The document discusses the components and functions of the UAP8100 system. The UAP is composed of the MGC and MGW. The MGC handles call control and media resources and supports various signaling protocols. It uses a client-server architecture for operation and maintenance. The system software on the MGC and workstations enables alarm management, device management, and other functions. The document also describes the alarm types, levels, and performance measurement capabilities of the UAP8100 system.
In this session you will learn:
Programmable Logic Controller(PLC)
Types of PLCâs
PLC architecture
Scan cycles
Scan patterns
PLC programming
Ladder diagram programming
Latch and Unlatch
DCS architecture
In this session you will learn:
DCS Introduction
PLC
SCADA
General architecture of DCS
Process or application
Scan time
Input and Output requirement
Redundancy
RTU and LCU
PLC vs DCS
In this session you will learn:
Instruments - Introduction
For more information, visit: https://www.mindsmapped.com/courses/industrial-automation/complete-training-on-industrial-automation-for-beginners/
In this session you will learn:
Programmable Logic Controller(PLC)
Types of PLCâs
PLC architecture
Scan cycles
Scan patterns
PLC programming
Ladder diagram programming
Latch and Unlatch
DCS architecture
In this session you will learn:
DCS Introduction
PLC
SCADA
General architecture of DCS
Process or application
Scan time
Input and Output requirement
Redundancy
RTU and LCU
PLC vs DCS
In this session you will learn:
Instruments - Introduction
For more information, visit: https://www.mindsmapped.com/courses/industrial-automation/complete-training-on-industrial-automation-for-beginners/
In this session you will learn:
DCS Introduction
PLC
SCADA
General architecture of DCS
Process or application
Scan time
Input and Output requirement
Redundancy
RTU and LCU
PLC vs DCS
For more information, visit: https://www.mindsmapped.com/courses/industrial-automation/complete-training-on-industrial-automation-for-beginners/
Our Tool Monitor Adaptive Control (TMAC) system protects your CNC machine while providing valuable information about your cutting process. The system reduces the high cost of replacement tools, lost production, and rejected parts by effectively measuring tool wear in real time. It operates on the principle that the horsepower required to cut a part increases as the tool's cutting edges deteriorate.
The âAdaptiveâ control feature of TMAC reduces cycle time and optimizes cutting conditions to improve tool life.
Distributed Control Systems (DCS) are dedicated systems used to control manufacturing processes that are continuous or batch-oriented, such as oil refining, petrochemicals, central station power generation, fertilizers, pharmaceuticals, food and beverage manufacturing, cement production, steelmaking, and papermaking. DCSs are connected to sensors and actuators and use set point control to control the flow of material through the plant.
The most common example is a set point control loop consisting of a pressure sensor, controller, and control valve. Pressure or flow measurements are transmitted to the controller, usually through the aid of a signal conditioning input/output (I/O) device. When the measured variable reaches a certain point, the controller instructs a valve or actuation device to open or close until the fluidic flow process reaches the desired set point.
Large oil refineries have many thousands of I/O points and employ very large DCSs. Processes are not limited to fluidic flow through pipes, however, and can also include things like paper machines and their associated quality controls (see quality control system QCS), variable speed drives and motor control centers, cement kilns, mining operations, ore processing facilities, and many others.
Innovic India Private Limited provides industrial Training on DCS as well as other automationtechnologies like PLC, SCADA, HMI, VFD and many more.
For Core Engineering jobs and 100% Job Oriented Industrial Training
Feel free to contact us on: +91-9555405045/+91-9811253572
Email: group.innovic2gmail.com
Web: www.innovicindia.com
The aim of this project is to design and develop a system , which will help us to control the industrial processes sitting in a far of location.
Here a wireless concept of RF radio frequency (frequency Modulation technology) is used to control and monitor.
In this session you will learn:
DCS Introduction
PLC
SCADA
General architecture of DCS
Process or application
Scan time
Input and Output requirement
Redundancy
RTU and LCU
PLC vs DCS
For more information, visit: https://www.mindsmapped.com/courses/industrial-automation/complete-training-on-industrial-automation-for-beginners/
Our Tool Monitor Adaptive Control (TMAC) system protects your CNC machine while providing valuable information about your cutting process. The system reduces the high cost of replacement tools, lost production, and rejected parts by effectively measuring tool wear in real time. It operates on the principle that the horsepower required to cut a part increases as the tool's cutting edges deteriorate.
The âAdaptiveâ control feature of TMAC reduces cycle time and optimizes cutting conditions to improve tool life.
Distributed Control Systems (DCS) are dedicated systems used to control manufacturing processes that are continuous or batch-oriented, such as oil refining, petrochemicals, central station power generation, fertilizers, pharmaceuticals, food and beverage manufacturing, cement production, steelmaking, and papermaking. DCSs are connected to sensors and actuators and use set point control to control the flow of material through the plant.
The most common example is a set point control loop consisting of a pressure sensor, controller, and control valve. Pressure or flow measurements are transmitted to the controller, usually through the aid of a signal conditioning input/output (I/O) device. When the measured variable reaches a certain point, the controller instructs a valve or actuation device to open or close until the fluidic flow process reaches the desired set point.
Large oil refineries have many thousands of I/O points and employ very large DCSs. Processes are not limited to fluidic flow through pipes, however, and can also include things like paper machines and their associated quality controls (see quality control system QCS), variable speed drives and motor control centers, cement kilns, mining operations, ore processing facilities, and many others.
Innovic India Private Limited provides industrial Training on DCS as well as other automationtechnologies like PLC, SCADA, HMI, VFD and many more.
For Core Engineering jobs and 100% Job Oriented Industrial Training
Feel free to contact us on: +91-9555405045/+91-9811253572
Email: group.innovic2gmail.com
Web: www.innovicindia.com
The aim of this project is to design and develop a system , which will help us to control the industrial processes sitting in a far of location.
Here a wireless concept of RF radio frequency (frequency Modulation technology) is used to control and monitor.
WAM - Web-enabled Alarm Management for Invensys System Platform, Archestra, Intouch, Infusion, Foxboro Control Software users.
For more information visit: http://www.ureason.com or http://www.wonderware.com/solution_providers/isv/PartnerProductSpec.asp?ProductID=7730
The proposed monitoring system for analytics databases hinges on a Performance Monitoring Dashboard and an Incident Management Module. The dashboard provides real-time insights into key performance indicators like query execution time and resource utilization, aiding in early detection of potential bottlenecks. On the other hand, the Incident Management Module, integrated with the dashboard, ensures a reactive approach to anomalies. It auto-logs incidents, categorizes them by severity, and notifies relevant personnel for prompt resolution. This blend of real-time monitoring and reactive incident management establishes a robust framework for maintaining optimal database performance, minimizing downtime, and ensuring a streamlined analytics operation.
In this presentation, learn how to configure the thresholds for each parameter, the violation alarms, notifications for each violation criteria and IT workflows & Automation for repetitive tasks.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients donât know what they donât know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsâ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Â
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
Â
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projectsâ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, youâre in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part âEssentials of Automationâ series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Hereâs what youâll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
Weâll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Donât miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Â
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overviewâ
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
Â
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties â USA
Expansion of bot farms â how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks â Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
5. l UAP is composed of two parts: MGC and MGW
l MGC is the call control and media resource part of the UAP, and is the crucial part. The
MGC has the following functions:
p Call control, service processing, and provide broadband and narrowband media
resources.
p Supports narrowband signaling such as TUP, ISUP, SCCP, TCAP, INAP, CAP, WIN,
among others.
p Supports packet protocols such as H.248, SIGTRAN, and SIP as required by NGN.
l MGW is the TDM switching centre of the UAP8100. It has a TDM switching capacity of
256K, supporting both TDM trunks and IP trunks.
6. l A standard Client/Server architecture is adopted between UAP8100 Operation &
Maintenance System and the UAP8100 equipment. UAP8100 Operation & Maintenance
System works as the client terminal. It performs the management through communication
with the UAP8100 equipment via the TCP/IP-based MML protocol. Installed on any work
station running eitherWindows2000 or Windows XP, this subsystem can achieve single
point management independently.
7.
8. l The host software refers to the software running on UAP MGC main processing unit. It
provides the following functions:
p Signaling and protocol adaptation
p Call processing
p Service control
l The OAM software refers to the software running on the BAM and workstations. Together
with host software, it enables maintenance personnel to implement the similar features to
the host as host software:
p Data management
p Device management
p Alarm management
p Traffic measurement
p Signaling tracing
l The OAM software adopts a client/server model, and consists of the following components:
p BAM software
p Client software
9. l BAM is the core component of UAP8100 MGC terminal system. The BAM software
contains three parts:
p Operating system (Windows 2000 Server).
p Database management software (SQL Server 2000).
p BAM server software.
l UAP8100 MGC workstation needs to be installed with two kinds of software:
p operating system and client software. The operating system can be Windows NT.
p Windows 2000 Professional and Windows XP Professional.
10. l Run UAP MGC terminal system: Start->Programs->U-SYS UAP8100 MGC Operation and
Maintenance Center.
11. l MGC Operation and Maintenance Center include :
p Uninstall U-SYS UAP8100 MGC.
p U-SYS UAP8100 MGC Alarm Management System.
p U-SYS UAP8100 MGC AutoLogin Tool.
p U-SYS UAP8100 MGC Online Book.
p U-SYS UAP8100 MGC Operation and Maintenance System.
p U-SYS UAP8100 MGC Performance Management System.
p U-SYS UAP8100 MGC Print Service.
p U-SYS UAP8100 MGC Server Gateway Tool.
p U-SYS UAP8100 MGC Server.
p U-SYS UAP8100 MGC Trace Viewer.
p U-SYS UAP8100 MGC Workstation Gateway Tool.
12. l The alarms can be classified into three types:
p Fault alarm : A fault alarm corresponds to a fault. It can be a circuit fault, signaling
unreachable, link interruption, or board failure. It is displayed as a fault in the alarm
report. When a fault is recovered, a recovery alarm will be generated accordingly.
p Event alarm : An event alarm describes an occasional and instant event during
system operation. It has no corresponding recovery alarm. Some event alarms recur
regularly. It can be a call connection or board loading.
p Recovery alarm : Each recovery alarm has a corresponding fault alarm. It can be
regarded as a part of the fault alarm.
l There are four levels of alarms, classified by severity. Each identifies a different level of
impact on service.
p Critical : Critical alarms have already affected the quality of service, and require
immediate actions even in non-duty hours. The equipment and network resource
might be completely unavailable.
p Major : Major alarms have already affected the quality of service, and require
immediate actions. The quality of service and the service provisioning capability of
the equipment are degraded, and must be restored during your duty hours.
p Minor : Minor alarms have not affected the quality of service, but require treatment
in proper time or further observation to prevent graver faults and errors.
p Warning : Warning alarms indicate potential errors that might affect the service.
13. l The alarms can be classified into three types:
p Fault alarm : A fault alarm corresponds to a fault. It can be a circuit fault, signaling
unreachable, link interruption, or board failure. It is displayed as a fault in the alarm
report. When a fault is recovered, a recovery alarm will be generated accordingly.
p Event alarm : An event alarm describes an occasional and instant event during
system operation. It has no corresponding recovery alarm. Some event alarms recur
regularly. It can be a call connection or board loading.
p Recovery alarm : Each recovery alarm has a corresponding fault alarm. It can be
regarded as a part of the fault alarm.
l There are four levels of alarms, classified by severity. Each identifies a different level of
impact on service.
p Critical : Critical alarms have already affected the quality of service, and require
immediate actions even in non-duty hours. The equipment and network resource
might be completely unavailable.
p Major : Major alarms have already affected the quality of service, and require
immediate actions. The quality of service and the service provisioning capability of
the equipment are degraded, and must be restored during your duty hours.
p Minor : Minor alarms have not affected the quality of service, but require treatment
in proper time or further observation to prevent graver faults and errors.
p Warning : Warning alarms indicate potential errors that might affect the service.
14. l Performance measurement is also known as payload measurement or traffic
measurement.
l It refers to various measuring activities carried out on the communication networks to
obtain the following measurement data:
p Running status
p Signaling information
p User information
p System resources
l It provides reliable data reference for the following pUAPoses:
p Operation management
p Troubleshooting of equipment
p Network monitoring
p Network maintenance
p Network planning
p Network designing
15. l The BAM application software includes processes such as Warn, Dataman, and Bill. The
startup window of the U-SYS UAP8100 MGC Server includes the following four columns:
[Service], [Status], [Startup], and [ImagePath].
l Status: Status of process.
p Started: The process is running.
p Stopped: The process is stopped.
p Exception: The process is abnormal. For example, the process is suspended.
l Startup: Startup type of the U-SYS UAP8100 MGC Server.
p Automatic: After detecting that the process is stopped, the U-SYS UAP8100 MGC
Server automatically restarts the process.
p Manual: After detecting that the process is stopped, the U-SYS UAP8100 MGC
Server does not restart the process automatically. You have to restart it manually.
p System: The process is managed by the system.
p Disabled: The process is invalid or cancelled.
l ImagePath: Path of execution file corresponding to process.
l BAM application software includes processes such as Warn, Dataman, and Bill. Meanings
of various processes are listed as follows:
16. l (continued)
p Warn: It is the alarm process. It processes the device alarm information and internal
alarm information of the BAM. It provides functions of alarm report and alarm
information query for workstation. It drives the alarm box.
p Dataman: It is the data configuration process. It processes device configuration data
and backs up data such as call prefix data and device data.
p Bill: It is the billing process. It collects and sorts IP Centrex bills.
p Maintain: It is the maintenance process. It processes device maintenance commands
such as loading patches for device programs and signaling tracing.
p Statis: It is the performance measurement process. It processes performance
measurement data such as creating performance measurement tasks and result
query.
p MML: It implements the communication between the BAM and workstation,
operator authority management, explanation of command entered through
workstation, and distribution of command entered by workstation. In addition, the
MML process bridges the communication between various processes of the BAM
and the client. It is responsible for the execution of timer command.
p Exchange: It is the communication module between the BAM and other devices. It
loads device programs and data. It distributes messages returned by devices. It
bridges the data exchange between the BAM and the host.
p BillSorter: It sorts and manages bills. Its function has been shifted to the iGWB.
p SNTPClient: It is the SNTP client. It collects server time and synchronizes the time of
the BAM with that of the client.
p FTP Man: It is the FTP management process for managing file upload and download
between the BAM and the other FTP servers when the BAM serves as an FTP client.
p XSMan: It is a monitoring process for managing monitoring interfaces. The BAM can
interchange data with the monitoring center only when this process is started.
17. l The main menu enables operations to the system, and also provides help files for the
system. The main menu includes [System], [Service, [Authority], [View], [Window] and
[Help].
l The toolbar functions includes [user login/logout], [Navigator tree], [Output window],
[Command line window], [Real-time Print], [Help Topics ].
18. l The system management operations comprises two sections-device management and
subscriber management. In the navigation tree of the client interface, click the
[Management] pane, and the navigation tree is changed as shown in the following :
p Browsing device panel.
p Displaying board information.
p Resetting boards.
p Swapping boards.
p Querying CPU usage.
p Querying memory usage.
19. l MML: Human-Machine Language
l There are two types of parameters:
p The red ones are compulsory, which must be specified.
p The black ones are optional, which can be specified or omitted.
l To know the range of value of a specific parameter, stop the cursor at the input box and
the system will display a pop-up help, indicating the function of the button, and the range
of value and default value of the parameter. Figure above shows the details.
l Specify the parameters according to your requirement.
l Click the button or press <F9>, and the system starts executing the command. The
[Common Maintenance] tab displays the results as shown in the following figure .
l Common Maintenance: Returns the execution results of commands from the BAM.
l History Command: Records all executed commands in the current login, including
unsuccessful ones.
l Help Information: Displays the online help for commands and nodes in the navigation tree.
Each help page includes the functions, notes, parameter description, and examples.
20. l Trace management is the real-time tracing and observation of the connection of the user
circuit, trunk circuit, and interface signaling link in the following aspects:
p Connection procedure.
p State migration.
p Resource usage.
p Call party release procedure.
p Coding sending.
p Control signaling flow.
21. l Select [Authority/Accounts/Add...] in the main client interface, and the [Accounts
Management] dialog box is displayed
l Enter or select the authority attributes.
l Click <OK>. You have completed adding an operator account.
l The system administrator (using the G_SYS command group) enjoys the highest authorities,
and can use all commands. The guest operator can only use the commands in the
G_GUEST command group. The authorities of common operators are defined by operator
group and operator domain.
22. l Can modify the commands in a certain command group only when log in to the client as
system administrator.
23. l Operation Procedure
p Select [Authority/Workstation/Add...] in the main client interface, and the [WS
Management] dialog box is displayed
p Enter the workstation name and IP address.
p Set the authority for the workstation.
p Click <OK>.
l Notes on Adding a Workstation
p The workstation name is not case-sensitive. You cannot leave it blank or use the
name of an existing workstation.
p The IP address must be a valid one. Like the workstation name, you cannot use the
IP address of an existing workstation.
p If you do not set the workstation authority, by default it will have the lowest
authority G_GUEST.
p To ensure that a legal operator can log in the UAP8100 MGC client, you have to
allocate an account and password by selecting [Authority/Accounts/Add...].
p You can also use the command ADD WS to add a workstation in the command
window.
24.
25.
26.
27.
28.
29.
30. l LST BRD: Query the configuration of a board, including frame No., slot No., board
position, board type, board No., backup type, master/slave status, whether synchronous,
management status, central processing unit ( CPU) busy threshold, CPU normal threshold,
installation status and operation status.
31. l DSP BRD: Query the configuration information of boards, including frame No., slot No.,
board position, board type, board No., backup status, master/slave status, installation
status and operation status.
32.
33. l The default automatic backup starts at 4:30 a.m.. The system will back up the BAM
database and registration table to the specified backup directory during BAM installation
(the directory has been set for sharing in system installation). The backup directory can be
queried and changed in the registration table.
l In the [Start/Run] menu, input regedit command to open the registration table edit
window.
l Find HKEY_LOCAL_MACHINE/SOFTWARE/HUAWEI/CC08/DataMan/BackUpFilePath and its
key value is the backup directory. The backup directory can be changed by modifying the
value.
l Automatic backup of the BAM database
p The backup of the BAM database is performed in a scrolling manner. At most 4
database files can be backed up automatically. The backup file of the BAM database
includes the following content:
p The database backups of the recent three consecutive days (except for Sunday). The
names of the three backup files are BamYYYYMMDD.dat.
p A BAM database backup is saved on the first day each month. The file name is
BamMonthBak.dat.
34. l (continued)
l Automatic backup of the BAM registration table
p Registration information of the BAM in Windows system registers. Only the latest
backup is retained, with the file name BamReg.bak.
l Introduction of manual backup in next page.
35. l Use the tool menu of Enterprise Manager of SQL Server
p In the Windows NT/2000 interface of BAM, click [Start/Programs/Microsoft SQL
Server/EnterpriseManager] to log in to the database server.
p Suppose the name of BAM is 2203 (WindowsNT/2000). Enter [Console
Root/Microsoft SQL Servers/2203 (WindowsNT/2000) /Databases] and right
click to pop up a floating menu as shown in this figure.
36. l Click [All Tasks/Backup Database] to pop up a window. Select [Bam] from the
[Database] domain so as to select the database to be backed up. In the [Backup] domain,
determine the method of data backup by selecting backup of all the data or of data that
has been modified. Select the default data backup file name of the system in the
[Destination] domain and click [Remove] to remove the value. Then click the <Add>
button to determine the path where the backup file is located
38. l The operation of the safe data recovery is also carried out on BAM. You can either run the
installation program of the terminal system or use the SQL Service Manager tool to restore
the BAM data. It is suggested to run the installation program of the terminal system to
restore the data in safety.
39. l The BAM Service monitors whether the U-SYS UAP8100 MGC Server is started. If the BAM
Service runs normally and it detects that the U-SYS UAP8100 MGC Server is stopped, the
BAM Service automatically restarts the BAM. The function of the BAM Service is similar to
that of the Software Watchdog.
l Select [Control Panel] of Windows NT/2000, and double-click [Service]. Then select
BAMService, click the <Start> button and select [Disable] in [Startup Type] as shown in
the slide. The restart of the BAMService can be avoided while recovering the data.
41. l Click the button to stop the SQL Server program. Then the system will pop up a dialogue
box. After the <Yes> button has been clicked, the communication between the
foreground and the background of the C&C08-AIP will be interrupted.
l Click the button in this figure to restart the SQL Server program.
42. l If the device file does not displays in figure-1, the operation procedures are as follows:
Figure-1
l Click the <Select Devices> button to pop up a window as figure-2 shows.
43. l (continued)
Figure-2
l Select the equipment files in the list. Click <Remove ALL> to remove all files and click
<ADD> to pop up the window in Figure-3
Figure-3
l Click the <OK> button after selecting the device to be recovered based on the equipment
name.
l Select the data backup file to be recovered and click the <OK> button. The system will
pop up a window showing the progress of the data recovery.
l After the data recovery is completed, set the BAM Service at the automatic start mode and
restart BAM.
44.
45.
46. l The UAP8100 MGW software includes the UAP8100 MGW management and the board
service, which are together called background administration module (BAM). The BAM is
installed in the hard disk of the built-in operation and maintenance unit (OMU). Besides,
the board service software is also stored in the Flash of boards, which can be updated by
loading the latest version from the BAM after the software in the BAM is updated and the
board boot mode is set to âFROM BAMâ.
l The UAP8100 MGW provides an embedded BAM operating on the OMU. It also provides
externalmanagement interfaces and uses a real-time distributed operating system to
improve service process ability and response speed.
l LMT connects to NET board OMC console.
47. l Run MGW LMT: Start->Programs->Huawei Local Maintenance Terminal
48. l LMT include :
p Tools
» It is used for MML commands updating, equipment debugging, alarms
forwarding and tone file creating.
p Add or Remove U-SYS UAP8100 MGW V300R003
» It is used for upgrading or unloading the current LMT system.
p U-SYS UAP8100 MGW Alarm Management System
» It is used for alarm querying and processing.
p U-SYS UAP8100 MGW Operation and Maintenance System
» It is used for data configuration, device operation and maintenance and right
setting, and so on.
p U-SYS UAP8100 MGW Operation Online Help
» It is used for providing online help information for the LMT sub-systems.
p U-SYS UAP8100 MGW Performance Management System
» It is used for creating performance measure tasks and displaying results.
p U-SYS UAP8100 MGW Trace Viewer
» It is used for viewing the traced messages during off line.
49. l Fault Alarm Browse is used to display the summary of the received fault alarms. It opens
when the system is started up, finds out currently fault messages from BAM by an query,
and then brief the messages in the window. Current fault messages refer to those that
have not been cleared or acknowledged.
l Event Alarm Browse is used to display summary information of the event alarms in the
window. When the system is started, it queries the event alarms in the BAM and display
them in item list of the window.
50. l Performance statistics is also called performance measurement, indicating the
measurement to devices and around telecommunication networks (for such items as traffic
volume and load) to provide the data about network operation. Measurement elements
include measure item, measure object and measure time.
51. l The main menu enables operations to the system, and also provides help files for the
system. The main menu includes [System], [Operation], [Security Management], [View],
[Window] and [Help].
l The toolbar functions includes [user login/logout], [Office management], [Lock], [Navigator
tree], [Prompt window], [Command line window], [Open TraceReview Tool ], [Open Alarm
Management System], [Open Performance Management System], [Real-time Print], [Help
Topics ].
52. l The maintenance tab is made up of two parts: trace management and panel management.
l The performance trace of the equipments can be classified into 2 parts according to the
traced objects and the task applications:
p Trace to the service procedure flows of the UAP8100 system.
p Trace to the interactive interface.
l Panel management is a tool for visualized management of the equipments, which is
achieved by selecting and manipulating the equipment through the graphic interface.
53. l MML Command Tab categorizes MML commands in form of a tree, which enables you to
view a command according to its category.