The document provides commands and steps to verify connections and check the status of different components in an eNodeB network. It includes commands to check the S1-CP, S1-UP, X2 links and handover functionality. Additional commands are provided to check the health, restart, lock/unlock cells and sectors, and verify the software package version of an eNodeB.
E node b_useful_commands_for_rf_engineerMohamed Msuya
This document provides instructions for verifying connections and checking the status of various network elements in an LTE network using Moshell commands. Specifically:
1) Commands are given to check the S1-CP connection between an eNodeB and MME after restart, verify S1-UP connectivity between an eNodeB and SGW, and check the status of X2 links between eNodeBs.
2) Instructions are provided to check if handover features are activated on an eNodeB and to view IP addresses and relations between cells, frequencies, and sectors.
3) The status of cells and sectors can be checked, and cells can be locked or unlocked using provided commands.
Integrated Data, Message, and Process Recovery for Failure Masking in Web Ser...Gera Shegalov
The document discusses ensuring exactly-once execution semantics for web services through the use of interaction contracts and failure masking techniques implemented in a PHP framework called EOS. It presents an interaction contracts framework that uses formal specifications, model checking, and persistent logging to guarantee exactly-once execution across failures. The document also evaluates the performance overhead of the EOS implementation through an experiment running a simulated e-commerce auction service.
This document discusses SCAN, VIP, and HAIP in Oracle RAC environments. It provides details on:
- VIP - a virtual IP address that is not statically linked to a single node, allowing for faster failovers. Each node has a VIP.
- SCAN - a single virtual IP and listener that provides load balancing and high availability. SCAN acts as an abstraction layer so client connect strings do not need to change.
- HAIP - high availability IP addresses that allow clusterware and the database to use plumbed IP addresses for private interconnect traffic via solutions like bonding and trunking.
The document discusses best practices for using Apache Cassandra, including:
- Topology considerations like replication strategies and snitches
- Booting new datacenters and replacing nodes
- Security techniques like authentication, authorization, and SSL encryption
- Using prepared statements for efficiency
- Asynchronous execution for request pipelining
- Batch statements and their appropriate uses
- Improving performance through techniques like the new row cache
OSMC 2008 | Monitoring MySQL by Geert VanderkelenNETWAYS
Monitoring MySQL has a long history within Nagios. Several plugins are available already. In addition to that, there are probably lots of plugins that have been developed by the community. We take a look at some of these and discuss what kind of additional useful information could be pulled out of a MySQL Server for monitoring it even better. A simple example on how to write such plugins will be shown, also using NDB API for monitoring MySQL Cluster. Now that MySQL Enterprise Monitor (MEM) is available, we'll go through the possibilities for combining the two platforms. We will also discuss the NDOUtils for storing configuration and event data using MySQL.
This talk starts with a brief overview of MySQL itself: some history, where it's heading too, and why it is so successful.
Formal Verification of Web Service Interaction ContractsGera Shegalov
The document summarizes research on formal verification of interaction contracts (ICs) for web services. It describes an IC framework that provides exactly-once execution semantics even in the presence of failures. The framework specifies ICs using Statemate statecharts and formally verifies properties like safety and liveness. It also demonstrates applying ICs to a web service architecture with frontend and backend servers.
The document summarizes the new features and improvements in CodeIgniter 3.0. Key highlights include increased number of commits compared to previous versions, improved database features like query builder and failover connections, new features like output minification and pagination improvements, and a focus on unit testing.
This document summarizes the steps taken to install and configure MySQL 5.1.50 and MySQL 5.5.8 on the same machine for performance testing purposes. It describes preparing the testing environment, installing each MySQL version, and configuring various parameters like the InnoDB storage engine settings. Tests were run using Sysbench to compare the performance of each version for operations like inserting 1 million records with and without concurrency. The results are presented in tables showing the time taken for each operation on each MySQL configuration.
E node b_useful_commands_for_rf_engineerMohamed Msuya
This document provides instructions for verifying connections and checking the status of various network elements in an LTE network using Moshell commands. Specifically:
1) Commands are given to check the S1-CP connection between an eNodeB and MME after restart, verify S1-UP connectivity between an eNodeB and SGW, and check the status of X2 links between eNodeBs.
2) Instructions are provided to check if handover features are activated on an eNodeB and to view IP addresses and relations between cells, frequencies, and sectors.
3) The status of cells and sectors can be checked, and cells can be locked or unlocked using provided commands.
Integrated Data, Message, and Process Recovery for Failure Masking in Web Ser...Gera Shegalov
The document discusses ensuring exactly-once execution semantics for web services through the use of interaction contracts and failure masking techniques implemented in a PHP framework called EOS. It presents an interaction contracts framework that uses formal specifications, model checking, and persistent logging to guarantee exactly-once execution across failures. The document also evaluates the performance overhead of the EOS implementation through an experiment running a simulated e-commerce auction service.
This document discusses SCAN, VIP, and HAIP in Oracle RAC environments. It provides details on:
- VIP - a virtual IP address that is not statically linked to a single node, allowing for faster failovers. Each node has a VIP.
- SCAN - a single virtual IP and listener that provides load balancing and high availability. SCAN acts as an abstraction layer so client connect strings do not need to change.
- HAIP - high availability IP addresses that allow clusterware and the database to use plumbed IP addresses for private interconnect traffic via solutions like bonding and trunking.
The document discusses best practices for using Apache Cassandra, including:
- Topology considerations like replication strategies and snitches
- Booting new datacenters and replacing nodes
- Security techniques like authentication, authorization, and SSL encryption
- Using prepared statements for efficiency
- Asynchronous execution for request pipelining
- Batch statements and their appropriate uses
- Improving performance through techniques like the new row cache
OSMC 2008 | Monitoring MySQL by Geert VanderkelenNETWAYS
Monitoring MySQL has a long history within Nagios. Several plugins are available already. In addition to that, there are probably lots of plugins that have been developed by the community. We take a look at some of these and discuss what kind of additional useful information could be pulled out of a MySQL Server for monitoring it even better. A simple example on how to write such plugins will be shown, also using NDB API for monitoring MySQL Cluster. Now that MySQL Enterprise Monitor (MEM) is available, we'll go through the possibilities for combining the two platforms. We will also discuss the NDOUtils for storing configuration and event data using MySQL.
This talk starts with a brief overview of MySQL itself: some history, where it's heading too, and why it is so successful.
Formal Verification of Web Service Interaction ContractsGera Shegalov
The document summarizes research on formal verification of interaction contracts (ICs) for web services. It describes an IC framework that provides exactly-once execution semantics even in the presence of failures. The framework specifies ICs using Statemate statecharts and formally verifies properties like safety and liveness. It also demonstrates applying ICs to a web service architecture with frontend and backend servers.
The document summarizes the new features and improvements in CodeIgniter 3.0. Key highlights include increased number of commits compared to previous versions, improved database features like query builder and failover connections, new features like output minification and pagination improvements, and a focus on unit testing.
This document summarizes the steps taken to install and configure MySQL 5.1.50 and MySQL 5.5.8 on the same machine for performance testing purposes. It describes preparing the testing environment, installing each MySQL version, and configuring various parameters like the InnoDB storage engine settings. Tests were run using Sysbench to compare the performance of each version for operations like inserting 1 million records with and without concurrency. The results are presented in tables showing the time taken for each operation on each MySQL configuration.
The document appears to contain code snippets and documentation related to boundary scan testing and initialization of integrated circuits. Specifically, it includes:
1. Code examples for boundary scan register definitions using attributes like REGISTER_FIELDS, REGISTER_MNEMONICS, and REGISTER_ASSEMBLY.
2. Descriptions and examples of initialization data registers and related instructions/procedures for setting up I/O protocols, voltages, and clocks on chips.
3. Package definitions and examples that define and assemble segments for boundary scan registers and initialization data fields across multiple ICs.
A Framework for Robust Control of Uncertainty in Self-Adaptive Software Conn...Pooyan Jamshidi
We enable reliable and dependable self‐adaptations of component connectors in unreliable environments with imperfect monitoring facilities and conflicting user opinions about adaptation policies by developing a framework which comprises: (a) mechanisms for robust model evolution, (b) a method for adaptation reasoning, and (c) tool support that allows an end‐to‐end application of the developed techniques in real‐world domains.
The document describes how to add LED driver programs to the BSP in Windows CE. It involves creating directories and files for the LED driver in the BSP folder, adding code to initialize and control the LEDs, compiling the driver and testing application, and integrating them into the kernel so the testing application runs at startup. Key steps include creating makefiles and source files for the driver, implementing IO control functions to turn LEDs on/off, and compiling the test application to call these driver functions through device I/O control calls.
This document discusses binary vulnerabilities and methods for identifying and exploiting them. It covers topics like stack overflows, heap overflows, integer overflows, and pointer vulnerabilities. It also discusses vulnerability metrics, identifiers, and tools that can be used for analysis like fuzzers, symbolic execution, and decompilers. Exploitation techniques like bypassing protections and transferring control are also mentioned.
This document discusses binary vulnerabilities and methods for finding and exploiting them. It covers different types of vulnerabilities like stack overflows, heap overflows, and integer overflows. It also discusses vulnerability metrics, identifiers, and tools that can be used to analyze binaries both statically and dynamically like fuzzers, symbolic execution, and taint analysis. Exploitation techniques like bypassing protections and ROP are also mentioned.
This document discusses randomization using SystemVerilog. It begins by introducing constraint-driven test generation and random testing. It explains that SystemVerilog allows specifying constraints in a compact way to generate random values that meet the constraints. The document then discusses using objects to model complex data types for randomization. It provides examples of using SystemVerilog functions like $random, $urandom, and $urandom_range to generate random numbers. It also discusses constraining randomization using inline constraints and randomizing objects with the randomize method.
This document describes the history and features of the MDP-Plus expert advisor (EA). It was originally based on the MillionDollarPips EA and has undergone several versions with updates and improvements made by Capella. Key features of MDP-Plus v2.1.2 include trailing stops, support for no dealing desk brokers, optimized settings, and customization of indicators and order settings. The EA uses moving averages, Bollinger Bands, and other indicators to determine entry signals and manage open positions.
Learn from Fastly veteran Cassandra Dixon on some of the most common customer issues we see — such as why things aren’t caching, misconfigured origins, issues with intermediary proxies, and VCL snafus — and the best ways to resolve them. We’ll also discuss our unique approach to debugging — using seemingly mundane tools to diagnose issues in creative ways — and how you can apply these methods to your own organization to get the most out of Fastly’s offerings.
The document provides instructions for setting up a TI-RTOS project for the CC1352R wireless microcontroller. It describes creating a CCS project targeting the CC1352R, configuring compiler and linker settings, generating a system configuration file, and adding TI-RTOS and driver library files. The goal is to build a basic "hello world" project to demonstrate real-time operating system functionality on the CC1352R wireless microcontroller.
This document discusses various Oracle SQL concepts including query optimization, execution plans, joins, indexes, and full table scans. It provides guidance on understanding how Oracle processes and executes SQL queries, the importance of statistics and selectivity, and techniques for writing efficient queries such as predicate pushing and query transformations. The goal is to help readers gain a conceptual understanding of Oracle's internals to formulate more efficient SQL.
The document discusses the glance-replicator tool in OpenStack. Glance-replicator allows replication of images between two glance servers. It can replicate images and also import and export images. The document provides examples of using glance-replicator commands like compare, livecopy to replicate images between two devstack all-in-one OpenStack environments. It demonstrates the initial state with only one environment having images and after replication both environments having the same set of images.
FOSDEM 2012: MySQL synchronous replication in practice with GaleraFromDual GmbH
This document provides an overview of MySQL synchronous replication using Galera. It discusses why Galera is used over other replication options, how to set up a Galera cluster with 3 nodes, the configuration required, and how to perform operations like starting/stopping nodes and performing a state snapshot transfer. It also covers characteristics of Galera like synchronous multi-master replication, automatic membership control, and parallel replication. The document is meant to facilitate questions and discussion about using Galera in practice.
Debugging: Rules And Tools - PHPTek 11 VersionIan Barber
The document provides rules and tools for debugging. It discusses understanding the system, making failures reproducible, quitting thinking and closely observing behaviors, dividing problems into smaller pieces, changing one thing at a time, and maintaining an audit trail of changes. Tools mentioned include Xdebug, Selenium, PHPUnit, strace, and source control systems. Logging, instrumentation, and testing techniques are also covered.
This document discusses MongoDB replication and sharding. It begins with an introduction to MongoDB and its data model. It then covers replication with master-slave and replica sets. It also discusses sharding components including shard servers, config servers, and mongos routers. It provides examples of setting up replica sets, adding shards, and combining replica sets with sharding. The document encourages trying these techniques yourself and sharing experiences.
This document summarizes MySQL's init_connect feature which allows SQL statements to be executed for each client connection. It provides examples of setting init_connect to log client connections to a table and discusses how to address issues like preventing the logs from being written to binary logs. The document also estimates storage needed for connection logs and provides an example of periodically deleting old log entries.
Replication allows copying data from one MySQL database server to another. It works by logging all SQL statements on the master server and playing them back on the slave server. Logical replication copies the data changes and allows asynchronous replication with potential delays. Configuring replication involves setting up a slave server to copy and replay the binary logs from the master server.
Replication allows copying data from one MySQL database server to another. It works by logging all SQL statements on the master server and playing them back on the slave server. Logical replication copies the data changes and allows asynchronous replication with potential delays. Configuring replication involves setting up a slave server to copy and replay the binary logs from the master server.
The document provides an overview of a NodeJS CRUD and deployment course. The course outline includes: setting up a NodeJS environment on SmartOS with MySQL and Git in 3 minutes; tools for cloud development like SSH, SCP, and Git; building a simple web server with authorization using Passport and CRUD functionality with MySQL; and advanced topics like load balancing for cloud services. The course also provides a Micloud server for hands-on labs and sample projects.
LoRaWAN technology uses unlicensed spectrum and provides long range connectivity for IoT devices. It uses chirp spread spectrum modulation and supports different data rates and frequency bandwidths depending on regional regulations. LoRaWAN networks have a star topology with IoT devices connecting to gateways and using a central network server. IoT devices are classified into different classes depending on their communication needs, with Class A devices allowing bidirectional communication through scheduled bursts.
Ch 8 - Energy, Enthalpy, and Thermochemistry.pdfCharbelRahme2
The document discusses energy, enthalpy, and thermochemistry. It defines key concepts like energy, heat, work, internal energy, enthalpy, and explains how they relate. It also discusses state functions, the first and second laws of thermodynamics, and how to calculate enthalpy changes using standard enthalpies of formation and Hess's law. Experimental methods like calorimetry are also covered to measure energy changes during chemical reactions.
The document appears to contain code snippets and documentation related to boundary scan testing and initialization of integrated circuits. Specifically, it includes:
1. Code examples for boundary scan register definitions using attributes like REGISTER_FIELDS, REGISTER_MNEMONICS, and REGISTER_ASSEMBLY.
2. Descriptions and examples of initialization data registers and related instructions/procedures for setting up I/O protocols, voltages, and clocks on chips.
3. Package definitions and examples that define and assemble segments for boundary scan registers and initialization data fields across multiple ICs.
A Framework for Robust Control of Uncertainty in Self-Adaptive Software Conn...Pooyan Jamshidi
We enable reliable and dependable self‐adaptations of component connectors in unreliable environments with imperfect monitoring facilities and conflicting user opinions about adaptation policies by developing a framework which comprises: (a) mechanisms for robust model evolution, (b) a method for adaptation reasoning, and (c) tool support that allows an end‐to‐end application of the developed techniques in real‐world domains.
The document describes how to add LED driver programs to the BSP in Windows CE. It involves creating directories and files for the LED driver in the BSP folder, adding code to initialize and control the LEDs, compiling the driver and testing application, and integrating them into the kernel so the testing application runs at startup. Key steps include creating makefiles and source files for the driver, implementing IO control functions to turn LEDs on/off, and compiling the test application to call these driver functions through device I/O control calls.
This document discusses binary vulnerabilities and methods for identifying and exploiting them. It covers topics like stack overflows, heap overflows, integer overflows, and pointer vulnerabilities. It also discusses vulnerability metrics, identifiers, and tools that can be used for analysis like fuzzers, symbolic execution, and decompilers. Exploitation techniques like bypassing protections and transferring control are also mentioned.
This document discusses binary vulnerabilities and methods for finding and exploiting them. It covers different types of vulnerabilities like stack overflows, heap overflows, and integer overflows. It also discusses vulnerability metrics, identifiers, and tools that can be used to analyze binaries both statically and dynamically like fuzzers, symbolic execution, and taint analysis. Exploitation techniques like bypassing protections and ROP are also mentioned.
This document discusses randomization using SystemVerilog. It begins by introducing constraint-driven test generation and random testing. It explains that SystemVerilog allows specifying constraints in a compact way to generate random values that meet the constraints. The document then discusses using objects to model complex data types for randomization. It provides examples of using SystemVerilog functions like $random, $urandom, and $urandom_range to generate random numbers. It also discusses constraining randomization using inline constraints and randomizing objects with the randomize method.
This document describes the history and features of the MDP-Plus expert advisor (EA). It was originally based on the MillionDollarPips EA and has undergone several versions with updates and improvements made by Capella. Key features of MDP-Plus v2.1.2 include trailing stops, support for no dealing desk brokers, optimized settings, and customization of indicators and order settings. The EA uses moving averages, Bollinger Bands, and other indicators to determine entry signals and manage open positions.
Learn from Fastly veteran Cassandra Dixon on some of the most common customer issues we see — such as why things aren’t caching, misconfigured origins, issues with intermediary proxies, and VCL snafus — and the best ways to resolve them. We’ll also discuss our unique approach to debugging — using seemingly mundane tools to diagnose issues in creative ways — and how you can apply these methods to your own organization to get the most out of Fastly’s offerings.
The document provides instructions for setting up a TI-RTOS project for the CC1352R wireless microcontroller. It describes creating a CCS project targeting the CC1352R, configuring compiler and linker settings, generating a system configuration file, and adding TI-RTOS and driver library files. The goal is to build a basic "hello world" project to demonstrate real-time operating system functionality on the CC1352R wireless microcontroller.
This document discusses various Oracle SQL concepts including query optimization, execution plans, joins, indexes, and full table scans. It provides guidance on understanding how Oracle processes and executes SQL queries, the importance of statistics and selectivity, and techniques for writing efficient queries such as predicate pushing and query transformations. The goal is to help readers gain a conceptual understanding of Oracle's internals to formulate more efficient SQL.
The document discusses the glance-replicator tool in OpenStack. Glance-replicator allows replication of images between two glance servers. It can replicate images and also import and export images. The document provides examples of using glance-replicator commands like compare, livecopy to replicate images between two devstack all-in-one OpenStack environments. It demonstrates the initial state with only one environment having images and after replication both environments having the same set of images.
FOSDEM 2012: MySQL synchronous replication in practice with GaleraFromDual GmbH
This document provides an overview of MySQL synchronous replication using Galera. It discusses why Galera is used over other replication options, how to set up a Galera cluster with 3 nodes, the configuration required, and how to perform operations like starting/stopping nodes and performing a state snapshot transfer. It also covers characteristics of Galera like synchronous multi-master replication, automatic membership control, and parallel replication. The document is meant to facilitate questions and discussion about using Galera in practice.
Debugging: Rules And Tools - PHPTek 11 VersionIan Barber
The document provides rules and tools for debugging. It discusses understanding the system, making failures reproducible, quitting thinking and closely observing behaviors, dividing problems into smaller pieces, changing one thing at a time, and maintaining an audit trail of changes. Tools mentioned include Xdebug, Selenium, PHPUnit, strace, and source control systems. Logging, instrumentation, and testing techniques are also covered.
This document discusses MongoDB replication and sharding. It begins with an introduction to MongoDB and its data model. It then covers replication with master-slave and replica sets. It also discusses sharding components including shard servers, config servers, and mongos routers. It provides examples of setting up replica sets, adding shards, and combining replica sets with sharding. The document encourages trying these techniques yourself and sharing experiences.
This document summarizes MySQL's init_connect feature which allows SQL statements to be executed for each client connection. It provides examples of setting init_connect to log client connections to a table and discusses how to address issues like preventing the logs from being written to binary logs. The document also estimates storage needed for connection logs and provides an example of periodically deleting old log entries.
Replication allows copying data from one MySQL database server to another. It works by logging all SQL statements on the master server and playing them back on the slave server. Logical replication copies the data changes and allows asynchronous replication with potential delays. Configuring replication involves setting up a slave server to copy and replay the binary logs from the master server.
Replication allows copying data from one MySQL database server to another. It works by logging all SQL statements on the master server and playing them back on the slave server. Logical replication copies the data changes and allows asynchronous replication with potential delays. Configuring replication involves setting up a slave server to copy and replay the binary logs from the master server.
The document provides an overview of a NodeJS CRUD and deployment course. The course outline includes: setting up a NodeJS environment on SmartOS with MySQL and Git in 3 minutes; tools for cloud development like SSH, SCP, and Git; building a simple web server with authorization using Passport and CRUD functionality with MySQL; and advanced topics like load balancing for cloud services. The course also provides a Micloud server for hands-on labs and sample projects.
LoRaWAN technology uses unlicensed spectrum and provides long range connectivity for IoT devices. It uses chirp spread spectrum modulation and supports different data rates and frequency bandwidths depending on regional regulations. LoRaWAN networks have a star topology with IoT devices connecting to gateways and using a central network server. IoT devices are classified into different classes depending on their communication needs, with Class A devices allowing bidirectional communication through scheduled bursts.
Ch 8 - Energy, Enthalpy, and Thermochemistry.pdfCharbelRahme2
The document discusses energy, enthalpy, and thermochemistry. It defines key concepts like energy, heat, work, internal energy, enthalpy, and explains how they relate. It also discusses state functions, the first and second laws of thermodynamics, and how to calculate enthalpy changes using standard enthalpies of formation and Hess's law. Experimental methods like calorimetry are also covered to measure energy changes during chemical reactions.
This document summarizes key concepts from chapters on atomic structure and quantum mechanics. It describes electromagnetic radiation and its wave-particle duality. Matter is found to have both particle and wave properties. The atomic spectrum of hydrogen is explained by Bohr's model of discrete electron energy levels. Later, the quantum mechanical model using Schrodinger's equation provides a more accurate description by defining atomic orbitals using quantum numbers. Orbital shapes, energies, and electron configurations are also summarized.
This document provides an overview of several key chemistry concepts across multiple chapters:
Chapter 1 introduces fundamental concepts like the three states of matter, elements and compounds, and physical and chemical properties.
Chapter 2 discusses atomic structure, including Dalton's atomic theory, early experiments that led to modern atomic models, and the organization of the periodic table. It also introduces molecules, ions, and chemical bonding.
Chapter 3 covers stoichiometry, including atomic masses, the mole concept, and percent composition of compounds.
The document defines important terms and provides examples to illustrate concepts like the periodic table, naming simple ionic and covalent compounds, and acid naming conventions. Diagrams and figures are included to summarize key ideas.
The document discusses how to identify gaps between sales and marketing by creating an assessment framework to analyze past performance, current processes, strategy, and gathering customer feedback. It suggests surveying customers to understand preferences and pain points during the sales process. Identifying these gaps is important for companies to understand shortcomings and set goals to improve sales and marketing alignment.
GE Digital - Customer Reference Stories - 9Nov2017.pptxCharbelRahme2
The document provides an overview of GE's digital customer insights and reference stories. It summarizes that GE has over 10,000 total customers, including many Fortune 500 companies in industries like automotive, oil & gas, chemicals, and others. The customer satisfaction score is not provided. The reference booklet contains over 100 customer stories that can be shared publicly, with additional references found online. The outline categorizes customer stories by industry such as aviation, manufacturing, power, etc.
This document provides an overview of solving problems involving ages through different methods like forming equations, using tricks, and practice problems on numbers. It discusses techniques like using ratios, looking for divisible values, tracking changes in ratios over time, and setting up equations with different timelines. Sample problems are provided covering topics like ratios of ages, sums and differences of ages, and properties of two-digit numbers. The document aims to explain easier methods for solving age and number problems to save time on exams.
ABB pursued a strategy of rapid growth through acquisitions in the 1990s while decentralizing operations. In the 2000s, ABB emphasized quality, efficiency, and technological innovation. Under CEO Percy Barnevik, ABB used a multidomestic approach and strategies like customer focus, quality management, and time-based management. Barnevik and later CEOs restructured ABB's organization to improve margins, returns, and reliability. ABB's power products strategy focused on fixing transformers, streamlining products, and updating high-voltage platforms. For power systems, ABB aimed to increase margins, leverage existing customers, and focus on core activities like transmission while pushing new applications.
This document provides an overview of ABB Group and its operations in Greece. ABB is a global leader in power and automation technologies, with 145,000 employees in around 100 countries. In Greece, ABB has been operating since the 1920s and currently has around 285 employees. It has major operations in power systems, process automation, discrete automation and motion, and low voltage products. ABB in Greece has annual revenues of around 90-100 million euros and serves over 1,700 active clients.
Jazz originated in 19th century New Orleans, influenced by African culture. It is characterized by improvisation, especially in styles like free jazz. Blues is one of the most well-known jazz genres, often associated with sadness emotions. Jazz musicians typically perform in small groups or big bands using instruments like piano, saxophone, trumpet, and trombone, and sometimes include vocalists. Louis Armstrong was a highly influential trumpeter and vocalist born in 1901 in New Orleans who helped develop jazz in the 1920s with his bands Hot Five and Hot Seven before gaining international fame later in his career. He made scatting famous and continued performing jazz until his death in 1971.
Mind maps are a visual way to organize ideas and information. They allow you to generate ideas, see relationships between topics, and improve memory. To create a mind map, use shapes, lines, images, keywords and a central idea to visually connect different branches of a topic. Examples show mind maps for a conference presentation, vacation planning, and class notes.
This document profiles 50 famous people who experienced failure or setbacks before achieving great success. It describes how many of the most well-known innovators, artists, and leaders faced numerous rejections and failures in their early careers, including Henry Ford, Walt Disney, Albert Einstein, Oprah Winfrey, J.K. Rowling, The Beatles, and Michael Jordan, before eventually attaining worldwide fame and recognition for their accomplishments.
This chapter discusses cell site development and the types of cell sites used in wireless networks. It describes macro cell sites as large, conventional sites and metro cell sites as smaller, lower-power sites concealed in fixtures. The chapter outlines factors considered in cell site planning such as coverage needs, zoning restrictions, and aesthetics. It also discusses trends toward adding small cell sites and using distributed antenna systems (DAS) to enhance coverage.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
3. How to verify connection between eNodeB an MME (S1-Control
Plane) after eNB or MME restart >st mme or st termpointtomme
• DFWe0600037> st mme
• 100727-13:22:42 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• ===================================================================================
• Proxy Adm State Op. State MO
• ===================================================================================
• 886 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,TermPointToMme=MME010012008226
• ===================================================================================
• Total: 1 MOs
• DFWe0600037> st termpointtomme
• 100727-13:23:01 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• ===================================================================================
• Proxy Adm State Op. State MO
• ===================================================================================
• 886 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,TermPointToMme=MME010012008226
• ===================================================================================
• Total: 1 MOs
To find out IP address for MME
>get <proxy#>
4. How to Verify connection between eNodeB to SGW S1-UP (S1 – User
Plane) after eNB or SGW restart
To verify S1-UP (link from eNodeB to S-GW), you have to run ping command from
UE to application server.
Ping <IP address> -t
5. How to verify connection X2 link (Links between eNB)
• DFWe0600037> st termpointtoenb
• 100727-14:28:05 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• ===================================================================================
• Proxy Adm State Op. State MO
• ===================================================================================
• 684 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600671,TermPointToENB=DFWe0600671
• 692 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600008,TermPointToENB=DFWe0600008
• 694 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600029,TermPointToENB=DFWe0600029
• 703 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600607,TermPointToENB=DFWe0600607
• 708 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600049,TermPointToENB=DFWe0600049
• 712 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600674,TermPointToENB=DFWe0600674
• 718 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600055,TermPointToENB=DFWe0600055
• 722 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600007,TermPointToENB=DFWe0600007
• 725 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600036,TermPointToENB=DFWe0600036
• 730 1 (UNLOCKED) 1 (ENABLED) ENodeBFunction=1,EUtraNetwork=1,ExternalENodeBFunction=DFWe0600044,TermPointToENB=DFWe0600044
This command will verify X2 links. A
maximum of 64 host MOs
(IpAccessHostGpb, IpAccessHostSpb
and IpAccessHostEt) can be
configured in a node.
A maximum of 64 host MOs
(IpAccessHostGpb, IpAccessHostSpb
and IpAccessHostEt) can be
connected to IpInterface MOs on one
board.
19. Shows all RUS boards installed in the ENodeB
• DFWe0600531> cabx
• 100804-11:26:30 10.26.66.110 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/11419
• .
• =====================================================================================================
• SMN APN BOARD GREEN YELLOW RED PRODUCT NR REV DATE SERIAL NR TEMP COREMGR
• =====================================================================================================
• 0 1 DUL 20 01 ON OFF OFF KDU 137 533/3 R2C 20100406 C823455278
• -----------------------------------------------------------------------------------------------------
• ================================================================
• SMN ProductNr Rev Name Date SerialNr
• ================================================================
• 0 ROJ 999 999 * BACKPLANE
• ----------------------------------------------------------------
• =======================================================================================================
=========================
• SMN APN PORT BOARD GREEN YELLOW RED PRODUCT NR REV DATE SERIAL NR
• =======================================================================================================
=========================
• 0 1 BXP_0_1 RUS steady 16 off KRC 118 59/1 R2B 20100329 CC40857143
• 0 1 BXP_1_1 RUS steady 16 off KRC 118 59/1 R2B 20100331 CC40865276
• 0 1 BXP_2_1 RUS steady 16 off KRC 118 59/1 R2B 20100329 CC40857167
• ----------------------------------------------------------------------------------------------------------------------------
22. To verify status of sync device
• DFWe0600037> st sync
• 100727-15:10:29 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2
stopfile=/tmp/18164
• ===========================================================
========================
• Proxy Adm State Op. State MO
• ===========================================================
========================
• 95 1 (UNLOCKED) 1 (ENABLED)
Equipment=1,Subrack=1,Slot=1,PlugInUnit=1,TimingUnit=1,TuSyncRef=1
• ===========================================================
========================
• Total: 1 MOs
To Verify handling of sync
• DFWe0600531> get . clock
• 100804-09:44:51 10.26.66.110 8.0d ERBS_NODE_MODEL_A_9_2
stopfile=/tmp/11419
• ===========================================================
===================== =================================
• MO Attribute Value
• ===========================================================
===================== =================================
• Synchronization=1 nodeSystemClock 2 (LOC
KED_MODE)
• Subrack=1,Slot=1,PlugInUnit=1,TimingUnit=1 tuSystemClock 2
(LOC KED_MODE)
• ===========================================================
===================== =================================
0 UNKNOWN_MODE
1
STARTUP_MODE
The system clock is starting up.
2
LOCKED_MODE
The system clock signal on the Timing Unit is locked: a
synchronization reference is used to generate the system clock,
the clock accuracy is 50 ppb or better.
3
HOLD_OVER_MODE
The system clock signal on the Timing Unit has holdover quality: no
synchronization reference is used to generate the system clock,
the clock accuracy is 50 ppb or better.
4
FREE_RUNNING_MODE
The system clock signal on the Timing Unit is free-running: no
synchronization reference is used to generate the system clock,
the clock accuracy is 4.6 ppm or better.
5
FAILED_MODE
The system clock signal on the Timing Unit is failed: there is fault in
generating the system clock, no guarantee of clock accuracy
level.
6
LOSS_OF_TRACKING_MODE
The frequency of the system clock is at its upper or lower limit.
7
NOT_APPLICABLE
The system clock signal on Timing Unit is not applicable: the TUB or
the CBU is not present.
24. How to check cell alarm
• DFWe0600037> alt
• 100727-15:13:11 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• Connecting to 10.26.4.174:56834 (CorbaSecurity=OFF, corba_class=2, java=1.6.0_13, jacoms=R71CD02, jacorb=R71AN04)
• Trying file=/var/opt/ericsson/amos/moshell_logfiles/edonngu/logs_moshell/tempfiles/20100727-131859_18123/ior18123
• Resolving the alarm service in OMS...
• Simple Alarm Client initialized...
• Starting to retrieve active alarms
• Nr of active alarms are: 4
• ================================================================================================
• Date & Time (Local) S Specific Problem Cause Mo-Reference
• ================================================================================================
• 2010-07-10 09:43:51 M TemperatureSensorFailure equipment_malfunction BatteryBackup=1
• 2010-07-10 09:43:51 M BatteryMissing configuration_or_customizing_error BatteryBackup=1
• 2010-07-10 09:44:41 C License Key File Fault configuration_or_customizing_error Licensing=1
• 2010-07-27 15:06:55 M Upgrade Package Corrupt file_error UpgradePackage=R20BT
• >>> Total: 4 Alarms (1 Critical, 3 Major)
How to check more detail on each alarm
• DFWe0600037> ala
• 100727-16:30:22 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• Connecting to 10.26.4.174:56834 (CorbaSecurity=OFF, corba_class=2, java=1.6.0_13, jacoms=R71CD02, jacorb=R71AN04)
• Trying file=/var/opt/ericsson/amos/moshell_logfiles/edonngu/logs_moshell/tempfiles/20100727-131859_18123/ior18123
• Resolving the alarm service in OMS...
• Simple Alarm Client initialized...
• Starting to retrieve active alarms
• Nr of active alarms are: 4
• ================================================================================================
• Sever Specific Problem Cause Mo-Reference
• ================================================================================================
• Crit License Key File Fault configuration_or_customizing_error Licensing=1
• Maj BatteryMissing configuration_or_customizing_error BatteryBackup=1
• Maj TemperatureSensorFailure equipment_malfunction BatteryBackup=1
• Maj Upgrade Package Corrupt file_error UpgradePackage=R20BT
• Alarm Id : SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-ENB,MeContext=DFWe0600037_5
• Event Time : Jul 10, 2010 9:44:41 AM
• Perceived Severity : Critical
• Managed Object Class : Licensing
• Managed Object Instance : SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-
ENB,MeContext=DFWe0600037,ManagedElement=1,SystemFunctions=1,Licensing=1
• Specific Problem : License Key File Fault
• Probable Cause : configuration_or_customizing_error
• Additional Text : No license key file installed
• Acknowledged by :
• Acknowledgement Time : 0
• Acknowledgement State: 2
• System DN : SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-ENB,MeContext=DFWe0600037
• Notification Id : 7
• Additional Info :
25. How to check cell alarm log
>lga or lga –xxd (number of days)
• DFWe0600531> lga -2d
• 100804-09:59:24 10.26.66.110 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/11419
• Trying password from ipdatabase file: /opt/ericsson/amos/moshell/sitefiles/ipdatabase...
• Startdate=19661031.081320, Enddate=20100805.145924
• ........Get /c/logfiles/alarm_event/ALARM_LOG.xml /var/opt/ericsson/amos/moshell_logfiles/edonngu/logs_moshell/tempfiles/20100803-
162851_11377/alarmLog11419.xml ... OK
• ====================================================================================================================
• Timestamp (UTC) S Problem Cause MO-reference
• ====================================================================================================================
• 2010-03-28 21:49:57 AL m Password File Fault configuration_or_customizing_error Security=1
• 2010-03-28 21:50:00 AL C License Key File Fault configuration_or_customizing_error Licensing=1
• 2010-04-29 14:49:00 AL * License Key File Fault configuration_or_customizing_error Licensing=1
• 2010-04-29 14:49:36 AL m Password File Fault configuration_or_customizing_error Security=1
• 2010-04-29 14:49:40 AL C License Key File Fault configuration_or_customizing_error Licensing=1
• 2010-04-29 14:52:46 AL M Invalid Ethernet Optical Module replaceable_unit_type_mismatch
Subrack=1,Slot=1,PlugInUnit=1,ExchangeTerminalIp=1,GigaBitEthernet=1
• 2010-04-29 14:52:52 AL * Invalid Ethernet Optical Module replaceable_unit_type_mismatch
Subrack=1,Slot=1,PlugInUnit=1,ExchangeTerminalIp=1,GigaBitEthernet=1
• 2010-04-29 14:52:52 AL M Gigabit Ethernet Link Fault loss_of_signal Subrack=1,Slot=1,PlugInUnit=1,ExchangeTerminalIp=1,GigaBitEthernet=1
• 2010-04-29 14:52:54 AL * Gigabit Ethernet Link Fault loss_of_signal Subrack=1,Slot=1,PlugInUnit=1,ExchangeTerminalIp=1,GigaBitEthernet=1
• 2010-04-29 14:53:16 AL m Password File Fault configuration_or_customizing_error Security=1
• 2010-04-29 14:53:16 AL C License Key File Fault configuration_or_customizing_error Licensing=1
• 2010-04-29 19:54:32 AL M EnclosureProductDataMismatch configuration_or_customizing_error Cabinet=1
• 2010-04-29 19:54:53 AL * License Key File Fault configuration_or_customizing_error Licensing=1
• 2010-04-29 19:54:57 AL M LossOfMains commerical_power_failure HwUnit=PSU-1
• 2010-04-29 19:55:02 AL M TemperatureSensorFailure equipment_malfunction BatteryBackup=1
• 2010-04-29 19:55:02 AL M CircuitBreakerTripped fuse_failure HwUnit=BFU-1
• 2010-04-29 19:55:03 AL * CircuitBreakerTripped fuse_failure HwUnit=BFU-1
• 2010-04-29 19:55:03 AL M BatteryMissing configuration_or_customizing_error BatteryBackup=1
• 2010-04-29 19:55:05 AL M Disconnected equipment_malfunction HwUnit=PSU-3
• 2010-04-29 19:55:06 AL M Disconnected equipment_malfunction HwUnit=PDU-2
• 2010-04-29 19:55:06 AL M Disconnected equipment_malfunction HwUnit=SAU
• 2010-04-29 19:57:45 AL M LinkFailure link_failure Subrack=1,Slot=1,PlugInUnit=1,RiPort=A
26. How to check cell alarm log
>lgae or lgae –xxd (number of days)
• RNING - During reconfiguration of programs, no SwAllocation found for PlugInUnit: SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-
ENB,MeContext=DFWe0600037,ManagedElement=1,Equipment=1,HwUnit=PSU-1. =. =
• 2010-06-09 19:04:28 EV UpgradePackage=CXP102051/1_R20GY UpgradePackage Warning: Unexpected condition detected.
currentStepLabel=HardINITIATE. TimeStamp=Date: 2010-06-09, Time: 19:04:28.580. Version=SU_SW: DeltaUPs - R71CD04. Slogan=WARNING -
During reconfiguration of programs, no SwAllocation found for PlugInUnit: SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-
ENB,MeContext=DFWe0600037,ManagedElement=1,Equipment=1,HwUnit=PSU-2. =. =
• 2010-06-09 19:04:30 EV UpgradePackage=CXP102051/1_R20GY UpgradePackage Warning: Unexpected condition detected.
currentStepLabel=HardINITIATE. TimeStamp=Date: 2010-06-09, Time: 19:04:30.707. Version=SU_SW: DeltaUPs - R71CD04. Slogan=WARNING -
During reconfiguration of programs, no SwAllocation found for PlugInUnit: SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-
ENB,MeContext=DFWe0600037,ManagedElement=1,Equipment=1,HwUnit=PDU-1. =. =
• 2010-06-09 19:04:32 EV UpgradePackage=CXP102051/1_R20GY UpgradePackage Warning: Unexpected condition detected.
currentStepLabel=HardINITIATE. TimeStamp=Date: 2010-06-09, Time: 19:04:32.915. Version=SU_SW: DeltaUPs - R71CD04. Slogan=WARNING -
During reconfiguration of programs, no SwAllocation found for PlugInUnit: SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-
ENB,MeContext=DFWe0600037,ManagedElement=1,Equipment=1,HwUnit=BFU-1. =. =
• 2010-06-09 19:04:34 EV UpgradePackage=CXP102051/1_R20GY UpgradePackage Warning: Unexpected condition detected.
currentStepLabel=HardINITIATE. TimeStamp=Date: 2010-06-09, Time: 19:04:34.779. Version=SU_SW: DeltaUPs - R71CD04. Slogan=WARNING -
During reconfiguration of programs, no SwAllocation found for PlugInUnit: SubNetwork=ONRM_ROOT_MO_R,SubNetwork=DFW-
ENB,MeContext=DFWe0600037,ManagedElement=1,Equipment=1,HwUnit=SCU. =. =
• 2010-06-24 18:19:28 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
• 2010-06-24 18:19:41 EV Synchronization=1 NssSynchronization_SynchRefChanged
• 2010-06-24 18:19:41 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
• 2010-07-19 22:56:11 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
• 2010-07-19 22:56:22 EV Synchronization=1 NssSynchronization_SynchRefChanged
• 2010-07-19 22:56:22 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
• 2010-07-20 19:31:35 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
• 2010-07-20 19:31:46 EV Synchronization=1 NssSynchronization_SynchRefChanged
• 2010-07-20 19:31:46 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
• 2010-07-22 23:46:42 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
• 2010-07-22 23:46:53 EV Synchronization=1 NssSynchronization_SynchRefChanged
• 2010-07-22 23:46:53 EV Synchronization=1 NssSynchronization_SystemClockStatusChanged
28. How to check eNB power seting
• DFWe0600037> get . power
• 100727-15:29:48 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• =================================================================================================================
• MO Attribute Value
• =================================================================================================================
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=60Watt CapacityOutputPowerId 60Watt
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=60Watt capacityUnitOutputPower Number of 60 Watt Licenses
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=60Watt keyIdOutputPower CXC4010626
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=60Watt licenseCapacityOutputPower 0
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=60Watt licenseStateOutputPower 0 (DISABLED)
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=40Watt CapacityOutputPowerId 40Watt
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=40Watt capacityUnitOutputPower Number of 40 Watt Licenses
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=40Watt keyIdOutputPower CXC4010625
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=40Watt licenseCapacityOutputPower 0
• Licensing=1,CapacityLicenses=1,CapacityOutputPower=40Watt licenseStateOutputPower 0 (DISABLED)
• SubrackProdType=ROJ999999_* maxPowerDissipation 2000
• EUtranCellFDD=DFWe06000372 maximumTransmissionPower 406
• EUtranCellFDD=DFWe06000372 partOfRadioPower 100
• EUtranCellFDD=DFWe06000373 maximumTransmissionPower 406
• EUtranCellFDD=DFWe06000373 partOfRadioPower 100
• EUtranCellFDD=DFWe06000371 maximumTransmissionPower 406
• EUtranCellFDD=DFWe06000371 partOfRadioPower 100
• SectorEquipmentFunction=S1 confOutputPower 20
• SectorEquipmentFunction=S2 confOutputPower 20
• PowerSupply=1 PowerSupplyId 1
• PowerDistribution=1 PowerDistributionId 1
• SectorEquipmentFunction=S3 confOutputPower 20
• =================================================================================================================
• Total: 11 MOs
These are 3 key eNB power parameters
– partOfRadioPower
– confOutputPower
– maximumTransmissionPower
29. Detail on eNB power seting
Power per Radio Unit [W]:
H/W Capability
– Power capability limited by the RU hardware.
License Power Available
– Power capability as limited by power license management.
partOfRadioPower= 100 {0..100}
– Specifies fraction of power for LTE in case of shared RU.
confOutputPower= 20 {20, 40, 60, 80, 120} [W]
– Used to restrict power in the sector
30. How to change power setting
Example: change power on confoutputpower
• DFWe0600037> set SectorEquipmentFunction=S1 confoutputpower
40
• 100727-15:32:56 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2
stopfile=/tmp/18164
• Set confoutputpower on following MOs ?
• ====================================================
===============================
• 938 SectorEquipmentFunction=S1
• ====================================================
===============================
• Are you Sure [y/n] ?
• y
31. How to lock and un-lock cell
• DFWe0600037> bl cellfdd
• 100727-16:43:42 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• Block following MOs ?
• ===================================================================================
• 628 ENodeBFunction=1,EUtranCellFDD=DFWe06000372
• 842 ENodeBFunction=1,EUtranCellFDD=DFWe06000373
• 889 ENodeBFunction=1,EUtranCellFDD=DFWe06000371
• ===================================================================================
• Are you Sure [y/n] ? Y
• DFWe0600037> deb cellfdd
• 100727-16:45:02 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• Deblock following MOs ?
• ===================================================================================
• 628 ENodeBFunction=1,EUtranCellFDD=DFWe06000372
• 842 ENodeBFunction=1,EUtranCellFDD=DFWe06000373
• 889 ENodeBFunction=1,EUtranCellFDD=DFWe06000371
• ===================================================================================
• Are you Sure [y/n] ?
32. How to check Physical-layer Cell Identity (PCI)
• DFWe0600037> get utrancellfdd=dfwe0600037 cellid
• 100727-16:52:40 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• ==========================================================================================
=======================
• MO Attribute Value
• ==========================================================================================
=======================
• EUtranCellFDD=DFWe06000372 cellId 2
• EUtranCellFDD=DFWe06000372 physicalLayerCellIdGroup 145
• EUtranCellFDD=DFWe06000372 physicalLayerSubCellId 2
• EUtranCellFDD=DFWe06000373 cellId 3
• EUtranCellFDD=DFWe06000373 physicalLayerCellIdGroup 148
• EUtranCellFDD=DFWe06000373 physicalLayerSubCellId 1
• EUtranCellFDD=DFWe06000371 cellId 1
• EUtranCellFDD=DFWe06000371 physicalLayerCellIdGroup 143
• EUtranCellFDD=DFWe06000371 physicalLayerSubCellId 0
• ==========================================================================================
=======================
• Total: 3 MOs
PCI sector 2 = 145*3 + 2 = 437. This is PCI UE detect and collection tool reports
33. Physical-layer Cell Identity (PCI)
• PSS signal: 3 different sequences called Physical-Layer Identities
(0-2)
• SSS signal: 168 different sequences called Physical-Layer Cell-
Identity groups (0-167)
• Because of 168 Physical-Layer Cell-Identity groups with 3
Physical-Layer, we will have 504 PCIs
168 × 3 = 504 Physical-Layer Cell Identities
• For each cell, PCIi = 3Sj + Pk
(Where i = 0 … 503; Group j = 0 … 167; ID k = 0 … 2)
34. How to check eNB parameters
• You need to dump the kget file from eNB
1. > l+ filenam
2. > kget all
3. >l-
Kget file will be stored in the location of current directory.
• Compare two eNB parameters
1. Take kget dump from eNB1, call it “kget_eNB1.log”
2. Moshell into eNB2
3. Do: diff . Kget_eNB1.log
35. How to Verify timer from active to idle
• DFWe0600037> get . tinactivity
• 100727-15:22:46 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• ======================================================================================
===========================
• MO Attribute Value
• ======================================================================================
===========================
• Rcs=1 tInactivityTimer 10
• ======================================================================================
===========================
• Total: 1 MOs
• DFWe0600037> set rcs=1 tinactivitytimer 60
• 100727-15:34:28 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2 stopfile=/tmp/18164
• Set tinactivitytimer on following MOs ?
• ===================================================================================
• 935 ENodeBFunction=1,Rcs=1
• ===================================================================================
• Are you Sure [y/n] ?
• y
36. How to check numbers of active UE (not IMSI) only MME can look up
IMSI
• DFWe0600037> ue print -ue -allcell
• 100727-15:17:22 10.26.4.174 8.0d ERBS_NODE_MODEL_A_9_2
stopfile=/tmp/18164
• $ ue print -ue -allcell
• CellId RacUeRef BbUeRef {traceRef,interfaces,traceDepth,ipAddress}
TypeOfActiveTrace SetByColi
• $