06 RAN16.0 Application of the NIC Tool in UMTS Data Collection

Documents

24 pages
23 views

Please download to get full document.

View again

of 24
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Share
Description
Application of the NIC Tool in UMTS Data Collection
Transcript
  www.huawei.com Security Level: HUAWEI TECHNOLOGIES CO., LTD. Application of the NIC Tool in UMTS Data Collection (R16)  HUAWEI TECHNOLOGIES CO., LTD.Huawei ConfidentialPage 2 Contents 3 How to Use the NIC Tool for Collecting UMTS Data? 2 What Data Can Be Collected By Using the NIC Tool? 1 References  HUAWEI TECHNOLOGIES CO., LTD.Huawei ConfidentialPage 3   Application purpose: The NIC tool is used to standardize data collection experience, improve the collection efficiency, and support one-click data collection in fault location,SOP, and urgent issue analysis.  Recommended application scenarios:  Maintenance scenarios (SOP, fault location, fault analysis, and network evaluation)  Single-NE multi-information collection scenarios  Multi-NE data collection scenarios Application Scenarios  HUAWEI TECHNOLOGIES CO., LTD.Huawei ConfidentialPage 4 Urgent Problemanalysis: The NIC tool in this case is used to collect data after a fault occurs.Network evaluation: The NIC tool in this case is used to evaluate the existing networks.SOP: The NIC tool in this case is used to support SOP inspection and security inspection. Scenario CategoryDetailed ScenarioApplication Description Urgent ProblemRNC_UrgentProblem_firstbitchWhen urgent problemoccur, the NIC tool is used to collect the first batch of data, including KPIs, number of users, operation logs, alarm logs, and configuration scripts. RNC_UrgentProblem_secondbitchWhen urgent problemoccur, the NIC tool is used to collect the second batch of data, including CHR logs, text logs, call fault logs, debug logs,operation logs, alarm logs, and traffic statistics. Scenario CategoryDetailed ScenarioApplication Description MAI EvaluationMAI EvaluationThe visualized network evaluation result concentrated on certain counters and the MR grid display function reduce the manpower costs on network analysis Accurate OptimizationAccurate OptimizationWith analysis and adaptation of massive data,suchas MRs and CHRs, the comprehensive, accurate and feasible suggestions can be provided for locating network optimization-related problems2G/3G/4GSubscribers immigration2G/3G/4GSubscribers immigrationIn the SRAN network,datasources,suchas CHRs,areanalyzed to evaluate the feasibility of user data migration Scenario CategoryDetailed ScenarioApplication Description SOPRNC_DevicesSecurity  AuditThe NIC tool is used to collect device security-related data, including software, process, network, important files, users' account, privilege ,security log, trace function states,BusinessLicense, security alarm etc. RNC_SOPThe NIC tool is used to inspect and evaluate the networks, and obtain data to analyze the potential faults.Nodeb_SecuritycheckThe NIC tool is used to collect device security-related data, including operating system software information, system process data, network data, files, account, right, security logs, traced data, service license data, and security alarms. NodeB_SOPThe NIC tool is used to inspect and evaluate the networks, and obtain data to analyze the potential faults. Default Data Collection Scenarios
Advertisement
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x