Professional Documents
Culture Documents
Sheheryar Obaid
Contents
y
Ericsson Architecture
The Architecture of Ericsson Charging System 5 Brief intro of different Entities and their functions
CCN Introduction
Introduction to TSP and NSP Explanation of CCF Interfaces and Protocols (CIP) Traffic Cases
CCN O&M
Complete O&M of Ericsson CCN Including Fault, Performance and SS7 Management, B&R and Statistics
Sheheryar Obaid 3
Sheheryar Obaid
OBJECTIVES
After this chapter we will be able to
Name all the Network Entities in CS 5 Environment y Describe each node and its functionality in a CS 5 Environment y Identify the connectivity of each NE in a CS 5 environment
y
Sheheryar Obaid
CS5.0
y y y
Sheheryar Obaid
Architecture of CS5
Sheheryar Obaid
VS
CCN INTRODUCTION
Sheheryar Obaid
OBJECTIVES
After this chapter we will be able to
Explain what CCN is, its functions and services Describe the architecture and interfaces of CCN Explain what is TSP and its characteristics Describe TelORB and its role Describe what CCF is and its function Describe NSP and different types of processors Describe what is CIP and perform CAP to CIP conversion y Describe different Traffic scenarios
y y y y y y y
Sheheryar Obaid 10
Introduction to CCN
y
Primary function of CCN is to facilitate real time charging and convert all the incoming protocols to CIP for SDP
CCN does not maintain user accounts nor does it perform RTC
What is CCN
CCN is a charging application built on Telecom Server Platform implemented on Dicos OS y Primarily it works as a relay towards SDP (as SDP only understands CIP) y Different protocols terminate at CCN and it works as a protocol converter and packet forwarder to SDP
y
CCN consists of two main parts TSP platform and CCF application
TSP and CCF are explained in the following slides
Sheheryar Obaid
13
TSP is a generic telecom grade platform on which we can deploy many applications
e.g HLR,AC,IN,CCN etc
TSP offers a combination of scalability, availability and real time characteristics y Ericsson CCN is also built upon TSP y TSP provides the following advantages
y
Support of Software upgrades during operation Support for geographical redundancy Real-Time Operation: transmission takes place with minimal and controlled delay
y
There are two ways to connect to TSP via CLI(ssh) and GUI (http)
Sheheryar Obaid 14
NSP
y
Difference between NSP and TSP is that NSP is a hardware release while TSP is a software release
We can upgrade to TSP6 on NSP 5 hardware
Sheheryar Obaid
16
NSP 6.0
Sheheryar Obaid
17
First and Last slot of every magazine is reserved for MXB plugin unit y The main roles of different processors are
y
Traffic Processor : used for the processing of application Loader : dedicatedly used for cluster management Node Management : Linux processors to provide O&M interface I/O : used for initial loading, backups, dumping and upgrade File Server : used for storing application data
Sheheryar Obaid 18
y y
GEP2 SAS
Can be used as an I/O and File Server processor These boards can be used to extend the HDD capacity Please note that I/O and FS are not part of the cluster
GEP2 E1/T1
This is used as a connectivity processor for Sigtran and E1 connectivity
Sheheryar Obaid
19
Sheheryar Obaid
20
CCF - Access
y
CCF - Services
y
Sheheryar Obaid
22
CCFCCF- Functions
y
Sheheryar Obaid
24
Interfaces explained
y y y y y y y y y
CAP v1 for charging of voice calls CAP v3 for charging of GPRS and SMS MAP protocol for HLR and FNR ERTC protocol for Ericsson MSC CIP/IP protocol for SDP SSH for connectivity with client PCs Gy interface for connectivity with GGSN FTP to transfer CDRs to EMM HTTP/LDAP for configuration via RMA
Sheheryar Obaid 25
CIP
y
CIP is a new charging interrogation protocol that uses IP instead of SS7 and is based on diameter application The three messages of CIP are
First Interrogation
x RET,RET result operation at the start of call
Intermediate Interrogation
x RET,RET result operation during the call
Final Interrogation
x RET, RET result operation at the end of call
Sheheryar Obaid 26
CAP
CIP
IDP
First Interrogation
RET, RET Result
ACR
Intermediate Interrogation
RET, RET Result
Last ACR
Final Interrogation
RET,RET Result
CAP
CIP
Sheheryar Obaid
28
Traffic Cases
y
Sheheryar Obaid
29
Voice Call
Sheheryar Obaid
30
Voice Call
1. 2. 3. 4.
5.
6. 7.
A call is initiated from a charging system subscriber.The OCSI of the subscriber in the VLR, routes the call to the SSF. The SSF collects data about the call and triggers CCN. CCN performs a SDP selection and sends the data, collected in step 2, in a first interrogation to SDP. SDP reserves money from the account and sends the calculated call time to CCN, together with other call data such as announcements to be played. CCN tells the SSF to play announcements if this has been requested by SDP. Further on, CCN tells the SSF to setup the call and to supervise it based on the call time calculated by SDP. The call lasts longer than the call time sent to the SSF, so a notification is sent to CCN. CCN requests SDP to make another reservation from the account with an intermediate interrogation.
Sheheryar Obaid
31
SDP makes a new charging analysis and deducts the amount previously reserved from the account. In this example it is assumed that there is still sufficient funds left on the subscribers account. SDP then reserves money for the next period and forwards a new call time to CCN. CCN passes the new call time on to the SSF.
1. Note: Step 69 can be repeated several times. In this example, steps 1017 describes what happens when the subscriber's account balance reaches the account empty limit.
The call lasts longer than the call time sent to the SSF and a notification is sent to CCN. CCN requests SDP to make another reservation from the account with an intermediate interrogation. SDP makes a new charging analysis and updates the account.The charging analysis shows that there is not enough money on the account to cover the requested period. SDP sends the calculated call time to CCN together with an indication that there is no money left on the account and that a call cutoff warning announcement is to be played. The time between the warning announcement and call cutoff can be configured. For this example 30 seconds is used.
Sheheryar Obaid
32
CCN uses the 30 seconds indication from SDP and the time between call cutoff warning and call cutoff is excluded from the new call time. CCN then passes the new call time on to the SSF. The SSF notifies CCN that the time sent down in step 13 has expired. CCN sends the remaining 30 seconds and tells the SSF to play the call cutoff warning announcement. The SSF notifies CCN that the final 30 seconds has expired. CCN tells the SSF to play the call cutoff announcement and to disconnect the call. The SSF notifies CCN of the call disconnection. A final report is sent from CCN to SDP. SDP performs final charging of the call. SDP rates the total call and sends a final report result to CCN. CCN sends a call release to the SSF.
Sheheryar Obaid
33
SMS
Sheheryar Obaid
34
SMS
1. 2. 3. 4. 5. 6. 7. 8. 9.
An originating SMS is received by the MSC/SSF. The MSC/SSF analyses the data and interrogates the serving CCN. CCN interrogates SDP. SDP verifies the account status, reserves money and sends the result to CCN. CCN replies to the interrogation from the SSF based on the result from SDP. The MSC/SSF delivers the SMS to the SMS-C. The SMS-C confirms the delivery of the SMS. The MSC/SSF forwards the result to CCN. CCN forwards the result to SDP. SDP charges the corresponding account.
Sheheryar Obaid 35
MNP
Sheheryar Obaid
36
MNP
1. 2.
3. 4.
The call is initiated by the Charging System subscriber. If it is an originating or forwarded call: the called party number is sent to the MNP database. If it is a terminating call: the calling party number is sent to the MNP database. The MNP database returns MNP information to CCN, for delivery to SDP.
Sheheryar Obaid 37
CCN O&M
Sheheryar Obaid
38
O&M Concept
y
Operation
By operation we mean network operation and co-ordination on a day to day basis Collection of data and analysing it Monitoring of critical alarms Ensuring high level of service
Maintenance
Keeping the network work correctly Troubleshooting Testing Reporting
Sheheryar Obaid 39
Sheheryar Obaid
40
FAULT MANAGEMENT
OBJECTIVES
Use the user interface for receiving and viewing of alarms and notifications y Retrieve past alarms using log query y Review the error logs in the system y List important directories for log files in the system
y
Sheheryar Obaid
41
Fault management
y y
FM allows detect faults and malfunctions on node Two default viewers are used for FM
Alarm Viewer Notification Viewer
Alarms are actionable events, Notifications are for informational purposes only y OS writes events used for troubleshooting to error logs as do all programs, logs are stored on I/O y Alarms are of two types
y
Automatically Detected and Automatically Cleared (ADAC) e.g processor failure Automatically detected manually cleared (ADMC)
Sheheryar Obaid 42
ALARM viewer
Sheheryar Obaid
43
Severity
Indeterminate, Minor, Major, Critical
Time y Type
CommunicationAlarm, QoS, ProcessingErrorAlarm, EquipmentAlarm, EnivironmentalAlarm
y y y y
Object Type
Name reflects the MO that triggered the alarm
Instance
Identifier of the MO that triggered the alarm
FaultID
Identifies the alarm within ObjectType and Instance
Cause
Description of probable cause
Sheheryar Obaid 44
Notification viewer
Sheheryar Obaid
45
Time
Time when notification was sent
Object Type
Identifies the type of object the notification is about
y y
Instance
Identifies the object the notification is about
Type
Integer value used to differentiate between different events belonging to the same object
Sheheryar Obaid 46
Log query
y y y y
Log query is a GUI that helps display alarm history. Open the Node Management Toolbox. The Node Management window appears. In Logging, click Log Query. The Database Selection window appears. Choose the current or the backup database option, and click Select. The Log Type Selection window, alike to the following example, appears. In the application list, select the log type to be queried, then click Select. The Query Tool window appears.
Sheheryar Obaid 47
Sheheryar Obaid
48
Error logs
y y y
Linux Syslog
/var/log/messages
Applog
/opt/telorb/axe/tsp/applog
Console log
/opt/telorb/axe/tsp/consolelogs
Sheheryar Obaid
49
Sheheryar Obaid
50
Describe the principles of backup and restoration of the TSP platform y Create a backup and restore the TelORB database y Create a backup of IO y Describe principle of Centralized Scheduler
y
Sheheryar Obaid
51
Site Database: all services running on IO SS7: all configuration files having SS7 settings NM: configuration of all 3PPs connected to NM
Sheheryar Obaid 52
Processor Reload
x Restore only certain processors
Sheheryar Obaid 53
Archiving Backups
Backups could be archived to external servers either tape drives or hard disks
Sheheryar Obaid
54
Basic
x Shows a list of all the backups currently available on IOS x Only one of the backups are active marked with A
Archiver
We can also set the number of backups to be retained y DBN backups are scheduled in the scheduler
y
Sheheryar Obaid 55
Backups
Sheheryar Obaid
56
Scheduler
Sheheryar Obaid
57
DBN DISKLOG
Objectives
Describe the disklog functionality on CCN platform y Configure and Manage the disklog function on the CCN platform
y
Sheheryar Obaid
58
DBN DISKLOG
y y y
y y
Disk Log is used for point in time recovery Disk Log Is an incremental backup of POTs All critical information is disk logged such as subscriber account data so that it could be recovered even if the entire system is reloaded A transaction that updates such data stores changes in a log file on IO processors When the system is restored from backup the log for that backup is applied as well
Sheheryar Obaid 59
Disklog Snap
Sheheryar Obaid
60
SS7 MANAGEMENT
Objectives
Describe SS7 protocol stacks supported by CCN y Configure and Manage SS7 Function on TSP6 Platform
y
Sheheryar Obaid
61
Signalling Manager
Signalling Manager is a GUI used for management of SS7 stack of CCN y SS7 Stacks supported by CCN are
y
Go to Signalling Manager
SCTP Get instance list
x Select FE x Note Endpoint ID
SCTP
To Know where the different counters of CCN are stored y To calculate BHCA stats of all services and requests coming to CCN y To Monitor load on different blades of CCN
y
Sheheryar Obaid
64
Load Viewer
y
Start the Load Viewer using the command win. The command is in the following form:
win -th <VIP_address> | -n | -s | -i | geometry +<xPosition>+<yPosition>
Performance Counters
y y
Path
/opt/telorb/axe/tsp/NM/PMF/reporterLogs/CcnCounters
SMS counters
/opt/telorb/axe/ccn/bin/CleanCcnCounters.pl `ls ltr | grep Nov 24 | gawk {print$9} | grep Messaging-Charging-Originating-SMS /opt/telorb/axe/ccn/bin/CleanCcnCounters.pl `ls ltr | grep Nov 24 | gawk {print$9} | grep Messaging-Charging-DirectDebitSuccessful
Call Counters
/opt/telorb/axe/ccn/bin/CleanCcnCounters.pl `ls ltr | grep Nov 24 | gawk {print$9} | grep Voice-Charging-Originating-Call /opt/telorb/axe/ccn/bin/CleanCcnCounters.pl `ls ltr | grep Nov 24 | gawk {print$9} | grep Voice-Charging-First InterrogationSuccessful
Sheheryar Obaid
66