Discovery APP Description - Basic Functions & Data Access
Discovery APP Description - Basic Functions & Data Access
Discovery APP Description - Basic Functions & Data Access
Access
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: [email protected]
Contents
1 Basic Features.................................................................................................................................1
1.1 System Management......................................................................................................................................................1
1.1.1 System Management...................................................................................................................................................1
1.2 Security Management.....................................................................................................................................................3
1.2.1 Security Management..................................................................................................................................................3
1.3 Service Configuration.....................................................................................................................................................5
1.3.1 Service Configuration..................................................................................................................................................5
2 Common Functions.......................................................................................................................8
2.1 Huawei GSM Data Access.............................................................................................................................................8
2.2 Ericsson GSM Data Access............................................................................................................................................8
2.3 Nokia GSM Data Access................................................................................................................................................9
2.4 Huawei UMTS Data Access.........................................................................................................................................10
2.5 Ericsson UMTS Data Access........................................................................................................................................11
2.6 Nokia UMTS Data Access............................................................................................................................................12
2.7 Huawei LTE FDD Data Access....................................................................................................................................13
2.8 Huawei LTE TDD Data Access....................................................................................................................................14
2.9 Huawei 5G NR Data Access.........................................................................................................................................14
2.10 Ericsson LTE FDD Data Access.................................................................................................................................15
2.11 Ericsson LTE TDD Data Access.................................................................................................................................16
2.12 Nokia LTE FDD Data Access.....................................................................................................................................17
2.13 Nokia LTE TDD Data Access.....................................................................................................................................18
2.14 UMTS All User Standard Signalling Data Access.....................................................................................................19
2.15 LTE All User Standard Signalling Data Access.........................................................................................................19
2.16 5G NR All User Standard Signalling Data Access.....................................................................................................20
2.17 GIS Support................................................................................................................................................................21
2.18 Indoor and Outdoor Differentiation............................................................................................................................22
2.19 Subscriber Identifier Encryption................................................................................................................................23
2.20 RAN Sharing Support.................................................................................................................................................24
2.21 OTT Data-Based Geolocation....................................................................................................................................25
2.22 20mX20m Grid Observation......................................................................................................................................26
2.23 Service Alarm.............................................................................................................................................................27
Issue ()
Contents
Issue ()
SmartCare Suite APP Description--Basic Functions &
Data Access
SmartCare Suite APP Description--Basic Functions &
Data Access 1 Basic Features
1 Basic Features
Summary
This feature provides the software, hardware, and basic functions required for the normal
operation of the Discovery. The basic functions are as follows: server device management,
server time management, server configuration management, software package management,
startup and restart management, license management, application management, task
scheduling, system monitoring, alarm management, log management, and data backup
management.
Benefits
This feature enables the Discovery to operate properly.
Description
Server device management
This function allows users to add, delete, modify, and query the server hardware devices of
the Discovery. The Discovery can manage server hardware devices, such as monitoring,
alarm, software installation, capacity expansion, upgrade, and backup, only after the server
hardware devices are added to the Discovery. When users want to add a server hardware
device, they must set the type, name, and IP address of the server.
Server time management
This function is used to manage the time zone and time settings of server devices, including
setting the time zone, and configuring a Network Time Protocol (NTP) server for
synchronizing time to server devices.
Server configuration management
This function is important for installing and deploying software for the Discovery. This
function is used to configure module groups, service IP addresses, and backup servers for
servers. After server hardware devices are added, users need to deploy software packages on
the servers. The software packages are organized by module group. Therefore, users need to
set the module groups that need to be installed on each server. After the module groups are
set, packages can be automatically downloaded and installed. Then, users need to configure a
service IP address for each server to ensure that services can be processed. The backup server
configuration function is used to configure standby servers for each type of server (for
example, web servers).
Software package management
This function is used to upload software packages, query uploaded software packages, and
delete software packages during system software installation and upgrade.
Startup and restart management
This function is used to start up and restart the following processes: data access subsystem,
data pre-processing subsystem, data center subsystem, service application subsystem, and
system management subsystem. The Discovery automatically starts each subsystem process
after being powered on. When a subsystem process is suspended, the Discovery automatically
restarts this process. Users can also manually restart a subsystem process.
License management
This function is used to import, delete, activate, deactivate, and query license files.
Application management
The service features and platform of the Discovery are independent of each other. The
service features are packaged and installed in the Discovery as applications to quickly
meet customer requirements. The application management function enables users to
dynamically install, start, stop, and uninstall an application package when the Discovery
is running without restarting the Discovery.
Task scheduling
The Discovery processes service data through periodic tasks. Tasks may be dependent on one
another and multiple dependent tasks comprise a job flow. The task scheduling function is
used to schedule job flows through the following methods:
Periodic scheduling: The Discovery schedules tasks based on a specified time period.
Timing scheduling: The Discovery schedules tasks at a specified time.
Dependent scheduling: Users set the sequence of executing tasks, and the Discovery
schedules a task only after all the tasks before it are executed.
Event- and operation- triggered scheduling: Users manually trigger the execution of a
task.
System monitoring
This function is used to monitor the running status of the Discovery hardware and
software, including:
− Monitoring overview: displays the topology diagram of the data flows for each
server or cluster from the perspective of system data processing. This function helps
monitor data processing, such as traffic and the number of call history records
(CHRs), on each node of each cluster.
− Hardware monitoring: monitors the hardware status of each server, including the
overall server status, memory, CPU, disks, and network port operating status.
− Software monitoring: monitors the status of each software process on each server,
including whether each process is started, and the CPU usage and memory usage of
each process, and starts, stops, and resets service processes.
Alarm management
This function is used to view and clear alarms.
Log management
This function is used to record and manage operation logs and run logs. Operation logs
record user operations on software functions, are used to manage security and collect
statistics on the frequency of using these functions. Run logs mainly record the context
information about abnormal system running, and are used to demarcate and identify
software problems. Operation log management allows users to browse, filter, and export
operation logs. Run log management allows users to browse, filter, and download run
logs.
Backup management
This function supports manual backup and automatic scheduled backup of the data in the
Discovery database. When exceptions occur in the database, users can restore data using
backup files, which improves the disaster tolerance capability of the Discovery. This function
supports operation functions, such as remotely backing up data, manually deleting backup
data, and uploading, downloading, and restoring backup data.
Enhancement
None
Dependencies
None
Summary
To ensure operation security, the Discovery provides functions, such as user and rights
management, anonymization management and certificate management, as well as preset
services such as operating system (OS) hardening and antivirus management.
Benefits
This feature ensures the operation security of the Discovery.
Description
User and rights management
The user management function is used to add, delete, modify (for example, configuring user
roles), and query system users. Implemented through roles management, the rights
management function is used to add, delete, modify, and query user roles (for example,
administrators) and configure operation permission for user roles. (Operation permission
indicates the permission on a specific system function, such as subscriber group analysis and
system maintenance.)
Anonymization management
The anonymization management function provides two functions: setting the anonymization
mode and checking the current anonymization key status of each operations support system
(OSS).
Setting the anonymization mode: In an encryption version, users can set the
anonymization mode to control the switching between hardware anonymization and
software anonymization. When the mode is set to hardware anonymization, a third-party
external encryptor is connected to the GENEX Discovery to encrypt subscriber identities
in raw data. When the mode is set to software anonymization, the GENEX Discovery
provides an internal anonymization function and therefore the third-party external
encryptor is not required.
Checking the anonymization key status: Users can check whether the anonymization
function of each Huawei OSS connected to the Discovery is enabled (Huawei NEs
anonymize sensitive data when the anonymization function is enabled). Users can also
check hash values of anonymization keys to determine whether the anonymization keys
of different OSSs are consistent.
Certificate management
In normal cases, the subsystems of the Discovery communicate with one another using a
certificate mechanism to ensure security. For example, the web server communicates with the
customer web browser through certificates. Preset certificates are provided for the Discovery
when the Discovery is installed. The certificate management function enables users to change
current certificates used by the Discovery to other certificates.
OS hardening
This function is used to harden an OS by disabling insecure OS services, restricting access to
files and directories, hardening OS accounts and passwords, and adjusting OS kernel
parameters, thereby enhancing the OS security of the GENEX Discovery.
This function displays a security warning message when users perform system operations,
such as logging in to the Discovery using File Transfer Protocol (FTP) or Secure Shell (SSH).
In addition, this function provides system logs related to Inetd, FTP, cron tasks, and daemon
process, helping users trace and audit the system operations they have performed.
The OS installed on each server is hardened according to the default hardening policies during
the production of GENEX Discovery devices. Some hardening policies are not universal, and
therefore need to be manually implemented to harden the OS based on site conditions. Such
policies include disabling the remote login by user root, setting Transmission Control
Protocol (TCP) wrappers, disabling FTP services, and others.
Antivirus management
Virus attacks and spread pose a great challenge to operators' network security. Huawei
provides antivirus solutions to Windows and SUSE Linux OSs by deploying third-party
software, thereby preventing the GENEX Discovery from being attacked and harmed by
viruses, worms, and spyware.
Huawei OSS antivirus solution protects the GENEX Discovery, Citrix client, and Citrix server
that run the Windows OS from viruses by deploying OfficeScan 8.0. In addition, this solution
protects the GENEX Discovery server software that runs the SUSE Linux OS from viruses by
deploying ServerProtect for Linux 3.0 and Control Manager.
Enhancement
None
Dependencies
OfficeScan 8.0, ServerProtect for Linux 3.0, and Control Manager are commercial antivirus
software products and must be purchased separately by operators. Third-party hardware and
software configured for antivirus solutions apply to OSS products, such as the U2000, PRS,
and GENEX Discovery, after being deployed once. Operators do not need to purchase the
hardware and software for each product.
Summary
The Discovery provides the following service configuration functions: NE access, data source
subscription, feature parameter configuration, engineering parameter management, polygon
management, feature database management, data maintenance and management, and antenna
management.
Benefits
This feature enables service features to work properly.
Description
NE access
The Discovery obtains NE lists, NE configuration data, and performance data from Huawei
OSS (U2020). If the Trace Server is deployed, the Discovery collects CHRs and MRs of
Huawei RNC (BSC)/NodeB/eNodeB/MME devices from the Trace Server. The Discovery
collects MV NE data, including configuration data, performance data, and CHR/MR data,
from the DGW. The NE access function is used to configure and collect the basic information
(for example, accounts and IP addresses) of external systems, such as the OSS, Trace Server,
RNC (BSC), and DGW. The basic information is used for command and data interaction
between the Discovery and external systems. The Discovery supports setting of the collector.
The IP addresses, port numbers, and protocol types of the collection objects can be configured
for data collection.
Data source subscription
This function is used to deliver data subscription commands (which directly control NEs to
generate related data, such as controlling the NE sets that report CHR and MR data and
controlling the specific types of data blocks reported by NEs) to Huawei NEs. This function is
also used to deliver data subscription commands for obtaining competitors' device data to the
DGW (users need to configure data on OSSs of competitors' devices). Therefore, users can
obtain the CHR and MR data used for various service features.
This function provides NE subscription objects for data collection. CHRs, MRs, and
performance data required by each feature are collected based on the NE subscription objects.
Feature parameter configuration
This function is used to configure calculation-related parameters for various service features,
for example, the Call Setup Time-out Threshold parameter for the UMTS User Group
Analysis feature.
Engineering parameter management
Engineering parameters describe information, such as BTS locations, cell names, cell
identifiers, and antenna azimuths, downtilts, heights, and types, and are the basic data that is
collected, analyzed, displayed, and operated by the Discovery.
This function allows users to import, export, and query engineering parameters, collect
statistics on engineering parameter status, and manually synchronize NE configuration data
(for example, frequencies and scrambling codes) based on engineering parameters. This
function allows the system to automatically collect and import engineering parameters from
third-party SFTP/FTP servers.
Polygon management
Polygons are widely used in the Discovery to specify the range of measurement,
analysis, and query in a specified service feature. The polygon management function
allows users to create, delete, query, and manage polygons.
Administrative region management
The system automatically creates administrative region polygons within the network
access scope based on an imported map. This function supports network monitoring and
evaluation by administrative region.
− Compared with polygon management, administrative region polygons cannot be
manually drawn. They are created by importing an electronic map. Once a polygon
is created, its usage scenario is relatively stable.
− Maps in MapInfo, Shape, or GeoJSON format can be imported.
− Hierarchy relationships between the administrative regions can be configured.
Legend management
This function manages the legend information about counters of each feature and records
the colors displayed on the map for each counter. It allows users to create, delete,
modify, and view legends.
Feature database management
On live networks, one geographic location is covered by multiple cells in normal cases. The
signal strength in these cells and the related cell information constitute the signal
characteristics of this geographic location. A feature database describes the distribution of
network signals on maps. Feature database-based matching is one of the MR location
positioning algorithms used by the Discovery. This function allows users to import, delete,
and query feature database files.
Grid origin configuration
The initial results of MR location positioning are the longitudes and latitudes on a spherical
coordinate system. The Discovery displays the location positioning results on a grid map and
projects the sphere to a plane to facilitate statistical summarization and display. The system
projects all or part of the sphere to a plane in order to display the geo-location results on a grid
map. The sphere is distorted after the projection, and the generated grid map or geographic
observation data is distorted. The grid origin configuration function minimizes the distortion
of geographic observation data by properly setting parameters based on the areas on the
sphere.
Data maintenance and management
This feature applies to the data used for various service features, including:
Querying the data status (for example, the NEs and time periods for which data is
available) of various features to improve system maintainability
Querying the disk usage of the data used for various features.
Managing aged feature data: Users can set the data aging time of various features. When
the data aging time of a feature is exceeded, the Discovery automatically deletes the data
used for this feature
Antenna management
This function is used to manage antennas, including:
Common antennas
Smart antennas
Massive MIMO antennas
Enhancement
Dependencies
None
2 Common Functions
Summary
This feature collects and parses Huawei GSM data, helping upper-layer analysis features
analyze Huawei GSM NEs.
Benefits
Huawei GSM data collection and parsing are the basic conditions for Huawei GSM network
analysis.
Description
This feature collects and parses GSM CHR/MR data, configuration data, and performance
data generated by Huawei NEs, helping upper-layer analysis features analyze Huawei GSM
NEs.
Enhancement
Adaptation to the 20B version is added.
Dependencies
This feature cannot be used separately and must be used with related service features.
Summary
This feature collects and parses Huawei UMTS data, helping upper-layer analysis features
analyze Huawei UMTS NEs.
Benefits
Huawei UMTS data collection and parsing are the basic conditions for Huawei UMTS
network analysis.
Description
This feature collects and parses UMTS CHR/MR data, configuration data, and performance
data generated by Huawei NEs, helping upper-layer analysis features analyze Huawei UMTS
NEs.
Enhancement
Adaptation to the 20B version is added.
Dependencies
This feature cannot be used separately and must be used with related service features.
Summary
This feature collects and parses Huawei LTE FDD data, helping upper-layer analysis features
analyze Huawei LTE FDD NEs.
Benefits
Huawei LTE FDD data collection and parsing are the basic conditions for Huawei LTE FDD
network analysis.
Description
This feature collects and parses LTE FDD CHR/MR data, configuration data, and
performance data generated by Huawei NEs, helping upper-layer analysis features analyze
Huawei LTE FDD NEs.
Enhancement
Adaptation to the 20B version is added.
Dependencies
This feature cannot be used separately and must be used with related service features.
Summary
This feature collects and parses Huawei LTE TDD data, helping upper-layer analysis features
analyze Huawei LTE TDD NEs.
Benefits
Huawei LTE TDD data collection and parsing are the basic conditions for Huawei LTE TDD
network analysis.
Description
This feature collects and parses LTE TDD CHR/MR data, configuration data, and
performance data generated by Huawei NEs, helping upper-layer analysis features analyze
Huawei LTE TDD NEs.
Enhancement
Adaptation to the 20B version is added.
Dependencies
This feature cannot be used separately and must be used with related service features.
Summary
This feature collects and parses Huawei NR data, helping upper-layer analysis features
analyze Huawei NR NEs. This feature can parse NR SA and NSA data.
Benefits
Huawei NR data collection and parsing are the basic conditions for Huawei NR network
analysis.
Description
This feature collects and parses Huawei NR CHR/MR data and configuration data generated
by Huawei NEs, helping upper-layer analysis features analyze Huawei NR NEs.
Enhancement
Adaptation to the 20B NE version is added.
Summary
This feature allows users to view original code streams of subscribed signaling of all
subscribers in the Complaint Assistant Analysis feature. For details about restrictions and
supported vendors, see Discovery Suite APP Description--Complaint Assistant
Analysis(RAN).
Benefits
This feature enables network optimization engineers to view original code streams of call
signaling, helping customers quickly analyze problem causes and improving subscriber
satisfaction.
Description
This feature enables the Discovery to collect and parse all-subscriber standard signaling data,
allowing upper-layer analysis features to analyze UMTS NEs.
Enhancement
None
Dependencies
This feature cannot be independently used. It is used with the Complaint Assistant Analysis
feature.
Summary
This feature allows users to view original code streams of subscribed signaling of all
subscribers in the Complaint Assistant Analysis feature. For details about restrictions and
supported vendors, see Discovery Suite APP Description--Complaint Assistant
Analysis(RAN).
Benefits
This feature enables network optimization engineers to view original code streams of call
signaling, helping customers quickly analyze problem causes and improving subscriber
satisfaction.
Description
This feature enables the Discovery to collect and parse all-subscriber standard signaling data,
allowing upper-layer analysis features to analyze LTE NEs.
Enhancement
None
Dependencies
This feature cannot be independently used. It is used with the Complaint Assistant Analysis
feature.
Summary
This feature provides the following GIS-related functions: integration of various online maps,
offline map loading, map display and operation, service map layer exporting, display of
engineering parameters on maps, and complex space analysis.
Benefits
This feature provides customers with intuitive geographic observation and analysis methods.
Description
This feature provides the following functions:
Integrates various online maps:
The Discovery integrates various online maps, such as Google Maps, Bing Maps, and
OpenStreetMap, helping users easily check the geographic locations of engineering
parameters and service counters.
Loads offline maps.
The Discovery allows users to load offline maps, such as planning maps (for example,
Planet maps) commonly used for telecommunications systems, .shp maps of the
Environmental Systems Research Institute (ESRI), and vector .tab maps of MapInfo. The
offline maps are used in the Problem Area Recognition, Road Theme, and High-speed
Rail Theme features.
Supports basic GIS map operations:
Performing basic map view operations, such as moving maps, zooming in or out maps,
and eagle eyes
Setting layer display levels
Managing layers (display/hide and transparency settings)
Enabling or disabling multi-window correlative display
Measuring distances
Querying engineering parameters, place names, and coordinates
Dynamically drawing points, lines, and planes, and dynamically rendering them based on
legends
Geographically displaying grid, cell, base station, and polygon data
Querying and highlighting geographical elements in the space dimension
Importing multiple offline maps
Geographically displays engineering parameters:
− Loads and displays engineering parameters on maps.
− Displays engineering parameters based on specified filter criteria.
− Allows users to set the site and cell labels, determine whether to display the labels.
Multiple fields can be combined for display.
− Allows users to set cell sector display styles and colors.
Allows users to export data.
Allows users to export service data within the customized scope in .kml or .kmz format
and displays the exported data on Google Earth, helping users check network site
conditions.
Allows users to export the grid service layer in GRD format. The exported traffic insight
file can be opened on a third party tool as a map layer.
Allows users to export pictures within the window range in PNG or JPEG format.
allows users to export data in TAB format.
Manages maps.
This feature preprocesses map data, imports map data, configures maps, and releases
map services.
Supports complex space analysis technologies.
This feature provides space analysis technologies, such as space query, kilometer
interpolation, and buffer analysis, for supporting features requiring GIS technologies,
such as Road Theme, High-speed Rail Theme, and Problem Area Recognition.
Enhancement
None
Dependencies
None
Summary
This feature is developed based on an advanced MR location algorithm and is used to
determine whether an MR is generated indoors or outdoors. Indoor and outdoor results can be
separately generated for coverage insight, traffic insight, network performance insight, and
other functions and displayed on maps.
Benefits
In the UMTS and LTE eras, most network services, especially data services, are used indoors.
The indoor signal propagation environments are more complex than the outdoor signal
propagation environments and experience a greater signal propagation loss. This feature
enables operators to analyze indoor and outdoor coordinated coverage and abnormal
problems.
Description
This feature is developed based on an MR location algorithm and is used to determine
whether an MR is generated indoors or outdoors. This feature cannot be used separately and
must be used together with other features. The following features can distinguish indoor and
outdoor results after users purchase the Indoor and Outdoor Differentiation license:
GSM/UMTS/LTE/NR Coverage Insight
GSM/UMTS/LTE/NR Traffic Insight
GSM/UMTS/LTE/NR Network Performance Insight
GSM/UMTS/LTE User Group Analysis
MV Support
Ericsson and Nokia networks support this feature.
Enhancement
The NR indoor and outdoor differentiation capability is supported.
Automatic learning of indoor and outdoor thresholds is supported.
Dependencies
This feature cannot be used separately and must be used with related service features.
The capability of improving the indoor/outdoor differentiation accuracy based on
electronic maps can be used only after offline electronic maps are imported. For details
about the offline map formats, see GENEX Discovery Map Data Source Technical
Clarification.
Summary
The Discovery provides a series of measures for protecting communication privacy of
subscribers, for example, deleting communication content, short message content, dual tone
multiple frequency (DTMF) key content, Email content, MMS content, and web page
browsing content, and scrambling subscriber identifier information (such as MSISDN and
IMSI) on the GUI. The Discovery also provides a subscriber identifier (MSISDN/IMSI)
encryption solution for customers. This solution uses a unidirectional irreversible encryption
algorithm to encrypt subscriber identifiers before storing them so that users of the Discovery
system cannot identify subscribers' personal information. Customers can use either the
hardware encryption method (default) or software encryption method.
Benefits
This feature protects security of subscribers' personal data (privacy) and helps operators
prevent risks of violating user privacy.
Description
If personal communication data is used inappropriately, private information may be disclosed.
Countries and regions around the world have personal data protection requirements in laws
and regulations. The Discovery uses a unidirectional irreversible encryption algorithm to
encrypt subscriber identifiers (such as MSISDN and IMSI) before storing them. In problem
demarcation and service assurance, encrypted subscriber identifiers are used for analysis.
Customers can use either the hardware encryption method (default) or software encryption
method. In hardware encryption, keys are stored in third-party encryption servers (specified
by customers) and the encryption process is executed completely on the servers to ensure key
security. The encryption server is managed by operators. In software encryption, the
Discovery encrypts subscriber identifiers using software algorithms, and keys are specified
and entered by users. The keys are encrypted and stored in the system to prevent disclosure.
Personal communication records of subscribers are all stored using ciphertexts. The
information will not be disclosed even if the hard disks are exposed.
Encrypted personal numbers are displayed on the system GUI and O&M personnel uses the
encrypted numbers for problem demarcation and service assurance.
Enhancement
None
Dependencies
None
Summary
This feature controls the display and analysis of RAN sharing capability in service features.
Benefits
In RAN sharing scenarios, this feature helps operators focus on evaluation of subscribers'
KPIs on the current network. It analyzes KPIs of subscribers on the current network from the
area level to the subscriber level and drills down into abnormal CHRs of subscribers who
experience poor services and have network deregistration risks.
Description
This feature supports the following functions:
− Uses PLMN (MCC+NCC) information contained in IMSIs to identify subscribers
of different operators in RAN sharing scenarios.
− Collects statistics of subscribers of different operators by PLMN.
− Drills down into CHRs of subscribers of a specified PLMN.
This feature cannot be used independently. Only after users purchase the RAN Sharing
Support license, the RAN sharing analysis function can be used in the following features:
− GSM/UMTS/LTE TDD/LTE FDD Traffic Insight
− GSM/UMTS/LTE TDD/LTE FDD Network Performance Insight
MV Support
Ericsson and Nokia networks do not support this feature.
Enhancement
None
Dependencies
This feature cannot be used separately and must be used with related service features.
IMSI information is used for identifying subscribers of different vendors. If IMSI data
sources are unavailable (for example, MME records are not collected on LTE networks)
or IMSIs are scrambled on the NE side, this feature cannot be used.
The function of split data sources by operator depends on the OSS and Trace Server.
Summary
This feature supports 20 m x 20 m grid-based geographic observation for Inter-Operator
Coverage Competition and Network Construction Support.
Benefits
20mX20m indicates the grid size. Geographic observation in a finer granularity is supported,
and it is related to the positioning precision.
Description
This feature supports 20 m x 20 m grid-based geographic observation for Inter-Operator
Coverage Competition and Network Construction Support.
Enhancement
None
Dependencies
This feature cannot be used independently. It is used with the Inter-Operator Coverage
Competition and Network Construction Support features.
Summary
This feature dynamically customizes service alarm rules in a running system and generates
service alarms according to the rules.
Benefits
This feature provides quick support for service alarm customization in each office.
Description
This feature customizes service alarm rules based on dimensions (such as NE) defined in
service themes and service counters. The system generates alarms according to the
customized alarm rules and allows users to view alarm records.
This feature is supported in the following features:
Coverage Insight: The supported counters include:
− GSM
DL RxLev (All MRs) (Huawei, Ericsson, Nokia)
UL RxLev (All MRs) (Huawei, Ericsson, Nokia)
DL RxLev (1st MR) (Huawei, Ericsson, Nokia)
UL RxLev (1st MR) (Huawei, Ericsson, Nokia)
DL RxLev (Last MR) (Huawei, Ericsson, Nokia)
UL RxLev (Last MR) (Huawei, Ericsson, Nokia)
DL Poor Quality Percentage (All MRs) (Huawei, Ericsson, Nokia)
UL Poor Quality Percentage (All MRs) (Huawei, Ericsson, Nokia)
DL Poor Quality Percentage (1st MR) (Huawei, Ericsson, Nokia)
UL Poor Quality Percentage (1st MR) (Huawei, Ericsson, Nokia)
DL Poor Quality Percentage (Last MR) (Huawei, Ericsson, Nokia)
UL Poor Quality Percentage (Last MR) (Huawei, Ericsson, Nokia)
DL Weak Coverage Percentage (Huawei, Ericsson, Nokia)
UL Weak Coverage Percentage (Huawei, Ericsson, Nokia)
DL Weak Coverage and Poor Quality Percentage (Huawei, Ericsson, Nokia)
UL Weak Coverage and Poor Quality Percentage (Huawei, Ericsson, Nokia)
DL Interface Percentage (Huawei, Ericsson, Nokia)
UL Interface Percentage (Huawei, Ericsson, Nokia)
− UMTS
Best Pilot RSCP (All MRs) (Huawei, Ericsson, Nokia)
Best Pilot Ec/No (All MRs) (Huawei, Ericsson, Nokia)
Best Pilot RSCP (1st MR) (Huawei, Ericsson, Nokia)
Best Pilot Ec/No (1st MR) (Huawei, Ericsson, Nokia)
Best Pilot RSCP (Last MR) (Huawei, Ericsson, Nokia)
Best Pilot Ec/No (Last MR) (Huawei, Ericsson, Nokia)
Active1 RSCP (All MRs) (Huawei, Ericsson, Nokia)
Active2 RSCP (All MRs) (Huawei, Ericsson, Nokia)
Active3 RSCP (All MRs) (Huawei, Ericsson, Nokia)
Active1 Ec/No (All MRs) (Huawei, Ericsson, Nokia)
Active2 Ec/No (All MRs) (Huawei, Ericsson, Nokia)
Active3 Ec/No (All MRs) (Huawei, Ericsson, Nokia)
Handover Attempts
Handover Failures
Handover Successes
Handover Success Rate
− UMTS
RRC Connection Setup Attempts
RRC Connection Setup Failures
RRC Connection Setup Successes
RRC Connection Setup Success Rate
RAB Setup Attempts
RAB Setup Failures
RAB Setup Successes
RAB Setup Success Rate
RAB Normal Releases
RAB Abnormal Releases
RAB Call Drop Rate
Soft Handover Attempts
Soft Handover Failures
Soft Handover Successes
Soft Handover Success Rate
Intra-Frequency Hard Handover Attempts
Intra-Frequency Hard Handover Failures
Intra-Frequency Hard Handover Successes
Intra-Frequency Hard Handover Success Rate
Inter-Frequency Hard Handover Attempts
Inter-Frequency Hard Handover Failures
Inter-Frequency Hard Handover Successes
Inter-Frequency Hard Handover Success Rate
Inter-RAT Handover Attempts(U->G)
Inter-RAT Handover Failures(U->G)
Inter-RAT Handover Successes(U->G)
Inter-RAT Handover Success Rate(U->G)
− LTE TDD/FDD
RRC Connection Setup Attempts
RRC Connection Setup Failures
RRC Connection Setup Successes
RRC Connection Setup Success Rate
E-RAB Setup Attempts
E-RAB Setup Failures
E-RAB Setup Successes
E-RAB Setup Success Rate
Enhancement
None
Dependencies
Counters that can be customized are used in the GSM/UMTS/LTE Coverage Insight,
GSM/UMTS/LTE Traffic Insight, GSM/UMTS/LTE Network Performance Insight, and
GSM/UMTS/LTE User Group Analysis features.
For details about the KPIs supported by different vendors or data sources, see the
corresponding feature description.