Está en la página 1de 57

3/31/2014

eRAN TDD FMA Introduction V1.5.0


WTL Network I&V and Maintenance Dept 2013.06

www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Chapter 1 FMA Background and Planning Chapter 2 Single-Site Log Analysis on the FMA Chapter 3 Whole-Network Log Analysis on the FMA Chapter 4 Other Functions

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 2

Introduction
Long fault rectification time
1. The number of UEs has exceeded 100 thousand in 2012 and will reach one million in 2013. Therefore, a highly efficient tool must be developed to support large O&M information. 2. During several fault rectification tests, the average fault rectification time is over 1 hour, which cannot meet product requirements.

Low maintenance and locating efficiency


1. Locating methods are limited for internal faults and experience cannot be accumulated. 2. Import or export of many types of logs are time- and labor-consumed. 3. A large number of logs are collected manually, which reduces efficiency.

FMA
Multiple tools
1. There are many types of tools, such as the OMSTAR, InsightSharp, NIC, AlmTool, PFM, and UnpackTool. 2. Analysis documents vary with product versions, which are difficult to adapt to.

Difficult onsite maintenance


1. Data amount is large on the live network and indicators such as alarms cannot be fully monitored. 2. Manual network maintenance is difficult to perform.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 3

FMA Application Scenario


Fast M2000 traffic statistics analysis Fast alarm classification and analysis Inventory data measuring and check

Fault analysis for sites in batches

M2000

FMA
Alarm log analysis and display

Fault rectification results


1. Phenomenon 2. Conclusion 3. Workaround

PC
1. One-click data

collection on the NIC 2. Manual data collection 3. Manual network log collection on the M2000

1. Collects XML scripts. 2. Collects alarm logs. 3. Collects traffic statistics logs. 4. Collects debug logs. 5. Collects operation logs. 6. Collects CHR logs. 7. Collects M2000 alarms. 8. Collects M2000 traffic statistics. 9. Collects M2000 scripts. 10. Collects M2000 inventory files.

Call log analysis and display Configuration file analysis and display Operation log analysis and display Debug log analysis and display Performance log analysis and display

Fault locating and analysis for a single site

Information collection
HUAWEI TECHNOLOGIES CO., LTD.

eNodeB
Huawei Confidential Page 4

eRAN TDD FMA Application Scenario


eNodeB project
Analyzes logs and tracing results exported from the eNodeB. Analyzes logs exported in plaintext. Performs CHR statistics, filtering, and dedicated rule formulation.

M2000 project

FMA

Analyzes traffic statistics exported from the M2000. Analyzes alarms exported from the M2000. Analyzes inventory files exported from the M2000. Analyzes KPI reports and top cells.

Temporary project
Supports analyzing one-click logs by rightclicking the log files. Supports browsing logs by right-clicking the log files.
Page 5

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

FMA Function - Log Analysis and Display (1)


Introduction to the log analysis and display function For eNodeB data: The FMA analyzes logs in terms of the configuration, alarm, fault, performance, operation, debug, and platform. The FMA also analyzes signals traced over standard interfaces and TTI tracing. For M2000 data: The FMA analyzes M2000 traffic statistics, alarm, inventory, and configuration files.
Function Item Configuration file analysis Traffic statistics files CHR log CHR logs analysis Tracing over standard interfaces Tracing file analysis TTI tracing Alarm logs Fault logs eNodeB logs Basic log analysis Operation logs Debug logs BSP logs Operation logs Security logs Temperature logs Board changing logs Canbus logs RRU alarm logs RRU operation logs RRU RF logs CDT tracing Description XML INN/mrf/mrf.gz/mrf.ok CHR tmf Control number: 14, 33, 34, 49, 50, 97, 98, 132, 135, 136, and 149 almlog.log cfltlog.log lfltlog.log OPR DBG BSPLOG/BSPMEM *.RUN *.SEC *.bdt *.cbd Supports TRAN but does not support bottomlayer software and logic logs analysis. Does not support M2000 tracing. Remarks Does not support the DBS. Supports cell- and board-based statistics.

Category Subcategory

HERT platform log analysis

Overall system
MARP platform log analysis

M2000 logs

LBBP logs Text log analysis M2000 traffic statistics file analysis M2000 alarm analysis M2000 inventory file analysis M2000 configuration file analysis

*.txt xls/xlsx/csv xls/xlsx/csv XML/CSV XML/CSV

TTI tracing for the LBBP Example: BrdInfo.txt Supports files exported by the PRS.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 6

FMA Function - Log Analysis and Display (2)


Introduction to the log analysis and display function The FMA supports the following operations for different logs: condition-based analysis, sorting, searching, statistics, filtering, and saving. The FMA supports log export in plaintext. The FMA also supports log translation and language switch between English and Chinese.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 7

FMA Obtaining and License Application

FMA obtaining

1. Obtain the latest beta version or official version at http://3ms.huawei.com/hi/group/7761. 2. Obtain the commercial version from the following two navigation paths at http://support.huawei.com: Software Center > Version Software > Wireless Product Line > LTE TDD > LTE TDD O&M Tools Software Center > Version Software > Wireless Product Line > SingleRAN TDS-L > TDS-L O&M Tools

FMA installation License application

1. The FMA is green software and you can use it after decompressing the FMA package. 2. After you use the FMA for the first time, you can right-click a log file and choose Browse with eRAN TDD FMA from the shortcut menu to fast open the log the next time. 1. You can apply for an FMA license by using your China domain account and Huawei intranet. Each license enables you to use the FMA for six months. Note that only the Huawei intranet can be used. The iAccess cannot access the domain authentication server. 2. You can also send the FMA ESN to Wu Liting (employee ID: 00134378) to apply for an offline license.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 8

Chapter 1 FMA Background and Planning Chapter 2 Single-Site Log Analysis on the FMA Chapter 3 Whole-Network Log Analysis on the FMA Chapter 4 Other Functions

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 9

Single-Site Log Analysis Overview

BRDLOG
Containing all logs of an eNodeB Configuration script in XML format Containing configuration information of an eNodeB

Manually decompress the one-click log package. Create an eNodeB project and open it.

Application Scenario

Log browsing and association analysis


Script browsing in MO or MML mode Conversion from XML format to MML format for a single log file or in batches Alarm browsing Fault log browsing Operation log browsing Traffic statistics log browsing CHR log analysis DBG log analysis Association analysis of traffic statistics, operation, alarm, and fault logs Analysis of RUN, SON, TRANS, and BSP logs

Locates and analyzes common faults based on eNodeB logs. Prefilters fault logs and saves them to files in .csv or .txt format for analysis.

FMA basic log analysis

Right-click the log file to open the temporary project.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

One-Click Log Decompression


This function is to decompress the one-click log file to detailed files so that the FMA can choose logs when a project is created.
CHR: call logs, used to record historical call information DBG: system software running logs, used to record the software running status that cannot be detected by the system, such as the object status change and record of an abnormal message OPR: operation logs, used to record commands delivered from OM terminals. Operation logs help maintenance personnel manage OM records. PFM: Traffic statistics logs, used to record system KPI data, such as access times and handover times Almlog.log: alarm logs, used to record alarm information during eNodeB running Cfltlog.log: central-layer fault logs. The central-layer fault module records fault information, such as the fault occurrence time and causes, reported by local fault modules. Ifltlog.log: local-layer fault logs, used to records fault information of local-layer modules, such as the fault occurrence time and causes

BRD logs (Compressed and uncompressed)

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 11

Log Analysis Entry - Creating a Project


Create an eNodeB project to analyze decompressed logs.

Choose a patch version for DBG, CHR, and IFTS logs.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 12

Log Analysis Entry - Modifying, Deleting, and Updating a Project


Create an eNodeB project to analyze decompressed logs.

Modifying and deleting the project

After the modification, click Save. You can modify multiple projects simultaneously.

Right-click a project node and choose Delete from the shortcut menu.

Updating the project

Example: Open a project and browse DBG logs.

Choose Project > Mod/Del eNodeB Project from the main menu.

Add other types of logs and click Update. Note: You must close the project before adding or deleting a log which is opened.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 13

Log Analysis Entry - Browsing with eRAN TDD FMA


Right-click an .xml file or BRD log file and choose Browse with eRAN TDD FMA from the shortcut menu.

Click a log file in the right pane. A project about this type of logs is automatically created.

Note: You can create a temporary project by right-clicking a log file and choosing Browse with the eRAN TDD FMA from the shortcut menu. This temporary project cannot be updated and is automatically deleted when the FMA is closed.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Page 14

FMA Function - Operation Log Analysis


Operation log analysis The FMA supports basic log operations such as sorting, searching, filtering, number-based jumping, saving, and double-clicking a log to view detailed information. The FMA also supports the display of risky commands. Red characters indicate failure operations and red highlighted characters indicate risky commands. The FMA provides the function of hiding the LST or DSP command to improve analysis efficiency.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 15

FMA Function - Alarm and Fault Resolution and Linkage


Alarm and fault resolution and linkage The FMA provides functions including conditional resolution, sorting, searching for, filtering, jumping based on synchronization numbers, saving, and double-clicking a log to view detailed information. The alarms are displayed in different colors depending on alarm severities. Critical alarms are in red, major alarms in orange, minor alarms in light yellow, and warnings in green. Mapping between alarms and faults are clearly displayed in fault logs. Alarm and fault logs can be linked with operation logs, DBG logs, and CHR logs based on time by right-clicking in the middle pane and choose Relate to > DBG by Time or CHR by Time from the shortcut menu. (The search is within 60 minutes.)

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 16

FMA Function - Log Association


The FMA supports joint analysis of traffic statistics, alarm, fault, and operation logs. In this way, users can rapidly view traffic statistics to analyze impact on KPIs and click the time of KPI deterioration to associate the corresponding alarm, fault, and operation log. Dashboard is available only when two of the following files are available for a project: traffic statistics file, alarm file, fault file, and operation log file. The time to be set in the FMA is half an hour before and after the current time.

Log association, fast locating ALM-29240 Cell Unavailable in 120 cells of office T in C country
On the Dashboard tab, the LTE Basic KPI pane (not involved in this case) is displayed on the upper left, the Alarm Page pane on the upper right, the Fault Page pane on the lower left, and the Operate Page pane on the lower right. Right-click any pane, for example, right-click in the Operate Page pane or the Alarm Page pane, latest data is dynamically displayed in the other three panes, as shown in the figure. In this way, fault or alarm causes can be identified quickly.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 17

FMA Function - Debug Log Analysis


Debug log analysis The FMA supports PID-, ulLogID-, and time-based log searching, which facilitates communication between the frontline and R&D personnel if logs cannot be sent back. All logs can be saved by using the FMA.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 18

FMA Function - CHR Analysis (1)


CHR analysis CHR events are displayed in a tree structure. CHR logs can be classified by file or cell and CHR events can be classified by UE, TMSI, RRC setup cause, or release cause. CHR events can be filtered by event, event field value, and call ID. The FMA also supports field-based measurement and event copy and saving by right-clicking the event. Particular logs of events such as L2_DRB_STRU and L2_USER_INFO are displayed by double-clicking the event.

The FMA provides error code conversion to flexibly handle multiple CHR faults. The FMA provides better CHR log analysis performance by integrating advantages of InsightSharp and UMAT.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 19

FMA Function - CHR Analysis (2)


User-defined statistics and filtering functions

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 20

FMA Function - Expert System


Introduction to the expert system Daily network troubleshooting experience accumulates abundant rules for various data source processing. The FMA adopts these rules for fast fault locating. The expert system uses CHR logs as the data source. After the CHR logs are imported, Expert is displayed. Currently, the FMA supports 16 general rules covering the following three aspects: service drop, handover, and access.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 21

FMA Function - Expert System


Access The FMA provides six rules for access analysis: 1. Access Abnormal Rel. Stat. Statistics of access failure causes 2. No-Reply Ratio of the RRC Connection Setup Failure Uplink weak coverage and interference analysis in the RRC stage 3. Access UL Coverage Analysis in NAS/ERAB phase Uplink weak coverage and interference analysis in the NAS/ERAB stage 4. Access Top User Stat. Measurement of top access users 5. Access User Distribution Statistics Access user distribution analysis 6. Access UE Capabilities of the Top Users Measurement of top access UE types

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 22

FMA Function - Expert System


Drop The FMA provides six rules for drop analysis: 1. Abnormal Rel. Stat.: cause measurement for internal abnormal releases 2. UL Coverage Analysis: uplink weak coverage and interference analysis 3. Missed Neighbor Cell: missed configuration of neighboring cells 4. Top User Stat.: top user measurement 5. User Distribution Statistics: user distribution analysis 6. UE Capabilities of the Top Users: UE capability measurement for top users

Example: Top User Stat.

Double-click a record to check drop causes.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 23

FMA Function - Expert System


Handover The FMA provides four rules for handover analysis: 1. HO. Top User Stat.: measurement of top handover users 2. HO. UL Coverage Analysis: handover uplink interference and weak coverage measurement 3. HO. UE Capabilities of the Top Users: UE capability measurement for top handover users 4. HO. Fail Caused by S-eNB or T-eNB: handover failure problem isolation and location on the source and target sides

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 24

FMA Function - Standard Interface Analysis


The FMA supports signaling analysis over the Uu, S1, and X2 interfaces, including signaling browsing, filtering, searching, and comparison. The signaling browsing window comprises three parts: File tabs (TRACE_UU, TRACE_S1, and TRACE_X2) in the upper left area Signaling list in the medium area Number of pages, number of logs, and TMF version number in the lower area Double-click a signaling message. The Message Browser - MsgExplain dialog box is displayed. You can view the explanation of the signaling message in the dialog box. The FMA provides the following two filtering functions: Filtering signaling based on filter criteria including Message Type, Message Direction, S1 ID, Call ID, and Time Filtering signaling with the current call ID Searching: The FMA supports searching for a message by field on the TRACE_UU, TRACE_S1, and TRACE_X2 tab. When a matching message is found, the mouse pointer moves over to the message.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 25

Expanded Log Analysis Function - TTI


Currently, the L1 and L2 TTI tracing function is the mostly used fault diagnosis method. Create a project, select an adapter version, and select a path to add all TMF files in the path or select a TMF file (for example, h718190M_IFTSTrace_20130302_172126_443171_TID_2329.tmf) to add it. Open the project. The tree structure of all TMF file content, all added TMF files, number of pages, number of logs, and adapter version number are displayed on the left of the project window. Double-click a level-2 or level-3 node in the tree structure in the upper left pane. Data analysis results are displayed as a table in the lower right pane. To filter data in a column in the lower right pane, right-click the column and select a filter criterion. If a column that contains time in the HHMMSS format is available in the data analysis result table in the lower right pane, double-click a column that contains only numbers in the table to generate a line graph with time as the horizontal ordinate in the upper right pane.

Create a project and add TTI tracing files.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 26

FMA Function - LBBP Log Analysis


The BBUlog function provides LMPT and LBBP log analysis. As shown in the following figure, logs whose types are supported are displayed in the right pane. You can double-click a log to view its information.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 27

FMA Function - RRU Log Analysis


The left pane in the following figure shows the log types supported. You can double-click a log to view its information.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 28

FMA Function - Signaling Flowchart


Signaling flowchart The FMA parses the signaling over the Uu and S1 interfaces and integrates the signaling by call ID. Based on the integrated signaling, a signaling flowchart can be drawn. You can double-click a signaling message to view IE information.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 29

FMA Function - Signaling Comparison


Signaling comparison The FMA supports comparison of signaling protocol text.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 30

Chapter 1 FMA Background and Planning Chapter 2 Single-Site Log Analysis on the FMA Chapter 3 Whole-Network Log Analysis on the FMA Chapter 4 Other Functions

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 31

Whole-Network Log Analysis Overview


Browsing KPI/trend chart/ failure causes Fast top cell analysis KPI analysis by cluster Daily KPI report exporting

Daily maintenance application

Top alarm analysis Top site analysis

BBU/RRU/optical module report/fault diagnosis in batches BBU topology report Site-based hardware information query Parameter report extraction based on XML scripts on the live network

Daily network KPI analysis and monitoring Network alarm and fault analysis Hardware fault diagnosis in batches Network inventory statistics

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 32

Traffic Statistics Analysis Function - Traffic Statistics Importing

Obtain the template for collecting traffic statistics data using the FMA. After the initialization, the traffic statistics analysis page is displayed. It takes a long time to import large amount of traffic statistics data.

Collect traffic statistics data on the M2000 based on the obtained template.

Create an M2000 project. HUAWEI TECHNOLOGIES CO., LTD.

Add a traffic statistics file and set Frame rate, Special sub frame, and System bandwidth.

Huawei Confidential

Page 33

Traffic Statistics Analysis Function - KPI Browsing


On the KPI tab, traffic measurement counters are classified into Entire network KPI, Cell KPI, and CPU Load, which are further classified into Link_Quality, Mobility, Load_capacity, Accessibility, Retainability, Throughput, Coverage, and Availability.

Double-click any data in the lower right pane to view an enlarged image.

Double-click a counter. Detailed information about the related counters is displayed in a table in the lower right pane. You can right-click the table to save the table. The upper right pane shows the counters in graphic mode. You can query detailed KPI information, such as setup and failure times, to fast locate fault occurrence time and causes.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 34

Traffic Statistics Analysis Function - Top Cell Analysis


On the TopCell tab, the information about top n user-defined counters is displayed. The counters related to ratios are displayed by success rate and failure time. RRC setup success rate RRC setup success rate of top 10 cells Proportion of RRC setup failure rate of top 10 cells to that of the entire network RRC setup success rate if the rate of top 10 cells is deducted RRC setup success rate of top 10 cells, failure rate, and cell name

Click the TOP Cell List tab. The details about failures in the cell are displayed.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 35

Traffic Statistics Analysis Function KPI Analysis by Cluster


On the Object tab, you can select multiple cells to form a cluster and then view the KPIs. Right-click the blank area and choose Add Cluster. The Cluster Editor dialog box is displayed. You can move clusters from the left area to the right area.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 36

Traffic Statistics Analysis Function - Daily KPI Report Preparation


Click Export Report in the lower left pane to export a daily KPI report that covers KPI values and fault location results. Thresholds are classified by high level and low level. On the Performance page, click Threshold in the lower left pane. The thresholds of user-defined counters are displayed. Double-click an item. In the displayed dialog box, you can change the threshold of the selected counter.

Click a link to view the following details about this type of KPIs: 1. Measurement result generated each hour on the entire network 2. Measurement result generated each day in a cell

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 37

M2000 Alarm Analysis Function - Alarm Importing


In the navigation tree, alarms are sorted by Alarm All, Critical, Major, Minor, Warning, and Active Alarm. In the upper right pane, measurement results of alarms generated each day are displayed in charts. In the lower right pane, alarm details are displayed in tables.

Export alarm files from the M2000.

Import alarm files to the FMA.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 38

M2000 Alarm Analysis Function - Top Alarm and Trend Analysis


Top alarm and top site distribution analysis You can specify the alarm analysis time and mode. Alarms sorted by severity are displayed in the navigation tree. You can double-click a node to view the trend chart of alarms reported each day in the upper right pane. Alarm duration is displayed in the alarm area in the lower right pane. You can choose Filter, Colour, or Statistics from the shortcut menu. Specify the alarm analysis time and mode.

The number of alarms is displayed in a table and a chart on the Alarm Data tab.

In the navigation tree, alarms are sorted by Alarm All, Critical, Major, Minor, Warning, and Active Alarm.

Choose Statistics to analyze distribution of alarms in a column. Huawei Confidential Page 39

HUAWEI TECHNOLOGIES CO., LTD.

M2000 Alarm Analysis Function - Top Site Analysis


Top alarm and top site distribution analysis Top sites and the number of alarms are displayed in the navigation tree. You can double-click a node to view the trend chart of alarms. You can right-click a record in the lower right pane and select Statistics from the shortcut menu to view top alarms at any site.

Navigation tree on the Top Site tab

Choose Statistics.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 40

M2000 Inventory Analysis Function - Data After the initialization, the hardware Collection and Importing information page is displayed.
Collect device archive files on the M2000.

Create an M2000 project.

Import device archive files.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 41

FMA Function - M2000 Inventory File Analysis


The FMA supports inventory file analysis to locate hardware faults in batches. You can view inventory files by device, topology, or site. The data is displayed as Device Basic, Frame Info, and Board Info in the window. You can search, filter, measure, and save inventory data. You can also obtain information such as device software and hardware versions, slot number, property information, BIOS, and barcode.
Enter the folder where the M2000 client installation program is located. Example: C:\HUAWEI_OMC920\client\client\bin

Double-click omcDevdoc.bat.

Analyzing inventory files

Collecting inventory files

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 42

M2000 Inventory File Analysis Function Hardware Report


Hardware reports support TD-NodeB, eNodeB, and TLMBTS (TDS-LTE dual-mode). Network hardware information, including the BBU, RRU, and optical module, is displayed in the navigation tree. You can delete a board repeatedly measured or displayed from a TDS-LTE site. You can double-click any node to view hardware information such as software and hardware, serial number, installation position, and manufacturing date in a report. You can view the AC/DC power supply type of the RRU under SubType. You can perform multi-dimension statistics, filter serial numbers, and save records in.xml file to fast measure hardware and locate faults in batches.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 43

M2000 Inventory File Analysis Function BBU Topology Report


Status of the board in each slot is displayed in the same table, facilitating network fault locating.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 44

M2000 Inventory File Analysis Function Viewing Inventory Information about a Site
In the navigation tree, you can choose a site and view its inventory information in the right pane, such as software and hardware information, subrack information, and board information.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 45

M2000 Configuration Analysis Function


The configuration file GUI contains the Object and MO tabs. You can select a site object on the Object tab and select a query object on the MO tab. The Object tab displays versions and quantities of configuration files to be analyzed in the navigation tree. The MO tab displays MO objects in the configuration file in the navigation tree.

Right-click a level-3 node to save all records in the node. Right-click table content to save all the table content.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 46

Chapter 1 FMA Background and Planning Chapter 2 Single-Site Log Analysis on the FMA Chapter 3 Whole-Network Log Analysis on the FMA Chapter 4 Other Functions

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 47

XML to MML
This function is to convert .xml configuration file of the eNodeB into MML commands. Navigation path: Tools > eNodeB XML to MML This function can be performed for a single site or sites in batches.

Note: Because MOs in .xml files do not strictly map to MML commands, the converted MML commands may have errors and can be used only for reference. Do not send these MML commands to NEs.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 48

Alarm Comparison
This function is to compare any two alarm files before and after an upgrade or reconstruction. Alarms are exported from the M2000 in .xls or .csv format. If alarms are added, cleared, or no alarms are generated, difference of the two alarm files can be automatically compared. This function uses the alarm ID and alarm information as key words.

You can view sites with changes in the navigation tree. The number in the brackets indicates the number of changes.

In the right pane, if Different is displayed under Compare Result, alarms in the two files change. These changed alarms are marked in yellow. In an upgrade comparison scenario, if an alarm exists in Alarm Data1 but does not exist in Alarm Data2, the alarm has been cleared. If an alarm exists in Alarm Data2 but does not exist in Alarm Data1, the alarm is newly reported.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 49

Brdlog Unpack Tool


Choose Tools > Brdlog Unpack Tool from the main menu.

Set the path where data sources are stored and save path for decompressed BRD logs. Click Start and then obtain the decompression result.

The FMA supports analysis of LMPT, LBBP, and RRU one-click log files and compressed CHR log files. Note: If you run the ULD NEFILE:SRCF=CHRLOG,MODE=IPV4 command on the LMT, you can obtain compressed CHR log files. Choose Tools > Brdlog Unpack Tool to decompress the packet.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 50

Quick Query of Parameters in MML Command Output


You can quickly check parameters in MML command output in batches. You can use MML command outputs to quickly query eNodeB and cells where certain functions are enabled, greatly improving efficiency. Start the FMA and choose Tools > MML inquiry result visualization from the main menu.

The following uses an example to describe efficiency improvement effect for using FMA. The task is to query all the cells in the record where the value of Cell active state is Deactivated in the MML command output file Test Data.txt. Without using the FMA, you must query records one by one. If the record query of one site requires 10 seconds, it takes at least 1 hour to find cell IDs one by one for 500 sites. Alternatively, you can use the FMA tool to save packets as an .xml file, and use the filtering function to quickly find cell IDs. This method usually takes less than 30 seconds to find cell IDs, greatly improving efficiency.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 51

Uu Interface Parameter Extraction Tool


The Probe can only be used to collect signaling heads but not parameters in signaling. The Uu interface parameter extraction tool can be used to collect parameters in Uu interface signaling and perform parameter mapping. On the menu bar, choose Tools > Uu Parameter Collection to enable the Uu interface parameter extraction function.

Note: The file to be analyzed is a .txt file stored using the Probe. The .txt file is named in the format of Probe_20120829143921_H.txt. The following figure shows an example of the contents in the file.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 52

Power Calculation
Power calculation varies with eRAN versions, which makes the calculation complicated. The FMA integrates a power calculation tool that enables power calculation in black box mode, improving work efficiency of field and maintenance engineers. Choose Tools > Power calculate tool from the main menu to start the power calculation function.

A dialog box is displayed, as shown in the following figure. Set the six parameters in the red frame and click Run.

BandWidth: Specifies the cell bandwidth and can be set to 1.4 MHz, 3 MHz, 5 MHz, 10 MHz, 15 MHz, or 20 MHz. PA: Can be set to 6 dB, 4.77 dB, 3 dB, 1.77 dB, 0 dB, 1 dB, 2 dB, or 3 dB. You can run the LST CELLDLPCPDSCHPA command to query the value of PA. PB: Specifies the power scaling factor index, with the value ranging from 0 to 3. You can run the LST PDSCHCFG command to query the value of PB. RSPwr: Specifies the power of the cell reference signal, with the value ranging from 60 to 50. You can run the LST PDSCHCFG command to query the value of RSPwr. SCH power: Specifies the power of the synchronization channel, with the value ranging from 3175 to 3175. You can run the LST CELLCHPWRCFG command to query the value of SCH power.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 53

Appendix 1 FMA V1.5.0 Function List


Classification Function XML script analysis Alarm log analysis Fault log analysis Operation log analysis eNodeB Performance log analysis Debug log analysis Call log analysis TMF TMF (TTI) LMPT, LBBP, and RRU log analysis Description Browsing XML scripts Converting XML format to MML format Browsing alarm logs in the BRD log Browsing fault logs, including central-layer fault logs and local-layer fault logs, in the BRD log Browsing and analyzing operation logs in the BRD log Analyzing traffic statistics logs in the BRD log Browsing and analyzing DBG logs in the BRD log Browsing and analyzing CHR logs in the BRD log Analyzing signaling over the Uu, S1, and X2 interfaces IFTS tracing and analysis Analyzing LMPT, LBBP, and RRU logs Browsing KPI Analyzing top cells Analyzing KPI by cluster Outputting daily KPI reports Monitoring daily KPI Handling KPI problems Optimizing the network Monitoring daily alarms Periodical alarm analysis assistance Measuring network hardware inventory Adjusting hardware Analyzing the networking Analyzing network configurations Comparing alarms before and after the upgrade Comparing alarms before and after the network adjustment Decompressing BRD logs Application Scenario Analyzing LTE scripts Analyzing alarms Analyzing eNodeB faults Analyzing eNodeB operation records Analyzing eNodeB KPI Analyzing printed eNodeB internal module logs Handling UE service problems Handling UE service problems Handling UE service problems

Traffic statistics KPI analysis

Alarm analysis M2000 Inventory analysis

Analyzing top sites and alarms Analyzing alarm trend and distribution Extracting board, RRU, and optical module information Rectifying fault in batches Extracting parameter reports based on XML scripts on the live network

Configuration analysis

Alarm comparison

Comparing changes of active alarms, such as alarm adding and clearance

One-click log decompression

Decompressing single or batch BRD logs

Other functions

Fast MML parameter analysis Uu interface parameter extraction tool Power calculation XML to MML

Fast checking parameters in MML command output in batches Collecting parameters in Uu interface signaling and performing parameter mapping Power calculation in black box mode Converting from XML format to MML format for a single site or sites in batches

Highly efficient MML result query

Querying Uu interface parameters Power calculation Converting configuration script in XML format to MML format

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 54

Appendix 2 FMA V1.5.0 Supported Version


V100R004C00 V100R004C00SPC200 V100R004C00SPC260 V100R004C00SPC270 V100R005C00 V100R005C00SPC310 V100R005C00SPC340 V100R005C00SPC360 V100R005C00SPC370 V100R005C01 V100R005C01SPC110 V100R005C01SPC200 V100R005C01SPC300 V100R006C00 DBS3900LTE V100R006C00SPC110/BTS3900LTEV100R008C00SPC110

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 55

Appendix 3 Help Channel

Development team and help channel

The LTE TDD maintenance tool development team is responsible for maintenance and development. For any requirement, contact the tool system engineer Yang Jun (employee ID: 00147314). For any problem, contact the project manager Wu Liting (employee ID: 00134378). You can also submit problems at http://hi3ms.huawei.com/hi/group/7761.

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 56

Thank You
www.huawei.com

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

Page 57

También podría gustarte