need to perform related
steps on the Citrix Farm server rather than on the local PC. If you have no
permission to log in to the Citrix Farm server, you cannot directly access
Windows Control Panel on the Citrix Farm server. To access it, right-click the
Java icon on Windows system tray on the local PC and choose Open Control
Panel from the short-cut menu. The following figure shows the window:
Procedure
Step 1 Enable the next-generation Java plug-in again.
1. Open Control Panel in the Windows operating system and double-click Java.
The Java Control Panel dialog box is displayed. In the Java Control Panel
dialog box, click the Advanced tab, clear Enable the next-generation Java
Plug-in (requires browser restart) under Java Plug-in and click OK.
2. Select Enable the next-generation Java Plug-in (requires browser restart)
by referring to step a and click OK. Figure 12-32 shows the window.
Figure 12-33 Checking the amount of disk space set for storing temporary
files
4. Check the amount of disk space used for storing temporary Java files in the
directory where temporary Java files are saved. The part marked in red frame
in Figure 12-34 shows the directory. This amount is greater than the preset
one.
Before deleting folders in this directory, close all running LMT clients.
6. Log in to the LMT again to check whether this problem is solved.
Step 3 Install Windows operating system patch KB960714.
1. 12.3.1 Installing OS Patches
----End
Procedure
Step 1 Close all browsers that are opened at the moment.
Step 2 Clear temporary Java files.
1. If this problem persists after performing step 1, delete temporary Java files.
2. Open Control Panel in the Windows operating system and double-click Java.
The Java Control Panel dialog box is displayed.
3. In the displayed Java Control Panel dialog box, click Setting. The Temporary
Files Settings dialog box is displayed. Check the amount of disk space set for
storing temporary files, as shown in Figure 12-35.
Figure 12-35 Checking the amount of disk space set for storing temporary
files
4. Check the amount of disk space used for storing temporary Java files in the
directory where temporary Java files are saved. The part marked in red frame
in Figure 12-36 shows the directory. This amount is greater than the preset
one.
Before deleting folders in this directory, close all running LMT clients.
6. Log in to the LMT again to check whether this problem is solved.
----End
Procedure
Step 1 Open Control Panel in the Windows operating system and double-click Java. The
Java Control Panel dialog box is displayed.
Step 2 In the displayed Java Control Panel dialog box, click the Advanced tab, choose
SecurityMixed code (sandboxed vs. trusted) security verification, and select
Disable verification (not recommended). Figure 12-37 shows the dialog box.
Step 3 Close all opened browsers and delete Java temporary files. To delete Java
temporary files, perform the following operations:
1. Open Control Panel in the Windows operating system and double-click Java.
The Java Control Panel dialog box is displayed, as shown in Figure 12-38.
2. In the Java Control Panel dialog box, click Settings. The Temporary Files
Settings dialog box is displayed, as shown in Figure 12-39.
3. In the Temporary Files Settings dialog box, click Delete Files to delete Java
temporary files and click OK.
----End
Context
Java Applet in the IE browser is incompatible with HTML elements when they are
stacked together. As a result, interfaces (stacked in the Java Applet) for
performing tracing and monitoring tasks blink. This problem does not affect the
function but deteriorates user experience.
Procedure
● This problem occurs only on the IE browser. Use the Firefox browser to avoid
this problem.
----End
Procedure
Step 1 Delete all files in the Java installation path. The default installation path is C:
\Program Files\Java\jre6\.
Step 2 If step 1 fails because files are locked or in use, restart the system and repeat step
1.
----End
Context
Changing Settings for Next-Generation Java Plug-in Fails, the error message is
shown in Figure 12-40.
This problem is caused by a Java defect. The setting changing fails not because
browsers are running but because the user has no permission to perform the
operation.
To change the settings, the user must belong to the Power Users group or have
more rights.
Perform the following steps to grant the user more rights.
Procedure
Step 1 Log in to the operating system (OS) using an administrator-level account
authorized for the administrator's operations. Right-click My computer and
choose Manage from the shortcut menu.
Step 2 In the Computer Management window, choose System toolsLocal Users and
GroupsGroups and double-click Power Users in the right pane of the window, as
shown in the following figure:
Step 3 In the displayed window, click Add, add the user account to the Power Users
group, and click OK, as shown in the following figures:
Step 5 Use the user account to log in the OS again after the previous steps are complete.
The user account now has permission to change settings for Enable the next-
generation Java Plug-in.
After changing the settings, you can restore the user rights. To restore the user rights, log in to
OS using an administrator-level account again and remove the user account from the Power
Users group by referring to steps 1 through 3. The change of the user rights does not affect
settings for Enable the next-generation Java Plug-in.
----End
Context
When the browser cache or Java Applet cache is insufficient, any of the following
cases will result in the inconsistency between the LMT displayed in the browser
and the actual LMT.
● After a controller version upgrade or rollback, the browser fails to obtain the
new Javascript, JAR files, and other files from the LMT server. As a result, the
browser uses the preceding files saved before the controller version upgrade
or rollback.
● The preceding files are damaged during the use of the LMT.
Procedure
● To clear the cache and cookies in the browser, perform the steps shown in the
following table.
Before you clear the Java Applet, exit the LMT. Otherwise, some loaded data
will be lost and unexpected errors will occur.
c. On the General tab page, click Settings. The Temporary Files Settings
dialog box is displayed.
d. Click Delete Files. In the displayed Delete Temporary Files dialog box,
select the Applications and Applets and Trace and Log Files check
boxes, and click OK.
e. In Java Control Panel, click OK.
f. The operations take effect after the browser restarts.
----End
Procedure
Step 1 The error message Do you want to run this application? is displayed in the
Security Warning dialog box.
For Java 1.8, click I accept the risk and want to run this application. and click
Run. Then, click Continue.
----End
Procedure
● To clear the cache and cookies in the browser, perform the steps shown in the
following table.
Before you clear the Java Applet, exit the LMT. Otherwise, some loaded data
will be lost and unexpected errors will occur.
c. On the General tab page, click Settings. The Temporary Files Settings
dialog box is displayed.
d. Click Delete Files. In the displayed Delete Temporary Files dialog box,
select the Applications and Applets and Trace and Log Files check
boxes, and click OK.
e. In Java Control Panel, click OK.
f. The operations take effect after the browser restarts.
----End
Context
A function is introduced to the JRE later than Java 1.7. 10 to control when and
how to run untrusted Java applications contained in a web page. The untrusted
Java application refers to an application with digital signature applied by an
unknown issuer or without a certificate issued by a trusted certificate authority.
The default security level is set to High, indicating that the untrusted Java
applications will be blocked.
Procedure
Step 1 Reconfigure the Java security level or add Exception Site List.
● On the Control Panel page, click Java. In the displayed Java Control Panel
dialog box, click Security. On the displayed Security tab page, select Enable
Java content in the browser, set Security Level to Medium, and then click
Apply.
● Alternatively, click Edit Site List on the Security tab page in the Java Control
Panel dialog box to add the sites accessing the LMT to the site list. If this
method is used, the Java security level does not need to be reconfigured. For
the sites added in the site list, mark whether the access to the LMT through
HTTPS or HTTP. For example, https://10.20.198.33 or http://10.30.192.60.
Step 4 Log in to the LMT again. When enabling any of the batch processing, tracing,
monitoring, and device maintenance functions, select I accept the risk and want
run this application on the displayed do you want run this application? dialog
box and click Run. If the Do you want to continue? dialog box is displayed, click
Continue.
----End
Context
The JRE installed on the computer is not of the latest version and an upgrade to
the latest version is recommended by Java. To continue to use the WebLMT and
update the JRE later, it is good practice to perform the procedure described below.
Procedure
Step 1 In the Your Java version is out of date dialog box, select the Do not ask again
until the next update is available check box.
----End
Context
● Patch KB960714 solves the problem of Java console output error. Therefore,
the Java application can be loaded successfully on the LMT.
Procedure
Step 1 In the Windows OS, open the Control Panel window. Double-click the Add or
Remove Programs icon.
Step 2 In the displayed Add or Remove Programs window, select Show updates. Check
whether patches KB944338, KB938397 and KB960714 are present in the list of
Currently installed programs.
● If the patches are present, the task is complete.
● If the patches are not present, go to Step 3.
Step 3 Determine whether a Windows patch needs to be installed according to the OS
version and IE version.
● Patch KB960714 needs to be installed when the OS version and IE version are
combined in the following ways:
OS Version IE Version
----End
Procedure
● If the Excel version is earlier than Office 2007, perform the following
operations:
a. On the menu bar of Excel, choose Data > Import External Data >
Import Data. Then the Select Data Source dialog box is displayed.
Figure 12-41 shows the dialog box.
b. In the Select Data Source dialog box, select the csv file in UTF-8 coding.
Then the Text Import Wizard - Step 1 of 3 dialog box is displayed.
Figure 12-42 shows the dialog box. Select 65001:Unicode(UTF-8) in File
origin.
c. Click Next. Then the Text Import Wizard - Step 2 of 3 dialog box is
displayed. Figure 12-43 shows the dialog box. Select Comma under
Delimiters.
d. Click Finish. Then the Import Data dialog box is displayed. Figure 12-44
shows the dialog box.
b. In the Import Text File dialog box, select the csv file in UTF-8 coding.
Then the Text Import Wizard - Step 1 of 3 dialog box is displayed.
Figure 12-42 shows the dialog box. Select 65001 : Unicode (UTF-8) in
File origin.
c. Click Next. Then the Text Import Wizard - Step 2 of 3 dialog box is
displayed. Figure 12-43 shows the dialog box. Select Comma under
Delimiters.
d. Click Finish. Then the Import Data dialog box is displayed. Figure 12-44
shows the dialog box.
Procedure
Step 1 On the LMT PC, select My Computer and right-click Properties from the shortcut
menu. The System Properties dialog box is displayed.
Step 2 In the System Properties dialog box, click the Advanced tab and click
Environment Variables. The Environment Variables dialog box is displayed.
Step 3 In the Environment Variables dialog box, click New. The New User Variable
dialog box is displayed.
Step 4 In the New User Variable dialog box, set Variable name to
JPI_PLUGIN2_NO_HEARTBEAT and Variable value to 1. Then click OK.
Step 6 In the System Properties dialog box, click OK to finish adding the environment
variable.
----End
Prerequisites
● You have logged in to the LMT using a Built-In Administrator Account or
admin Account.
Context
HTTPS is Hypertext Transfer Protocol Secure. Based on HTTP, HTTPS introduces
SSL (or TLS) to ensure transmission security. To put it simply, HTTPS is a
combination of HTTP and SSL. To enter the HTTPS login mode, enter https://
Website to be visited + Port No in the Address bar of the browser. The default port
No. is 443. Use the default port No. to enter the LMT login page.
Procedure
Step 1 Change the login mode
1. Log in to the LMT through HTTPS.
2. Run the MML command SET WEBLOGINPOLICY. In this step, set POLICY to
HTTPS.
Step 2 Run the MML command RST OMUMODULE to restart the LMT so that the change
takes effect. In this step, set TG to ACTIVE and MNAME to weblmt.
NOTICE
1. Running this command disconnects all online users from the LMT.
2. Normally, the restart is complete within 5 seconds. After the restart is complete,
the change takes effect when users log in to the LMT again.
----End
Context
This problem arises when the operating system enables the system recovery
function that monitors changes of the files on the hard disk and consumes some
hard disk space. With insufficient hard disk space, the system displays "Insufficient
hard disk space", and if a tracking or monitoring task is running on the LMT, it is
likely that the tracking or monitoring data cannot be saved.
Procedure
Step 1 Log in to the operating system (OS) using an administrator-level account
authorized for the administrator's operations. Right-click My computer and
choose Properties.
Step 2 In the "System Properties" window, click System Recovery, select Disable System
Recovery on All Drivers, and click Submit, as shown in Figure 12-49.
----End
Context
BTS nodes cannot be displayed under Device Navigation Tree, as shown in Figure
12-50.
Procedure
● Method 1: For the operating system Windows XP Service Pack 2 or 3, install
the KB982381 patch. To download this patch, visit http://www.microsoft.com/
downloads.
● Method 2: Upgrade the browser. You are advised to upgrade it to Internet
Explorer 8.
----End
Context
Port 80 is the default port for LMT login. This problem occurs because port 80 is
occupied by a default HTTP service in Windows 7.
To confirm the cause, run the netstat —naop tcp command at the Windows 7
command prompt to check whether port 80 is occupied. If it is occupied by a
process with the PID of 4, as shown in the following figure, the problem occurs
due to the cause.
This process is a system process and therefore cannot be closed directly. To close
it, perform the following steps.
Procedure
Step 1 In Windows, choose StartRun and enter regedit to open Registry Editor.
Step 2 Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
\HTTP.
Step 3 Change the DWORD value of Start to 0.
Step 4 Restart the PC and log in to the LMT again.
----End
Procedure
Step 1 In the Windows 2003 and Windows XP operating system (OS), choose Start >
Control Panel, and then click Add/Remove Programs, the Windows
Components Wizard dialog box is displayed.
Step 2 In the Windows Components Wizard dialog box, deselect Upload Root
Certificates, as shown in the following figure. Then click Next to complete the
modification.
----End
Context
Copy the MML commands failing to be executed to an UltraEdit file. It is found
that these MML commands are displayed in two lines. In UltraEdit, click to
view these MML commands in the binary format. A redundant carriage return
(CR) 0x0D stays at the LF location of the MML command each. See Figure 12-52.
Figure 12-52 Viewing an MML command in the binary format using UltraEdit
In the Windows operating system (OS), the CR 0x0D and LF 0x0A must be used
pairwise. The unpaired CRs or LFs cannot be deleted. As a result, the MML
commands fail to be executed.
Procedure
Step 1 Copy the MML commands failing to the executed to an UltraEdit or notepad file
and delete all LFs and CRs. Then, copy these commands back to Batch and
execute them again.
----End
Procedure
Step 1 Check all running programs on the PC. Find the program using the same shortcut
key settings as the LMT.
Step 2 Modify the program shortcut key settings which are the same as those on the LMT
or stop the program when you use the LMT.
----End
Context
A tracing task may generate multiple tracing files, which depends on the traced
messages.
If you close the trace dialog box, the last tracing file cannot be uploaded to the
specified directory. The last tracing file refers to the one being generated. The
generated tracing files can be uploaded.
Procedure
Step 1 In the Trace Navigation Tree, double-click Manage Trace Task. The Manage
Trace Task tab page is displayed.
Step 2 Query the UE tracing or IOS tracing task being performed, select a task, and click
Delete. The preceding settings enable the tracing result file being generated to be
uploaded to the specified directory.
----End
Procedure
Step 1 1. Uninstall the Google chrome frame plug-in.
Step 2 2. Clear the IE browser cache.
Step 3 3. Log in to the LMT again
----End
Procedure
Step 1 1. Use a third-party tool, such as the FileZilla, to upload a file to the OMU. Before
uploading this file, specify the file name using the gb2312 coding and save the
file. In this way, the file manager can manage this file.
Set the FileZilla as follows: Choose FileSite Manager. A Site Management dialog
box is displayed. Select the corresponding site from My Sites. On the Charset tab
page, select Use custom charset, set Encoding to gb2312, and click Connect. The
encoding is modified. Then, upload the file.
Step 2 On the LMT, click System Settings. Select Chinese in Language, and click OK.
Open the file manager to view the file, and you can see a normally displayed file
name. The file can be removed now.
----End
Context
When users attempt to log in to the Web LMT after the product version software
is upgraded or rolled back, they refresh the page for several times but still cannot
obtain the verification code. To ensure the normal operation of the LMT, perform
the following operations:
Procedure
● Internet Explorer
a. On the main menu of Internet Explorer, choose Tools > Internet Options.
The Internet Options dialog box is displayed.
b. Click Delete and perform the operation according to the Internet Explorer
version.
▪ If the FireFox version is 10.0, click Clear Now in the Network dialog
box to delete files.
▪ If the FireFox version is 17.0 or later, click Clear Now in the Cached
Web Content dialog box to delete files.
c. Click OK to close the Options dialog box.
----End