Download 410_LSM-R_User-Manual_V2.0.pdf...
2600-00CZ5YGAL Ver. 2.0
410 LSM-R
User Manual
COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied, translated, transcribed or duplicated for any commercial purposes or disclosed to the third party in any form without the prior written consent of SAMSUNG Electronics Co., Ltd.
TRADEMARKS Product names mentioned in this manual may be trademarks and/or registered trademarks of their respective companies.
This manual should be read and used as a guideline for properly installing and operating the product.
This manual may be changed for the system improvement, standardization and other technical reasons without prior notice. Updated manuals are available at: https://systems.samsungwireless.com/
For questions on the manuals or their content, contact
[email protected]
©2011 SAMSUNG Electronics Co., Ltd.
All rights reserved.
LSM-R User Manual
INTRODUCTION
Purpose This Long Term Evolution (LTE) evolved UTRAN Node-B (eNB) Element Management System (EMS) user manual describes the information necessary for using the LTE eNB EMS, e.g., how to register and manage users and how to use the menus.
Content and Organization This manual consists of 7 Chapters and 1 Annex. CHAPTER 1. EMS Interface Describes the GUI for the EMS, the basic operation method of the system, and Help. CHAPTER 2. Configuration Management Describes the functions to view, modify, add and delete the information in the NE. CHAPTER 3. Fault Management Describes the functions to manage the faults occurring within the system. CHAPTER 4. Performance Management Describes the functions to manage the features related to the performance of the network resource. CHAPTER 5. General Management Describes the functions to setup, control and monitor the operating environment. CHAPTER 6. Security Management Describes the functions to register, modify, search and/or delete the operator to access the EMS system. For security purpose, the access to the system will be limited to the registered operators only.
© SAMSUNG Electronics Co., Ltd.
I
LSM-R User Manual
CHAPTER 7. SON Management Provides the menu for the operation of the Self Organizing Networks (SON), including the monitoring of the DHCP and SON statuses and the setting of the variables used in the SON algorithm execution. ANNEX A. Open Source Announcement Describes the open source announcement.
Conventions The following symbols are used in this manual. The following types of paragraphs contain special information that must be carefully read and thoroughly understood.
Checkpoint Provides the operator with checkpoints for stable system operation.
Note Provides references for additional information.
Revision History Version
Date of Issue
1.0
09. 2011.
First edition
2.0
11. 2011.
Revised according to UI and menu modified.
© SAMSUNG Electronics Co., Ltd.
Remarks
II
LSM-R User Manual
TABLE OF CONTENTS PurposeI Content and Organization .......................................................................................................................... I Conventions............................................................................................................................................... II Revision History ........................................................................................................................................ II
CHAPTER 1. EMS Interface 1.1
1.2
1.3
1.4
1.5
Connecting to EMS ................................................................................................................ 1-1 1.1.1
Login .........................................................................................................................................1-1
1.1.2
Logout .......................................................................................................................................1-3
Interface Configuration ......................................................................................................... 1-4 1.2.1
Menu Frame .............................................................................................................................1-5
1.2.2
Main Frame ..............................................................................................................................1-7
1.2.3
Tree Viewer Frame ..................................................................................................................1-7
1.2.4
Event Viewer Frame ................................................................................................................1-8
1.2.5
Event Viewer Frame ................................................................................................................1-8
Basic Operation ..................................................................................................................... 1-9 1.3.1
Button........................................................................................................................................1-9
1.3.2
Basic Settings...........................................................................................................................1-9
1.3.3
Sitemap...................................................................................................................................1-10
Network Viewer .....................................................................................................................1-11 1.4.1
Tree Viewer ............................................................................................................................ 1-11
1.4.2
Map Viewer.............................................................................................................................1-14
1.4.3
Rack Viewer ...........................................................................................................................1-19
1.4.4
Group Management ...............................................................................................................1-27
Help
1-29
CHAPTER 2. Configuration Management 2.1
1-1
CLI
2-1
2-1
2.1.1
CLI Configuration .....................................................................................................................2-1
2.1.2
Basic CLI Functions .................................................................................................................2-3
2.1.3
Command Window ..................................................................................................................2-7
2.1.4
History Window ........................................................................................................................2-9
2.1.5
Response Window .................................................................................................................2-10
© SAMSUNG Electronics Co., Ltd.
III
LSM-R User Manual
2.2
2.3
2.4
2.1.6
Autonomous Window ............................................................................................................ 2-15
2.1.7
Batch Window ....................................................................................................................... 2-18
2.1.8
Macro Execution.................................................................................................................... 2-24
NE Grow/Degrow .................................................................................................................. 2-27 2.2.1
NE Grow ................................................................................................................................ 2-27
2.2.2
NE Degrow ............................................................................................................................ 2-29
Cell Management .................................................................................................................. 2-30 2.3.1
Cell Grow and Degrow.......................................................................................................... 2-30
2.3.2
Administrative State Modification ......................................................................................... 2-31
Neighbor................................................................................................................................ 2-32 2.4.1
2.5
2.6
Neighbor Management ......................................................................................................... 2-32
Software ................................................................................................................................ 2-36 2.5.1
Package Upgrade ................................................................................................................. 2-36
2.5.2
Verify ...................................................................................................................................... 2-38
2.5.3
Software Update.................................................................................................................... 2-40
2.5.4
Firmware Update ................................................................................................................... 2-41
2.5.5
History .................................................................................................................................... 2-43
2.5.6
Schedule ................................................................................................................................ 2-45
Data Audit.............................................................................................................................. 2-47 2.6.1
Data Audit .............................................................................................................................. 2-47
2.6.2
Scheduling Function for Periodical Data Audit .................................................................... 2-50
2.7
SerialNo Management .......................................................................................................... 2-53
2.8
System Backup ..................................................................................................................... 2-55 2.8.1
Backup ................................................................................................................................... 2-55
2.8.2
Restore .................................................................................................................................. 2-56
2.8.3
System Backup History......................................................................................................... 2-58
CHAPTER 3. Fault Management
3-1
3.1
Event Viewer ........................................................................................................................... 3-1
3.2
Viewing the Event History ..................................................................................................... 3-5
3.3
Current Alarm ......................................................................................................................... 3-7
3.4
Alarm Statistics .................................................................................................................... 3-10
3.5
Audible Alarm ....................................................................................................................... 3-12
3.6
Visible Alarm ......................................................................................................................... 3-14
CHAPTER 4. Performance Management 4.1
4-1
Performance Statistics........................................................................................................... 4-2
© SAMSUNG Electronics Co., Ltd.
IV
LSM-R User Manual
4.1.1
Viewing Statistics Data ............................................................................................................4-3
4.1.2
Viewing Statistics Chart ...........................................................................................................4-5
4.2
Collection Results.................................................................................................................. 4-8
4.3
PI Monitoring .......................................................................................................................... 4-9
4.4
4.5
4.3.1
PI Search ..................................................................................................................................4-9
4.3.2
PI Registration ........................................................................................................................ 4-11
4.3.3
PI Modification ........................................................................................................................4-13
4.3.4
PI Deletion ..............................................................................................................................4-14
4.3.5
PI Monitoring ..........................................................................................................................4-15
4.3.6
PI Trend Graph .......................................................................................................................4-16
On Demand Statistics .......................................................................................................... 4-17 4.4.1
On Demand Statistics View ...................................................................................................4-18
4.4.2
On Demand Statistics Registration .......................................................................................4-19
4.4.3
On Demand Statistics Deletion .............................................................................................4-21
4.4.4
On Demand Statistics Monitoring .........................................................................................4-22
Call Trace .............................................................................................................................. 4-24 4.5.1
Call Trace Window Configuration..........................................................................................4-24
4.5.2
Call Trace List Management..................................................................................................4-25
4.5.3
Call Trace Registration...........................................................................................................4-27
4.5.4
Call Trace Deletion .................................................................................................................4-28
4.5.5
Call Trace Monitoring .............................................................................................................4-29
4.5.6
Call Trace History View..........................................................................................................4-31
CHAPTER 5. General Management
5-1
5.1
Network Monitoring ............................................................................................................... 5-1
5.2
Process Management ............................................................................................................ 5-3
5.3
Resource Monitoring ............................................................................................................. 5-5
5.4
Resource Management.......................................................................................................... 5-6 5.4.1
CPU ..........................................................................................................................................5-6
5.4.2
Memory.....................................................................................................................................5-8
5.4.3
File System .............................................................................................................................5-10
5.4.4
Database ................................................................................................................................ 5-11
5.5
Resource Statistics.............................................................................................................. 5-14
5.6
Database ............................................................................................................................... 5-16 5.6.1
Log Management ...................................................................................................................5-16
5.7
Self Diagnosis ...................................................................................................................... 5-17
5.8
Log Viewer............................................................................................................................ 5-19
© SAMSUNG Electronics Co., Ltd.
V
LSM-R User Manual
CHAPTER 6. Security Management
6-1
6.1
User Manager .......................................................................................................................... 6-1
6.2
Changing Password ............................................................................................................... 6-5
6.3
Group Management ................................................................................................................ 6-6
6.4
IP Manager .............................................................................................................................. 6-9
6.5
Login History ........................................................................................................................ 6-13
6.6
6.5.1
History .................................................................................................................................... 6-13
6.5.2
Logon Session....................................................................................................................... 6-14
Operation History ................................................................................................................. 6-15
CHAPTER 7. SON
7-1
7.1
SON Option ............................................................................................................................. 7-1
7.2
SON Property .......................................................................................................................... 7-5
© SAMSUNG Electronics Co., Ltd.
VI
LSM-R User Manual
LIST OF FIGURES Figure 1.1 Log-in Window ...................................................................................................... 1-1 Figure 1.2
Main Window ......................................................................................................... 1-2
Figure 1.3 Log-out Button ....................................................................................................... 1-3 Figure 1.4
EMS Frame Configuration ..................................................................................... 1-4
Figure 1.5
Map Viewer of the Main Frame ............................................................................. 1-7
Figure 1.6
Tree Viewer Frame ................................................................................................ 1-7
Figure 1.7
System Viewer Frame ........................................................................................... 1-8
Figure 1.8
Event Viewer Frame .............................................................................................. 1-8
Figure 1.9
Example of Search Period Setting ........................................................................ 1-9
Figure 1.10
Calendar Window ................................................................................................ 1-9
Figure 1.11
Tree Viewer ........................................................................................................1-11
Figure 1.12
Tree Viewer ....................................................................................................... 1-12
Figure 1.13
Map Viewer ....................................................................................................... 1-14
Figure 1.14
Legend .............................................................................................................. 1-15
Figure 1.15
Status ................................................................................................................ 1-16
Figure 1.16
eNB Tooltip ........................................................................................................ 1-17
Figure 1.17
Rack Viewer Window ........................................................................................ 1-19
Figure 1.18
Main Board Alarms ............................................................................................ 1-20
Figure 1.19
RRH Configuration and Alarms ......................................................................... 1-20
Figure 1.20
RRH Grow Context Menu .................................................................................. 1-21
Figure 1.21
RRH Grow CLI Edit Dialog Window .................................................................. 1-21
Figure 1.22
RRH Degrow Context Menu .............................................................................. 1-22
Figure 1.23
RRH Degrow Password Confirmation ............................................................... 1-22
Figure 1.24
Reset Context Menu.......................................................................................... 1-23
Figure 1.25
Inventory Menu.................................................................................................. 1-24
Figure 1.26
Inventory ........................................................................................................... 1-24
Figure 1.27
Alarm Inhibit/Allow Context Menu...................................................................... 1-25
Figure 1.28
Alarm Inhibit/Allow Dialog .................................................................................. 1-25
Figure 1.29
Alarm Inhibit/Allow Modification ......................................................................... 1-26
Figure 1.30
Alarm Inhibit/Allow Result Dialog....................................................................... 1-26
Figure 1.31
Registering Groups ........................................................................................... 1-27
Figure 1.32
Group Registration Result ................................................................................. 1-27
Figure 1.33
Modifying Group Information ............................................................................. 1-28
Figure 1.34
Deleting Groups ................................................................................................ 1-28
Figure 1.35
About EMS Window .......................................................................................... 1-29
Figure 2.1
CLI Window ........................................................................................................... 2-2
Figure 2.2
Selecting the Target ID .......................................................................................... 2-3
© SAMSUNG Electronics Co., Ltd.
VII
LSM-R User Manual
Figure 2.3
Selecting from Command Tree .............................................................................. 2-3
Figure 2.4
Entering Command ................................................................................................ 2-4
Figure 2.5
Execution History ................................................................................................... 2-4
Figure 2.6
Execution Result .................................................................................................... 2-5
Figure 2.7
Event Message Display ......................................................................................... 2-5
Figure 2.8
Command Window................................................................................................. 2-7
Figure 2.9
Command History Window .................................................................................... 2-9
Figure 2.10
Successful Execution of the Command ............................................................. 2-10
Figure 2.11
Unsuccessful Execution of the Command .......................................................... 2-10
Figure 2.12
Copying a Message ........................................................................................... 2-11
Figure 2.13
Saving a Message ............................................................................................. 2-11
Figure 2.14
Saving All Messages .......................................................................................... 2-12
Figure 2.15
Changing the Font ............................................................................................. 2-12
Figure 2.16
Selecting a Background Color ........................................................................... 2-13
Figure 2.17
Background Color Selection Result ................................................................... 2-13
Figure 2.18
Changing the Request Color .............................................................................. 2-14
Figure 2.19
Adding Filter ....................................................................................................... 2-15
Figure 2.20
AutoMessage Color Modification ....................................................................... 2-17
Figure 2.21
Batch Window .................................................................................................... 2-18
Figure 2.22
Command Input Error Dialog ............................................................................. 2-19
Figure 2.23
Executing a Batch Job ....................................................................................... 2-20
Figure 2.24
Batch Job Result (1) .......................................................................................... 2-20
Figure 2.25
Batch Job Result (2) .......................................................................................... 2-21
Figure 2.26
Saving a Batch File (1) ....................................................................................... 2-21
Figure 2.27
Saving a Batch File (2) ....................................................................................... 2-22
Figure 2.28
Opening a Batch File ......................................................................................... 2-22
Figure 2.29
Adding a Batch File Directory ............................................................................ 2-23
Figure 2.30
Macro Execution ................................................................................................ 2-24
Figure 2.31
Modifying the Macro (1) ..................................................................................... 2-25
Figure 2.32
Modifying the Macro (2) ..................................................................................... 2-25
Figure 2.33
Modifying the Macro (3) ..................................................................................... 2-25
Figure 2.34
Modifying the Macro (4) ..................................................................................... 2-25
Figure 2.35
Deleting the Macro (1) ....................................................................................... 2-26
Figure 2.36
Deleting the Macro (2) ....................................................................................... 2-26
Figure 2.37
Duplicated Macro Dialog .................................................................................... 2-26
Figure 2.38
NE Grow ............................................................................................................ 2-27
Figure 2.39
Grow Window(1) ................................................................................................ 2-28
Figure 2.40
Grow Window(2) ................................................................................................ 2-29
Figure 2.41
NE Degrow ........................................................................................................ 2-29
Figure 2.42
Cell Grow and Degrow ....................................................................................... 2-30
© SAMSUNG Electronics Co., Ltd.
VIII
LSM-R User Manual
Figure 2.43
Neighbor Management GUI .............................................................................. 2-32
Figure 2.44
Neighbor Import/Export GUI .............................................................................. 2-34
Figure 2.45
Neighbor Integrity Check ................................................................................... 2-35
Figure 2.46
Package Upgrade.............................................................................................. 2-36
Figure 2.47
Verify Window ................................................................................................... 2-38
Figure 2.48
Package Compare Information Window ............................................................ 2-39
Figure 2.49
S/W Update ....................................................................................................... 2-40
Figure 2.50
Firmware Update ............................................................................................... 2-41
Figure 2.51
History Window ................................................................................................. 2-43
Figure 2.52
Schedule Window.............................................................................................. 2-45
Figure 2.53
Configuration Information Sync ......................................................................... 2-47
Figure 2.54
Viewing the Configuration Information Synchronization .................................... 2-48
Figure 2.55
Selecting an eNB from the tree ......................................................................... 2-49
Figure 2.56
Verifying the eNB infor4-mation selected from Sync Data ................................. 2-49
Figure 2.57
Viewing the Scheduler ....................................................................................... 2-50
Figure 2.58
Adding Scheduler .............................................................................................. 2-51
Figure 2.59
Viewing the Scheduler ....................................................................................... 2-51
Figure 2.60
Date Selection Calendar ................................................................................... 2-51
Figure 2.61
Selecting the Scheduler Period ......................................................................... 2-51
Figure 2.62
SerialNo Management ....................................................................................... 2-53
Figure 2.63
Backup Window................................................................................................. 2-55
Figure 2.64
Execution Result of System Backup.................................................................. 2-55
Figure 2.65
Restore Window ................................................................................................ 2-56
Figure 2.66
Selecting File to restore ..................................................................................... 2-57
Figure 2.67
Execution Result of Restoring ........................................................................... 2-57
Figure 2.68
System Backup History Window........................................................................ 2-58
Figure 3.1
Event Viewer Window ........................................................................................... 3-1
Figure 3.2
Event Viewer Filter Window .................................................................................. 3-3
Figure 3.3
Detailed Event Information Window ...................................................................... 3-4
Figure 3.4
Event History Window ........................................................................................... 3-5
Figure 3.5
Current Alarm Window .......................................................................................... 3-7
Figure 3.6
Detailed Information of Current Alarm ................................................................... 3-9
Figure 3.7
Fault Statistics Window ....................................................................................... 3-10
Figure 3.8
Audible Alarm Window ........................................................................................ 3-12
Figure 3.9 Visible Alarm Setting Window .............................................................................. 3-14 Figure 3.10
Visible Alarm Output Window ............................................................................ 3-15
Figure 3.11
Setting the Visible Alarm by Fault Code............................................................. 3-16
Figure 3.12
Selecting the Visible Alarm Code ...................................................................... 3-17
Figure 4.1
Selecting the Performance Menu .......................................................................... 4-1
© SAMSUNG Electronics Co., Ltd.
IX
LSM-R User Manual
Figure 4.2
Statistics Data View Window.................................................................................. 4-2
Figure 4.3
Filter Setting ........................................................................................................... 4-4
Figure 4.4
Statistics Chart ....................................................................................................... 4-5
Figure 4.5
Disabling the Graph Overlap .................................................................................. 4-6
Figure 4.6
Chart Option Setting .............................................................................................. 4-6
Figure 4.7
PM Collection Results ............................................................................................ 4-8
Figure 4.8
PI Management...................................................................................................... 4-9
Figure 4.9
PI Registration ..................................................................................................... 4-11
Figure 4.10
PI Registration Result ........................................................................................ 4-12
Figure 4.11
PI Modification.................................................................................................... 4-13
Figure 4.12
PI Deletion ......................................................................................................... 4-14
Figure 4.13
PI Monitoring ...................................................................................................... 4-15
Figure 4.14
PI Trend Graph .................................................................................................. 4-16
Figure 4.15
On Demand Statistics Management .................................................................. 4-17
Figure 4.16
On Demand Statistics Management Screen ...................................................... 4-18
Figure 4.17
On Demand Statistics Registration Screen ........................................................ 4-19
Figure 4.18
On Demand Statistics Deletion Result Window ................................................. 4-21
Figure 4.19
On Demand Statistics Monitoring Screen .......................................................... 4-22
Figure 4.20
Chart Option Setting .......................................................................................... 4-23
Figure 4.21
Trace Main Window ........................................................................................... 4-24
Figure 4.22
Selecting the Target ID ....................................................................................... 4-25
Figure 4.23
Trace List View Window ..................................................................................... 4-25
Figure 4.24
Trace Registration .............................................................................................. 4-27
Figure 4.25
Deleting a Trace ................................................................................................. 4-28
Figure 4.26
Starting the Trace Monitoring ............................................................................. 4-29
Figure 4.27
Trace Message Details ...................................................................................... 4-30
Figure 4.28
Viewing the Trace History .................................................................................. 4-31
Figure 5.1
Network Monitoring Window .................................................................................. 5-1
Figure 5.2
Process Monitoring Window .................................................................................. 5-3
Figure 5.3
Resource Monitoring Window ................................................................................ 5-5
Figure 5.4
CPU Window ......................................................................................................... 5-6
Figure 5.5
CPU Details Window.............................................................................................. 5-7
Figure 5.6
Memory Window .................................................................................................... 5-8
Figure 5.7
File System Window ............................................................................................ 5-10
Figure 5.8
Database Window ................................................................................................ 5-11
Figure 5.9
Resource Statistics Window ................................................................................ 5-14
Figure 5.10
Log Management Window ................................................................................. 5-16
Figure 5.11
Self Diagnostic Window ..................................................................................... 5-17
Figure 5.12
Log Viewer Window (1) ...................................................................................... 5-19
© SAMSUNG Electronics Co., Ltd.
X
LSM-R User Manual
Figure 5.13
Log Viewer Window (2) ..................................................................................... 5-19
Figure 5.14
Log Viewer Window (3) ..................................................................................... 5-20
Figure 6.1
Operator Management Window ............................................................................ 6-1
Figure 6.2
Operator Registration Window .............................................................................. 6-2
Figure 6.3
Operator Information Change Window .................................................................. 6-3
Figure 6.4
Operator Information Deletion Window ................................................................. 6-4
Figure 6.5
Operator Lockout Window ..................................................................................... 6-4
Figure 6.6
Changing Password Window ................................................................................ 6-5
Figure 6.7
Group Management Window ................................................................................. 6-6
Figure 6.8
Group Addition Window ......................................................................................... 6-7
Figure 6.9
Group Information Change Window ...................................................................... 6-8
Figure 6.10
Group Deletion Window ...................................................................................... 6-8
Figure 6.11
IP Management Window...................................................................................... 6-9
Figure 6.12
IP Registration Window ..................................................................................... 6-10
Figure 6.13
IP Information Change Window ..........................................................................6-11
Figure 6.14
IP Deletion Window ........................................................................................... 6-12
Figure 6.15
History Window ................................................................................................. 6-13
Figure 6.16
Logon Session Window ..................................................................................... 6-14
Figure 6.17
Operation History Window ................................................................................. 6-15
Figure 7.1
SON Management Window ................................................................................... 7-2
Figure 7.2
SON Option Search Criteria Selection .................................................................. 7-3
Figure 7.3
Changing SON Option........................................................................................... 7-3
Figure 7.4
Batch Modifying SON Option ................................................................................ 7-4
Figure 7.5
SON Property Window .......................................................................................... 7-5
Figure 7.6
SON Property Window Failure Verification ............................................................ 7-7
© SAMSUNG Electronics Co., Ltd.
XI
LSM-R User Manual
CHAPTER 1. EMS Interface
This chapter describes the Graphic User Interface (GUI) of the EMS and the basic method needed for the operation of the system.
1.1 Connecting to EMS Describes the log-in and log-out procedures.
1.1.1 Login The log-in procedure for the EMS operation is explained below: 1)
Open Microsoft Internet Explorer to connect to EMS.
Recommended Requirements for EMS Client The client machine should be running Windows 7 and Internet Explorer 8. The Java version should be JRE 1.6.0_20.
2)
Enter the IP address of the EMS server in the address field of the Internet Explorer and press Enter to bring up the log-in window. (https ://{ ip.address})
Figure 1.1 Log-in Window
© SAMSUNG Electronics Co., Ltd.
1-1
LSM-R User Manual
3)
Enter the operator‟s User id and Password in the input fields of the login window and click the Login button.
4)
Once the log-in information is verified, the EMS will be executed and the main window will be displayed.
Figure 1.2 Main Window
Internet Explorer Settings If a message reading ‘Downloads from this site to the computer is blocked by Internet Explorer for security purpose. Click here to view the options.’ appears for a short time in the Internet Explorer, change the Internet options as follows: - In the Internet Explorer, go to Tools Internet Options Security Custom Level. Under Downloads > ‘Automatic prompting for file downloads’, select ‘Enable’. Under ActiveX Controls and Plug-ins > ‘Automatic prompting for ActiveX controls’, select ‘Allow’. - In the Internet Explorer, go to Tools > Internet Options > Privacy > Pop-up Blocker. Then, check the ‘Block pop-ups’ option.
© SAMSUNG Electronics Co., Ltd.
1-2
LSM-R User Manual
1.1.2 Logout The EMS logout procedure is as follows:
Figure 1.3 Log-out Button
1)
Among the buttons shown on the upper right corner of the EMS window, click Logout. A log-out confirmation message will be displayed. 2) Click „OK‟ to log-out.
© SAMSUNG Electronics Co., Ltd.
1-3
LSM-R User Manual
1.2 Interface Configuration The EMS main window consists of the following five frames: Menu Frame Main Frame Tree Viewer Frame System Viewer Frame Event Viewer Frame
Menu Frame
Tree Viewer Frame
System Viewer Frame
Main Frame
Event Viewer Frame
Figure 1.4 EMS Frame Configuration
© SAMSUNG Electronics Co., Ltd.
1-4
LSM-R User Manual
1.2.1 Menu Frame The EMS menu consists of 6 management groups. The EMS menu frame displays the entire EMS management groups, and allows the execution of various commands for each management group. It also provides other additional functions. The menu frame consists of the following elements:
: Project title
: User information (user ID and group) : Additional function buttons
: User menu : Toolbar buttons for main menus : Controls the audible alarm : Hides/shows a specific frame in the main window : Checks connection status between the server and client Additional Function Buttons Buttons for additional functions are as follows: Button
Description Shows the site map to see the entire EMS structure. Provides the help. Logs out from the currently connected EMS.
© SAMSUNG Electronics Co., Ltd.
1-5
LSM-R User Manual
Toolbar Buttons Buttons for the direct link to the principal menus are as follows: Button
Description Links to the server’s resource management function.
Links to the network management function.
Audible Alarm Control Buttons Buttons for the audible alarm control are as follows: Button
Description On/Off control of the audible alarm. Turns off the currently active audible alarm.
Hide/Show Frame Buttons Buttons for hiding/showing frames are as follows: Button
Description Hides/shows the system viewer frame. Hides/shows the event viewer frame.
© SAMSUNG Electronics Co., Ltd.
1-6
LSM-R User Manual
1.2.2 Main Frame The main frame displays the map viewer among the network viewers. Once the operator executes a command in the menu frame, the corresponding function window will be displayed in the main frame.
Figure 1.5 Map Viewer of the Main Frame
1.2.3 Tree Viewer Frame The tree viewer frame displays the network elements in tree format.
Figure 1.6 Tree Viewer Frame
© SAMSUNG Electronics Co., Ltd.
1-7
LSM-R User Manual
1.2.4 Event Viewer Frame The System Viewer frame displays EMS resource status, representative alarm of node, and number of managed NE.
Figure 1.7 System Viewer Frame
1.2.5 Event Viewer Frame The event viewer frame shows the various errors collected by the EMS to the operator.
Figure 1.8 Event Viewer Frame
Event Viewer Frame Refer to ‘Event Viewer’ for specific details about the event viewer frame.
© SAMSUNG Electronics Co., Ltd.
1-8
LSM-R User Manual
1.3 Basic Operation This section describes the basic elements for the operation of the EMS.
1.3.1 Button The command buttons used in EMS are designed to run the same functions in different window. The command buttons commonly used in the EMS are as follows: Button
Description
Add
Adds new data.
Apply
Sets the properties for the data and/or function.
Close
Closes the window.
Delete
Deletes the data.
OK
Confirms and executes the command.
Search
Searches the data that have been previously configured or saved.
Set
Sets the properties for the data and/or function.
1.3.2 Basic Settings The operator will typically perform a series of configuration while executing the EMS functions. Some tasks require the operator to set the search period.
Figure 1.9 Example of Search Period Setting
The date can either be directly entered in the text box in the required format or be selected in the calendar by clicking the calendar button and click „Apply‟ button.
Figure 1.10 Calendar Window
© SAMSUNG Electronics Co., Ltd.
1-9
LSM-R User Manual
1.3.3 Sitemap EMS provides a site map to assist the operator through the operation menu. The site map gives an overall view of the menu configuration and allows the operator to execute the desired function directly from the map.
© SAMSUNG Electronics Co., Ltd.
1-10
LSM-R User Manual
1.4 Network Viewer The network viewer provides various functions to assist the operation of the network elements. The network viewer consists of tree viewer, map viewer and rack viewer. Network Elements Network elements are called „nodes‟, and they are classified by hierarchy. Node
Description
EMS
A node used to indicate the top parent class in the Tree Viewer.
Group
A node used to manage NE by grouping them
NE
A node representing a specific system.
Rack
The rack class of the NE.
Shelf
The shelf class of the NE.
Board
A node the represents the board, which is the unit of the NE.
Node and Configuration The NE and the board are the nodes that represent physical configurations. The remainders represent the virtual class hierarchy added for easier management of the system.
1.4.1 Tree Viewer The tree viewer displays the network elements in tree format.
Figure 1.11 Tree Viewer
© SAMSUNG Electronics Co., Ltd.
1-11
LSM-R User Manual
Select a specific node in the tree viewer, then right-click it. A popup menu for the corresponding node will be displayed within the tree viewer.
Figure 1.12 Tree Viewer
Icons The tree viewer uses the following icons to indicate the parent-child relationship between the networks and to display the alarms. The tree viewer of the main window will display up to the shelf level. In the function window, it will display up to the board level as necessary. Normal
Critical
Major
Minor
Disabled
(Blue)
(Red)
(Orange)
(Yellow)
(Gray)
Rack
-
-
-
-
-
Shelf
-
-
-
-
-
Node EMS Group eNB
Board
© SAMSUNG Electronics Co., Ltd.
-
1-12
LSM-R User Manual
Displaying Representative Alarm The NE will be shown as disabled if the IP ping and SNMP ping results are abnormal. The representative alarm will not be displayed when the NE is in disabled state.
NE Sorting
1) Select „Sort‟ from the top of the tree viewer (available by name and IP). 2) The NE of the tree viewer will be sorted accordingly. NE Search
Select „Search‟ from the top of the tree viewer. Enter the content to be searched in the text field and press the Enter key. The Search supports partial search option. Search terms are case-sensitive. 3) The corresponding NE in the tree viewer will be selected. 4) Press the Enter key again, the next NE will be selected. 1) 2)
© SAMSUNG Electronics Co., Ltd.
1-13
LSM-R User Manual
1.4.2 Map Viewer The map viewer displays the eNB class among the network elements in grid map format. The status map consists of the following four elements: A toolbox providing the tool functions, a status providing the status of the overall eNBs, a grid map displaying all the eNBs along with the overall alarm status for each eNB, and an eNB information showing the basic information of the selected eNB.
Figure 1.13 Map Viewer
© SAMSUNG Electronics Co., Ltd.
1-14
LSM-R User Manual
Toolbox Refresh Gets the tree list of the main window again to re-display the status map. Legend Provides the description of the alarms and symbols used in the status map. The information shown in legend is as follows:
Figure 1.14 Legend
Server Time Shows the time of the EMS server, not the time of the device logged in with the WEB EMS (web client).
© SAMSUNG Electronics Co., Ltd.
1-15
LSM-R User Manual
Status Displays the status and alarm information of the eNB shown in the status map.
Figure 1.15 Status
The status icons provide the following information: Status
Description
Total
Number of all eNBs registered to the LSM (LTE System Manager).
In svc
Number of eNB in normal call processing.
SH.down
Number of eNB which wireless resource is preparing to be blocked.
Lock
Number of eNB which wireless resource is currently blocked.
Dis conn
Number of eNB in ping down state.
Not init
Number of eNB in SNMP up state, for which the initialization is not complete.
Cri
Number of eNB which representative alarm is in critical state.
Maj
Number of eNB which representative alarm is in major state.
Min
Number of eNB which representative alarm is in minor state.
Normal
Number of eNB with no alarm.
Basic Information of eNB Find eNB Allows to find an eNB equipment with its name. A partial name search function is also provided. Name Displays the name of the eNB equipment. ID Shows the system ID of the eNB equipment. IP Address Shows the IP address of the eNB equipment.
© SAMSUNG Electronics Co., Ltd.
1-16
LSM-R User Manual
Grid Viewer Tooltip Shows a brief description of the eNB that the mouse cursor is pointing at.
Figure 1.16 eNB Tooltip
The right-click popup for the registered grid map cell. Provides the following functions for the selected eNB: Menu
Description
NE Information
Displays the basic information of the selected eNB equipment.
Rack Viewer
Displays the rack viewer information of the selected eNB equipment.
Failure Sync
Attempts to sync the failure information for the selected eNB equipment.
NE Information
Attempts to initialize (sync) the NE information of the selected eNB
Loading
equipment.
Cell Management
Displays the cell management information of the selected eNB equipment.
PI Monitoring
Displays the PI monitoring information.
NE Reset
Attempts to run the reset command on the selected eNB equipment.
Remote Reset
Attempts to run the remote reset command on the selected eNB equipment.
General
Displays the Main Window General Surveillance information.
Surveillance Security User
Displays the Main Window Security User Management information.
Management AdministrativeState
Attempts to run the command to block the wireless resource of the
Locked
selected eNB equipment.
AdministrativeState
Attempts to run the command to release the blocked wireless resource of
Unlocked
the selected eNB equipment.
AdministrativeState
Attempts to run the command to prepare to block the wireless resource of
Shuttingdown
the selected eNB equipment.
Delete NE
Deletes the selected eNB equipment.
Force Delete NE
Force delete the disconnected eNB equipment.
© SAMSUNG Electronics Co., Ltd.
1-17
LSM-R User Manual
The right-click popup for the dismounted grid map cell. Allows to register a new eNB equipment. Menu
Description
Grow
Displays the eNB equipment registration window.
Cell Status The grid viewer displays the eNB alarms in following colors: Alarm Color
Description
Red
Critical alarm information.
Orange
Major alarm information.
Yellow
Minor alarm information.
Blue
Normal alarm information.
The grid viewer displays the eNB status with the following symbols: Status
Description
X
Ping down state.
?
SNMP up state, initialization incomplete.
L
Wireless resource preparing to be blocked.
S
Wireless resource blocked.
About the ‘X’ state The NE will be shown as disabled if the IP ping and SNMP ping results are abnormal. The representative alarm will not be displayed when the NE is in disabled state.
© SAMSUNG Electronics Co., Ltd.
1-18
LSM-R User Manual
1.4.3 Rack Viewer You can display the Rack Viewer to check status of rack and board using the context menu displayed when you right-click an NE in the Tree Viewer or double-click an NE in the Map Viewer. The rack viewer provides the following functions: Displays the rack configuration information and current alarm information. Displays the board configuration information and current alarm information. Displays the representative alarm of the board. Displays the RRH configuration information and current alarm information. Displays a popup menu to grow the RRH. Displays a popup menu to degrow the RRH. Displays a popup menu to reset the resource. Displays a popup menu for the resource inventory. Displays a popup menu to inhibit/allow the alarm.
Displaying Current Alarm Information The rack viewer does not reflect the current alarm information in real time. It searches the database and shows the corresponding information when the node is double-clicked.
Figure 1.17 Rack Viewer Window
© SAMSUNG Electronics Co., Ltd.
1-19
LSM-R User Manual
Rack Configuration and Current Alarms 1) Click the rack in the left pane of the Rack Viewer. 2) The node information and current alarm information are displayed in the right pane. Board Configuration and Current Alarms 1) Double-click the board in the left pane of the Rack Viewer. 2) The node information and current alarm information for the board are displayed in the right pane. Main Board Alarms Normal (None)
Critical (Red)
Major (Orange)
Minor (Yellow)
Figure 1.18 Main Board Alarms
RRH Configuration and Current Alarms 1) Click the „RRH‟ tab in the right pane of the Rack Viewer. 2) This displays the RRH information and current alarms for the board.
Figure 1.19 RRH Configuration and Alarms
© SAMSUNG Electronics Co., Ltd.
1-20
LSM-R User Manual
Popup menu to grow the RRH 1) 2) 3) 4)
Click the „RRH‟ tab in the right pane of the Rack Viewer. Select and right-click the RRH to grow. Select „Create RRH‟ in the context menu. In the CLI Edit Dialog popup window, select the desired option and click „Execute‟.
Figure 1.20 RRH Grow Context Menu
Figure 1.21 RRH Grow CLI Edit Dialog Window
© SAMSUNG Electronics Co., Ltd.
1-21
LSM-R User Manual
Context Menu to Degrow the RRH 1) 2) 3) 4)
Click the „RRH‟ tab in the right pane of the Rack Viewer. Select and right-click the RRH to degrow. Select „Delete RRH‟ in the context menu. Enter the password in the password confirmation window and click „OK‟.
Figure 1.22 RRH Degrow Context Menu
Figure 1.23 RRH Degrow Password Confirmation
© SAMSUNG Electronics Co., Ltd.
1-22
LSM-R User Manual
Context Menu to Reset Resources The rack viewer provides a popup menu to reset the resources including the board resource. 1) 2) 3)
Select and right-click the board in the left pane of the Rack Viewer. Select „Reset‟ in the context menu. A window will pop up to display the command execution result.
Figure 1.24 Reset Context Menu
© SAMSUNG Electronics Co., Ltd.
1-23
LSM-R User Manual
Popup menu for the resource inventory The rack viewer provides a popup menu to view the resource inventory including the board resource. 1) Select and right-click the board in the left pane of the Rack Viewer. 2) Select „Inventory‟ in the context menu. 3) The Inventory dialog window will pop up to display the command execution result.
Figure 1.25 Inventory Menu
Figure 1.26 Inventory
© SAMSUNG Electronics Co., Ltd.
1-24
LSM-R User Manual
Popup menu to inhibit/allow the alarm. The rack viewer provides a popup menu to inhibit/allow alarms for the resources including the board resource. 1)
Select and right-click the board in the left pane of the Rack Viewer.
2)
Select „Alarm Inhibit/Allow‟ in the context menu.
3) The Alarm Inhibit/Allow dialog window will pop up to display the command execution result.
Figure 1.27 Alarm Inhibit/Allow Context Menu
Figure 1.28 Alarm Inhibit/Allow Dialog
© SAMSUNG Electronics Co., Ltd.
1-25
LSM-R User Manual
4)
Click on the „Status‟ item of the alarm type you wish to modify from the displayed list, then select „INHIBIT/ALLOW‟.
5)
Click „Apply‟ to apply the change.
6) A dialog window will pop up to display the application result for each corresponding item.
Figure 1.29 Alarm Inhibit/Allow Modification
Figure 1.30 Alarm Inhibit/Allow Result Dialog
© SAMSUNG Electronics Co., Ltd.
1-26
LSM-R User Manual
1.4.4 Group Management The tree viewer provides a popup menu to register, modify and/or delete groups. Registering Groups 1)
Right-click the EMS node of the tree viewer to display a popup menu, then select „Create Network‟.
2)
When the information Input Window is displayed, enter the name and position and click „OK‟.
Figure 1.31 Registering Groups
3)
If the command is successful, the corresponding group will be added to the tree viewer.
Figure 1.32 Group Registration Result
© SAMSUNG Electronics Co., Ltd.
1-27
LSM-R User Manual
Modifying Group Information 1) Select „Network Information‟ from the group node popup menu of the tree viewer. 2) The node information window will be displayed. Enter the information in the node information window and click „OK‟. 3) If the command is successful, the corresponding group information will be applied to the tree viewer.
Figure 1.33 Modifying Group Information
Deleting Groups 1) Select „Network Information‟ from the group node popup menu of the tree viewer or map viewer. 2) When the password Input Window is displayed, enter the password of your log-in account. 3) Enter the password and click „OK‟. 4) If the command is successful, the corresponding group will be deleted from the tree
viewer and the map viewer. Figure 1.34 Deleting Groups
Restrictions on Deleting Groups A group can only be deleted if it has no NE registered to it.
© SAMSUNG Electronics Co., Ltd.
1-28
LSM-R User Manual
1.5 Help The Help allows to view the information of the EMS server. The server information provided by the Help menu is as follows: Sever version Sever copyright Server‟s management target
Figure 1.35 About EMS Window
© SAMSUNG Electronics Co., Ltd.
1-29
LSM-R User Manual
CHAPTER 2. Configuration Management
The configuration management allows the operator to view, modify, add and/or delete the NE information. The operator can check the current configuration and/or setup or control the NE with the functions provided in the configuration management. Also, the configuration management offers a CLI window supporting the operator commands.
2.1 CLI The CLI can be executed by selecting „Configuration‟ „CLI‟. The CLI is a module which allows the operator to execute the commands for the NE through the GUI.
2.1.1 CLI Configuration When the CLI is executed, the following information will be displayed. The CLI provides 3 types of layouts. The description in this manual is based on Layout 3 which includes all possible cases.
© SAMSUNG Electronics Co., Ltd.
2-1
LSM-R User Manual
Figure 2.1 CLI Window
Layout Selection You can select the layout using the following three methods: Menu & Icon
Description From the menu, click Layout. A sub-menu will be displayed as shown on the left. Select the desired layout. The layout of the window will be adjusted accordingly.
Select the desired layout icon in the toolbar. The layout of the window will be adjusted accordingly. Ctrl-1, 2, 3
In the CLI window, press Ctrl+1 (Layout 1), Ctrl+2 (Layout 2), or Ctrl+3 (Layout 3). The layout of the window will be adjusted accordingly.
© SAMSUNG Electronics Co., Ltd.
2-2
LSM-R User Manual
2.1.2 Basic CLI Functions Once the CLI is executed, the following window will be displayed. Selecting a Target In the initial CLI window, select the combo list of the target to select the target ID. The following tree will be displayed. Select the NE you wish to execute the command on.
Figure 2.2 Selecting the Target ID
Command Window : Click the corresponding button to activate the command tree input window. The command tree allows the operator to select the desired command from the tree. If you select a command from the command tree, the corresponding parameter attribute values will be displayed in the command parameter input window in the right pane.
Figure 2.3 Selecting from Command Tree
© SAMSUNG Electronics Co., Ltd.
2-3
LSM-R User Manual
Input Window To enter a command, proceed as follows: 1) 2)
Select a command from command tree, then enter the parameter. The command will be automatically created in the Input Window below command tree. Use the ↑ and ↓ keys to select a command from the command list.
Figure 2.4 Entering Command
Button
Description
Execute
Executes the selected/entered command.
Previous
Executes a command repeatedly by selecting a specific NE or group.
Repeat
Initializes the parameter values of the currently selected command.
Reset
Clears the input field’s data.
History Window You can re-execute the previously executed command as follows: 1) 2)
In the History window, double-click the previous command log. Use the ↑ and ↓ keys in the command Input Window to browse through the commands saved in the history list, select the desired command, then click „Execute‟. : Click the corresponding button to activate the history window.
Figure 2.5 Execution History
© SAMSUNG Electronics Co., Ltd.
2-4
LSM-R User Manual
Response Window The result of the command executed by the operator will be displayed as illustrated below.
Figure 2.6 Execution Result
Autonomous Window The alarm and status messages generated during the system operation will be displayed as illustrated below.
Figure 2.7 Event Message Display
© SAMSUNG Electronics Co., Ltd.
2-5
LSM-R User Manual
Exiting the CLI On the menu bar, click „File‟ „Close‟ to close the CLI window. The CLI can also be closed with the hot key „Ctrl-o‟.
© SAMSUNG Electronics Co., Ltd.
2-6
LSM-R User Manual
2.1.3 Command Window Searching for a Command 1) Select a target NE/Group from the top of the CLI. 2) In the command window, select the Search tab. 3) Select the Command Search mode or the Parameter Search mode. 4) The Command Search mode will search for the command which matches the input string. 5) Click on the searched command. 6) The selected command will be entered as the input command.
Figure 2.8 Command Window
The command input window provides the following functions: Displays the command search failure. Restricts the command execution if the mandatory parameter is not entered. Parameter Filtering: Restricts the input of the parameter value exceeding the allowed range. Allows to input a numeric type parameter. Allows to input an enum type parameter.
© SAMSUNG Electronics Co., Ltd.
2-7
LSM-R User Manual
Allows to input a normal type parameter. Allows to input an IP type parameter Allows to input a date type parameter Verifies the command error. Allows to reset the parameter. Confirms the main command. Verifies the main command‟s Password. Restricts the execution permission by operator level. Allows to execute a command repeatedly on multiple NEs. Displays help when the operator enters a question mark (?). Displays a list of the commands beginning with the input string when the operator enters a command string in the Input Window. Applies the command searched in the Input Window. Allows to browse the command history in the Input Window. Allows to enter a command in lowercase.
© SAMSUNG Electronics Co., Ltd.
2-8
LSM-R User Manual
2.1.4 History Window On the toolbar, click the command execution history icon. The following command execution history window will be displayed Selecting a Command in the History Window 1) Click a command in the History Window. 2) The selected command will be displayed in the Input Window. Executing a Command in the History Window 1) Double-click a command in the History Window. 2) The command will be executed. Clearing the Execution History 1) After executing the command, right-click in the History Window. 2) Select „Remove All‟, „Remove Selected‟ or „Remove COMPLD Only‟. 3) The corresponding execution history will be deleted.
Figure 2.9 Command History Window
© SAMSUNG Electronics Co., Ltd.
2-9
LSM-R User Manual
2.1.5 Response Window Displaying Successful Command Execution Result 1) 2)
After a command is executed, the corresponding command will be displayed. If the execution of the command was successful, the result will be displayed in the Response Window.
Figure 2.10 Successful Execution of the Command
Displaying Unsuccessful Command Execution Result If the execution of the command was unsuccessful, the corresponding execution result will be displayed along with the reason of failure.
Figure 2.11 Unsuccessful Execution of the Command
© SAMSUNG Electronics Co., Ltd.
2-10
LSM-R User Manual
Copying a Message 1) 2) 3)
Select a specific area of the Response Window. Right-click the Response Window to display the context menu. Select „Copy‟ to copy the selected message.
Figure 2.12 Copying a Message
Saving a Message 1) Select a specific area of the Response Window. 2) Right-click the Response Window to display the context menu. 3) Select „Save‟, designate a path in the dialog window, then click „OK‟. 4) The selected message will be saved in the designated path.
Figure 2.13 Saving a Message
© SAMSUNG Electronics Co., Ltd.
2-11
LSM-R User Manual
Saving All Messages 1) 2) 3)
Right-click the Response Window to display the context menu. Select „SaveAll‟, designate a path in the dialog window, then click „OK‟. All messages of the Response Window will be saved in the designated path.
Figure 2.14 Saving All Messages
Clearing a Message 1) 2) 3)
Right-click the Response Window to display the context menu. Select „Clear‟. All messages in the Response Window will be cleared.
Changing the Font 1) Right-click the Response Window to display the context menu. 2) Select „Change Font‟, and select the desired font from the dialog window. 3) The message will be displayed in the selected font.
Figure 2.15 Changing the Font
© SAMSUNG Electronics Co., Ltd.
2-12
LSM-R User Manual
Changing the Background 1) 2) 3)
Right-click the Response Window to display the context menu. Select „Change Background‟. Select the desired color from the Color Chooser dialog window.
Figure 2.16 Selecting a Background Color
4) The background of the Response Window will be displayed in the specified color.
Figure 2.17 Background Color Selection Result
© SAMSUNG Electronics Co., Ltd.
2-13
LSM-R User Manual
Changing the Request Color 1) Right-click the Response Window to display the context menu. 2) Select „Change Message Color‟. 3) Select „REQUEST COLOR‟. 4) Select the desired color from the Color Chooser dialog window. 5) The request will be displayed in the specified color.
Figure 2.18 Changing the Request Color
Changing the Response Color 1) Right-click the Response Window to display the context menu. 2) Select „Change Message Color‟. 3) Select „RESPONSE COLOR‟. 4) Select the desired color from the Color Chooser dialog window. 5) The response will be displayed in the specified color. Changing the Error Color 1) Right-click the Response Window to display the context menu. 2) Select „Change Message Color‟. 3) Select „ERROR COLOR‟. 4) Select the desired color from the Color Chooser dialog window. 5) Check if the error is displayed in the specified color. Pause On 1) 2)
Right-click the Response Window to display the context menu. Selecting „Pause‟ will pause the response message at current state.
Pause Off 1) Right-click the Response Window in „PauseOn‟ state to display the context menu. 2) Selecting „PauseOff‟ will resume the paused response message. © SAMSUNG Electronics Co., Ltd.
2-14
LSM-R User Manual
2.1.6 Autonomous Window The Autonomous window will display the autonomous messages occurring from the equipment. Adding Filter 1) Right-click the event window to display the context menu. 2) Select „Add Filter‟. 3) Select a target in the Add Filter window. 4) The filter window of the corresponding target will be added. 5) The added window will only display the events of the selected target.
Figure 2.19 Adding Filter
Copying Event 1) 2) 3)
Select a specific area of the event window. Right-click the event window to display the context menu. Select „Copy‟.
Saving Event 1) 2) 3) 4)
Select a specific area of the event window. Right-click the event window to display the context menu. Select „Save‟. Designate a path to save the event.
© SAMSUNG Electronics Co., Ltd.
2-15
LSM-R User Manual
Saving All Events 1) 2) 3)
Right-click the event window to display the context menu. Select „Save All‟. Designate a path in the dialog window to save the events.
Clearing Event 1) 2) 3)
Right-click the event window to display the context menu. Select „Clear‟. All messages in the event window will be cleared.
Pause On 1) 2)
Right-click the event window to display the context menu. Selecting „Pause‟ will pause the output event at current state.
Pause Off 1) 2)
Right-click the event window in „PauseOn‟ state to display the context menu. Selecting „Pause Off‟ will resume the paused event.
Changing Font 1) Right-click the event window to display the context menu. 2) Select „Change Font‟. 3) Select the desired font in the dialog window. 4) The message will be displayed in the specified font. Changing Background 1) Right-click the event window to display the context menu. 2) Select „Change Background‟. 3) Select the desired color in the dialog window. 4) The background of the event window will be displayed in the specified color. Changing Critical Alarm Color 1) Right-click the event window to display the context menu. 2) Select „Change AutoMessage Color‟. 3) Select „CRITICAL ALARM COLOR‟. 4) Select the desired color from the Color Chooser dialog window. 5) The Critical Alarm will be displayed in the selected color. Changing Major Alarm Color 1) Right-click the event window to display the context menu. 2) Select „Change AutoMessage Color‟. 3) Select „MAJOR ALARM COLOR‟. 4) Choose a desired color from the „Color Chooser Dialog‟ window. 5) The Major Alarm is displayed in the specified color.
© SAMSUNG Electronics Co., Ltd.
2-16
LSM-R User Manual
Changing Minor Alarm Color 1) Right-click the event window to display the context menu. 2) Select „Change AutoMessage Color‟. 3) Select „MINOR ALARM COLOR‟. 4) Choose a desired color from the „Color Chooser Dialog‟ window. 5) The Minor Alarm is displayed in the specified color.
Figure 2.20 Auto Message Color Modification
Changing Alarm Clear Color 1) Right-click the event window to display the context menu. 2) Select „Change AutoMessage Color‟. 3) Select „ALARM CLEAR COLOR‟. 4) Choose a desired color from the „Color Chooser Dialog‟ window. 5) The specified color will be displayed when the alarm is cleared. Changing Status Event Color 1) Right-click the event window to display the context menu. 2) Select „Change AutoMessage Color‟. 3) Select „STATUS COLOR‟. 4) Select the desired color from the Color Chooser dialog window. 5) The status will be displayed in the specified color.
© SAMSUNG Electronics Co., Ltd.
2-17
LSM-R User Manual
2.1.7 Batch Window Click the batch icon ( ) on the toolbar to display the „Batch Window‟ as shown below. The Batch Window allows the operator to save a list of commands to be executed in batch.
Figure 2.21 Batch Window
Adding a Batch Job Adding from the command tree 1) Select a command from the command window. 2) Click „Add‟ in the Batch Window. 3) The selected command will be added to the batch job. Adding a Batch Job in the History Window 1) Select a command in the History Window. 2) Click „Add‟ in the Batch Window. 3) The selected command will be added to the batch job. Adding a Batch Job from the Input Window 1) Enter a command in the Input Window. 2) Click „Add‟ in the Batch Window. 3) The entered command will be added to the Batch Window.
© SAMSUNG Electronics Co., Ltd.
2-18
LSM-R User Manual
If an invalid command is entered in the Input Window while adding the commands in the batch job, the following error dialog will be displayed.
Figure 2.22 Command Input Error Dialog
Specifying the Batch Job Interval 1) Select a command from the command window. 2) Specify a value for the „Gap‟ in the Batch Window. 3) Click „Add‟ in the Batch Window. 4) The selected command will be added to the batch job with the specified interval. Deleting a Batch Job 1) Select a command in the Batch Window. 2) Click „Delete‟ in the Batch Window. 3) The selected command will be deleted from the Batch Window. Modifying a Batch Job Modifying a target in the batch job 1) Select a command in the Batch Window. 2) Modify the target in the target window. 3) Click „Modify‟ in the Batch Window. 4) The batch job will be changed with the new target. Modifying a command in the batch job 1) Select a command in the Batch Window. 2) Select a command to modify from the command window. (You may also select a command in the History Window or enter it in the Input Window.) 3) Click „Modify‟ in the Batch Window. 4) The batch job will be changed with the new command. Modifying the batch job execution interval 1) Select a command in the Batch Window. 2) Change a value for the „Gap‟ in the Batch Window. 3) Click „Modify‟ in the Batch Window. 4) The execution interval of the corresponding command in the batch job will be changed. Changing the Batch Job Order 1) Select a command in the Batch Window. 2) Click the up/down arrows in the Batch Window. 3) The batch job‟s command execution order will be changed.
© SAMSUNG Electronics Co., Ltd.
2-19
LSM-R User Manual
Executing a Batch Job 1)
In the target, select the NE to execute the batch job, then click „Apply‟. (Select the checkbox in the tree to select multiple NEs.)
2)
Add a command to the batch job list.
3)
Click „Start‟.
Figure 2.23 Executing a Batch Job
4) The corresponding command execution result will be displayed in the Response Window.
Figure 2.24 Batch Job Result (1)
© SAMSUNG Electronics Co., Ltd.
2-20
LSM-R User Manual
5) The command execution result will be displayed in the Batch Window.
Figure 2.25 Batch Job Result (2)
Stopping a Batch Job 1) Register a command to the batch list and click „Start‟. 2) While the command is being executed, click „Stop‟. 3) The execution of the command will be stopped. Saving a Batch File Saving the batch job list in a file 1)
Click „Save‟ in the Batch Window.
Figure 2.26 Saving a Batch File (1)
2)
Enter the file name in the popup window.
3)
Click „Save‟.
© SAMSUNG Electronics Co., Ltd.
2-21
LSM-R User Manual
4) The commands in the Batch Window will be saved in the specified file.
Figure 2.27 Saving a Batch File (2)
Checking the Batch File Redundancy 1) 2) 3) 4)
Click „Save‟ in the Batch Window. Enter an existing batch file name in the popup window. Click „Save‟. A Duplicated Batch File message will be displayed.
Opening a batch file Opening a batch file 1) Click „Open‟ in the Batch Window. 2) Select a file. 3) Click „Open‟. 4) The commands of the selected file will be applied to the Batch Window.
Figure 2.28 Opening a Batch File
© SAMSUNG Electronics Co., Ltd.
2-22
LSM-R User Manual
Adding a batch file directory 1) Click „Save‟ in the Batch Window. 2) Click on the Add Directory icon at the top right corner of the popup window. 3) Enter the directory name in the popup dialog window. 4) Click „OK‟. 5) The batch file directory will be added.
Figure 2.29 Adding a Batch File Directory
Deleting a Batch File Deleting a Batch File 1) Click „Save‟ in the Batch Window. 2) Select a batch file to delete from the popup window. 3) Click on the Delete icon at the top right corner of the window. 4) The batch file is deleted. Deleting a batch file directory 1) Click „Save‟ in the Batch Window. 2) Select a batch file directory to delete from the popup window. 3) Click on the Delete icon at the top right corner of the window. 4) The batch file directory is deleted.
© SAMSUNG Electronics Co., Ltd.
2-23
LSM-R User Manual
2.1.8 Macro Execution The macro execution icon allows the operator to add shortcut icons for the frequently used command lists and execute the registered commands by clicking on the shortcut icons.
Figure 2.30 Macro Execution
Adding the Macro Selecting a command from the command window to add to the macro list 1) Select a command from the tree in the command window. 2) Click „Macro‟. 3) The corresponding command will be added to the Macro List and its icon will be activated. Entering a Command in the Input Window to Add to the Macro List 1) Enter a command in the Input Window. 2) Click „Macro‟. 3) The corresponding command will be added to the Macro List and its icon will be activated. Applying the Macro 1) 2) 3) 4) 5)
Select a command from the macro list. The selected command will be applied to the command window. The input parameters of the selected command will be applied to the parameter window. The selected command will be applied to the Input Window. The Help for the selected command will be displayed on the Help window.
Executing the Macro Executing the macro in the same way as a basic command 1) Select a command from the macro list. 2) Click „Execute‟ in the Input Window. 3) The command‟s execution result will be displayed in the Response Window. (You can also execute the command by pressing the Enter key.) 4) The command‟s execution log will be displayed on the execution history window. Executing the macro with double-click You can execute a command by double-clicking the corresponding command icon in the macro list.
© SAMSUNG Electronics Co., Ltd.
2-24
LSM-R User Manual
Modifying the Macro 1)
Select an icon from the macro list.
Figure 2.31 Modifying the Macro (1)
2)
Right-click the icon and select „Edit‟.
Figure 2.32 Modifying the Macro (2)
3)
Enter a command in the Input Window.
4)
Click „OK‟.
Figure 2.33 Modifying the Macro (3)
5) The icon will be changed to the corresponding command in the macro list.
Figure 2.34 Modifying the Macro (4)
© SAMSUNG Electronics Co., Ltd.
2-25
LSM-R User Manual
Deleting the Macro 1)
Select an icon from the macro list.
2)
Right-click the icon and select „Delete‟.
Figure 2.35 Deleting the Macro (1)
3) The corresponding command will be deleted from the macro list.
Figure 2.36 Deleting the Macro (2)
Checking the Macro Command Redundancy 1) 2) 3)
Select a command which already exists in the macro list from the command window. Click „+‟. A Duplicated Macro command message will be displayed.
Figure 2.37 Duplicated Macro Dialog
Saving and Importing the Macro List for Each Operator 1) Register a command to the macro list. 2) Close the CLI window. 3) Select „Configuration‟ „CLI‟ to restart the CLI window. 4) The commands registered to the macro for each operator will be loaded.
© SAMSUNG Electronics Co., Ltd.
2-26
LSM-R User Manual
2.2 NE Grow/Degrow The tree viewer and map viewer provide a popup menu to register, modify and/or delete the NE.
2.2.1 NE Grow There are two methods to register the NE. One method is to select „Configuration‟ „Grow‟, the other method is to select the „Grow‟ context menu from the group node of the tree viewer or map viewer. A window to register the NE will then be displayed.
Figure 2.38 NE Grow
To enter the NE information, proceed as follows: 1)
Select „Grow‟ from the NE Node popup menu of the tree viewer or map viewer, or select „Configuration‟ „Grow‟ from the main menu.
© SAMSUNG Electronics Co., Ltd.
2-27
LSM-R User Manual
2)
Once the grow window appears, enter the NE information, then click „Next‟.
Figure 2.39 Grow Window (1)
Group
Item
Description
Group
-
Select the upper group where the NE belongs to.
Type
MACRO_OUTDOOR_RACK
macro outdoor rack type configuration
MACRO_OUTDOOR_DIST
Macro outdoor DU/RU separated configuration
PICO_OUTDOOR_RACK
Pico outdoor rack type configuration
MACRO_OUTDOOR_MIG
Macro outdoor migration configuration
MACRO_INDOOR_DIST
Macro indoor DU/RU separated configuration
-
Version of the NE. Manages the configuration in
Version
XML. ID *
-
The eNB ID value, 1-20 bit (1048575).
Serial No.
-
The eNB’s serial number
Name *
-
The NE name (unique within the system)
MM Type
-
Multi Mode Type
Bank Slot ID
-
The eNB’s Bank Slot ID
Location
-
System’s mount location
MME IP
-
IP address of MME
-
External connection port
Information External Link
© SAMSUNG Electronics Co., Ltd.
2-28
LSM-R User Manual
3)
In the second step window, enter the cell information. Click on each grid in the cell information window to add or delete a cell.
Figure 2.40 Grow Window (2)
4)
When you have finished entering all the cell information, click „Finish‟. A progress bar will be displayed to show the progress of the grow process. The process will be completed when the progress reached 100%.
Grow/Degrow Input Parameters For the detailed information on the grow/degrow input parameters, see the Network Resource Management (NRM) interface specification.
2.2.2 NE Degrow If you select „Delete NE‟ from the NE node popup menu of the tree viewer or map viewer, a password Input Window will be displayed. Enter the password and click „OK‟ to delete the corresponding NE.
Figure 2.41 NE Degrow
© SAMSUNG Electronics Co., Ltd.
2-29
LSM-R User Manual
2.3 Cell Management 2.3.1 Cell Grow and Degrow 1) There are two methods to launch the cell management window. One method is to select „Configuration‟ „Cell Management‟, the other method is to select the „Cell Management‟ context menu from the NE node of the tree viewer or map viewer. A window to perform the cell grow/degrow will then be displayed.
Figure 2.42 Cell Grow and Degrow
2)
Upon the initial cell management window launch, the cells in the cell information will be displayed in the following two types:
Cells in Grow status: The cells are displayed in yellow. If you right-click a cell and select „Cell Delete‟ from the popup window, the text „Delete‟ will appear in red in the State column of the Detail Cell Information section. Cells not in Grow status: The cells are displayed in white. If you click a cell, the color will be changed to pale yellow. A new row for the selected cell will be added to the Detail Cell Information section, and the text „Add‟ will appear in blue in the State column. Enter the information of the cell to add in each column of the newly added row. 3)
When you have finished entering all the delete/add information of each cell in the Detail Cell Information section, click „Apply‟. A progress bar will be displayed to show the progress of the cell grow/degrow process.
© SAMSUNG Electronics Co., Ltd.
2-30
LSM-R User Manual
2.3.2 Administrative State Modification You can change the administrative state of the cell in grow status to Locked or Unlocked from the cell management window. A Locked state cell will be shown with a lock on it. An UnLocked state cell will be shown without lock. Below is the procedure to change the locked/unlocked state: Locked Unlocked Change 1) 2)
Right-click a locked cell, and select „UnLock‟ from the popup window. A popup window will be displayed to show the administrative state modification status, and the change will be subsequently applied.
Unlocked Locked Change Right-click an unlocked cell (cell shown without lock), and select „Lock‟ or „Shutting Down‟ in the context menu. 2) A popup window will be displayed to show the administrative state modification status, and the change will be subsequently applied. 1)
© SAMSUNG Electronics Co., Ltd.
2-31
LSM-R User Manual
2.4 Neighbor 2.4.1 Neighbor Management Double-click a station from the tree at the left of the window to display the neighbor information of the corresponding station. The neighbor function provides the following information: The neighbor information of the selected eNB (displayed in Neighbor Relation Info at the bottom of the middle pane). The station in neighbor relationship with the selected eNB and the station which isn‟t (displayed in Neighbor eNB Info at the top right pane): The station in neighbor relationship with the selected eNB will be show in the „Neighbor eNB‟ tab. The station which isn‟t, but which resides within the area of the neighbor relationship with the selected eNB, will be shown in the „Other eNB‟ tab. The information of the cells in the eNB (displayed in Cell Detail Info at the middle of the right pane): Select an eNB information on the Neighbor eNB Info to display the cell information of the selected eNB. The neighbor add/modify/delete history (displayed in Neighbor Operation History at the lower right of the window).
Figure 2.43 Neighbor Management GUI
© SAMSUNG Electronics Co., Ltd.
2-32
LSM-R User Manual
Adding a Neighbor 1) 2)
Double-click the eNB you wish to add the neighbor from the tree at the left of the window. In Neighbor Relation Info, select the tab corresponding to the network (LTE, WCDMA, CDMA1XRTT, CDMAHPRD) you wish to add the neighbor, then click „Add‟. 3) Enter each and every parameter in the popup window, then click „Add‟ in the popup window to execute the command. 4) The execution result will be updated to the neighbor operation history. Modifying a Neighbor Select a neighbor in Neighbor Relation Info. The „Change‟ button at the top of the table will be activated. 2) Click the activated „Change‟ button, then modify the parameters as necessary in the popup window. 3) Click „Change‟ in the popup window. 4) The execution result will be updated to the neighbor operation history. 1)
Deleting a Neighbor Select a neighbor in Neighbor Relation Info. The „Delete‟ button at the top of the table will be activated. 2) Click on the enabled „Delete‟ button. A warning popup will be displayed. Click „OK‟ in the warning popup. 3) The execution result will be updated to the neighbor operation history. 1)
Additional Functions The neighbor GUI allows the operator to easily view the related information. If you select a neighbor relation in the Neighbor Relation Info, the information of the source eNB of the corresponding relation will be highlighted, and the information of the cell of the corresponding eNB will be displayed. The Status in the Neighbor Relation Info represents the status of the corresponding neighbor. Green: Bi-directional neighbor Yellow: Uni-directional neighbor Red: Neighbor which related cell has been deleted White: Neighbor which target eNB does not exist in the LSM (remote neighbors and other PLMN neighbors will also be shown in white) With the Neighbor Relation Info containing valid data, select a number in the Cell Num selection combo box at the top of the window. The neighbor relation having the selected number‟s cell as the source cell will change to blue, and when you select a relation in blue color, the information of the corresponding source cell in the Cell Detail Info will be displayed in green. Right-click the Neighbor Operation History to delete the information in the table.
© SAMSUNG Electronics Co., Ltd.
2-33
LSM-R User Manual
Neighbor Import/Export (This function allows to import/export the neighbor information, and can be executed from the menu bar at the top of the window.)
Figure 2.44 Neighbor Import/Export GUI
Import 1) Click „File‟ to import the file from the PC. 2) The imported data will be displayed in the table. 3) Make the desired modification to the table, then select one of the commands at the top of the window. 4) Check on the relation you wish to execute the selected command, then click „Apply‟. Export 1)
Check on the station to view the neighbor from the tree at the left of the window, then click „Inquiry‟ at the top of the window. (If you checked on bi-direction, each neighbor relation will be viewed in both directions.) 2) The neighbor relation of the selected eNB will be displayed on the table. Click „Save‟ to save it to the PC (.csv or .xls). 3) You can also view and modify the data in the table, then apply to the server.
© SAMSUNG Electronics Co., Ltd.
2-34
LSM-R User Manual
Neighbor Integrity Check This function allows to check the integrity of the neighbor information, and can be executed from the menu bar at the top of the window.
Figure 2.45 Neighbor Integrity Check
The integrity check will verify the following criteria: DELETED ENB OR REMOTE RELATION: The relation‟s target eNB has been deleted or is a remote neighbor. If corrected, the corresponding relation will be deleted. DELETED ENB FROM EXTERNAL: The relation‟s target eNB has been deleted. If corrected, the corresponding relation will be deleted. DELETED CELL 1: The relation‟s target cell information does not exist in the LSM. If corrected, the corresponding relation and the external-cell information will be deleted. DELETED CELL 2: The relation‟s target cell information exists in the LSM, but the external-cell information is missing. If corrected, the corresponding relation will be deleted. NOT DUPLEX: Represents an uni-directional neighbor relation. If corrected, a bidirectional relation with default values will be added. Non-IDENTICAL PARAMETER: The target cell‟s parameter value (external-cell value) of the corresponding relation does not correspond to the actual cell‟s parameter value. The displayed parameter values will not correspond to each other. If corrected, the target cell‟s parameter value (external-cell value) will be changed to the actual cell‟s parameter value.
© SAMSUNG Electronics Co., Ltd.
2-35
LSM-R User Manual
2.5 Software The „UI_SWM (UI_SW Management)‟ provides the user interface for the commands necessary to perform the package upgrade, software (SW) update and firmware (FW) update through the GUI. In addition, the UI_SWM provide the functions for the eNB to download and activate the package, SW and FW, as well as the functions to verify the package installation of the LSM/NE. The UI_SWM provides the package upgrade, software update and firmware update functions, as well as the functions to schedule their execution and save the execution history. The operator can perform the package upgrade, software update and firmware update at the desired time.
2.5.1 Package Upgrade In case of upgrading version of total package, performs the package upgrade below.
Figure 2.46 Package Upgrade
Tree Viewer: Displays all NEs registered to the EMS in tree structure. The check tree option allows the selection of multiple NEs. The NEs in the tree can be displayed selectively, per NE type or NE version. If you check on a NE in the tree, the check will also be applied to the NE status table. NE Status Table: Provides the information of the current and download package versions of each NE. Click on the right buttons of the table ( ) to display the information of the package, active software and firmware applied to each eNB. If the information of both current and download package versions exist, the package status will be displayed with the priority given to the download package version. Upgrade Information: Executes the command based on the selections in the Command Type, Package Version, Mode, Execute Type and Execute Schedule options.
© SAMSUNG Electronics Co., Ltd.
2-36
LSM-R User Manual
Package Upgrade Information, Download Information of SW/FW Update Group Command Type
Item
Description
Download
Executes the download.
Activation
Activates a downloaded package.
Download + Activation
Processes the activation after completing the download.
Package Version
-
Displays the version of the package to download. - Click the picture (
) on the right to display
the list of the current package version. Mode
AP_RESET
Resets after completing the activation.
REBOOT
Reboots after completing the activation.
immediate
Executes the command immediately.
schedule
Executes the command in schedule.
Execute Schedule
-
Sets the time for the scheduled execution.
Estimated time
-
Displays the time the corresponding function is
Execute Type
expected to complete when the apply button is clicked. Elapsed time
-
The completion time.
Package Upgrade Sequence 1) Check the desired NE in the tree. 2) Select the command type in „Upgrade Information‟. 3) Select the package to upgrade in „Package Version‟. 4) To execute the command immediately, select „immediate‟ in „Execute Type‟. 5) If you select „schedule‟, enter the desired time for the scheduled execution to the right field. The entered time should be at least 2 minutes later than the current time. 6) If you select „Download + Activation‟ or „Activation‟ in „Command Type‟, also select the mode. 7) Click „Apply‟. The value of the progress bar will change as the package upgrade proceeds.
© SAMSUNG Electronics Co., Ltd.
2-37
LSM-R User Manual
2.5.2 Verify Compares the package and firmware between the LSM and NE.
Figure 2.47 Verify Window
Tree Viewer: Displays all NEs registered to the EMS in tree structure. Verification Criteria: Sets the criteria for the verification. Verification Information: A list of NEs to perform the verification. Provides the Compare ( ) icon to view the verification result and detailed information. Click the Compare icon of the corresponding NE to view the detailed information. The parameters for the verification criteria are as follows: Parameter
Description
Package Version
Verify package version
Type
Verify Type - Software - Firmware
1) 2) 3) 4)
Check the desired NE in the tree. Click „Add‟ in „Verification Criteria‟. Select the version and type of the package to verify in „Verification Criteria‟. Click „Verify‟ in „Verification Criteria‟.
© SAMSUNG Electronics Co., Ltd.
2-38
LSM-R User Manual
5)
Click „Compare‟ to view the detailed comparison for each file.
Figure 2.48 Package Compare Information Window
Background Color
Description
White
Normal (Same Image)
Red
The same file exists in both the LSM and NE, but the content is different.
Yellow
The file exists only in the LSM or NE.
Save: Saves the contents of the comparison to an Excel file. Update: In case of red or yellow background (the file exists only in the LSM), check on the checkbox on the left then click „Update‟. The update list will be added to the corresponding software/firmware update tab. Note: The task will not be performed if a software/firmware update is already running.
© SAMSUNG Electronics Co., Ltd.
2-39
LSM-R User Manual
2.5.3 Software Update In case of updating specified software, performs the software update below.
Figure 2.49 S/W Update
Tree Viewer: Displays all NEs registered to the EMS in tree structure. Software List: Displays a downloadable list based on the NEs selected in the tree viewer. The [2.0.0] next to the title represents the version of the checked eNBs. Download Software: The list of the actual tasks to be performed, added from the software list. Download Information: Executes the command based on the Command Type, Execute Type or Execute Schedule. Software Update Sequence 1) Check the desired NE in the tree. 2) Click „Search‟ in „Software List‟. 3) Check the software to update in „Software List‟. 4) Click „Add‟ in „Software List‟. 5) Verify if the software list is displayed in „Download Software‟. 6) Select „Command Type‟ in „Download Information‟. 7) To execute the command immediately, select „immediate‟ in „Execute Type‟. If you select „schedule‟, enter the desired time for the scheduled execution to the right field. The entered time should be at least 2 minutes later than the current time. 8) Click „Apply‟. The value of the progress bar will change as the software upgrade proceeds.
© SAMSUNG Electronics Co., Ltd.
2-40
LSM-R User Manual
2.5.4 Firmware Update Performs the firmware update.
Figure 2.50 Firmware Update
Tree Viewer: Displays all NEs registered to the EMS in tree structure. Firmware List: Displays a downloadable list corresponding to the version selected in the version combo box. The [2.0.0] next to the title represents the version of the checked eNBs. Download Firmware: The list of the actual tasks to be performed, added from the firmware list. Download Information: Executes the command based on the Command Type: Reboot, Execute Type or Execute Schedule. Firmware Update Sequence 1) 2) 3) 4) 5) 6) 7)
Check the desired NE in the tree. Click „Search‟ in „Firmware List‟. Check the firmware to update in „Firmware List‟. Click „Update‟ in „Firmware List‟. Check if the firmware list is displayed on „Download Firmware‟. Select the „Board‟ information in „Download Firmware‟. (This setting is not required for the download.) Select the „Side‟ information in „Download Firmware‟. (This setting is not required for the download.)
© SAMSUNG Electronics Co., Ltd.
2-41
LSM-R User Manual
8) Select „Command Type‟ in „Download Information‟. 9) To execute the command immediately, select „immediate‟ in „Execute Type‟. If you select „schedule‟, enter the desired time for the scheduled execution to the right field. The entered time should be at least 2 minutes later than the current time. 10) Click „Apply‟. The value of the progress bar will change as the firmware upgrade proceeds.
© SAMSUNG Electronics Co., Ltd.
2-42
LSM-R User Manual
2.5.5 History Views the Command History
Figure 2.51 History Window
Tree Viewer: Displays all NEs registered to the EMS in tree structure. Search Criteria: Allows you to select the history search criteria. Command History: Displays the search result. The results of the command executed based on the EMS will be displayed in the table. Double-click the table to display the details of the command execution for each NE in „Detail‟. (Clicking the Detail ( ) icon will generate the same result as above.) Detail: Displays the command execution result for the NE upon clicking „Command History‟. The parameters for the search criteria are as follows: Parameter Type
Description Command history type - All - Package - Software - Firmware
Command Type
Command type - All - Download + Activation - Download - Activation
© SAMSUNG Electronics Co., Ltd.
2-43
LSM-R User Manual
(Continued) Parameter Execute Type
Description Task type - All: All tasks - Immediate: Tasks executed immediately - Schedule: Scheduled tasks
Status
Task Status - All: All tasks - Running: Tasks currently running - Complete: Completed tasks - Cancel: Cancelled tasks - Fail: The scheduled task failed to run due to another running task. - Process Restart: The EMS (mf) restarted during the execution of the task.
Period
1) 2) 3) 4) 5)
Search Period
Select the criteria in „Search Criteria‟. Click „Search‟ in „Search Criteria‟. Check if the search result is displayed in „Command History‟. Double-click a table value in „Command History‟. Check if the corresponding details are displayed in „Detail‟. Clicking the Detail icon ( ) in „Command History‟ will create the same result as above.
© SAMSUNG Electronics Co., Ltd.
2-44
LSM-R User Manual
2.5.6 Schedule Views the scheduled task.
Figure 2.52 Schedule Window
Tree Viewer: Displays all NEs registered to the EMS in tree structure. Search Criteria: Allows you to select the schedule search criteria. Schedule List: Displays the search result. The results of the command executed based on the EMS will be displayed in the table. Double-click the Detail ( ) in the table to display the details in „Detail‟. Detail: From „Schedule List‟, click the Detail ( ) icon to view the details. The parameters for the search criteria are as follows: Parameter Type
Description Scheduled task type - All - Package - Software - Firmware
Command Type
Scheduled task’s command type - All - Download + Activation - Download - Activation
© SAMSUNG Electronics Co., Ltd.
2-45
LSM-R User Manual
Select the criteria in „Search Criteria‟. Click „Search‟ in „Search Criteria‟. Check if the information of the schedule registered in „Schedule List‟ is displayed. From „Schedule List‟, click the Detail icon ( ) and check if the corresponding information is displayed in „Detail‟. 5) To delete the schedule containing search criteria, check on the schedule registered to the „Schedule List‟ then click „Delete‟. 1) 2) 3) 4)
© SAMSUNG Electronics Co., Ltd.
2-46
LSM-R User Manual
2.6 Data Audit From the Data Audit window, check the data versions of eNB and LSM and then select an eNB that the operator want to synchronize, and execute the configuration synchronization manually.
2.6.1 Data Audit Executing Data Audit 1) 2) 3)
From the LSM main window, select the „Configuration‟ „Data Audit‟ menu. Launch the Data Audit window. Once the Data Audit window opens, the data version of the LSM for all eNBs registered to the tree will be retrieved and displayed in the data version of the configuration at the right as illustrated below.
Figure 2.53 Configuration Information Sync
Tree Viewer: Displays all NEs registered to the EMS in tree structure. Data Audit: Allows the operator to view the eNB data version and LSM data version of the NE registered to the EMS and decide whether to perform the Data Audit. Network Group: The name of the network group where the eNB belongs to. eNB Name: The name of the eNB registered by the operator. eNB Id: The eNB‟s independent, unique ID. eNB Data Version: The eNB data version checked in the eNB through the cdd. LSM Data Version: The data version managed in the LSM DB. Result: Result of the execution.
© SAMSUNG Electronics Co., Ltd.
2-47
LSM-R User Manual
Scheduler: instead of performing the Data Audit manually, the operator can schedule the EMS to perform it periodically by registering the task to the scheduler and view the corresponding information in the scheduler. Viewing Data Audit 1) 2) 3) 4)
From the LSM main window, select the „Configuration‟ „Data Audit‟ menu. Launch the Data Audit window. Select the desired criteria from NE Type and NE Version at the top of the tree view (type or version, or type and version). Once you select type and/or version, the eNB information corresponding to the criteria will be retrieved from the LSM and displayed on Data Audit at the right of the window.
Figure 2.54 Viewing the Configuration Information Synchronization
System: Select the criteria to view the NE. NE Type: Select the type of the eNB. NE Version: Select the version of the eNB. If you select the NE type and/or version, the information of the eNBs corresponding to the criteria will be displayed. Otherwise, all eNBs‟ information will be displayed. Tree Viewer: The information of the eNBs corresponding to the criteria selected in System will be displayed in the tree. Data Audit: The information of the eNBs corresponding to B will be displayed along with the data version.
© SAMSUNG Electronics Co., Ltd.
2-48
LSM-R User Manual
Synchronize Data 1)
From the LSM main window, select the „Configuration‟ „Data Audit‟ menu.
2)
Launch the Data Audit window.
3)
In the tree view, select an eNB as illustrated below to launch the Data Audit.
Figure 2.55 Selecting an eNB from the tree
4)
Once an eNB is selected from the tree, the same eNB information will be selected from Synchronize Data as below:
Figure 2.56 Verifying the eNB infor4-mation selected from Sync Data
5)
Click „Execute‟.
6) The result will be displayed in the „Result‟ section.
© SAMSUNG Electronics Co., Ltd.
2-49
LSM-R User Manual
2.6.2 Scheduling Function for Periodical Data Audit Viewing the Scheduler 1) From the LSM main window, select the „Configuration‟ „Data Audit‟ menu. 2) The Data Audit window will be displayed. 3) Select the Scheduler tab from Data Audit. 4) The registered scheduler information will be displayed as below:
Figure 2.57 Viewing the Scheduler
Id: The ID registered to the scheduler. Start Date: The time and date of the initial Data Audit. End Date: The time and date the Data Audit is scheduled to end. Period: The period the Data Audit will be performed (day, week, month) Network Group: Network group information. eNB Name: The name of the eNB registered by the operator. Registration Date: The registration date.
© SAMSUNG Electronics Co., Ltd.
2-50
LSM-R User Manual
Adding Scheduler 1)
From the LSM main window, select the „Configuration‟ „Data Audit‟ menu.
2) The Data Audit window will be displayed. 3) The tree and the data version of the eNB will be displayed as illustrated below. 4)
Select the eNB to add to the scheduler from the tree.
5)
Select „Add Scheduler‟ from „Configuration Information Sync‟ as below:
Figure 2.58 Adding Scheduler
6)
Enter the desired start date, end date and period as below:
Figure 2.59 Viewing the Scheduler
You can also use the calendar to enter the start date and end date.
Figure 2.60 Date Selection Calendar
Enter the period. (Select between day, week or month.)
Figure 2.61 Selecting the Scheduler Period
© SAMSUNG Electronics Co., Ltd.
2-51
LSM-R User Manual
7)
Click „Execute‟.
8) The scheduler for the periodic Data Audit will be added to $nms_home/data/xml/schedule.xml. Deleting Scheduler 1) From the LSM main window, select the „Configuration‟ „Data Audit‟ menu. 2) The Data Audit window will be displayed. 3) Select the Scheduler tab to view the scheduler information. 4) Select the scheduler information to delete. Click „Delete‟ to delete the selected scheduler information.
© SAMSUNG Electronics Co., Ltd.
2-52
LSM-R User Manual
2.7 SerialNo Management The SerialNo Management allows the operator to add, modify and delete Serial Number.
Figure 2.62 SerialNo Management
Adding a Serial Number From the LSM main window, select the „Configuration‟ „SerialNo Management‟ menu. 2) Select the check box of eNB to add Serial Number, and enter the value in „Serial_Number‟ field. 3) Click the „Apply‟ button. The operator can check Serial Number added on the popup menu of „Success SerialNumber change‟. 1)
Modifying a Serial Number From the LSM main window, select the „Configuration‟ „SerialNo Management‟ menu. 2) Select the check box of eNB to modify Serial Number, and modify the value in „Serial_Number‟ field. 3) Click the „Apply‟ button. The operator can check Serial Number modified on the popup menu of „Success SerialNumber change‟. 1)
© SAMSUNG Electronics Co., Ltd.
2-53
LSM-R User Manual
Deleting a Serial Number From the LSM main window, select the „Configuration‟ „SerialNo Management‟ menu. 2) Select the check box of eNB to delete Serial Number, and delete the value in „Serial_Number‟ field. 3) Click the „Apply‟ button. The operator can check Serial Number deleted on the popup menu of „Success SerialNumber change‟. 1)
© SAMSUNG Electronics Co., Ltd.
2-54
LSM-R User Manual
2.8 System Backup „System Backup‟ allows the operator to backup/restore PLD.
2.8.1 Backup „PLD Backup‟ window and procedure are as follows:
Figure 2.63 Backup Window
Tree Viewer: Displays all NEs registered to the EMS in tree structure. System Backup : Register PLD Backup schedule or execute PLD Backup immediately. Executing PLD Backup 1) From the LSM main window, select the „Configuration‟ „System Backup‟ menu. 2) Select the eNB to backup PLD in Tree Viewer. 3) Select „Immediately‟ in „Type‟ field. 4) Click the „Execute‟ button. 5) The execution result is displayed in System Backup window.
Figure 2.64 Execution Result of System Backup
© SAMSUNG Electronics Co., Ltd.
2-55
LSM-R User Manual
Registering Backup Schedule From the LSM main window, select the „Configuration‟ „System Backup‟ menu. Select the eNB to backup PLD in Tree Viewer. Select „Schedule‟ in „Type‟ field. Set backup interval. Daily (1 day interval): set Hour, Minute. Weekly (1 week interval): set Day, Hour, Minute. Monthly (1 month interval): set Date, Day, Hour, Minute. 5) Click the „Execute‟ button. 1) 2) 3) 4)
Deleting Backup Schedule 1) 2)
Select the check box of schedule to delete. Click the „Delete‟ button.
2.8.2 Restore „PLD Restore‟ window and procedure are as follows:
Figure 2.65 Restore Window
© SAMSUNG Electronics Co., Ltd.
2-56
LSM-R User Manual
1) 2) 3)
From the LSM main window, select the „Configuration‟ „System Backup‟ menu. Select the eNB to restore PLD in Tree Viewer. Click the „File‟ button of the corresponding eNB in Restore table.
Figure 2.66 Selecting File to restore
3) Double-click the file to restore. 4) Click the „Execute‟ button. 5) The result of restore is displayed in Result and Reason column.
Figure 2.67 Execution Result of Restoring
© SAMSUNG Electronics Co., Ltd.
2-57
LSM-R User Manual
2.8.3 System Backup History The window and procedure to view execution history of PLD Backup and Restore are as follows:
Figure 2.68 System Backup History Window
1) 2) 3) 4) 4)
From the LSM main window, select the „Configuration‟ „System Backup‟ menu. Select the eNB to view execution history in Tree Viewer. Select Backup/Restore „Type‟ field. Select Success/Failed „Result‟ field. Click the „Search‟ button.
© SAMSUNG Electronics Co., Ltd.
2-58
LSM-R User Manual
CHAPTER 3. Fault Management
The fault management provides various functions to manage the faults occurring in the system.
3.1 Event Viewer The „Event Viewer‟ displays the events received through the server in real time. Fault Event Viewer
Figure 3.1 Event Viewer Window
The parameters of the event viewer are as follows: Parameter
Description
Severity
Indicates an event grade. - Critical: critical fault - Major: major fault - Minor: minor fault - Warning: fault information - Indeterminate: fault whose severity is not defined - Status: general information
Code
The event code.
Group
Displays the event groups in the following types: - Communication: communication process/procedure - Processing: software/processing procedure - Environment: external equipment environment - QoS: degradation of service quality - Equipment: fault in equipment - etc.: other faults & statuses.
Location
Location of the event.
Probable Cause
Cause of the event.
© SAMSUNG Electronics Co., Ltd.
3-1
LSM-R User Manual
Time
© SAMSUNG Electronics Co., Ltd.
Time of the event occurrence.
3-2
LSM-R User Manual
Event Viewer Filter The „Event Viewer‟ can be set to display only the specific events. Click the „Filter‟ button ( ) at the top of the „Event Viewer‟ to display the following window, then select the criteria of the event you wish to display.
Figure 3.2 Event Viewer Filter Window
Pausing/Receiving Events If you click the „Play‟ button ( ) at the top of the „Event Viewer‟, the „Play‟ button will be changed to „Pause‟ ( ) and the events will not be displayed anymore. If you click the „Pause‟ button again, it will be changed back to „Play‟ and all the events not displayed during the pause will be displayed. Deleting Displayed Events Click the „Clear‟ button ( ) at the top of the „Event Viewer‟ to delete the events currently displayed on the „Event Viewer‟. However, the history saved in the database will not be deleted. Printing Events Click the „Print‟ button ( ) at the top of the „Event Viewer‟ to print the events currently displayed on the „Event Viewer‟. Saving Events Click the „Save‟ button ( ) at the top of the „Event Viewer‟ to save the events currently displayed on the „Event Viewer‟ in an Excel file.
© SAMSUNG Electronics Co., Ltd.
3-3
LSM-R User Manual
Event Details Double-click a data in the „Event Viewer‟ to display the detailed information of the corresponding data on the popup window as below.
Figure 3.3 Detailed Event Information Window
© SAMSUNG Electronics Co., Ltd.
3-4
LSM-R User Manual
3.2 Viewing the Event History The „Event History‟ menu allows viewing and modifying the fault information saved in the database. Fault Event History
Figure 3.4 Event History Window
The parameters of the EMS history are as follows: Parameter
Description
Target
The NE to view
Period
Time lapse from when the event occurred to when it was canceled.
Event Type
The event type to view (All/Alarm/Status/Fault)
Severity
Event severity - Critical: critical fault - Major: major fault - Minor: minor fault - Warning: fault information - Indeterminate: fault whose severity is not defined - Status: general information
Group
Type of the event group - Communication: communication process/procedure - Processing: software/processing procedure - Environment: external equipment environment - QoS: degradation of service quality - Equipment: fault in equipment - etc.: other faults & statuses
© SAMSUNG Electronics Co., Ltd.
3-5
LSM-R User Manual
(Continued) Parameter
Description
Code
Alarm code
Ack
Fault recognition
Clear
Fault clear type
Searching the EMS History 1)
2)
3) 4) 5)
In the tree view of the main window, select an NE to view. The selected NE will be displayed in the „Target‟ field of the window. Select „All‟ to view all the system faults including the EMS faults, „EMS‟ to view only the faults occurred in the EMS. You can select „Alarm‟, „Status‟ or „Fault‟ for the „Event Type‟. If you select „Alarm‟, you can select the field values „Severity‟, „Group‟, „Ack‟, „Clear‟ and/or „Code‟ for viewing. If you select „Status/Fault‟, the „Severity‟, „Group‟, „Ack‟, „Clear‟ and „Code‟ values will not be applied. Click „Search‟. Check if the fault information corresponding to the selected criteria is displayed on the result table. Click „Save‟ to save the result.
Enabling/Disabling Fault Recognition 1) 2) 3)
From the result table, select the fault you wish the system to recognize. Click „Ack‟. From the „No.‟ column of the result table, check if the selected fault has been enabled for recognition. 4) To disable the fault recognition, select a fault from the result table and click „Unack‟. Clearing a Fault 1) 2) 3)
From the result table, select the fault you wish to clear. Click „Clear‟. Check the background color of the „Severity‟ column and the „Clear Time‟ column of the table to see if the selected fault has been successfully cleared.
© SAMSUNG Electronics Co., Ltd.
3-6
LSM-R User Manual
3.3 Current Alarm This function displays the unclear faults, and applies the alarms occurring afterwards in real time. You can change the information of a specific fault. Fault Current Alarm
Figure 3.5 Current Alarm Window
The parameters of the Current Alarm are as follows: Parameter
Description
Severity
the severity of the event.
Code
the alarm code.
Group
the event group where the event belongs to.
Location
location of an event
Probable Cause
cause of an event
Alarm time
time the event has occurred
Clear time
time the alarm was cleared
Clear type
if the fault was cleared, the type of the fault clearance ‘Auto/Manual’
© SAMSUNG Electronics Co., Ltd.
3-7
LSM-R User Manual
Viewing Current Alarm 1) 2)
3) 4) 5) 6)
7) 8)
From the menu, select „Fault‟ then „Current Alarm‟ to display the uncleared alarms on the table. When a fault occurs, the corresponding information is displayed on the table. When an alarm is cleared, the background color of the „Severity‟ column and the „Clear Time‟ column for the corresponding alarm will be updated. If you click the „No.‟, „Severity‟, „Group‟ or „Alarm Time‟ column‟s header, the information in the table will be sorted accordingly. You can filter the faults displayed on the screen by clicking the icon. If you click the „Refresh‟ button, only the uncleared information will be displayed on the table again. If you click the „Pause‟ button, the button will change to „Resume‟, and the newly occurring faults will not be displayed on the table. Click the „Pause‟ button again to display the faults which were not displayed during the pause. Click the icon to print the result. Click the icon to save the result table in an Excel or CSV file.
Modifying Current Alarm To select a specific fault information or select/clear the entire alarms in the table, check on the checkbox ( ) and click „Ack‟/„Unack‟ or „Clear‟. If you select „Ack‟, the background color of the „No.‟ column will be changed to gray. If you select „Unack‟ for an alarm which was previously active in Ack state, it will return to the pre-Ack status. If you select „Clear‟, the background color of the „Severity‟ column will be changed to green, and the value of the „Clear Time‟ column will be updated.
© SAMSUNG Electronics Co., Ltd.
3-8
LSM-R User Manual
Viewing the Detailed Fault Information
Figure 3.6 Detailed Information of Current Alarm
If you double-click the data on „Current Alarm‟ or select „Show Details‟ on the popup menu, the detailed information of the corresponding data will be displayed on a popup window. If you click the „Code Information‟ button, the information of the corresponding alarm code will be displayed on a popup window. A „Severity‟ column which color is in „Clear‟ state represents an alarm that has been cleared. The time the alarm was cleared will be displayed along with its clearance type.
© SAMSUNG Electronics Co., Ltd.
3-9
LSM-R User Manual
3.4 Alarm Statistics The „Alarm Statistics‟ function allows the operator to search the fault statistics information saved in the database of the EMS using various search criteria. Fault Alarm Statistics
Figure 3.7 Fault Statistics Window
The parameters of the fault statistics are as follows: Parameter
Description
Target
The command execution target value.
Series
Used to select the series of the chart. (Severity/Code)
Item
Used to select the value for the X axis of the chart. If the ‘Location’ value is selected, you cannot select the summary by time slot in the ‘Time Type’ field.
Time Type
Used to select the time unit for the statistics. ‘Hourly, Daily, Monthly, Hourly Sum., Daily Sum., Monthly Sum.’
Group
Used to select a fault group.
Period
Used to select the time to view.
© SAMSUNG Electronics Co., Ltd.
3-10
LSM-R User Manual
Searching the Fault Statistics 1)
2) 3) 4) 5) 6) 7)
8) 9)
In the tree view of the main window, select an NE to view. The selected NE will be displayed in the „Target‟ field of the window. Select „All‟ to view the statistics of all the system faults including the EMS faults, „EMS alarm only‟ to view only the faults occurred in the EMS. You can select and view a specific group from the „Group‟. Select the data corresponding to the series of the result chart from the „Series‟ field. Select the data corresponding to the X-axis of the result chart from the „Item‟ field. Specify the type of the statistics time in the „Time Type‟ field. The initial value of the „Period‟ field will be changed accordingly. Click „Search‟. Check if the „Alarm statistics‟ data satisfying the search criteria are displayed on the result table and chart. If you drag the mouse cursor over the chart, the selected part will be zoomed in and displayed with a scroll bar. If you click the „Zoom Out‟ button, the scroll bar will disappear and the chart will revert to its original size. Click „Print‟ to print the result. Click „Save‟ to save the result table in an Excel file and the result chart in a PDF file.
© SAMSUNG Electronics Co., Ltd.
3-11
LSM-R User Manual
3.5 Audible Alarm The „Audible Alarm‟ allows to set the audible alarm generation policy for each operator. Fault Audible Alarm
Figure 3.8 Audible Alarm Window
The parameters of the audible alarm are as follows: Parameter
Description
Mute
Sets the entire audible alarms on/off.
Play
- Repeat: Used to specify the number of times the audible alarm will be played. If unchecked, the alarm will be played only once. - No Interception: If checked, the audible alarm that occurred first will be played all the way through even if another audible alarm is generated. The next alarm will be played afterwards.
Grade
Used to select the grade to generate the audible alarm. ‘Critical/Major/Minor’
Policy
Used to select the audible alarm generation policy. ‘Representative Alarm/Final Alarm’
© SAMSUNG Electronics Co., Ltd.
3-12
LSM-R User Manual
Setting Audible Alarms by Level 1) 2) 3) 4) 5) 6) 7) 8) 9)
From the menu, select „Fault then „Audible Alarm‟ to pop up the „Audible Alarm‟ setup window. Select or deselect the „Mute‟ option. Select „by Grade‟. Using the „Repeat‟ button, specify whether to allow repetition and the repetition count. Select or deselect „No Interception‟. From „Grade‟, select the grade in which the audible alarm will be generated. From „Policy‟, select the audible alarm generation policy. Click „Set‟ o complete the setup. You can click „Pause‟ to pause the current audible alarm.
Setting Audible Alarms by Fault Code 1) 2) 3) 4) 5)
6) 7)
From the menu, select „Fault‟ then „Audible Alarm‟ to pop up the „Audible Alarm‟ setup window. Select or deselect the „Mute‟ option. Click „by Alarm Code‟. Using the „Repeat‟ button, specify whether to allow repetition and the repetition count. Select the sound source by fault code. Click „Add‟ to select a fault code. You can specify the sound source by clicking the „Browse‟ button at the right of the fault code. If you click the Set button, both the fault code and sound source information will be saved. Click „Set‟ to complete the setup. You can click „Pause‟ to pause the current audible alarm.
© SAMSUNG Electronics Co., Ltd.
3-13
LSM-R User Manual
3.6 Visible Alarm The „Visible Alarm‟ allows to set the visible alarm for each operator. The Visible Alarm function opens an alarm window automatically when a fault is generated, and displays the alarms occurred until the operator recognizes them. Fault Visible Alarm The visible alarm is initially set to OFF, and can be manually set to ON. It can also be configured for each corresponding level and/or specific fault code.
Figure 3.9 Visible Alarm Setting Window
The parameters of the visible alarm are as follows: Parameter OFF
Description Sets the entire visible alarms on/off. - By Level: Used to specify whether to filter the visible alarms by level. - By Fault Code: Used to specify whether to filter the visible alarms by fault code.
Grade
Used to select the grade in which the visible alarm will be generated. ‘Critical/Major/Minor’
© SAMSUNG Electronics Co., Ltd.
3-14
LSM-R User Manual
Setting the visible alarm by level 1) From the menu, select „Fault‟ then „Visible Alarm‟ to pop up the „Visible Alarm‟ setup window. 2) Deselect the „OFF‟ check box. 3) Select „by Grade‟, to specify the grade. 4) Specify the level of the alarms you wish to receive as visible alarm to „Critical/Major/ Minor‟. 5) Click „Set‟ to verify the application of the settings. 6) When a fault is generated, the Visible Alarm window will be opened automatically if not already open. Clearing the Visible Alarm 1) From the menu, select „Fault‟ then „Visible Alarm‟ to pop up the „Visible Alarm‟ setup window. 2) Select the „OFF‟ check box. 3) Click „Set‟. 4) The visible alarm will not be displayed even if the pre-defined alarm is generated. Automatic Generation of Visible Alarm When the Visible Alarm is set to „ON‟, the alarm will be automatically generated as below if it meets the predefined criteria (level and alarm code). 2) If the window is closed, it will be opened automatically if the alarm meeting the criteria is generated. 1)
Figure 3.10 Visible Alarm Output Window
© SAMSUNG Electronics Co., Ltd.
3-15
LSM-R User Manual
Setting Visible Alarms by Fault Code 1)
From the menu, select „Fault‟ then „Visible Alarm‟ to pop up the „Visible Alarm‟ setup window.
2)
Deselect the „OFF‟ check box.
3)
Select „by Alarm Code‟ to specify the fault code.
4)
Click „Add‟ to register a fault code.
Figure 3.11 Setting the Visible Alarm by Fault Code
5)
Select an NE type in the Fault Code Search window.
6)
Select the version of the selected NE type.
7)
Select an event type.
8)
Click „Search‟ to display the alarm code information of the selected NE type.
9)
Select the alarm code to be displayed as a visible alarm (by checking on the checkbox), then click „Add‟.
10) If you click „Add‟ button, the code selection window disappears. 11) Click „Set‟ on the visible alarm setting window.
© SAMSUNG Electronics Co., Ltd.
3-16
LSM-R User Manual
12) If an alarm that meets the criteria occurs, the visible alarm window will automatically appear.
Figure 3.12 Selecting the Visible Alarm Code
© SAMSUNG Electronics Co., Ltd.
3-17
LSM-R User Manual
CHAPTER 4. Performance Management
The performance management manages the functions related to the performance of the network resource. The following key functions are provided by the performance management: Performance Statistics Collection Results PI Monitoring On Demand Call Trace To manage the performance, select „Performance Management‟ from the main menu.
Figure 4.1 Selecting the Performance Menu
© SAMSUNG Electronics Co., Ltd.
4-1
LSM-R User Manual
4.1 Performance Statistics To view the statistics data collected. Performance Performance Statistics
System Selection Area
Statistics Family Selection Area
Statistics Result View Area
Parameter Area
Search Criteria Area
Figure 4.2 Statistics Data View Window
© SAMSUNG Electronics Co., Ltd.
4-2
LSM-R User Manual
4.1.1 Viewing Statistics Data Viewing Statistics Data 1) From the system selection area, select the NE you wish to view in the tree. 2) Search the Statistics Family in the order of Category, Statistics Family. 3) To search a specific LLOC in the parameter area, enter or select the corresponding value. Skip this step if you want to search the entire items. 4) In the search criteria area, set the „Statistics Period‟ to 15MIN, HOURLY, DAILY, MONTHLY. 5) You can also set the period automatically by selecting the „1 Hour‟, „12 Hours‟ or „1 Day‟ buttons. 6) Click „Search‟ to search the results. When the search is complete, the results are displayed on the right pane. Selecting Statistics Family Select the Statistics Family in Statistics Family Selection Area. Selecting Parameters Enter the following values to the „Parameter‟ field according to the data type of the LLOC: Type enum
Description If the data type is enum, a combo list will automatically appear when you click the mouse button.
Ipv4
Enter the IPV4 type.
enbID
Enter the ID of the eNB.
String
Enter all other data as string type.
© SAMSUNG Electronics Co., Ltd.
4-3
LSM-R User Manual
Statistics Search Result Window If you enter the search criteria and click „Search‟, the search results will be displayed on the statistics result view window. Below are the details of the main items in the statistics result view area. Item Hour
Description The time the statistics were collected. The latest data will appear in the highest row.
Location
The logical location where the statistics were collected.
Statistics Item
the items defined in the PmAttribute.xml will be displayed in sequential order. The items set as visible=‘false’ or excluded from filtering will not be displayed.
Sorting Statistics Search Results If you click the „Time‟ field in the table header of the search result window, the data display will be changed from latest oldest. These options will be toggled each time the button is pressed. Icons in the Statistics Result View Item
Description Saves the statistics search results. Prints the statistics search results. Filters the statistics output items. Shows the statistics output results in a chart.
Statistic Output Filtering
Figure 4.3 Filter Setting
1) 2) 3) 4)
Select to display the filter setting window as below. Clear the check box of the item you do not want to display on the window. Click the „Cancel‟ button to close the window. Click the „Apply‟ button to hide the items excluded from filtering.
© SAMSUNG Electronics Co., Ltd.
4-4
LSM-R User Manual
4.1.2 Viewing Statistics Chart Click the button in the statistic search results window to display the statistics window as shown below:
(Statistics) Type Selection Area
Chart Area
Command Execution Area Figure 4.4 Statistics Chart
Creating Statistics Charts 1) 2) 3)
4) 5)
Click the „Graph‟ icon in the statistics search result window. Select the (Statistics) Type of the data you wish to compare in the chart. Select the items you want to show in the chart. Up to 20 items can be shown overlapped in a chart. If you wish to show the items in individual charts, up to five charts can be created. Set whether or not to show the items overlapped in one chart. Click the „Apply‟ button to display the results on the right pane.
© SAMSUNG Electronics Co., Ltd.
4-5
LSM-R User Manual
Disabling the Graph Overlap The following illustrates the chart with the Graph Overlap option disabled. The Graph Overlap option is enabled by default.
Chart Area (Statistics) Type Selection Area
Figure 4.5 Disabling the Graph Overlap
Saving as PDF File Click the „Save‟ button to save the chart as file. One chart is saved per page in the PDF file. To print the chart, open the saved file with an explorer. Setting Chart Options The chart options can be set by right-clicking on the chart.
Figure 4.6 Chart Option Setting
© SAMSUNG Electronics Co., Ltd.
4-6
LSM-R User Manual
Item Legend
Description - Show: Outputs the legend (default) - Hide: Hides the legend
Graph Type
- PLOT: Line graph (default) - BAR: Bar chart
3D
- ON: 3D chart, bar graph only - OFF: 2D chart (default)
X Axis
- ON: X axis scale marks on (default) - OFF: X axis scale marks off
Y Axis
- ON: Y axis scale marks on (default) - OFF: Y axis scale marks off
© SAMSUNG Electronics Co., Ltd.
4-7
LSM-R User Manual
4.2 Collection Results Shows the results of the performance statistics collection. Performance Collection Results
System Selection Area Collection Results Area
Search Criteria
Figure 4.7 PM Collection Results
The result will be displayed as follows: Item
Description
Statistics Period
Statistics Collection Period
Time
Outputs the collected time.
Result
Outputs the collected results. (Success, Fail)
Failure
Outputs the number of failures. (Outputs the count collected every 5 minutes.)
Status
Outputs the name of the collected file.
© SAMSUNG Electronics Co., Ltd.
4-8
LSM-R User Manual
4.3 PI Monitoring PI monitors specific performance data by assigning threshold values. The PI monitoring utility will alert the operator by triggering an alarm when the corresponding threshold is met. If you click the „PI Management‟ button on the PI monitoring window, a registration window will appear as below. You can set and manage the PI items through the following registration procedure. Performance PI Monitoring
Figure 4.8 PI Management
4.3.1 PI Search PI Management View Item
Description
System selection
The units displayed in the system selection area at the bottom depend on the NE Type and NE on the tab menu at the top. - NE Type: Displays the items to allow the selection by NE type. - NE: Displays all NE lists.
PI item selection
The PI items selection area. The PI items are displayed according to the NE type or NE selected in the system selection area. The same data as the statistics family are displayed.
‘Search’ Button
Select the system and statistics items, then click ‘View’ to display the data from the PI settings in the result window on the right.
Search Result Window
The window showing the results of the search on the left pane.
‘Register’ Button
Used to set new PI management items
‘Modify’ Button
Used to modify the PI search results and apply the modification.
‘Delete’ Button
Used to delete the selected PI items.
© SAMSUNG Electronics Co., Ltd.
4-9
LSM-R User Manual
PI Search Procedures 1)
Select whether to search by NE or NE type in the system selection area using the tab menu. 2) Select the tab, select the desired system or type in the NE Type or NE list, then click „Search‟ to display all items that meet the corresponding system or type on the result area. 3) To search for specific PI items, select the PI item or group and click „Search‟ to search within the selected range.
© SAMSUNG Electronics Co., Ltd.
4-10
LSM-R User Manual
4.3.2 PI Registration In the PI search window, select the desired system or type and click „Register‟ to display a registration window as shown below. You can set the PI items through the following registration procedure.
(Statistics) Type Selection Area
Threshold Input Area
Figure 4.9 PI Registration
PI Registration Window Description Item
Description
(Statistics) Type
Displays the (Statistics) Type that belong to the selected Statistics Family.
Threshold Info
Threshold setting area.
Direction
Selects the direction for the threshold range. - UP: Alarms are triggered when the thresholds are exceeded. - DOWN: Alarms are triggered when the thresholds are not met.
Values
Area to enter the threshold values. For the up direction, the order is Critical > Major > Minor. For the down direction, the order is Critical < Major < Minor.
Register
A button used to register and execute the threshold value.
PI Registration Procedure 1) 2) 3) 4) 5) 6)
Click the NE Type or NE tab on the PI management screen. Select the system type or system in the system area. Select the statistics family to register, then click „Register‟ to display the „PI Registration‟ screen. Select the (Statistics) Type that belongs to the statistic family. Select the threshold direction between UP and DOWN. Enter the Critical/Major/Minor values.
© SAMSUNG Electronics Co., Ltd.
4-11
LSM-R User Manual
Click the „Register‟ button to start the registration. When the registration is complete, the result window will be displayed as shown below. This result window will also be displayed upon the modification and deletion processes. 9) After the registration is complete, the statistics will be collected and the levels will be defined to automatically trigger/restore the alarms and display the alarm history in the event viewer. 7) 8)
Figure 4.10 PI Registration Result
PI Registration Result Description Item
Description
Target
The NE name registered
Operation
Commands used in the registration. Commands that already exist in the database will be updated, and new commands will be automatically processed through the registration. - Registration: New registration - Update: Registration modification - Delete: Delete
Start Time
Registration start time
End Time
Registration end time
State
- Ready: Preparing for the registration - Processing: Processing the registration - Completed: Complete
Result
Displays the results
© SAMSUNG Electronics Co., Ltd.
4-12
LSM-R User Manual
4.3.3 PI Modification The procedure to modify the registered PI value is given below. To register the change, select the corresponding item in the search result area of the PI management window and click „Modify‟.
Figure 4.11 PI Modification
PI Modification Procedure 1) 2) 3) 4) 5)
Modify the values of items you want to change in the search result area of the PI management window. Once you change the values and move the mouse cursor, the corresponding fields will turn red and the check boxes on the left will be checked on. When the modification is complete, click „Modify‟. When the change is registered, the registration result window will be displayed. After the modification has been registered successfully, the statistics will be collected and the levels will be defined to automatically trigger/restore the alarms and display the alarm history in the event viewer.
© SAMSUNG Electronics Co., Ltd.
4-13
LSM-R User Manual
4.3.4 PI Deletion Registered PI values can be deleted by selecting the corresponding item in the search result area of the PI management window and click „Delete‟.
Figure 4.12 PI Deletion
PI Deletion Procedure 1) 2) 3) 4)
Select the check box of the item you wish to delete in the search result area of the PI management window. Select all items you wish to delete, then click „Delete‟. When the deletion is complete, the registration result window will be displayed. Once the deletion is complete, all active alarms related to the PI will be cleared automatically..
© SAMSUNG Electronics Co., Ltd.
4-14
LSM-R User Manual
4.3.5 PI Monitoring
Figure 4.13 PI Monitoring
1)
When the statistics collection for the PI is complete, the PI status is automatically refreshed in the PI monitoring window, and the highest levels for each statistic item are calculated and displayed. 2) Click on each item to display the list of the faults occurred on the right pane. 3) When an error occurs in the fault occurrence status, click the „Refresh‟ button to display the latest status. PI Monitoring Buttons Item
Description Displays the predefined Critical value when selecting a PI in the left. Displays the predefined Major value when selecting a PI in the left. Displays the predefined Minor value when selecting a PI in the left. Outputs the selected LLOC in graph and uses the graph for monitoring. Refreshes the window.
© SAMSUNG Electronics Co., Ltd.
4-15
LSM-R User Manual
4.3.6 PI Trend Graph When you click a specific PI item in the PI monitoring window, its location information will be displayed on the right. Double-click the location or use the button to view the trend graph. When you click another LLOC, the current trend graph is changed to reflect the change. There are five-minute trend and 60-minute trend graphs. They are refreshed after the fiveminute data and 60-minute data are collected, respectively.
Figure 4.14 PI Trend Graph
© SAMSUNG Electronics Co., Ltd.
4-16
LSM-R User Manual
4.4 On Demand Statistics On Demand Statistics outputs the trend of the statistics data collected during a given period in real time for specific items selected by the user to the screen in table and graph formats for monitoring purpose. Performance On Demand
Figure 4.15 On Demand Statistics Management
© SAMSUNG Electronics Co., Ltd.
4-17
LSM-R User Manual
4.4.1 On Demand Statistics View From the On Demand Statistics View screen, select a system and click „View‟ to view the On Demand statistics as shown below.
System Selection Area
Search Result Area
Figure 4.16 On Demand Statistics Management Screen
Search Results Description Item
Description
Ne
The registered NE name.
Statistics Family
The registered statistics family name (statistics category/family).
Location
The registered LLOC.
Period
The registered collection cycle.
Duration
The registered collection period.
Owner
The ID of the operator who processed the registration.
Status
The monitoring status. - Ready: On Demand statistics registered. Ready to start the monitoring. - Started: The monitoring has started. - Stopped: The monitoring was interrupted by the operator. - Complete: The monitoring is complete.
On Demand Statistics View 1) 2)
Select an NE tree in the system selection area. Click „Search‟ to search the results. The results will be displayed on the right.
© SAMSUNG Electronics Co., Ltd.
4-18
LSM-R User Manual
4.4.2 On Demand Statistics Registration From the On Demand Statistics View screen, select a system and click „Register‟ to view the registration screen as below. You can register the On Demand statistics through the following registration procedure.
Parameter Area Statistics Family Selection Area
Condition Input Area
Figure 4.17 On Demand Statistics Registration Screen
Selecting Statistic Family Select the statistics family in the statistics family selection area. Selecting Parameters Enter the following values to the „Parameter‟ field according to the data type of the LLOC: Type enum
Description If the data type is enum, a combo list will automatically appear when you click the mouse button.
Ipv4
Enter the IPV4 type.
enbID
Enter the ID of the eNB.
long
Enter the integer type. Position the mouse cursor on ‘Property’ to view the allowed range in tooltip.
String
Enter all other data as string type.
© SAMSUNG Electronics Co., Ltd.
4-19
LSM-R User Manual
Entering Criteria In the criteria input area, select the „Collection Cycle‟ and the „Duration‟ from the respective combo lists. On Demand Statistics Registration 1) From the On Demand Statistics View screen, select the NE you wish to register in the tree. 2) Click „Register‟ to display the „On Demand Statistics Registration‟ window. 3) Search the statistics family in the order of Category, family. 4) Enter or select the corresponding LLOC value in the Parameter area. 5) Select the collection cycle and duration in the Criteria Input area. 6) Click the „Register‟ button to start the registration. 7) You can register up to 2 entries per NE.
© SAMSUNG Electronics Co., Ltd.
4-20
LSM-R User Manual
4.4.3 On Demand Statistics Deletion The registered On Demand statistics can be deleted by selecting the item in the search result area of the On Demand Statistics View window and then clicking the „Delete‟ button.
Figure 4.18 On Demand Statistics Deletion Result Window
On Demand Statistics Deletion Result Item
Description
Target
The NE name registered
Statistics Family
The registered statistics family name (statistics category/family).
LLOC
The registered LLOC.
Operation
DELETE: Delete
Result
Displays the results
Reason
If failed, the reason of failure.
On Demand Statistics Deletion 1) 2) 3)
4)
Select the check box of the item you want to delete in the result area on the right of the On Demand View window. Click „Delete‟. Upon successful deletion, the list in the result area on the right pane will be refreshed. If any of the selected items were not deleted successfully, a result window will be displayed. (This window will not be displayed if all items were deleted successfully.) Operators with the Administrator permission can delete all the items. Operators without the Administrator permission can only delete the items he/she registered.
© SAMSUNG Electronics Co., Ltd.
4-21
LSM-R User Manual
4.4.4 On Demand Statistics Monitoring Outputs the On Demand statistics data that the system is collecting on the screen in table and graph formats.
(Statistics) Type Selection Area
Graph Output Area
Table Output Area
Command Execution Area Status Bar Area Figure 4.19 On Demand Statistics Monitoring Screen
(Statistics) Type Selection Check on the check box of the (Statistics) Type in the (Statistics) Type list, then click „Apply‟ to display the data of the selected (Statistics) Type in the graph. Start Click „Start‟ to request the NE to start monitoring the corresponding On Demand statistics. Stop Click „Stop‟ to request the NE to stop the current monitoring of the On Demand statistics. Graph Output Outputs the monitoring data to the graph in the predefined collection cycle interval.
© SAMSUNG Electronics Co., Ltd.
4-22
LSM-R User Manual
Table Output Outputs the monitoring data to the table in the predefined collection cycle interval. State Display Displays the monitoring status change history, command execution results, monitoring data collection history, etc. Save Click „Save‟ to save the graph and table as file. The first screen allows to save the graph in a PDF file, and the second screen allows to save the table in a CSV or Excel file. Setting Chart Options The chart options can be set by right-clicking on the chart.
Figure 4.20 Chart Option Setting
Item Legend
Description - Show: Outputs the legend - Hide: Hides the legend (default)
Graph type
- PLOT: Line graph (default) - BAR: Bar chart
X Axis
- ON: X axis scale marks on (default) - OFF: X axis scale marks off
Y Axis
- ON: Y axis scale marks on (default) - OFF: Y axis scale marks off
© SAMSUNG Electronics Co., Ltd.
4-23
LSM-R User Manual
4.5 Call Trace The call trace function monitors the status of the call flow for each call setup section in the given terminal. It provides the function to view, register and delete the call trace, as well as the function to view the corresponding history.
4.5.1 Call Trace Window Configuration Performance Call Trace The Trace List window allows to view/register/delete the call trace from the NE via the trace commands, and provides real-time monitoring in the LSM.
Figure 4.21 Trace Main Window
© SAMSUNG Electronics Co., Ltd.
4-24
LSM-R User Manual
4.5.2 Call Trace List Management Selecting a Target Click the combo box on the target search field at the top of the trace list window to display the list of the NEs currently registered in the LSM on the tree. Select the NE in which to perform the trace command. The command will be ready to be executed in the selected NE.
Figure 4.22 Selecting the Target ID
Viewing the Trace List Select the top LSM in the „Target‟ section of the trace list to display all the registered traces on the screen. Select a NE in the „Target‟ section of the trace list to display the traces registered to the corresponding NE on the screen. If you select a NE in the Target section of the trace list and click „Retrieve‟, the LSM will request the list of the currently registered traces to the corresponding NE and display the response on the trace list.
Figure 4.23 Trace List View Window
© SAMSUNG Electronics Co., Ltd.
4-25
LSM-R User Manual
Trace List Output Below is the description of the table shown on the trace list window. Item
Description
Status
: Trace monitoring is paused. : Trace monitoring is running.
Location
Information of the layer managed by the EMS. (Level2/Level3)
Trace Key
Key value for trace save/search.
Reference
Trace ID managed by the NE.
List of interface
Trace section.
Depth
Trace level.
TCE address
The section where the trace will be sent.
Trace List Window Icons Below is the description of the icons in the trace list window. Button
Description
Register
Register a trace.
Start
Start a trace. (Disabled if no trace list is selected.)
Delete
Delete a trace. (Disabled if no trace list is selected.)
Retrieve
Execute the command to view the trace.
© SAMSUNG Electronics Co., Ltd.
4-26
LSM-R User Manual
4.5.3 Call Trace Registration Registering a Trace 1)
Select a target in the trace list window.
2)
Click „Register‟ in the trace list window to display the registration window.
3)
Select or enter the following items in the trace list window.
Figure 4.24 Trace Registration
4)
Click „Execute‟.
5)
If you click „Execute‟, a trace registration request will be sent to the NE. If the result is successful, the trace list will be displayed with the newly registered trace job.
© SAMSUNG Electronics Co., Ltd.
4-27
LSM-R User Manual
4.5.4 Call Trace Deletion Deleting a Trace 1) 2) 3) 4)
Select a trace to delete from the trace list. In the Trace List window, click „Delete‟. If you click „Delete‟, a deletion confirmation window will be displayed. Click „Yes‟ to send the trace list deletion command to the NE. If the command is successful, the trace will be deleted from the NE.
Figure 4.25 Deleting a Trace
© SAMSUNG Electronics Co., Ltd.
4-28
LSM-R User Manual
4.5.5 Call Trace Monitoring Start of Trace Monitoring 1) 2)
Select an item to monitor from the displayed trace list window. If you select an item, the button will be enabled. Click the to display the trace monitoring window.
button
Trace Chart
Trace Data
Trace Log
Figure 4.26 Starting the Trace Monitoring
© SAMSUNG Electronics Co., Ltd.
4-29
LSM-R User Manual
Trace monitoring 1) The data monitoring allows the client to poll the data saved in the server file periodically (every second) and displays them on the window. 2) To view the details of a specific message, click the corresponding message in the chart or table.
Trace Chart
Trace Data
Trace Log
Figure 4.27 Trace Message Details
Trace Monitoring Window Icons Below is the description of the icons in the trace monitoring window. Button
Description Save the trace output data in a PDF file. Clears the data displayed on the window, and displays the data collected afterwards. Resume the monitoring. Stop the monitoring temporarily to click the message to view its details.
© SAMSUNG Electronics Co., Ltd.
4-30
LSM-R User Manual
4.5.6 Call Trace History View Viewing a Trace History To view the trace history, select Menu Trace History Window from the trace window. The trace history view function can display up to 10,000 messages from the data saved in the server. 1) Select the NE to view in the „Target‟ section. 2) Enter the cell number to view in the Cell Number field. 3) Specify the period to view in the Period field. 4) Click „Search‟ to display the data that meets the criteria. 5) To view the detailed information, click the corresponding message in the search results.
This page is intentionally left blank.
Trace Chart
Trace Data
Trace Log
Figure 4.28 Viewing the Trace History
Saving a Trace History If you click „Save‟, the trace data will be saved in a PDF/Excel file.
© SAMSUNG Electronics Co., Ltd.
4-31
LSM-R User Manual
CHAPTER 5. General Management
The general management monitors various functional blocks an resources on the EMS server. It also provides additional features to the operator to control the operating environment on the EMS.
5.1 Network Monitoring „Network Monitoring‟ periodically monitors the network connectivity status (using the Ping test) and the snmp connectivity status (using the Hello message). General Surveillance Network
Figure 5.1 Network Monitoring Window
© SAMSUNG Electronics Co., Ltd.
5-1
LSM-R User Manual
Searching the Network Status Select a target to search the network status from the „Target‟ field in the setting table. You can designate the target by selecting from the tree view or by entering the IP address. 2) Click „Search‟. 3) The search results will be displayed in the result table. 1)
The parameters for the network monitoring are as follows: Item
Description
NE Type
Unique index for the NE.
Location
Shows the location of the NE’s folder.
Master IP
Active IP among the NE’s redundant IPs.
Vice IP
Inactive IP among the NE’s redundant IPs.
Ping status
Shows the Ping status via ICMP.
SNMP status
Shows the SNMP status.
Viewing Network Status Use the „Get‟ button to view the network status in real time. Select an NE List in the left, then click „Search‟ to view the status of the network connections to the system devices from the EMS in real time. (The window will display the result of periodic search from the EMS server.) Viewing/Setting the Network Status Check Period The server checks the network status periodically. to view the check period, click „Get‟. The results are displayed in the result table. The time is displayed in seconds, which can be set between 10-999.
© SAMSUNG Electronics Co., Ltd.
5-2
LSM-R User Manual
5.2 Process Management „Process Management‟ feature allows the operator to view the status of the processes running in the EMS server. It also provides control to operator to start and stop the processes running on the EMS. If a process running in the server is abnormal, you can try stopping and restarting the corresponding process. If a process stops abnormally, it will be automatically restarted. General Surveillance Process
Figure 5.2 Process Monitoring Window
Viewing the Process Status Click the „Search‟ button to display the process status on the result table. The process status is displayed as follows: Running: The process is running normally. Stop: The process has stopped. The parameters for the process management are as follows: Item
Description
Name
Displays the process name.
Status
Displays the status of the process as Running or Stop.
Start time
Displays the start time if the process is running.
Restart count
The number of times the process was executed.
Process ID
Displays the ID of the process if the process is running.
© SAMSUNG Electronics Co., Ltd.
5-3
LSM-R User Manual
(Continued) Item
Description
CPU (%)
Displays the CPU usage occupied by the process.
Memory Used/Total (Mbyte)
Displays the memory bytes used by the process.
Threads
Displays the number of threads running in the process.
DB Connections Used/Total
Displays the maximum number of database connections allowed for the process and its actual number of connections.
Log level
Sets the process logging level.
The types of process are as follows: Launcher: Runs each process. It also monitors the process status and restarts the process if it stops functioning. us: Controls the logins and delivers the server events to the client. mf.dbld: Manages fault information occurring in NE. mf.gm: Monitors the status of the NE and the server resources. mf.cm: Manages the BS configuration and PLD data. mf.fm: Manages the faults and events of the BS. mf.pld: Creates the PLD of the BS. ni.snmp: Communicates with the equipments supporting the SNMP protocol. ni.init: Supports the BS loading. ni.ftp: Collects the statistics files from the BS. Stopping the Process Select the checkbox of the process you wish to stop in the „Name‟ field of the result table. Click the „Stop‟ button in the window to stop the process. Restarting the Process Select the checkbox of the process you wish to restart in the „Name‟ field of the result table. Click the „Restart‟ button in the window to restart the process. Changing the Process Log Level Select the checkbox of the process you wish to change the log level in the „Name‟ field of the result table. Select the desired log level. Click the „Modify‟ button in the window to change the log level of the process. The types of process log level are as follows: Config > Info > Warning > Severe > OFF Higher log level includes more log details.
© SAMSUNG Electronics Co., Ltd.
5-4
LSM-R User Manual
5.3 Resource Monitoring „Resource Monitoring‟ shows the status of the EMS resources (CPU and memory), on a regular basis. Resource monitoring feature on the LSMR monitors the status of the EMS resources (CPU and memory) in the server on a regular basis and outputs the results to line graphs. General Monitoring
Figure 5.3 Resource Monitoring Window
© SAMSUNG Electronics Co., Ltd.
5-5
LSM-R User Manual
5.4 Resource Management „Resource Management‟ monitors the resources of the EMS server. (CPU, File System, Memory, Database) It also provides the functionalities to set the threshold for generating alarms and the function to set the monitoring period of the EMS server.
5.4.1 CPU „CPU‟ management functionality allows to view the EMS server‟s CPU usage rate by CPU ID and to set the threshold values. For servers with more than 2 CPUs, the usage rate is displayed for each CPU. The threshold is used to trigger an alarm if the CPU usage rate of the EMS server exceeds a specific value. General Server Status CPU
Figure 5.4 CPU Window
Viewing the CPU Click the menu, and the followings are displayed in the result table. Threshold to issue an alarm upon the CPU status. CPU status retrieving period. Current CPU status. The current CPU status table is renewed automatically in every designated period. Click „Get‟ to view the thresholds and cycles.
© SAMSUNG Electronics Co., Ltd.
5-6
LSM-R User Manual
The CPU parameters are as follows: Item
Description
Resource
The CPU ID.
Usage (%)
The current CPU usage rate.
User (%)
The usage rate by user processes.
System (%)
The usage rate by system processes.
Wait IO (%)
The usage rate of the processes waiting for I/O.
Idle (%)
The CPU’s inactivity rate.
Searching the CPU threshold Click the menu to automatically search and display the threshold on the table. Click the „Get‟ button on the window to refresh the threshold value and display the most recent information. Setting the CPU Threshold The operators can set the desired threshold value in the threshold setting table. Click the „Set‟ button to set the threshold. Current CPU Status If you click the Average of the current CPU status, the detailed information for each CPU ID will be displayed.
Figure 5.5 CPU Details Window
© SAMSUNG Electronics Co., Ltd.
5-7
LSM-R User Manual
5.4.2 Memory „Memory‟ management feature allows to view the EMS server‟s memory usage rates and to set the threshold values. The memory usage rate is displayed as the percentage of the total memory used by the server. The threshold is used to trigger an alarm if the memory usage rate of the EMS server exceeds a specific value. General Server Status Memory
Figure 5.6 Memory Window
Viewing the Memory Usage Rate Click the menu, and the followings are displayed in the result table. Threshold to issue an alarm upon the memory status. Memory status retrieving period. Current memory status. The current memory status table is renewed automatically in every designated period. Click „Get‟ to view the thresholds and cycles. The memory parameters are as follows: Item
Description
Resource
Memory type.
Current status (%)
The current memory usage rate.
Total size (Mbytes)
Total size of the memory in Mbytes.
Used size (Mbytes)
Used space of the memory in Mbytes.
Free size (Mbytes)
Available space of the memory in Mbytes.
© SAMSUNG Electronics Co., Ltd.
5-8
LSM-R User Manual
Viewing the Memory Threshold Click the menu to automatically search and display the threshold on the table. Click the „Get‟ button on the window to refresh the threshold value and display the most recent information. Setting the Memory Threshold The operators can set the desired threshold value in the threshold setting table. Click the „Set‟ button to set the threshold.
© SAMSUNG Electronics Co., Ltd.
5-9
LSM-R User Manual
5.4.3 File System „File System‟ management feature allows to view the EMS server‟s file system usage rate and set the threshold values. The Detailed information of multiple file systems is displayed. The threshold is used to trigger an alarm if the file system usage rate of the EMS server exceeds a specific value. General Management Server Status File System
Figure 5.7 File System Window
Viewing the Usage Rate of the File System Click the menu, and the followings are displayed in the result table. Threshold to issue an alarm upon the file system status. File system status retrieving period. Current file system status. The current file system status table is renewed automatically in every designated period. Click „Get‟ to view the thresholds and cycles. The parameters of the file system are as follows: Item
Description
Resource
Types of the file system.
Current status (%)
The current file system usage rate.
Total size (Kbytes)
The size of the entire file system in Kbytes.
© SAMSUNG Electronics Co., Ltd.
5-10
LSM-R User Manual
(Continued) Item
Description
Used size (Kbytes)
The size of the file system in use in Kbytes.
Free size (Kbytes)
The size of the remaining file system in Kbytes.
Searching the Threshold Value of the File System Click the menu to automatically search and display the threshold on the table. Click the „Get‟ button on the window to refresh the threshold value and display the most recent information. Setting the Threshold Value of the File System The operators can set the desired threshold value in the threshold setting table. Click the „Set‟ button to set the threshold.
5.4.4 Database „Database‟ management feature allows to view the EMS server‟s database information and set the threshold values. The threshold is used to trigger an alarm if the database usage rate of the EMS server exceeds a specific value. General Server Status Database
Figure 5.8 Database Window
© SAMSUNG Electronics Co., Ltd.
5-11
LSM-R User Manual
Viewing the Database Usage Rate Click the menu, and the followings are displayed in the result table. Threshold to issue an alarm upon the database status. Database status retrieving period. Current database status. The current database status table is renewed automatically in every designated period. Click „Get‟ to view the thresholds and cycles.
© SAMSUNG Electronics Co., Ltd.
5-12
LSM-R User Manual
The database parameters are as follows: Item
Description
Resource
The database type.
Current status (%)
The current database usage rate.
Total size (Mbytes)
Total size of the database in Mbytes.
Used size (Mbytes)
Used space of the database in Mbytes.
Free size (Mbytes)
Available space of the database in Mbytes.
Searching the Threshold of the Database Click the menu to automatically search and display the threshold on the table. Click the „Get‟ button on the window to refresh the threshold value and display the most recent information. Setting the Database Threshold The operators can set the desired threshold value in the threshold setting table. Click the „Set‟ button to set the threshold.
© SAMSUNG Electronics Co., Ltd.
5-13
LSM-R User Manual
5.5 Resource Statistics „Resource Statistics‟ feature allows to view the hourly, daily, and monthly usage rate (%) of the EMS resources such as CPU, file system, memory, and database. Each usage rate is displayed in graphs and tables for your convenience. General Resource Statistics
Figure 5.9 Resource Statistics Window
Searching the Resource Statistics The parameters of the resource statistics are as follows: Item
Description
Resource Type
Types of the resources.
Resource Name
Displays the names of the detailed items by the resource types.
Statistics Type
The statistics type is divided into hourly, daily and monthly.
Period
Displays the start time and the end time.
1) 2) 3) 4) 5)
Select the resources to search for in the „Resource Type‟ field of the settings table. Select the name to search for in the „Resource Name‟ field. Select the statistics type to search for in the „Statistics Type‟ field. Select the period to search for in the „Period‟ field. Click „Get‟.
© SAMSUNG Electronics Co., Ltd.
5-14
LSM-R User Manual
Displaying the Resource Statistics To print the searched contents, click the „Print‟ button. Use the print dialog window to print. Saving the Resource Statistics To save the searched contents to the client, click the „Save‟ button. The resource statistics are saved in two formats: The graph in PDF format, and the table in XLS format.
© SAMSUNG Electronics Co., Ltd.
5-15
LSM-R User Manual
5.6 Database 5.6.1 Log Management „Log Management‟ allows to set the storing cycle of the PM, FM, and SM raw data, and the hourly, daily and monthly statistics data. It also allows to automatically deletes the data according to the predefined cycle. General Database
Figure 5.10 Log Management Window
Viewing and Changing the Database Log Information Storing Cycle Select the database log management menu to display the current storing cycle information for the FM, PM and SM data. Modify the storing cycle of the data you wish to change, then click the „Set‟ button.
© SAMSUNG Electronics Co., Ltd.
5-16
LSM-R User Manual
5.7 Self Diagnosis „Self Diagnosis‟ allows to view the status of the RMI connection, DB connection and event channel of the processes running in the EMS server. General Self Diagnostic
Figure 5.11 Self Diagnostic Window
Viewing the Process Diagnosis Status The parameters for the process diagnosis status are as follows: Parameter
Description
Process Name
The name of the process.
DB Status
The connection status between the process and the database. (
RMI Status
if normal,
if abnormal.)
The connection status between the process and the RMI. (
if normal,
if abnormal.)
Select the „Self-Diagnosis‟ menu to display the status of the database connection and RMI connection for each process in the results table. 2) The connection status will be displayed as if normal, and if abnormal. 3) Click the „Test‟ button in the window to test the status and refresh the window.
1)
© SAMSUNG Electronics Co., Ltd.
5-17
LSM-R User Manual
Viewing the Event Channel Diagnosis Status The parameters for the event channel diagnosis status are as follows: Item
Description
Publisher
A process distributing the events.
Link Status
The connection status between the processes will be displayed as normal, and
Subscriber
if
if abnormal.
A process receiving the events.
1) Select the „Self Diagnosis‟ menu to display the event channel status in the result table. 2) The event channel will be displayed as if normal, and if abnormal. 3) Click the „Test‟ button in the window to test the status and refresh the window.
© SAMSUNG Electronics Co., Ltd.
5-18
LSM-R User Manual
5.8 Log Viewer The log viewer allows to view the log file saved in the LSM server. In addition to viewing the log file details, the log viewer also allows to search by time and message. Depending on the quantity of the data in the selected file, the information may be displayed in multiple pages as illustrated below. Enter the keyword in the search Input Window at the top of the main window to search and display the parts within the current page that match the corresponding keyword. (The parts will be highlighted.)
Figure 5.12 Log Viewer Window (1)
Click „1 Hour‟, „12 Hours‟, „1 Day‟, or „Search‟ to perform the search by time or by message. The following illustrates the search by time. The LSM‟s log file is created by time, and thus only requires the search time to be provided by the user. Click the „Save‟ button to save the displayed information to the PC. If there‟s no search result, the „Save‟ button will be disabled.
Figure 5.13 Log Viewer Window (2)
© SAMSUNG Electronics Co., Ltd.
5-19
LSM-R User Manual
The following illustrates the search by message. The search by message is a feature specific to the log file created in the LSM. (The search may not be performed correctly if the format of the file is incorrect.) The log message created in the LSM uses the „;‟ symbol to distinguish between each log. The search by message will display all the log messages containing the keyword provided by the operator.
Figure 5.14 Log Viewer Window (3)
Check the „special‟ option to perform a conditional search. The conditional search uses special characters (&&, ||) between the keywords to add conditions (AND, OR) when performing the search. „&&‟ implies the AND condition, and „||‟ implies the OR condition. ABC && DEF: Search only the messages containing both ABC and DEF. ABC || DEF: Search the messages containing either ABC or DEF. Up to three keywords can be entered per search. A space must be provided between the keyword and the special characters.
© SAMSUNG Electronics Co., Ltd.
5-20
LSM-R User Manual
CHAPTER 6. Security Management
The security management feature allows to the operator to register, modify, search and/or delete user accounts. The security management module ensure the authorized access to the EMS system. Also this module will maintain the operation history for all the operators on the system.
6.1 User Manager „User Manager‟ feature provides facility to manage operator accounts on the EMS. This module will provide facility to view, modify and delete operator accounts, change access permission for users and assign the groups of NEs to specific user. Security User Manager
Figure 6.1 Operator Management Window
© SAMSUNG Electronics Co., Ltd.
6-1
LSM-R User Manual
The parameters for the operator management are as follows: Parameter
Description
User ID
Operator’s ID.
Privilege
Operator Level. The level includes Security Administrator, System Administrator, Manager, Operator and Guest.
Status
Operator’s status. The status includes Enable, Disable and Lockout.
Login Type
Possibility of accessing with the same ID from different sessions at the same time. If it is set to Single, operators cannot use the same ID to access from more than one session. But if it is set to Multiple, operators can login as many times as the designated number of sessions with the same ID.
Group
Information of group to which the operator belongs.
E-mail
Operator’s E-mail
Last Login IP
Last accessed IP.
Last Login Time
Last accessed time.
Managing node
Managing node.
Searching Operators 1)
If you select the Operator Management function, the currently registered operator information will be displayed in the result table. 2) The detailed information of the selected operator is displayed on the right. 3) Click the „Get‟ button at the bottom of the window to refresh the operator information. Operator Registration 1) Click „Add‟ at the bottom of the window. 2) The operator registration window appears on the right. 3) Enter the operator information and click „OK‟. 4) If the registration was successful, it will be shown in the result table. The parameters for the operator registration are as follows:
Figure 6.2 Operator Registration Window
© SAMSUNG Electronics Co., Ltd.
6-2
LSM-R User Manual
Parameter
Description
User ID
Operator’s ID.
Password
Operator’s password.
Re-Password
Verification of the password.
Privilege
Operator Level. The level includes Security Administrator, System Administrator, Manager, Operator and Guest.
Group
Operator’s group Different NE is assigned to each group to manage. The top level operator must select the default group.
Login Type
Specify whether to allow multiple logins using the same ID. If yes, enter the maximum number of sessions allowed to login.
E-mail
The operator E-mail address (optional).
Modifying Operator 1) 2)
Select an operator to modify from the result table. Click on the „Modify‟ button to display the operator information change window on the right. 3) Modify the operator information, then click „OK‟. 4) The changed information is reflected and displayed in the result table.
Figure 6.3 Operator Information Change Window
© SAMSUNG Electronics Co., Ltd.
6-3
LSM-R User Manual
Deleting Operator 1) 2) 3) 4) 5) 6)
Select an operator to delete from the result table. Click the „Delete‟ button at the bottom of the window. When the password input screen appears, enter the password of the operator currently logged in. In the password confirmation window, click „OK‟. If the operator is successfully deleted, it will be reflected in the result table. If a client was logged in with the deleted operator ID, it will be terminated forcefully.
Figure 6.4 Operator Information Deletion Window
Changing the Lockout Operator Status 1)
If you enter a wrong password five times consecutively during the login, you will be locked out. When locked out, you cannot log in for one hour.
Figure 6.5 Operator Lockout Window
2)
From the Operator Management, select an operator in lockout status.
3)
Click on the „Modify‟ button to display the operator information change window on the right.
4)
Change the operator status to Enable and click „OK‟.
5) The changed information will be reflected and displayed in the result table. 6)
Check whether the corresponding operator can log in again.
© SAMSUNG Electronics Co., Ltd.
6-4
LSM-R User Manual
6.2 Changing Password The „Changing Password‟ menu allows to change the his/her password. Security Change Password
Figure 6.6 Changing Password Window
The parameters for changing the password are as follows: Parameter
Description
Old Password
Current login password.
Password
New password.
Re-Password
Confirmation of the new password.
Changing Password 1) Click „Change Password‟ to change the password of the current operator. 2) Fill in the „Old Password‟, „Password‟, and „Re-Password‟ fields then click „OK‟ to change the password.
© SAMSUNG Electronics Co., Ltd.
6-5
LSM-R User Manual
6.3 Group Management The „Group Management‟ menu allows to group the network elements. Security Group Management
Figure 6.7 Group Management Window
The parameters for the group management are as follows: Parameter
Description
Group Name
Name of the network group.
Configuration Info.
- Available Elements: Available network configuration elements displayed in tree view. - Selected Elements: Elements the operator selected from the Available Elements.
User List
The list of the users within the group.
Comment
Description of the corresponding element.
Searching Groups If you click the „Group Management‟ menu, the information on the currently registered groups are searched and displayed on the result table. 2) Click the „View‟ button to refresh the registered group information. 1)
© SAMSUNG Electronics Co., Ltd.
6-6
LSM-R User Manual
Adding a Group 1) 2) 3)
Click „Add‟ at the bottom of the window. Enter the group name in the window displayed on the right and select a group element. Click the „OK‟ button in the window. Check if the registered group information is displayed on the result table.
Figure 6.8 Group Addition Window
© SAMSUNG Electronics Co., Ltd.
6-7
LSM-R User Manual
Changing Group Information 1) 2) 3) 4) 5)
Select a group to modify from the result table. Note: you cannot change the default group information. Click the „Modify‟ button at the bottom of the window. Check if the detailed information of the selected group is displayed on the right. Modify the group element information. Click the „OK‟ button in the window to apply the change.
Figure 6.9 Group Information Change Window
Deleting Groups 1) 2) 3) 4)
Select the group to delete from the result table. Note: you cannot delete the default group. Click the „Delete‟ button at the bottom of the window. In the deletion confirmation window, click „OK‟. You cannot delete the group if the group has an operator assigned to it.
Figure 6.10 Group Deletion Window
© SAMSUNG Electronics Co., Ltd.
6-8
LSM-R User Manual
6.4 IP Manager The „IP Manager‟ menu allows to manage the login authorization by client IP address and the number of sessions allowed for simultaneous access. Security IP Manager
Figure 6.11 IP Management Window
The parameters for the IP manager are as follows: Parameter
Description
IP Address
The client IP address.
Login Allowance
Whether to allow or deny login. If it is set to Allow, the login from the registered IP is allowed. If it is set to Deny, the login from the registered IP is not allowed.
Sessions
If Login Allowance is set to Allow, this indicates the number of sessions allowed for simultaneous access. (The maximum number of allowed sessions is 20.)
Description
Description of the IP.
Viewing the IP 1) The information of the currently registered IP is displayed on the result table. 2) To search by Login Allowance or IP, enter the search criteria in the search input table, then click „Search‟.
© SAMSUNG Electronics Co., Ltd.
6-9
LSM-R User Manual
Registering IP 1) Click „Add‟ at the bottom of the window. 2) The IP registration window appears on the right. 3) Enter the IP registration information and click the „OK‟ button. 4) If the information is processed successfully, the registered IP information will be displayed on the result table. Note: If Login Allowance is set to Deny, the client running in the corresponding IP address will be terminated forcefully.
Figure 6.12 IP Registration Window
© SAMSUNG Electronics Co., Ltd.
6-10
LSM-R User Manual
Changing the IP Information 1) 2) 3) 4) 5)
Select the IP information to change in the result table. Check if the detailed information of the selected IP is displayed on the right. Click „Modify‟ at the bottom of the window to display the modification window. Change the IP information in the modification window, then select „OK‟. If the modification of the IP information is processed successfully, the modified IP information will displayed in the result table. Note: If Login Allowance is set to Deny, the client running in the corresponding IP address will be terminated forcefully.
Figure 6.13 IP Information Change Window
© SAMSUNG Electronics Co., Ltd.
6-11
LSM-R User Manual
Deleting IP 1) 2) 3) 4) 5)
Click the IP to delete in the result table. Check if the detailed information of the selected IP is displayed on the right. Click on the „Delete‟ button at the bottom of the window. In the deletion confirmation window, click „OK‟. If the IP is successfully deleted, it will be reflected in the result table. Note: If an IP is deleted, the client running in the corresponding IP address will be terminated forcefully.
Figure 6.14 IP Deletion Window
© SAMSUNG Electronics Co., Ltd.
6-12
LSM-R User Manual
6.5 Login History „Login history‟ will provide facility to record and review the login history of various users of the EMS system. It also provides information about active users logged in on the server.
6.5.1 History „History‟ window allows the operator to view the login and logout history. Security Login History History
Figure 6.15 History Window
The parameters for the history are as follows. Parameter
Description
User ID
The account of the logged in operator.
IP Address
The client IP address.
Login Time
The time the operator logged in.
Logout Time
The time the operator logged out.
Success/Fail
Login success/fail for the operator.
Login Fail Reason
The reason for the login failure (if any).
Logout Status
Logout type.
Viewing History 1)
Enter the search criteria in the search input table. The available search criteria are Operator ID, IP Address, Login Success/Fail, and Login Time. 2) Click the „Search‟ button to search for login history. 3) The login history search results will be displayed in the result table. Saving/Printing 1) Search the history data with the login history search function. 2) Click the „Save‟ button in the window to save the searched data in an Excel file. 3) To print the saved data, use the print function in Microsoft Excel.
© SAMSUNG Electronics Co., Ltd.
6-13
LSM-R User Manual
6.5.2 Logon Session In the „Logon Session‟ menu, the operator can view all the users currently logged-in on the server. Also the operator with proper permissions can forcefully terminate the user sessions. Security Login History Logon Session
Figure 6.16 Logon Session Window
The parameters for the logon session are as follows. Parameter
Description
User ID
The account of the logged in user.
Privilege
The level of the logged in operator.
IP Address
The client IP address.
Login Time
The time the operator logged in.
Viewing the Logon Session 1)
If you select the Logon Session menu, the sessions currently logged on are displayed in the result table. 2) Click the „Search‟ button in the window to refresh the information of the session currently logged on. Forced Termination of the Logged on Session 1) 2) 3)
Select a logged in session you wish to force to terminate. Click the „Delete‟ button in the window to terminate the session of the corresponding operator. Check if the terminated session has been deleted from the logon session result table.
© SAMSUNG Electronics Co., Ltd.
6-14
LSM-R User Manual
6.6 Operation History The Operation history module records all commands executed by all the operators and stores it in the EMS database. The operator will have access to all the command/operation history of all users under “Operation History” window on the LSMR. The operator can search the operation history using various search criteria. The available search criteria are operator ID, Function, Message, Command and search period. Security Operation History
Figure 6.17 Operation History Window
The parameters for the operation history are as follows. Parameter
Description
Target
The target on which the command was executed.
User ID
The account of the logged in user.
Function
Separator for the EMS block which executed the command
Message
Identifier for the command type.
Command
The command executed.
Period
The time the command was requested/completed.
Searching the Operation History 1)
Select a system in which to search the operation history in tree view. The selected system will be displayed in the „Target‟ field of the setting table. 2) Enter the desired search criteria, such as Period, Operator ID, Function, Message and Command, in the search input table. 3) Click the „Search‟ button in the window to search the operation history. 4) The operation history search results will be displayed in the result table. Saving/Printing 1) Search the history data with the operation history search function. 2) Click the „Save‟ button in the window to save the searched data in an Excel file. 3) To print the saved data, use the print function in Microsoft Excel.
© SAMSUNG Electronics Co., Ltd.
6-15
LSM-R User Manual
CHAPTER 7. SON
SON Management feature on the LSMR provides the menu for the operation of the Self Organizing Networks (SON), including the monitoring of the DHCP and SON statuses and the setting of the variables used in the SON algorithm.
7.1 SON Option „SON Option‟ feature allows the operator to modify the configuration of the eNB‟s SON function. The basic SON Option information is set during the new eNB expansion. However, if you need to modify the SON Option after the initial setting, you will need to use the SON Option window. SON Option Window Select the „SON‟ menu in the LSM Main Window. If you select the „SON Option‟ menu, the following SON Option window will appear. Once the SON Option window is open, the Option information for the eNB and cell will be displayed. 4) Among the eNB Option information, LSM.NRT, LSM.PCID and LSM.RACH are the SON Option information managed by the LSM. The eNB.Pci, eNB.Delay compensation and eNB.Rpt Delay Compensation values are managed by the eNB. 5) Among the cell Option information, Anr, Energy Saving, Mobility Robustness, Rach Opt, etc. are managed by each cell. 1) 2) 3)
© SAMSUNG Electronics Co., Ltd.
7-1
LSM-R User Manual
Figure 7.1 SON Management Window
Tree Viewer: Displays all NEs registered to the LSM in tree structure. eNB SON Option: Retrieves the registered eNB‟s SON Option information. eNB Name: The name registered by the operator during the eNB expansion. LSM.NRT: Whether to create the initial neighbor information during the expansion. LSM.PCID: Whether to automatically allocate the physical cell id during the expansion. LSM.RACH: Whether to automatically allocation the RootSequenceIndex during the expansion. eNB.Pcid: Whether to use the pcid Enable function in he eNB. eNB.Delay Compensation: Whether to use the Delay Compensation function in the eNB. eNB.Rpt Delay Compensation: Whether to use the Rpt Delay Compensation function in the eNB Result: Execution result. Cell SON Option: Retrieves the registered cell‟s SON Option information. eNB Name: The name registered by the operator during the eNB expansion. Cell Number: Number of the cell. Anr: Whether to use the anr function. Energy Saving: Whether to use the energy saving function. Mobility Robustness: Whether to use the Mobility Robustness function. Mobility Load Balance: Whether to use the Mobility Load Balance function. Rach Opt: Whether to use the Rach Optimize function. Cnc Opt: Whether to use the Cnc Optimize function.
© SAMSUNG Electronics Co., Ltd.
7-2
LSM-R User Manual
Viewing SON Option Select the „SON‟ menu in the LSM Main Window. Select the „SON Option‟ menu to launch the SON Option window. In the tree view, select the NE Type and NE Version to retrieve the corresponding NE and SON Option that meet the criteria. 4) To retrieve the SON Option again without changing the NE Type and NE Version in the tree view, click the „View‟ button at the bottom of the window. 1) 2) 3)
Figure 7.2 SON Option Search Criteria Selection
Changing SON Option Select the „SON‟ menu in the LSM Main Window. Select the „SON Option‟ menu to launch the SON Option window. In the tree view, select the eNB to modify the SON Option. Modify the Option information of the corresponding eNB and cell as shown below. After the modification, click the „Execute‟ button at the bottom of the window. Once the Option change has been applied to the LSM database and eNB, „OK‟ will be displayed on the result window. 7) If the change application fails, the reason of failure will be displayed in the result window. 1) 2) 3) 4) 5) 6)
Figure 7.3 Changing SON Option
© SAMSUNG Electronics Co., Ltd.
7-3
LSM-R User Manual
Batch Modifying SON Option 1) 2) 3) 4) 5) 6) 7)
Select the „SON‟ menu in the LSM Main Window. Select the „SON Option‟ menu to launch the SON Option window. In the tree view, select the eNB to modify the SON Option. Double-click the header of the table containing the SON Option information to pop up a window to modify the flag information as shown below. Modify the Option information in the popup window, then click „OK‟ to process the batch modification of the SON Option for the selected eNBs in the tree. You can also perform the batch modification of the cell Option similarly to the eNB by selecting the cell information at the bottom. After the modification, click the „Execute‟ button at the bottom to apply the SON Option.
Figure 7.4 Batch Modifying SON Option
© SAMSUNG Electronics Co., Ltd.
7-4
LSM-R User Manual
7.2 SON Property SON Property provides a menu to set the values used in the SON algorithm. SON SON Property
Figure 7.5 SON Property Window
The SON property values that can be set are as follows: Parameter R Count
Description Can set to 0 or a greater value. Number of Cell to use for calculating average of NRT, PCI, RSI.
NRT Type
Can set to minimum, average or distance. Criteria of the effective radius when configuring NRT. - minimum: using R as distance with nearest neighbor cell - distance: criteria of fixed distance - average: using R as average distance with cell inside initDistance
NRT Multiple
Can set to 0 or a greater value. Expansion range of calculating the effective distance when configuring NRT
NRT Limit Distance
Can set to 0 or a greater value. Minimum of the effective radius when configuring NRT
© SAMSUNG Electronics Co., Ltd.
7-5
LSM-R User Manual
Parameter PCI Type
Description Can set to minimum, average or distance Criteria of the effective radius when allocating PCI - minimum : using R as distance with nearest neighbor cell - distance : criteria of fixed distance - average : using R as average distance with cell inside initDistance
PCI Multiple
Can set to 0 or a greater value. Expansion range of calculating the effective distance when allocating PCI
PCI Limit Distance
Can set to 0 or a greater value. Minimum of the effective radius when allocating PCI
PCI Black List
- Can set as number or number-number. - Set PCI Black List. - Can set up to 10 range. - In case of entering none or space: unused Black List ex) In case of setting 0-10,400-503: not allocated PCI of that range
PCI Reconfig Mode
Can set to cellAdminShutDown, cellAdminLock Mode of PCI Reconfiguration (eNB change Administrative Status in case of PCI Reconfiguration) . cellAdminShutDown : Unlock -> Shutting down . cellAdminLock : Unlock -> Locked
PCI Reconfig Timeout
Can set to 0 or a greater value.(unit: minute) Timeout of PCI Reconfig Mode
RSI Type
Can set to minimum, average, distance. Criteria of the effective radius when allocating RSI . minimum : using R as distance with nearest neighbor cell . distance : criteria of fixed distance . average : using R as average distance with cell inside initDistance
RSI Multiple
Can set to 0 or a greater value. Expansion range of calculating the effective distance when allocating RSI
RSI Limit Distance
Can set to 0 or a greater value. Minimum of the effective radius when allocating RSI
© SAMSUNG Electronics Co., Ltd.
7-6
LSM-R User Manual
Changing SON Property 1) 2)
You can change the property value in the SON Property Modification window. Click „Modify‟ to save the change to son_env.properties file in the server. The file will later be applied to the SON algorithm. If the property value is incorrect, the following window will be displayed upon clicking the „Modify‟ button.
Figure 7.6 SON Property Window Failure Verification
Cancelling the SON Property Modification 1) 2)
You can change the property value in the SON Property Modification window. Click „Cancel‟ to erase the current field values and import the property values from son_env.properties file.
© SAMSUNG Electronics Co., Ltd.
7-7
LSM-R User Manual
ANNEX A. Open Source Announcement
Some software components of this product incorporate source code covered under the GNU General Public License (GPL), Apache License etc. Acknowledgement: This product includes software developed by the Apache Software Foundation (http: //www.apache.org/). This product includes software developed by the JDOM Project (http: //www.jdom.org/) The software included in this product contains copyrighted software that is licensed under the GPL/LGPL. You may obtain the complete Corresponding Source code from us for a period of three years after our last shipment of this product by sending email to:
[email protected] If you want to obtain the complete Corresponding Source code in the physical medium such as CD-ROM, the cost of physically performing source distribution may be charged. This offer is valid to anyone in receipt of this information. Below is the list of components covered under GNU General Public License (GPL), Apache License etc. Component Apache Jakarta
License Apache 1.1
Commons BeanUtils Apache Jakarta
Apache Xerces Java
License Apache 2.0
XML Parser Apache 1.1
Commons Digester Apache Jakarta Slide
Component
Apache XML Xalan-
Apache 2.0
Java Apache 1.1
Apache XML-
Apache 2.0
Commons Resolver Apache Struts
Apache 1.1
Jakarta Commons-IO
Apache 2.0
Apache Xerces Java
Apache 1.1
Jakarta Commons-
Apache 2.0
XML Parser
Logging
Apache XML Crimson
Apache 1.1
xalan
Apache 2.0
Apache-XMLBeans
Apache 2.0
ISPConfig Hosting
BSD 2.0
Control Panel
© SAMSUNG Electronics Co., Ltd.
A-1
LSM-R User Manual
(Continued) Component
License
Component
License
Apache Ant
Apache 2.0
JavaMail
CDDL 1.0
Apache Axis2/Java
Apache 2.0
JAXB 2.0 Project
CDDL 1.0
Apache Jackrabbit
Apache 2.0
backport-util-
Creative Commons
concurrent
Public Domain Dedication
Apache Jakarta
Apache 2.0
Cryptix JCE
Commons Codec Apache Jakarta
Cryptix General License
Apache 2.0
J FTP
GPL 2.0
Apache 2.0
jaxen
Jaxen License
Apache 2.0
JDOM
Jdom License
Apache Jakarta Log4j
Apache 2.0
SACK
License for SACK
Apache Struts
Apache 2.0
Java Tar
Public Domain
Apache Tomcat
Apache 2.0
-
-
Commons Email Apache Jakarta Commons FileUpload Apache Jakarta HTTP Client
© SAMSUNG Electronics Co., Ltd.
A-2
LSM-R User Manual
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation‟s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author‟s protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors‟ reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone‟s free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.
© SAMSUNG Electronics Co., Ltd.
A-3
LSM-R User Manual
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0) This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The „Program‟, below, refers to any such program or work, and a „work based on the Program‟ means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limiation in the term „modification‟.) Each licensee is addressed as „you‟. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1) You may copy and distribute verbatim copies of the Program‟s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2) You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
© SAMSUNG Electronics Co., Ltd.
A-4
LSM-R User Manual
3)
4)
5)
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.
© SAMSUNG Electronics Co., Ltd.
A-5
LSM-R User Manual
6)
Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients‟ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7) If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royaltyfree redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8) If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9) The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and „any later version‟, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
© SAMSUNG Electronics Co., Ltd.
A-6
LSM-R User Manual
10) If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11) BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM „AS IS‟ WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12) IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS
© SAMSUNG Electronics Co., Ltd.
A-7
LSM-R User Manual
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the „copyright‟ line and a pointer to where the full notice is found.
Copyright (C) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 021101301 USA.
Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type „show w‟. This is free software, and you are welcome to redistribute it under certain conditions; type „show c‟ for details. The hypothetical commands „show w‟ and „show c‟ should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than „show w‟ and „show c‟; they could even be mouse-clicks or menu items-whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a „copyright disclaimer‟ for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program „Gnomovision‟ (which makes passes at compilers) written by James Hacker.
, 1 April 1989 Ty Coon, President of Vice
© SAMSUNG Electronics Co., Ltd.
A-8
LSM-R User Manual
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License.
Apache Software License Version 1.1 Copyright (c) 2000 The Apache Software Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment: „This product includes software developed by the Apache Software Foundation (http://www.apache.org/).‟ Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear. 4. The names „Apache‟ and „Apache Software Foundation‟ must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact
[email protected]. 5. Products derived from this software may not be called „Apache‟, nor may „Apache‟ appear in their name, without prior written permission of the Apache Software Foundation. THIS SOFTWARE IS PROVIDED „AS IS‟ AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
© SAMSUNG Electronics Co., Ltd.
A-9
LSM-R User Manual
This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation. For more information on the Apache Software Foundation, please see . Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.
Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. „License‟ shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. „Licensor‟ shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. „Legal Entity‟ shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, „control‟ means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. „You‟ (or „Your‟) shall mean an individual or Legal Entity exercising permissions granted by this License. „Source‟ form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. „Object‟ form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. „Work‟ shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). „Derivative Works‟ shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
© SAMSUNG Electronics Co., Ltd.
A-10
LSM-R User Manual
„Contribution‟ shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, „submitted‟ means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as „Not a Contribution.‟ „Contributor‟ shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and
© SAMSUNG Electronics Co., Ltd.
A-11
LSM-R User Manual
(d) If the Work includes a „NOTICE‟ text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and provide additional or different license terms and conditions use, reproduction, or distribution of Your modifications, or any such Derivative Works as a whole, provided Your use, production, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an „AS IS‟ BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.
© SAMSUNG Electronics Co., Ltd.
A-12
LSM-R User Manual
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets „„” replaced with your own identifying information. (Don‟t include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same „printed page‟ as the copyright notice for easier identification within third-party archives.
Copyright ‘yyyy’ ‘name of copyright owner’ Licensed under the Apache License, Version 2.0 (the ‘License’); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an ‘AS IS’ BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License
© SAMSUNG Electronics Co., Ltd.
A-13
LSM-R User Manual
BSD License Copyright (c) , All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS „AS IS‟ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
© SAMSUNG Electronics Co., Ltd.
A-14
LSM-R User Manual
COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0 1.Definitions. 1.1. „Contributor‟ means each individual or entity that creates or contributes to the creation of Modifications. 1.2. „Contributor Version‟ means the combination of the Original Software, prior Modifications used by a Contributor (if any), and the Modifications made by that particular Contributor. 1.3. „Covered Software‟ means (a) the Original Software, or (b) Modifications, or (c) the combination of files containing Original Software with files containing Modifications, in each case including portions thereof. 1.4. „Executable‟ means the Covered Software in any form other than Source Code. 1.5. „Initial Developer‟ means the individual or entity that first makes Original Software available under this License. 1.6. „Larger Work‟ means a work which combines Covered Software or portions thereof with code not governed by the terms of this License. 1.7. „License‟ means this document. 1.8. „Licensable‟ means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein. 1.9. „Modifications‟ means the Source Code and Executable form of any of the following: A. Any file that results from an addition to, deletion from or modification of the contents of a file containing Original Software or previous Modifications; B. Any new file that contains any part of the Original Software or previous Modification; or C. Any new file that is contributed or otherwise made available under the terms of this License. 1.10. „Original Software‟ means the Source Code and Executable form of computer software code that is originally released under this License. 1.11. „Patent Claims‟ means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor. 1.12. „Source Code‟ means (a) the common form of computer software code in which modifications are made and (b) associated documentation included in or with such code. 1.13. „You‟ (or „Your‟) means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License. For legal entities, „You‟ includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, „control‟ means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.
© SAMSUNG Electronics Co., Ltd.
A-15
LSM-R User Manual
2. License Grants. 2.1. The Initial Developer Grant. Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, the Initial Developer hereby grants You a world-wide, royaltyfree, non-exclusive license: (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer, to use, reproduce, modify, display, perform, sublicense and distribute the Original Software (or portions thereof), with or without Modifications, and/or as part of a Larger Work; and (b) under Patent Claims infringed by the making, using or selling of Original Software, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Software (or portions thereof). (c) The licenses granted in Sections 2.1 (a) and (b) are effective on the date Initial Developer first distributes or otherwise makes the Original Software available to a third party under the terms of this License. (d) Notwithstanding Section 2.1 (b) above, no patent license is granted: (1) for code that You delete from the Original Software, or (2) for infringements caused by: (i) the modification of the Original Software, or (ii) the combination of the Original Software with other software or devices. 2.2. Contributor Grant. Conditioned upon Your compliance with Section 3.1 below and subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license: (a) under intellectual property rights (other than patent or trademark) Licensable by Contributor to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof), either on an unmodified basis, with other Modifications, as Covered Software and/or as part of a Larger Work; and (b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: (1) Modifications made by that Contributor (or portions thereof); and (2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination). (c) The licenses granted in Sections 2.2 (a) and 2.2 (b) are effective on the date Contributor first distributes or otherwise makes the Modifications available to a third party. (d) Notwithstanding Section 2.2 (b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor Version; (2) for infringements caused by: (i) third party modifications of Contributor Version, or (ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or (3) under Patent Claims infringed by Covered Software in the absence of Modifications made by that Contributor.
© SAMSUNG Electronics Co., Ltd.
A-16
LSM-R User Manual
3. Distribution Obligations. 3.1. Availability of Source Code. Any Covered Software that You distribute or otherwise make available in Executable form must also be made available in Source Code form and that Source Code form must be distributed only under the terms of this License. You must include a copy of this License with every copy of the Source Code form of the Covered Software You distribute or otherwise make available. You must inform recipients of any such Covered Software in Executable form as to how they can obtain such Covered Software in Source Code form in a reasonable manner on or through a medium customarily used for software exchange. 3.2. Modifications. The Modifications that You create or to which You contribute are governed by the terms of this License. You represent that You believe Your Modifications are Your original creation(s) and/or You have sufficient rights to grant the rights conveyed by this License. 3.3. Required Notices. You must include a notice in each of Your Modifications that identifies You as the Contributor of the Modification. You may not remove or alter any copyright, patent or trademark notices contained within the Covered Software, or any notices of licensing or any descriptive text giving attribution to any Contributor or the Initial Developer. 3.4. Application of Additional Terms. You may not offer or impose any terms on any Covered Software in Source Code form that alters or restricts the applicable version of this License or the recipients rights hereunder. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Software. However, you may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear that any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer. 3.5. Distribution of Executable Versions. You may distribute the Executable form of the Covered Software under the terms of this License or under the terms of a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable form does not attempt to limit or alter the recipient‟s rights in the Source Code form from the rights set forth in this License. If You distribute the Covered Software in Executable form under a different license, You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or Contributor. You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer. 3.6. Larger Works. You may create a Larger Work by combining Covered Software with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Software.
© SAMSUNG Electronics Co., Ltd.
A-17
LSM-R User Manual
4. Versions of the License. 4.1. New Versions. Sun Microsystems, Inc. is the initial license steward and may publish revised and/or new versions of this License from time to time. Each version will be given a distinguishing version number. Except as provided in Section 4.3, no one other than the license steward has the right to modify this License. 4.2. Effect of New Versions. You may always continue to use, distribute or otherwise make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. If the Initial Developer includes a notice in the Original Software prohibiting it from being distributed or otherwise made available under any subsequent version of the License, You must distribute and make the Covered Software available under the terms of the version of the License under which You originally received the Covered Software. Otherwise, You may also choose to use, distribute or otherwise make the Covered Software available under the terms of any subsequent version of the License published by the license steward. 4.3. Modified Versions. When You are an Initial Developer and You want to create a new license for Your Original Software, You may create and use a modified version of this License if You: (a) rename the license and remove any references to the name of the license steward (except to note that the license differs from this License); and (b) otherwise make it clear that the license contains terms which differ from this License. 5. DISCLAIMER OF WARRANTY. COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN „AS IS‟ BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES THAT THE COVERED SOFTWARE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU. SHOULD ANY COVERED SOFTWARE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 6. TERMINATION. 6.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.
© SAMSUNG Electronics Co., Ltd.
A-18
LSM-R User Manual
6.2. If You assert a patent infringement claim (excluding declaratory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You assert such claim is referred to as „Participant‟) alleging that the Participant Software (meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the Initial Developer (if the Initial Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period, unless if within such 60 day period You withdraw Your claim with respect to the Participant Software against such Participant either unilaterally or pursuant to a written agreement with Participant. 6.3. In the event of termination under Sections 6.1 or 6.2 above, all end user licenses that have been validly granted by You or any distributor hereunder prior to termination (excluding licenses granted to You by any distributor) shall survive termination. 7. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED SOFTWARE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY‟S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. 8. U.S. GOVERNMENT END USERS. The Covered Software is a „commercial item,‟ as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of „commercial computer software‟ (as that term is defined at 48 C.F.R. 252.227-7014 (a) (1)) and „commercial computer software documentation‟ as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Software with only those rights set forth herein. This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFAR, or other clause or provision that addresses Government rights in computer software under this License.
© SAMSUNG Electronics Co., Ltd.
A-19
LSM-R User Manual
9. MISCELLANEOUS. This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by the law of the jurisdiction specified in a notice contained within the Original Software (except to the extent applicable law, if any, provides otherwise), excluding such jurisdiction‟s conflict-of-law provisions. Any litigation relating to this License shall be subject to the jurisdiction of the courts located in the jurisdiction and venue specified in a notice contained within the Original Software, with the losing party responsible for costs, including, without limitation, court costs and reasonable attorneys‟ fees and expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License. You agree that You alone are responsible for compliance with the United States export administration regulations (and the export control laws and regulation of any other countries) when You use, distribute or otherwise make available any Covered Software. 10. RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. Creative Commons Public Domain Dedication Copyright-Only Dedication (based on United States law) or Public Domain Certification The person or persons who have associated work with this document (the „Dedicator‟ or „Certifier‟) hereby either certifies that, to the best of his knowledge, the work of authorship identified is in the public domain of the country from which the work is published, or hereby dedicates whatever copyright the dedicators holds in the work of authorship identified below (the „Work‟) to the public domain. A certifier, moreover, dedicates any copyright interest he may have in the associated work, and for these purposes, is described as a „dedicator‟ below. A certifier has taken reasonable steps to verify the copyright status of this work. Certifier recognizes that his good faith efforts may not shield him from liability if in fact the work certified is not in the public domain. Dedicator makes this dedication for the benefit of the public at large and to the detriment of the Dedicator‟s heirs and successors. Dedicator intends this dedication to be an overt act of relinquishment in perpetuity of all present and future rights under copyright law, whether vested or contingent, in the Work. Dedicator understands that such relinquishment of all rights includes the relinquishment of all rights to enforce (by lawsuit or otherwise) those copyrights in the Work. Dedicator recognizes that, once placed in the public domain, the Work may be freely reproduced, distributed, transmitted, used, modified, built upon, or otherwise exploited by anyone for any purpose, commercial or non-commercial, and in any way, including by methods that have not yet been invented or conceived.
© SAMSUNG Electronics Co., Ltd.
A-20
LSM-R User Manual
Cryptix General License Copyright (c) 1995-2004 The Cryptix Foundation Limited. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED AND CONTRIBUTORS „AS IS‟ AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE CRYPTIX FOUNDATION LIMITED OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. jaxen License Copyright 2003 (C) The Werken Company. All Rights Reserved. Redistribution and use of this software and associated documentation („Software‟), with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain copyright statements and notices. Redistributions must also contain a copy of this document. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. The name „jaxen‟ must not be used to endorse or promote products derived from this Software without prior written permission of The Werken Company. For written permission, please contact
[email protected]. Products derived from this Software may not be called „jaxen‟ nor may „jaxen‟ appear in their names without prior written permission of The Werken Company. „jaxen‟ is a registered trademark of The Werken Company. Due credit should be given to The Werken Company. (http://jaxen.werken.com/).
© SAMSUNG Electronics Co., Ltd.
A-21
LSM-R User Manual
THIS SOFTWARE IS PROVIDED BY THE WERKEN COMPANY AND CONTRIBUTORS „AS IS‟ AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE WERKEN COMPANY OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. jdom License Copyright (C) 2000-2004 Jason Hunter & Brett McLaughlin. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the disclaimer that follows these conditions in the documentation and/or other materials provided with the distribution. The name „JDOM‟ must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact {request_AT_jdom_DOT_org}. Products derived from this software may not be called „JDOM‟, nor may „JDOM‟ appear in their name, without prior written permission from the JDOM Project Management {request_AT_jdom_DOT_org}. In addition, we request (but do not require) that you include in the end-user documentation provided with the redistribution and/or in the software itself an acknowledgement equivalent to the following: „This product includes software developed by the JDOM Project (http://www.jdom.org/).‟ Alternatively, the acknowledgment may be graphical using the logos available at http://www.jdom.org/images/logos. THIS SOFTWARE IS PROVIDED „AS IS‟ AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE JDOM AUTHORS OR THE PROJECT CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
© SAMSUNG Electronics Co., Ltd.
A-22
LSM-R User Manual
License of SACK COPYRIGHT AND PERMISSION NOTICE for Simple AJAX Code Kit (SACK). Copyright © 2005 Gregory Wild-Smith Authors Website: http://www.twilightuniverse.com/ All rights reserved. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the „Software‟), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s), authors website url, and this permission notice appear in all copies of the Software and that the above copyright notice(s), authors url, and this permission notice appear in supporting documentation. THE SOFTWARE IS PROVIDED „AS IS‟, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.
© SAMSUNG Electronics Co., Ltd.
A-23
LSM-R
User Manual ©2011 Samsung Electronics Co., Ltd. All rights reserved. Information in this manual is proprietary to SAMSUNG Electronics Co., Ltd. No information contained here may be copied, translated, transcribed or duplicated by any form without the prior written consent of SAMSUNG. Information in this manual is subject to change without notice.