This document was uploaded by user and they confirmed that they have the permission to share
it. If you are author or own the copyright of this book, please report to us by using this DMCA
report form. Report DMCA
Overview
Download & View I_o System Administration - Mss15.pdf as PDF for free.
Important Notice on Product Safety This product may present safety risks due to laser, electricity, heat, and other sources of danger. Only trained and qualified personnel may install, operate, maintain or otherwise handle this product and only after having carefully read the safety information applicable to this product. The safety information is provided in the Safety Information section in the “Legal, Safety and Environmental Information” part of this document or documentation set.
Nokia is continually striving to reduce the adverse environmental effects of its products and services. We would like to encourage you as our customers and users to join us in working towards a cleaner, safer environment. Please recycle product packaging and follow the recommendations for power use and proper disposal of our products and their components. If you should have questions regarding our Environmental Policy or any of the environmental services we offer, please contact us at Nokia for any additional information.
I/O System..................................................................................... 8 Principles of setting up an I/O configuration...................................8 Restrictions on connections of logical files...................................10 Methods for backing up outputs................................................... 10 Using BBU as spare device..........................................................11 Backing up with spare logical files and grouping the outputs....... 11 Restrictions on backing up outputs...............................................11 I/O devices................................................................................... 12 Hard disks (WDU)........................................................................ 12 Removable media........................................................................ 13 Printers......................................................................................... 13 Terminals...................................................................................... 14 VDS.............................................................................................. 15 Technical configuration of the VDS device...................................17 Capacity of the VDS device......................................................... 19 Setting parameters for the VDS device........................................20 Alarms and alarm modes for VDS device.................................... 21
2 2.1 2.2
Interrogating I/O connections and the whole connection tree...... 26 Interrogating I/O connections ...................................................... 26 Interrogating the whole connection tree....................................... 27
3 3.1 3.2 3.2.1 3.2.2 3.3 3.4 3.5 3.6
Controlling outputs....................................................................... 28 Defining an output device.............................................................28 Configuring a network connection for VPP.................................. 30 Directing outputs to the printer/computer with PAD connection... 30 Directing outputs to the printer/computer with Telnet/HTTP connection....................................................................................32 Outputting to a printer in another network element...................... 33 Outputting to a disk file.................................................................34 Removing the connection between a logical file and a disk file... 35 Creating and grouping logical files............................................... 36
4 4.1 4.1.1 4.1.2 4.1.3 4.2
Backing up outputs.......................................................................39 Backing up with spare logical files............................................... 39 Backing up with a redundant logical file....................................... 40 Backing up with a standby redundant logical file......................... 42 Backing up with group standby redundant logical files................ 44 Backing up with a spare device....................................................47
Replacing removable media.........................................................48 Preparing to replace MO disk media when VDS device stores in it. 50 Replacing MO disk media when VDS device stores data in it..... 52 Storing continuous data in MO disk media...................................53
6
Handling the WDU....................................................................... 55
7
Configuring the VDS.................................................................... 57
8
Changing file states for VDS device.............................................60
9 9.1 9.2 9.3 9.4
I/O system troubleshooting.......................................................... 62 Checking why desired data cannot be output to I/O device......... 62 Checking and running a fault diagnosis for I/O devices............... 64 Marking the bad blocks when WDU is faulty................................68 Checking the reason when I/O device information cannot be displayed normally (via ISI commands)....................................... 71
An I/O configuration is set up by defining connections to different targets...................................................................................................9
Figure 2
Example of a permitted connection.................................................... 12
Figure 3
Example of a prohibited connection................................................... 12
Figure 4
Terminal and Virtual Terminal............................................................. 14
Figure 5
Data transfer between a network element and a post-processing system................................................................................................ 16
Figure 6
Data transfer between a network element and a post-processing system when the MO disk media is in use......................................... 16
Figure 7
Counting of fill-up ratio. Files are transferred in sequential order....... 18
Figure 8
Counting of fill-up ratio. Files are not transferred in sequential order..... 18
Figure 9
Setting the filling ratio alarm limits...................................................... 24
Figure 10
Logical file SWITCH1 is connected to VPP-1.....................................29
Figure 11
Outputting to a printer in another network element............................ 33
Figure 12
Tree structure of connections between logical files and devices........36
Figure 13
Connect several logical files to one logical file which is connected to an output device................................................................................. 37
Figure 14
TRAMES1 is backed up with the redundant logical file (TRAMES1) RES.................................................................................................... 40
Figure 15
VPP-1 printer is faulty, so outputs are directed through redundant logical file (TRAMES1) RES to VPP-3................................................40
Figure 16
When VPP-1 becomes faulty, a standby redundant logical file backs up the output by directing the output through the redundant logical file TRAMES1 (CHG) to the VPP-3 printer...............................................42
Figure 17
Situation after standby redundancy has been used........................... 43
Figure 18
The initial situation when using group standby redundant logical files. MPTSLAVAIA is output to VPP-0 and VPP-1. VPP-1 becomes faulty.... 45
Figure 19
When VPP-1 becomes faulty, the system backs up the output by changing the entire group. In this example, the outputs are directed to VPP-2 and VPP-3...............................................................................45
Figure 20
When the backup is made with a spare device, the system always first tries to output to the default device.....................................................47
Figure 21
If outputs to the default device are unsuccessful, they are directed to the spare device................................................................................. 47
Differences between logical file types.................................................. 9
Table 2
Recommendation for the use of logical files.......................................10
Table 3
Alternatives in configuring the VTP.................................................... 15
Table 4
Specifying the targets when adding, changing or removing the connections between logical files....................................................... 28
Table 5
Requirements for configuration of the VPP with PAD connection...... 30
Table 6
Requirements for configuration of the VPP with TCP/IP connection...... 32
Table 7
Changes in the state of VDS-device files (by user)............................ 60
Summary of changes Changes between document issues are cumulative. Therefore, the latest document issue contains all changes made to previous issues. Changes between issues 13-1 and 13-0 Correct the parameters of MML in the entire documents. Changes between issues 13-0 and 12-0 The information of the increased data file number has been added. Changes between issues 12-0 and 11-0 The Q3 interface has been removed.
1 I/O System I/O system is used for inputting, outputting and storing data within a network element and for data transfer over LAN. An I/O configuration consists of input and output devices and connections that are needed for directing output data to the devices. When the system is delivered, it has a default I/O device configuration which is defined by the device supplier. The I/O system consists of the following I/O units:
g
WDU
hard disk unit
Removable media
FDU (magneto-optical (MO) disk or floppy disk) and UMS (USB memory stick) devices
VDS
virtual data storing device, needed for storing and controlling the transfer of charging data and statistics reports
VTP
virtual terminal, needed for the MML sessions
VPP
virtual printer
VDU
visual display unit
LPT
line printer
BBU
byte basket, a target for the outputs that are not needed.
Note: Removable media, VDU, and LPT only exist in classic hardware environment.
1.1 Principles of setting up an I/O configuration With the logical files and the connections, you can define the devices to which outputs are directed from the system. You can change the connections with MML commands. Application programs output data to logical files that can be connected to the desired targets. These targets can be I/O devices or other logical files. You can use logical files to direct, copy and back up outputs of the network element and of the operation and maintenance network. Outputs include, for example, alarms and reports. Logical files have one to four connections to I/O devices or to other logical files. Logical files can also be connected to a byte basket, which means that outputs are not directed anywhere.
An I/O configuration is set up by defining connections to different targets. connection target
application program
logical file
target target
You can connect logical files to the output devices of your choice. In other words, you can define where you want certain data to be output. The configuration of I/O devices can be changed later. The system handles input device connections; you do not need to define them. ASCII, XML and binary data Logical files are used to transfer data in either ASCII, XML or binary format. The system outputs the same data to different logical files in different formats. For example, traffic measurement data is output in ASCII format via logical file TRAMES and in binary format via logical file MTTRMS. Data in binary format needs less hard disk space, which means that it is more advantageous to transfer data from one network element to another in binary format. Types of logical files There are three types of logical files. The types are listed in the table below. Additionally, the table shows the differences between logical file types. Table 1
Differences between logical file types.
Logical file type
Creating
Deleting
Effect of a computer restart
permanent logical file
comes with software deliveries
cannot be deleted not affected if a with MML commands computer restarts
semipermanent logical file
created with MML can be deleted with commands or by MML commands or the system by the system
not affected if a computer restarts
temporary logical file
created with MML can be deleted with commands or by MML commands or the system by the system
deleted if a computer restarts
You can see the type of a logical file with the IID command. When a network element is delivered to the customer, it contains certain preset permanent logical files. All the files have default connections, which means they’re assigned to a default device and a default computer unit, where they are located by default. The table below shows a recommendation for the use of logical files:
connecting the output to an I/O device, for example, when several logical files are connected to one logical file
T = Temporary
testing
1.1.1 Restrictions on connections of logical files The connections of the logical files have the following restrictions: 1. Logical files must always be connected to a target. Logical files must always have a specified target. Therefore, you cannot remove the last target of a logical file. 2. Logical files can have a maximum of four targets. One logical file can be connected to a maximum of four devices or logical files. 3. You can have a maximum of four consecutive connections. Logical files can be connected to logical files and then to other logical files. The chain can consist of a maximum of four connections. 4. Tree structures can have a maximum of eight targets. A tree structure which consists of logical files, connections, and targets can have a maximum of eight targets. These targets can be local I/O devices or I/O devices which are located in the network. 5. The last target in the chain must be a device. If logical files are connected one after another, the last logical file must be connected to a device. 6. Connections must not be looped back. Logical files must not be connected one after another so that they form a loop. Connecting will succeed but data cannot be output. An exception: if the target device is BBU, there are no other connections.
g
Note: The number of incoming connections to a logical file or a device is not restricted. This means that you can connect as many logical files as you like to a target.
1.1.2 Methods for backing up outputs You can back up outputs by using • •
spare logical files or spare devices.
Backing up with a spare device is the dominant backup method. For instructions, see Backing up outputs.
Using BBU as spare device In some cases it is more important to be able to finish a certain operation than to be able to read the outputs, for example, from a printer. To successfully finish a task, the executing application needs to see that the execution of all tasks is successful (even if it is really not). In other words, the executing application must be able to finish the task it is executing, but it does not necessarily need to know what happens to the output. To be able to direct the outputs to an output device there must always be at least one output device available. The BBU is the only output device which is always in use. However, it is not possible to direct outputs directly both to the BBU and some other output device at the same time. Therefore, the connection to the BBU needs to be done through a logical file. An example of this type of connection is shown in the figure below. TRAMES
(TRAMES1) RES
VPP-1
logical file
BBU-0
In the figure above, the outputs are normally directed to VPP-1. If it becomes faulty, all outputs are directed to the BBU-0, and the executing application still recognizes the execution as being successful. Using this type of connection, it is possible to execute, for example, command files, no matter what the states of the other output devices are. Note that you cannot read the contents of the BBU-0. For instructions, see Backing up with a spare device.
1.1.2.2
Backing up with spare logical files and grouping the outputs The outputs produced by the system are often grouped according to data content. For example, all alarms are grouped together and all reports are grouped together. The system outputs each group via the group's own logical file. For example, alarms at different urgency levels have their own logical files. All logical files reserved for outputting alarms, for example, can be connected to the same device. If a logical file used for outputting three-star alarms is backed up by a spare logical file, the backing up does not affect the output of other alarms. If an output device is backed up by a spare device, it backs up the outputs of all alarms in the same way, no matter what their urgency level is. For instructions, see Backing up with spare logical files.
1.1.2.3
Restrictions on backing up outputs The spare logical file must have the same number of targets as the primary logical file. This means the spare logical file must have as many connections to targets as the primary logical file. If the target is a logical file, this file can have further connections to
other devices or logical files. The following figure shows an example of a permitted connection. Only those targets which are connected directly to a logical file count as a logical file's targets. Indirectly connected targets are not included in the number of targets. Figure 2
Example of a permitted connection. WDU-0
TRAMES1
(TRAMES1) GCHG
logical file
WDU-1 FDU-0
In the example above, both the logical file TRAMES1 and the spare logical file (TRAMES1) GCHG have one target. The following figure shows a prohibited connection: the logical file TRAMES1 has two targets, whereas the spare logical file (TRAMES1) has only one target. This connection is not possible, because the logical file and its spare logical file do not have the same number of targets. Figure 3
Example of a prohibited connection. WDU-0
TRAMES1
FDU-0
WDU-1
(TRAMES1) GCHG
1.2 I/O devices 1.2.1 Hard disks (WDU) Hard disks (WDU) work as the system's mass memory where system information is stored for the restart. The WDU is always duplicated: the system disk is backed up by a backup disk. The system reads data from the system disk. The system can have WDUs in various units. For example, the OMU always has WDUs. Units that produce or contain large amounts of data, such as charging unit (CHU) and the statistical unit (STU), can be equipped with WDUs. The maintenance of the WDU includes purging it by removing unnecessary directories and outdated software builds. For instructions, see Deleting files and directories in Operating System. For instructions on changing the WDU, see Changing the WDU in Changing of Mass Memory Units. For instructions on how to take safecopies of the WDU software, see instructions on Safecopying. Initializing the WDU
You need to initialize the WDU when you start to use a new one or when you want to delete the data on the disk and mark all the bad blocks. If you are changing the WDU, you can initialize the WDU in the test laboratory even before it is installed in the actual unit. The initializing process depends on the unit whose WDU you want to initialize.
1.2.2 Removable media
g
Note: Removable media (FDU) is only present in classic hardware environment. Removable disk unit (FDU) can be either magneto-optical (MO) disk or floppy disk. USB memory stick uses USB mass storage (UMS). The term removable media used here refers to both FDU and UMS connected devices. You can use MO disks or USB memory sticks for making safecopies from hard disks or bringing new software into the network element. The file format of an MO disk or a USB memory stick is FAT16 or FAT32. The file format of a floppy disk is F5 or FAT12. You can choose the format during formatting, and you can also choose if you want to create a partition table to the disk. Operating systems support different formats and sometimes you need a partition table. A partition table can be defined for an MO disk or a USB memory stick. It has been ensured that there is always the right data format in use depending on the equipped FDU device. Full support for F5 or FAT data format can be used for floppy disk according to non-PCI and PCI-CPU units: With non-PCI CPU units (CP4XX) FAT is not supported. F5 format is fully supported for the floppy disk. With PCI CPU units (CP6LX, CP6MX, CP550-B, CP523-A, CP710–A) both F5 and FAT data format are fully supported. The capacity of an MO disk depends, for example, on the size of disk sectors. The capacity of a USB memory stick depends on the type of the stick. For more information on MO disk, see Handling removable media.
1.2.3 Printers Printers operate as output devices. Typically, alarms, reports, and execution printouts are output to printers. Data in ASCII or binary format can be output to printers. You can use the connections of logical files to define the data to be output to printers. Data can be output over the X.25 or TCP/IP network from a network element using the VPP. The administrative computer allows outputs to be directed to a printer, a terminal, or memory. The computer to which outputs are directed must have an application that can read the data. The administrative computer can handle data in various ways. It can output the data to a printer or a visual display terminal, or it can store the data on its hard disk for further processing. The application should be selected in line with how data is further processed in the administrative computer. Line printer (LPT)
g
Note: Line printer is only present in classic hardware environment.
An LPT must be switched on and in the ON LINE state when data is output on it. The maintenance of an LPT includes adding paper and changing ribbon tape. Virtual printer (VPP) Using the VPP does not require any special measures. Outputs can be directed to the VPP by using the connections of logical files. The VPP requires a PAD (Packet Assembler/dissembler), http or telnet connection to operate. Before the connection is established, the VPP state is BL-SY. Note that the administrative computer always opens the VPP connection, and also that if there is a unit switchover in the OMU, the user must establish a new connection to the unit which is now the working unit. In the I/O system, VPPs with index under 50 direct their outputs to the PAD connection and VPPs from VPP-95 to VPP-99 direct their outputs to the telnet or http connection. After the connection has been established, the VPP state changes to WO-BU. For more information, see Configuring a network connection for VPP.
g
Note: When you use the VPP to transfer data, keep in mind that the data transfer is not protected. The connection uses a non-acknowledging data transfer protocol. If you want to transfer data using an acknowledging data transfer protocol, use a VDS (Virtual Data Storing Device).
1.2.4 Terminals Terminals allow you to operate the network element, that is, to give MML commands or service terminal commands. Terminals are categorized into MML terminals and virtual terminals. For more information about the use of commands and editors, see Executing MML commands and Service Terminal Essentials. Figure 4
Terminal and Virtual Terminal Administrative computer
Visual Display Unit - VDU A visual display unit operates as an input device or as an output device. Virtual Terminal - VTP A virtual terminal also operates as an input device. A virtual terminal is a terminal which is connected to a network element via a data network. Typically, the virtual terminal is a PC which is connected to a network element via a network. An administrative computer must have the Virtual Terminal (VT), PAD, or Telnet application.
g
Note: VTP devices should never be used as a target of a logical file connection, because VTP is normally waiting for an MML command and when some data should be output, the user must press Enter to initiate the execution of the next task. As a result, Enter must be pressed for each data stream to be output on the screen. Using a virtual terminal differs from using an ordinary terminal in two ways. First, you must be connected to a data network through your application, and then you must also be connected to a network element. Instructions about how to use the counterpart application are provided with the application that is used. A network protocol is used to connect a virtual terminal to a network element. The VTP connection is LAN or X.25.
Table 3
Alternatives in configuring the VTP
Protocols
Possible connections
Application
Additional information
OSI
X.25
VT application: PAD or ISO VT protocol
For further information on configuring, see OSI Guide
Telnet application
For further information on configuring, see TCP/IP Guide
LAN TCP/IP
LAN
1.2.5 VDS A Virtual Data Storing Device (VDS) is a device to transfer data from a network element to a post-processing system, for example, the billing centre (BC), outside a network element. The VDS device stores data in files which form data file group on the hard disk and on an MO disk. The post-processing system reads those files using the FTP protocol or FTAM except when the MO disk is in use.
Data transfer between a network element and a post-processing system.
Post-processing system
Network element
readingand writing X.25/LAN
Logicalfile
WDU connection Filegroup File1
File2
File3
Filen
VDS readingand writing
When the data is stored on the MO disk, the data is not transferred automatically to the post-processing center - the user has to take the MO disk media there manually. Figure 6
Data transfer between a network element and a post-processing system when the MO disk media is in use
for transferring charging data from a network element to a post-processing system, for example, Billing Centre (BC) for transferring reports for transferring any data which is output via logical files
• • •
g 1.2.5.1
I/O System
Note: The VDS device transfer always involves a certain amount of delay (normally several minutes). It is therefore not recommended to use the VDS device to transfer data that has strict real time requirements, such as alarms and hot billing.
Technical configuration of the VDS device The I/O system outputs data to a VDS device via a logical file. The VDS device stores the original and/or compressed data in data files which form a disk file group on the WDU or FDU (MO or floppy disk). This file group operates as a ring buffer. The FTAM and FTP protocols are used to transfer files. As soon as the network element applications finish writing data to the logical files, the VDS device writes the data to the data file. Filling of data files The data files are filled in sequence. If the files are transferred in the same order, then the data is also transferred in its original order. The order of the data should not change, otherwise the post-processing system might not be able to handle the data. This is why the untransferred files should not be skipped even if there are transferred files in the buffer after them. The skipping of untransferred files can be enabled, but this also means that the order of the data will be lost. This might be necessary if there is a problem with a file, and it cannot be transferred to the post-processing system. If that file is not skipped, there will be no file available to write in. Fill-up ratio of data files The fill-up ratio of the data files tells the percentage of disk files that are not available (unless overwriting or skipping of untransferred data is used) from the total number of disk files. Note that the fill-up ratio of the data files is the same as the percentage of full disk files only if the files are transferred in the same order in which they are written on the disk, see Figure Counting of fill-up ratio, Files are transferred in sequential order. If files are skipped and the next file is full, then the fill-up ratio is 100 per cent, although there are files that could be written in. See Figure Counting of fill-up ratio, Files are not transferred in sequential order.
g
Note: Skipping VDS device data files can be enabled in order to recover from an error situation. The fill-up ratio is always counted by excluding the succession of the transferred files after the current file, not by excluding all transferred files. The following two figures illustrate the counting of fill-up ratio:
Counting of fill-up ratio. Files are transferred in sequential order.
CURRENTFILLUPRATIO:44%
NUMBEROFFULLFILES:6 FULL
FULL
FULL
FULL 16
1
15
TRANS
2
14 TRANS
TRANS
3
13
4
12
5
TRANS
FULL
OPEN
6
11 10
TRANS
7 9
8
TRANS
TRANS TRANS
Figure 8
FULL
TRANS
Counting of fill-up ratio. Files are not transferred in sequential order.
CURRENTFILLUPRATIO:100%
NUMBEROFFULLFILES:7 FULL
FULL
FULL
FULL 16
1
15
TRANS
2
14 TRANS
TRANS
FULL 3
13
4
12
5
OPEN
6
11 TRANS
FULL
10
FULL
7 9
8
TRANS
TRANS TRANS
TRANS
File transfer The post-processing system initiates the data transfer. Its application asks/polls the VDS device to find out if there are files in the FULL state to be transferred.
By observing the status of the files, you can monitor the transfer of files to the postprocessing system. You can display the file states by giving the command IFO or IFP. For more information on file statuses, see the command descriptions of commands IFO and IFS. The FTAM protocol of OSI or the FTP of TCP/IP is used in the data transfer to the postprocessing system. The control files of the VDS device or the notification interface are used for controlling the data transfer. The VDS Device Data File Transfer Control File (TTTCOF) is used for controlling the transferring of VDS data files from the local disk drives of a computer unit to the postprocessing system. The post-processing system updates the TTTCOF and writes it to the network element using FTAM/FTP. In the network element, the Virtual Data Storing Device Driver (VIDAST) checks the data by comparing the control files (TTSCOF and TTTCOF) through which data files are transferred to the post-processing system and thus again available for storing data. In order to maximize the usage of disk capacity, the allowed maximum number of data file has been increased from 9999 to 50000, as a secondary result, the name of data file is changed (e.g. changed from GE0001.DAT to GE00001.DAT). Consequently after the upgrade (containing this improvement), the old data file with the old name cannot be transferred to post-processing system automatically, in this case, you need to transfer the old data file manually.
g
Note: Use the IFH command to enable or disable the TTTCOF reading from disk and to define the TTTCOF reading interval if reading is enabled. If the notification-based method for transfer control is used, we recommended disabling the loading of the TTTCOF for better performance. The ZLIB software is used in the compression functionality of the VIDAST.
1.2.5.2
Capacity of the VDS device Storage capacity of the VDS device The storage capacity of the VDS device depends on • • •
the storing media the degree of used capacity of the storing media the selected compression mode
To reach full capacity, only use one VDS device on the hard disk. Storing speed of the VDS device The storing speed of the VDS device depends on • • •
DN98796803 Issue: 13-1
the block size of the data to be written the read and write speed of the storing media and other usage of VDS devices the chosen optimization mode of the VDS device. Optimization mode should only be used when the storing target is WDU.
The larger the blocks written on the WDU at a time are, the higher the speed. You can choose the block size for charging data. This enables you to control the speed. When you choose the block size, keep in mind the maximum block size of the backup device, as these two must be compatible. For more information on backing up, see Backing up outputs. For more information on charging and the block size for charging data, see information on Changing charging block size in Charging handling.
1.2.5.3
Setting parameters for the VDS device You can define the following parameters to control the VDS: 1. number and size of files (IFF command) 2. alarm limits and mode for file group usage (IFA command). For more information about alarm limits, see Alarms and alarm modes for VDS device. 3. time-out intervals for closing open files (IFT command) 4. overwrite and skipping mode of full files (IFF command) 5. compression mode (IFF command) 6. optimization mode (IFF command) 7. storing target (IFF command) Number and size of files The data files to which the VDS device writes data operates as a ring buffer which can have 10-50000 files. These limits are VDS device specific. For certain applications the number of files can be different. For example, the GSMCHA application can have a maximum of 50000 files. You can choose the number of files for each ring buffer. You can also define the file size. When you choose the number and the size of files, take into account the amount of data that requires storing, the transfer rate and the desired amount of free disk space. When measuring the disk files, keep in mind the capacity requirements. You have to determine • • • • •
the amount of data to be stored and transferred the length of time for which the data has to be stored on the storing media if the connection to the post-processing system is broken the speed at which the post-processing system application can read data the data transfer rate of the network how large a file you want to transfer at a time
You have to reserve some disk space for the buffer memory in case of data network outages. A minimum of two to three-day buffering capacity is considered the norm. If there are disturbances in data transfer connections and the files cannot be transferred, the buffer gives time for fault diagnosis. In this way you can avoid relying on a backup device. Time-controlled file closing Time-out intervals direct a file from the OPEN state to the FULL state. This causes the VDS device to close the file. Time-out intervals are based on either of the following:
Use clock time when you do not want the data of different days to be written to the same file. Use time intervals to synchronize the writing of the VDS device with the polling of the post-processing system. File overwrite and skipping mode The file group operates as a ring buffer. When one file becomes full, the VDS device writes to the next file. If the next file is not free, the VDS device can be configured so that it does one of the following: • • •
overwrites files skips to the next free file stops writing to the VDS device
If a backup device is defined for the VDS device and overwriting and skipping are disabled, the system writes to the backup device. The alarm limits can also be used when overwriting is enabled. Use the IFF command to configure the VDS device. Compression mode With compression mode you can define if files are compressed or not and if the compressed files are deleted after transfer. Storing target The storing target I/O device of the VDS device can be WDU (both hard disks), FDU (MO or floppy disk), or UMS. The VDS device maintains its disk file group and controls files on the specified storing target. Expiration days of files When the limit storage time for charging data feature is activated, you can define the expiration days for files. The transferred files with more than the set expiration days would be purged.
1.2.5.4
Alarms and alarm modes for VDS device Filling ratio alarms and alarm limits Three VDS device related filling ratio alarms occur when the used capacity reaches certain points. You can configure the alarm limits, that is, the degree of capacity utilization, when these alarms occur. Two of the filling ratio alarms are used to warn when VDS device is filling up and one is used to warn when VDS device is full. The first thing to do when configuring filling ratio alarms is to decide whether they are needed, and if they are, which filling ratio alarms are needed. You can configure the VDS in the following three ways: • • •
DN98796803 Issue: 13-1
to use all filling ratio alarms to use only the 'VDS is full' filling ratio alarm to use no filling ratio alarms at all
If all filling ratio alarms are taken into use you have to define the following four alarm limits for the VDS device: • • • •
a limit at which the first filling ratio alarm is set (1st alarm limit) a limit at which the first filling ratio alarm is cancelled (1st cancel limit) a limit at which the second filling ratio alarm is set (2nd alarm limit) a limit at which the second filling ratio alarm is cancelled (2nd cancel limit)
Recommendations for filling ratio alarm limits When the degree of used capacity reaches the filling ratio alarm limit, the system sets a filling ratio alarm. For more information on the calculation of the used capacity, see Technical configuration of VDS device. When the degree of used capacity drops to the cancel limit, the system cancels the filling ratio alarm. Set the cancel limit noticeably lower than the filling ratio alarm limit. If the cancel limit is very close to the filling ratio alarm limit, and if the degree of used capacity hovers on both sides of the cancel limit, filling ratio alarms will be constantly set and cancelled. Filling ratio alarms are a sign of a failure in data transfer connection or of an increase in the amount of data. The filling ratio alarm limits have to be defined so that the maintenance personnel have enough time to react to the situation. You can switch off the filling ratio alarms by increasing the number or size of files, or by correcting the fault. The filling ratio alarm limit should be set according to the experience of the maintenance personnel. You can also switch off the filling ratio alarms altogether, but this is not recommended. Alarm sets and prioritization of filling ratio alarms There are two different sets of filling ratio alarms, which makes it possible to define the priority of alarms. Filling ratio alarms 2549, 2550 and 2551 are used when storing critical data; for example charging applications use them. Filling ratio alarms 2731, 2732 and 2733 are used when storing less critical data; for example statistical applications use them. The default is 50% for the first filling ratio alarm limit and 80% for the second filling ratio alarm limit. The first filling ratio alarm is 2731 or 2549. *
ALARM VDS-1 VIDAST (0023) 2731 FIRST ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED WDU SB 50% 45% *
ALARM VDS-0 VIDAST (0023) 2731 FIRST ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED GENE00 50% 45% **
ALARM VDS-0 VIDAST (0013) 2549 FIRST ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED WDU SB 50% 45% **
ALARM VDS-0 VIDAST (0013) 2549 FIRST ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED GENE00 50% 45%
ALARM VDS-1 VIDAST (0024) 2732 SECOND ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED WDY SB 80% 75% *
ALARM VDS-1 VIDAST (0024) 2732 SECOND ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED GENE00 80% 75% *** ALARM VDS-0 VIDAST (0014) 2550 SECOND ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED WDU SB 80% 75% *** ALARM VDS-0 VIDAST (0014) 2550 SECOND ALARM LIMIT FOR UNAVAILABLE VDS-DEVICE DATA FILES REACHED GENE00 80% 75%
In addition, the VDS device has two fixed filling ratio alarms, 2551 and 2733, which mean that the device has no free files. In other words, the degree of used capacity is 100%. **
ALARM VDS-1 VIDAST (0025) 2733 OUT OF AVAILABLE VDS-DEVICE DATA FILES WDU SB
**
ALARM VDS-1 VIDAST (0025) 2733 OUT OF AVAILABLE VDS-DEVICE DATA FILES GENE00
*** ALARM VDS-1 VIDAST (0015) 2551 OUT OF AVAILABLE VDS-DEVICE DATA FILES WDU SB *** ALARM VDS-0 VIDAST (0015) 2551 OUT OF AVAILABLE VDS-DEVICE DATA FILES GENE00
If there are no free files in the disk file ring and untransferred data is overwritten, the filling ratio alarm 2386 is displayed: **
This filling ratio alarm means that the transfer of files to a post-processing system is unsuccessful. When you have determined suitable filling ratio alarm limits over time, they should be kept constant. As the amount of data written to the VDS device increases, you can extend the capacity by increasing the size and number of files accordingly. The time to react to faults is thus also kept constant.
Untransferred data in VDS device alarm This alarm is used when the VDS device is used as a spare storing target in data transfer and storing chains. The alarm is set if the data file group of VDS on the hard disk or on the removable disk contains untransferred data (any file in state OPEN or FULL). By default, the setting of this alarm is disabled, but the user can enable the alarm with the IFA command. Program cancels the alarm automatically when there are no more untransferred files, or the alarm can be disabled manually with the IFA command. This does not correct the problem that caused this alarm itself; it only cancels the alarm. The user is solely responsible for the correct usage of this alarm. *
ALARM VDS-1 VIDAST (0008) 3233 UNTRANSFERRED DATA IN VDS DEVICE WDU SB 0002
Too old files in VDS device alarm This alarm is set when VDS contains files that are not transferred into the postprocessing system within the given threshold age limit or manual transfer of the media is required because the FDU (MO disk) contains data which is becoming too old. By default, the setting of this alarm is disabled, but the user can enable the alarm with the IFA command. Program cancels the alarm automatically when there are no more files that are too old on the disk, or the alarm can be disabled manually with the IFA command. This does not correct the problem that caused this alarm itself; it only cancels the alarm. The user is solely responsible for the correct usage of this alarm.
Interrogating I/O connections and the whole connection tree
I/O System Administration
2 Interrogating I/O connections and the whole connection tree 2.1 Interrogating I/O connections Purpose You can check to which devices and logical files a certain logical file is connected by using the IID or IIL command. You can interrogate the connections from a device's standpoint. The IIL command outputs all logical files which are connected to a certain device.
g
Note: We recommend you to interrogate the connections of I/O devices before adding, changing, or removing connections.
Procedure 1
Interrogate the connections by a logical file (IID) When giving the parameter , you can use the wildcard character %. The default value of this parameter is all logical files
ZIID:<system name>,<destination unit>:;
2
Interrogate the connections by a device (IIL)
ZIIL:<system name>,<destination unit>:DEV=;
Result Expected outcome For the interrogation of connections by a logical file, the execution printout of the command ZIID::SWITCH1; is as follows: LOGICAL FILE(S): SYSTEM = OMC-CART PAGE 1 LOG LOG FILE FILE NBR NAME & CLASS 4C SWITCH1 P
UNIT = OMU SPARE FILE MODE
PHYSICAL FILE NAME
OBJ IND
SYSTEM NAME
1 OMC-CART
UNIT NAME OMU
DEVICE/ LOGICAL FILE VPP-0
COMMAND EXECUTED
In the execution printout, the DEVICE/LOGICAL FILE column shows all devices which are connected to the logical file SWITCH1. In this example, SWITCH1 is connected to VPP-0.
Interrogating I/O connections and the whole connection tree
The printout of the command ZIIL:,OMU:DEV=VPP-1; displays all logical files of OMU that are connected to VPP-1. The execution printout of the command is as follows: LOG LOG SPARE FILE FILE FILE NBR NAME & CLASS MODE C8 ATMUTMA P C9 ATMFRVCTMA P CA ATMVCTMA P CB TRARSSA P CF ATMSDCREP P D0 V5PROVA P COMMAND EXECUTED
PHYSICAL FILE NAME
OBJ IND 1 1 1 1 1 1
SYSTEM NAME OMC-CART OMC-CART OMC-CART OMC-CART OMC-CART OMC-CART
In the execution printout, the LOG FILE NAME column shows all logical files which are connected to VPP-1. In this example, six files (ATMUTMA, ATMFRVCTMA, ATMVCTMA, TRARSSA, ATMSDCREP, and V5PROVA) are connected to VPP-1. Related topics For further information, see Controlling outputs.
2.2 Interrogating the whole connection tree Purpose You can output all destination objects of a named logical file using the LF4EVR service terminal extension.
Steps
1
Activate the service terminal As a command code (below 4) you can use any other character than those used for service terminal programs or extensions installed earlier. For general information on using the service terminal, see Service terminal essentials.
3 Controlling outputs You can direct outputs from the network element via logical files to mass memory devices, printers, visual display terminals (VTs) and to the byte basket.The manufacturer has defined the initial settings for connections between logical files and devices. You can change these settings later. To interrogate the existing connections of the logical files, use the IID and IIL commands.
3.1 Defining an output device Purpose A default output device has been defined for each logical file. However, you can group the outputs of logical files freely by subject, and direct them to the existing output devices, mass memory devices and logical files. Below are the instructions on how to add, change and remove the connections between logical files using the IIS command. The table shows adding, changing, and removing of targets. A dash means that you do not give a value to that parameter block. For example, when you remove a target, define the target you want to remove as the current target but do not define the new target. Table 4
g
Specifying the targets when adding, changing or removing the connections between logical files
Current target
New target
adding
-
new target
changing
current target to be replaced
new target, replacing the current one
removal
target to be removed
-
Note: A logical file must have at least one target. If you do not want to direct the outputs to any device, specify the byte basket (BBU-0) as the target. In this case no other devices can be used. You can connect several logical files to one logical file which is connected to an output device. This makes it easier to change output devices. For more information, see Grouping logical files. Before you start There are some restrictions on how to connect the logical files. For more information, see Restrictions on connections of logical files.
Display the current connections of a logical file, if needed (IID)
ZIID:<system name>,<destination unit>:;
2
Interrogate the connections by a device (IIL) If the target is an I/O device, always check the current connections.
ZIIL:<system name>,<destination unit>:DEV=;
3
Add/change/remove an object device connected to a logical file or to a spare logical file (IIS) A logical file can have a maximum of four targets.
ZIIS:<system name>,<destination unit>::<current object identification>:...; Example: Defining an I/O device as a target This example shows how to add, change, and remove an I/O device as a target. At first, the logical file SWITCH1 (three-star switching equipment alarms) is output only to the VPP-0 printer. a) Display the current connections of VPP-1 by a device.
ZIIL:,OMU:DEV=VPP-1; b) Add the VPP-1 printer as an output device. Figure 10
Logical file SWITCH1 is connected to VPP-1 VPP-1 OMU
SWITCH1
VPP-0 Ownnetworkelement
ZIIS::SWITCH1::DEV=VPP-1; The execution printout of the command shows that the logical file SWITCH1 is now connected to VPP-0 and VPP-1. c) Change the output from VPP-1 to VPP-2. ZIIS::SWITCH1:DEV=VPP-1:DEV=VPP-2; The execution printout of the command shows that the logical file SWITCH1 is now connected to VPP-0 and VPP-2. d) Remove the connection between the logical file SWITCH 1 and VPP-2 device. Do not enter the new object identification. ZIIS::SWITCH1:DEV=VPP-2:; The execution printout of the command shows that the logical file SWITCH1 is now connected to VPP-0 only.
3.2 Configuring a network connection for VPP Purpose In this chapter you can find information on how to direct data from the network element to the TCP/IP or X.25 (PAD) network, and what options you have to control the printing tasks. Printing tasks are directed via logical files as follows: 1. Printing tasks from a VPP device with index under 50 are directed to the PAD protocol-based VPP device with the corresponding index. 2. Printing tasks from a VPP device with index over 95 are directed to the HTTP server. Outputs can be directed to a VPP in the usual way by using the connections of logical files. For more information on VPP, see Printers.
g
Note: When you use the VPP to transfer data, note that the data transfer is not protected, and the connection uses a non-acknowledging data transfer protocol. If you want to transfer data using an acknowledging data transfer protocol, use a VDS (Virtual Data Storing Device). For more information, see VDS. In the I/O system, the virtual printer is an application which directs the data to be output to a defined network address. The computer to which outputs are directed must have an application that can read the data. The administrative computer can • •
output the data to a printer or a visual display terminal, or store the data on its hard disk for further processing.
The application should be selected in line with how data is further processed in the administrative computer.
3.2.1 Directing outputs to the printer/computer with PAD connection Purpose This procedure concerns only the X.25 (PAD) connection. Before you start Table 5
Requirements for configuration of the VPP with PAD connection
Requirements for administrative computer
Requirements for network element
X.25/PAD protocol
adapter plug-in unit X.25 connection physical channel
For more information about configuring the above, refer to the OSI Guide.
Create an X.25 NSAP for PAD by using an SVC (QBN) The command reserves the next available NSAP number. NSAP stands for Network Service Access Point, and SVC for Switched Virtual Circuit. The connection role is local (L) and the NSAP type is 1. The DTE number of a virtual printer is the X.25 address which is followed by the VPP index, that is, the X.25 sub-address. For example, if the X.25 address is 1234 and the VPP index is 01, the DTE number is 123401. If you want to connect several virtual printers, the X.25 network address remains unchanged, but the sub-address changes. Therefore, the DTE number of the VPP-2 device would be 123402.
ZQBN::L:1:DTE=,SPI=01000000;
2
Create a network address (QBC) In a public network, you have to check network addresses with the network operator.
ZQBC::L;
3
Add the NSAP to the PAD network address (QBT)
ZQBT::;
4
Allow the use of the NSAP (QBG)
ZQBG:,UNL;
5
Create a local application (QDL)
ZQDL::::UNL::VPP,:;
6
Define the data which will be output to a virtual printer (IIS) Connect a logical file to that printer.
ZIIS:,:::DEV=VPP-;
g
Note: The QB command group is only supported in the ATCA SGSN for the ATCA NEs.
3.2.2 Directing outputs to the printer/computer with Telnet/HTTP connection Purpose This procedure concerns only Telnet/HTTP connection. Before you start Check the current connections.
ZIID:[<system name>| def],[<destination unit>]:[| def],[]; Connect the logical file to the VPP, if needed.
ZIIS:,:::DEV=VPP-; Table 6
Requirements for configuration of the VPP with TCP/IP connection
Protocols
Possible connections
Application
VPP index
Additional information
TCP/IP
LAN
LPD
0 to 50
For more information, refer to IN - Line Printer Handling
TCP/IP
LAN
HTTP or Telnet
95 to 99
Port: 11111
Steps
1
Establish a Telnet or HTTP connection to OMU IP address with port number 11111 If you are using a Telnet terminal, connect to the correct address and port, then press the enter key once. If you are using a web browser, simply connect to the correct address and port; no extra keystrokes are needed.
2
Check the state of corresponding VPP devices (ISI) If the working state of the VPP devices corresponding to the Telnet or HTTP sessions is WO-BU, then the connection for printing is established. The working state of the VPP devices which are not reserved for any connection is BL-SY. ZISI::VPP If the VPP device you connected to is not in the WO-BU state, outputs are not printed via Telnet or HTTP. The connection for printing is not established, or it is disconnected. To re-establish the connection for printing via Telnet or HTTP, start a new connection to OMU from a web browser or a Telnet terminal via port 11111.
End the session when you are ready You can stop the printing simply by closing the Telnet terminal or the web browser.
3.3 Outputting to a printer in another network element Purpose When you want to observe the state of the network from one network element, direct the most important outputs to the output devices of that network element. Before you start There are some restrictions on how to connect the logical files. For more information, see Restrictions on connections of logical files.
Steps
1
Connect the desired logical file to a logical file located in another network element (IIS) A new connection is added, when you do not give the parameter <current object identification>.
ZIIS::::; Example: Connecting a logical file in its own network element to a logical file located in another network element a) Connect the logical file TRAMES1, which is located in traffic measurements, from its own network element to the logical file TRAMES1 in OMC0. In OMC0, TRAMES1 is already connected to VPP-0. Figure 11
Outputting to a printer in another network element VPP-0
3.4 Outputting to a disk file Purpose Connecting a logical file to a hard disk differs from other connections; first you must create the disk file to which you want to connect a logical file. Also, the directory path must be included in the connection. A disk file can behave as a normal disk file or as a ring file. Use ring files when you want the most recent data always to be stored in the file. When the recent data in the ring files becomes outdated, it can be replaced by new data. The file is empty when you first create it. The system writes data via the logical file to the disk file from beginning to end, until the file is full. If the disk file is a ring file, the system continues to write to the file starting from the beginning. This means that the oldest data is deleted as new data is written in the file. However, if the file is a normal disk file, once it is full, data cannot be written to it through the logical file.
g
Note: If a logical file is connected to a disk file and you use the IWE command to empty the disk file, the system does not output data to the disk file. In such a case, create the connection again by using the III command. Note though that normally it is not necessary to empty a ring file. Before you start There are some restrictions on how to connect the logical files. For more information, see Restrictions on connections of logical files.
Steps
1
Create a file on the disk (IWC) If the command concerns an MO disk (FDU) or a USB memory stick, you do not need to give the parameters and .
ZIWC:,<destination unit>:,<default subdir in use>:<subdir>...:,,,;
2
Connect a logical file to the disk, if needed (IIS) Some logical files are already connected to the disk by default.
ZIIS:,<destination unit>:,: <current object identification>:DEV=WDU-...; For a USB memory stick, use the following command:
Connect the logical file to the disk file and define the directory and file (III) Note: When there are several logical files in the chain, link the first logical file to the hard disk file (the III command). In this case, the target of the first logical file should be a logical file (linked using the IIS command). Connect the last logical file of the chain to the hard disk. Give the parameter the value RF only if you want the disk file to function as a ring buffer. The default value OF means that the disk file functions as a normal disk file.
ZIII:,<destination unit>:,: <default subdir in use>,<subdir>...:,,, ; Example: Outputting to a disk a) Create a file on the disk. Create a file named MMLLOGFILE on the system disk and backup disk in the /DIRA/DIRB/ directory. The file size is 4000 bytes.
ZIWC:,OMU:WSB,NODEF:DIRA,DIRB:MMLLOGFILE,,4000,NN; b) Connect the logical file to the hard disk, if needed. In this example, the existing output device, VPP-0 printer is replaced with the hard disks.
ZIIS:,OMU:MMLLOG,PRI:DEV=VPP-0:DEV=WDU-SB; c) Link the logical file to the disk file. Connect the logical file MMLLOG, which is in your own network element, to the MMLLOGFILE in the /DIRA/DIRB/ directory. The file functions like a normal disk file.
ZIII:,OMU:MMLLOG,PRI:NODEF,DIRA,DIRB:MMLLOGFILE;
3.5 Removing the connection between a logical file and a disk file Purpose If you want to delete an existing connection between a logical file and a disk file, enter the III command without giving any value to the parameter .
Steps
1
Remove the connection between a logical file and a disk file (III)
ZIII:,<destination unit>:,; Example: Removing the connection between a logical file and a disk file In this example, you are removing the connection created in Outputting to a disk file.
a) Remove the connection between the logical file MMLLOG and the disk file. Do not give any value to the parameter .
ZIII:,OMU:MMLLOG,PRI;
3.6 Creating and grouping logical files Purpose When you want to output the same data to several devices, use the tree structure of connections. A logical file can be connected to a maximum of four different devices. If you want to direct the output to more than four devices, first connect the logical file to four logical files, then you can have another four connections from each logical file. You can connect logical files to each other by using a tree structure. This means that a file in the root is connected to another logical file, which in turn can be connected to either I/O devices or logical files. Figure 12
Tree structure of connections between logical files and devices
Networkelement A
NetworkelementB
Operationandmaintenancecentre
VPP-0 VPP-1
VPP-3
SWIOWN
SWIOWN2
SWITCH1 SWIOWN2
VPP-4
VPP-2
1
2
3
4
amaximumof4connectionsoneaftertheother
For more information on logical files, see Defining an output device.
g
Note: Creating and backing up a tree structure has some restrictions. See Restrictions on connections of logical files and Restrictions on backing up outputs. You may need to create logical files if you want to output the logical file to more than four devices or if you want to group logical files. The first step indicates how you can create a logical file with the command IIF. You can connect several logical files to one logical file which is then connected to an output device. This makes it easier to change output devices. Instead of changing the output devices of all logical files separately, you only need to change the output devices of one logical file. The steps from 2 to 4 give you an example of this procedure. The following figure illustrates how two-star and three-star alarms are grouped in one logical file, ALARMSA. From this logical file, they are connected to the logical file ALARMSB in another network element. ALARMSB's target is the VPP-0 printer.
Connect several logical files to one logical file which is connected to an output device
NetworkelementSYS-A
NetworkelementSYS-B
SWITCH1 TRANSM1 POWER1
ALARMSA
ALARMSB
VPP-0
EXTERN1 OPERMA1
Before you start There are some restrictions concerning the connections and backing up. For more information, see Restrictions on connections and Restrictions on backing up.
Steps
1
Create a logical file (IIF) The parameter defines if the logical file is semi-permanent (S) or temporary (T). We recommend that you use semi-permanent logical files. Temporary logical files are deleted automatically at the end of the MML session. To create a semi-permanent file, give the value S to the parameter . You can define the target connected to the logical file, and the target's location in the parameter block