Ericsson CPP Survey .ppt

上传人:土8路 文档编号:11403752 上传时间:2021-08-02 格式:PPT 页数:101 大小:3.49MB
返回 下载 相关 举报
Ericsson CPP Survey .ppt_第1页
第1页 / 共101页
Ericsson CPP Survey .ppt_第2页
第2页 / 共101页
Ericsson CPP Survey .ppt_第3页
第3页 / 共101页
Ericsson CPP Survey .ppt_第4页
第4页 / 共101页
Ericsson CPP Survey .ppt_第5页
第5页 / 共101页
点击查看更多>>
资源描述

《Ericsson CPP Survey .ppt》由会员分享,可在线阅读,更多相关《Ericsson CPP Survey .ppt(101页珍藏版)》请在三一文库上搜索。

1、Other boards,Other boards,Other boards,ET-M1,ET-M1,ET-M1,GPB Active Core MP,GPB Active Core MP,GPB Passive Core MP,GPB Passive Core MP,- 298,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,LMs LMs,BP xx,Repertoire:,A group of loadmodules that are going to be executed in the same processor.,Software

2、Allocation 1 Core MPs Core_MP,Software Allocation xx,Software Allocation 2 BPs LMs,CPP Survey Software Allocation Links the repertoires to the,correct processor,Figure 9-13 Phase 1 - Software Allocation vs. Repertoires When creating the upgrade packet the load modules have to be linked with the boar

3、ds in the node in the Upgrade Control File. This file is created in the Software Manager of the Element Manager. The tools for this are:, ,Software repertoires Software allocations,Software repertoires A software repertoire is a group of loadmodules that will execute on the same processor. For examp

4、le, all loadmodules that will execute on the core MPs will be grouped together in the same repertoire (ex. CORE_MPs). Software Allocations The repertoires define the loadmodules that will execute in all the processors. However, they will not define where the processor is.,EN/LZT 123 6795 R2A,Copyrig

5、ht Ericsson AB, 2003,- 299,9 Operation and Maintenance The software allocation links the correct set of repertoires to the correct set of boards. Example, the core MPs in a RNC is located on slot 10 and 11. The software allocation links the repertoire, CORE MPs, to these slots. Upgrade Control File

6、(UCF.xml) This file contains the information that the node needs to perform the upgrade. See the table below. Table 9-1 The content of the UCF.xml file,- 300,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey SOFTWARE INSTALLATION,/plnh /d GPB All other GPBs,/plnh /d GPB All other GPBs,/c,/d

7、 GPB Active Core GPB,Upgrade Packet,Distribution of,Loadmodules,Figure 9-14 Phase 2 - installation The software installation process aims to install the upgrade package at the file system at the Network Element. The process is performed manually using the CPP Element Manager, i.e. the Software Manag

8、er. The software (UP) is downloaded from a central FTP server. The Software Manager will guide the operator step by step through the process. Once the installation phase is finished, the new software is pre-loaded into the memories and the node is ready for the upgrade phase. SOFTWARE UPGRADE The SW

9、 Upgrade procedure provides functionality to activate new SW previously installed using the SW installation System Function, and creates a new current Configuration Version (CV). A precondition for the SW Upgrade function is that the correct SW and HW are successfully installed on the network elemen

10、t during the software installation phase. From the SW Upgrade graphical user interface (GUI) the operator will be able to perform the following tasks., ,Select an Upgrade Package Update network element software Confirm new software,EN/LZT 123 6795 R2A,Copyright Ericsson AB, 2003,- 301,Software Manag

11、er,9 Operation and Maintenance The upgrade needs a manual confirmation by the operator in order to remain active. If no confirmation is made within a certain time, the network element will automatically roll back to previous configuration version (with previous software). GPB,Database RAM,Upgrade Pa

12、cket,UP,Rebuilding,of database,Confirm,CV1 CV2 Software Backup Flashdisk,Disabled part Upgrade Install,New entry,Figure 9-15 Phase 3 Software Upgrade The upgrade flow can be summarised as the following steps: 1) A new upgrade package is stored on the node. 2) The CPP is ordered to download the new u

13、pgrade package. 3) The CPP node interprets the upgrade information (XML) and retrieves the missing load modules. 4) The CPP node is ordered to upgrade the node. 5) A new CV is created. 6) The new program objects are distributed to the processors. 7) Board restart is made one board at the time. 8) A

14、new CV is created. The operator must confirm the successful upgrade.,- 302,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey Configuration Version Concept The Configuration Version (CV) concept in CPP is used both for Software management and backup/restore. The CV mainly includes a database

15、 export. Since the database contains the managed object model (MoM), represented as database tables, all information about CPP is included. Pointers to load modules e.g. information about name and version, hardware configuration and reference to an upgrade package is also included. The CV does NOT i

16、nclude the actual load modules or the upgrade package. (Note that on-line documentation is regarded as a load module). A new CV can be created automatically (every 24 hours) or on operator command and is stored locally on the CPP flash disk (a.k.a. CV backup). Technically 50 CVs can be stored. Howev

17、er the current flash disk space will limit number of CVs to about 3-8, depending on node size. Restore of a CV (a.k.a.CV restore) is done locally on the network element and requires that necessary load modules (correct upgrade package) are already installed. The CVs on the flash disk can be retrieve

18、d and stored on an external FTP server used as external backup device. This is done from an FTP client and it is up to the administrator to keep track of the CVs, which upgrade package it refers to and to which node they belong, for instance by having a file system that correspond to the nodes. The

19、upgrade package is never retrieved from the network element to the FTP server, because it already exists on a server. However, it can be deleted on the network element to save space. Deletion must then be done from an FTP client. It is not recommended to remove old Upgrade Packages (and load modules

20、) until a verified upgrade is done, because it must always be possible to restore previous version without transferring configuration version and upgrade package from an FTP server. If it is necessary anyway to restore to a previous upgrade package that is no longer installed on the node (this shoul

21、d be an exception) then the following is done: 1) There are one “holy” minimal LMs and CVs that must not be removed. The network element is restarted using this minimal configuration. 2) When the network element is started, a Software Installation is done. I.e. an installation of old software is don

22、e on the disk. 3) When the node has the correct upgrade package stored, the administrator transfers the configuration to be used by using an FTP client.,EN/LZT 123 6795 R2A,Copyright Ericsson AB, 2003,- 303,9 Operation and Maintenance 4) A normal CV restore is done, from local flash disk to RAM, by

23、selecting active CV in a list and restarting the network element. When a normal Software Installation (upgrade) is performed, the restart to the minimal configuration is usually not necessary. In other words, a normal software upgrade will not affect the traffic so much. The Software Manager (EM) in

24、 this case also supports the operator with step-by-step instructions of the complete upgrade flow. FAULT MANAGEMENT GENERAL When a fault occurs in the Network Element, it is possible to issue two different types of alarms, a primary alarm and secondary alarms. The primary alarm contains information

25、about the original fault (the root cause) and the secondary alarms about the consequences the fault generates. All current alarms in the Network Element, i.e. the active alarm list, and the alarm log can be viewed from the element management application implemented in the network elements. Whenever

26、a fault is detected in the network element an alarm is raised and the active alarm list is updated. The alarm disappears from the active alarm list when it is cleared. It is then moved to the alarm log. There exists an alarm log within a network element where all alarms are stored. The alarm log is

27、persistent and the size of the alarm log can be altered. The alarm log provides all alarm information, like alarm state changes. When an alarm is ceased, the state change will be logged, but the alarm will not be removed from the alarm log. It is possible to view the content of the alarm log. In eac

28、h alarm there is unambiguous information that points to the fault objects. There is an Operation Procedure documentation on-line connected to each alarm with suggested repair actions. Alarm Suppression An overall goal with Fault Management functionality is to reduce the amount of alarms that are iss

29、ued from the network. To support that, CPP provides support for alarm suppression. The majority of,- 304,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey fault situations will produce only one primary alarm and when applicable also a secondary alarms. Alarm Subscription In the Network Elem

30、ents only simple subscription of alarms is supported. It allows for either subscription to all alarms or switch off the alarm subscription completely. ALARM HANDLING Figure 9-16 The Element Manager Alarm List The fault management service includes active alarm list administration, alarm log. The noti

31、fication service handles subscriptions for alarms and sends notifications to all clients that have subscribed to the alarms. The actual alarm is created in the management adaptation layer where a fault indication is tagged with the following information:,Event type. The event type identifies an alar

32、m type in the alarm record,EN/LZT 123 6795 R2A,Copyright Ericsson AB, 2003,- 305,9 Operation and Maintenance e.g. Communication, Environmental, Equipment, Processing Error and Quality of Service., ,Probable cause. Each alarm will have a probable case value. It qualifies an alarm and provides further

33、 information than the event type defined above. Severity level. There will be a perceived severity value for each alarm in the node. It indicates the relative urgency for operator attention, e.g. critical, major, minor and warning. Specific Problem Additional text (optional) Additional information (

34、optional),The alarm handling within a network element relies on the ITU x.733 alarm reporting function and supports the Alarm IRP specified by 3GPP (TS 32.111-2). These documents provide information about the content of the alarm reports and alarm transfer protocols that can be used. The alarm handl

35、ing feature includes the following functions:, ,Active Alarm List administration. The Active Alarm List contains a list of alarms, which are active in the system. The active alarm list is presented to the operator via a graphical user interface Alarm Log administration. The Alarm Log contains the hi

36、story of alarms, which have been generated in the system. The alarm log is viewable for the operator. Alarm Subscription. The Alarm Subscription sub-function is responsible for the set-up and maintenance of alarm subscriptions in the system. An alarm is notified to a subscriber after the subscriber

37、has made a subscription for that alarm. Alarm Manipulation The operator can acknowledge/un-acknowledge alarms and write a comment to a particular alarm. Alarm Distribution Distribution of alarms to a sub-network manager or overall network management system. CPP supports CORBA as solution-set for the

38、 Alarm IRP (TS 32.111-3).,- 306,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey LOGS There are different logs defined in the CPP system in which different information can be retrieved. The following logs exits:, ,Historical Alarm Log: One alarm log per Network Element. All alarm status ch

39、anges are logged in the alarm log. Event Log.,One log per Network Element. All events, which are not alarms i.e. they dont have any state, are stored in this log. An example of an event is the restart event. All the logs are using the “Round-Robin” principle, i.e. when they are full the oldest infor

40、mation will be overwritten. It is possible to handle the logs as files and export them to any external media if they need to be stored for a long time for some reason. It is however not recommended, because they cannot be viewed outside the node without special tools. The logs on the network element

41、 can be viewed from the element manager.,EN/LZT 123 6795 R2A,Copyright Ericsson AB, 2003,- 307,9 Operation and Maintenance Intentionally Blank,- 308,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey Intentionally Blank,EN/LZT 123 6795 R2A,Copyright Ericsson AB, 2003,- 309,10 Questions 10 Qu

42、estions,- 310,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey Chapter 1 CPP Introduction 1. Why did Ericsson start to develop CPP? 2. What is the idea behind the layered architecture in UMTS networks? 3. What is the role of the TAG? 4. What is the difference of the role between CPP and TS

43、P?,EN/LZT 123 6795 R2A,Copyright Ericsson AB. 2003,- 311,0 10 Questions 5. Which five System Areas make up the CPP platform? Chapter 2 CADE 6. What is CADE? Chapter 3 CPP Execution Platform 7. What is the Main Processors (MP) used for? 8. Where can the BPs be found?,- 312,Copyright Ericsson AB, 2003

44、,EN/LZT 123 6795 R2A,CPP Survey 9. What is IPC used for? 10. What is the difference between reliable and non-reliable programs? 11. Give three examples of applications that run on the core MPs? 12. What is the purpose of the Cluster Interface (CLI)?,EN/LZT 123 6795 R2A,Copyright Ericsson AB. 2003,-

45、313,0 10 Questions 13. What is the Name Server used for? 14. What is found in the local partitions of the File system? Chapter 4 Platform Administration 15. What does the System Manager respectively the Board manager supervise? 16. How can the node protect itself from cyclic restarts?,- 314,Copyrigh

46、t Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey 17. What parts in the node can be restarted? 18. When is the Armament file used? 19. Where is the Trace TRX-DIG referers to the digital part of the TRX, TRX-TC to the control part and TRX-ANA to the analogue part of the TRXB. FPGAs perform the digit

47、al signal processing on the TRX board. It includes pulse shaping, interpolation filtering, digital modulation, gain compensation on TX and digital demodulation, decimation filtering, matched filtering and automatic gain control on RX. For the analog processing TRXB performs Channel Filtering, AD/DA

48、Conversion and RF Modulation/Demodulation. The board includes two transmitters and receivers, which operate on two independent duplex frequency pairs. Functionality TRXB,RF Demod. RF Demod.,Channel filtering,RF Modu- lation,Channel filtering Channel filtering,A/D Conversion A/D Conversion,Figure 11-

49、35 RBS functionality in the TRXB,- 52 -,Copyright Ericsson AB, 2003,EN/LZT 123 6795 R2A,CPP Survey The following functions must be implemented on the TRX board: Downlink functions:, ,Digital filtering and digital I/Q modulation D/A conversion Up conversion and analog channel filtering TX output power compensation over frequency and temperature Output power supervision,Uplink functions:, ,Analog channel filtering and down conversion A/D conversion Digital I/Q demodulation and digital filtering Automatic gain contro

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 社会民生


经营许可证编号:宁ICP备18001539号-1