Академический Документы
Профессиональный Документы
Культура Документы
TS-RNC-SW-038
RNC PROBLEM
REPORT
INSTRUCTIONS
Radio Controllers
WCDMA RNC
RN2.1, RN2.0, RN3.0
Corrective
Urgent
Security
Information is classified as
Internal
Public
Customer Specific
Company Confidential
1 (33)
Table of Contents
1.
2.
3.
4.
5.
5.1
5.2
5.3
5.4
6.
6.1
6.2
6.3
6.4
7.
7.1
7.2
7.3
8.
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
8.12
8.13
8.14
8.15
9.
10.
11.
12.
13.
13.1
13.2
14.
15.
16.
17.
Company Confidential
2 (33)
Contact:
Contact your local Nokia Siemens Networks support
Summary of changes:
25-02-2008
11
09-04-2008
12
30-05-2008
13
25-06-2008
14
Company Confidential
3 (33)
Purpose
This document contains generic information about products. These can be
instructions that explain problem situations in the field, instructions on how to prevent
or how to recover from problem situations, announcements about changes or
preliminary information as requirements for new features or releases.
2. KEYWORDS
Problem report, Electra, RNC outage, System restart, Unit restart.
3. SUMMARY
This document contains basic instructions for making a problem report in such a
way that all the necessary information is included in it. Filling in the problem
report carefully and attaching required information to it makes the problem
investigation process faster.
4. DETAILED DESCRIPTION
This document contains instructions for collecting basic data from the network
element (RNC) for fault analyzing purposes. This data shall always be collected if
some abnormal situation has occurred in the system, and Nokia Siemens
Networks (NSN) will be informed of it. An abnormal situation may be, for
example, a decreased traffic handling capacity, or a spontaneous restart of a
computer unit. In the worst case the abnormal situation may lead to a system
outage.
The data to be collected is essential for the further analysis of the problem for
trying to find out the root cause of the fault. The data shall be collected as soon
as possible after the abnormal situation has taken place. This is important
because the information stored about the problem (e.g. the black box of a certain
unit, or alarm history) may get overwritten in the process of time.
The data to be collected, as well as the commands to be used for collecting them,
have been described in the instructions below. The data shall be stored in
descriptively named log files, which shall then be zipped into to file and delivered
to NSN as an attachment of the problem report / outage report.
The log collection macro (rnclogcol.exe) and ini files are available via NOLS. The
macro makes possible to collect automatically the required logs for the following
situations: NE spontaneous restart, unit spontaneous restart, RNC configuration,
call success problems and OAM (BTS) problems. See chapter Using the Log
Collection Macro rnclogcol.exe for more details.
If only few of logs are needed take manually the relevant settings for every
particular case are explained later in this document.
In addition to collecting the data, fill in the problem report by taking into account
the following issues:
Company Confidential
4 (33)
Title of the problem report should be a very short description of the fault
situation
Description of the problem in the problem report should be an exact and a
clear description of the fault situation. Note that only one fault shall be
reported in one problem report and at least the following information should
be provided in addition to the actual problem description:
Situation in the beginning, e.g. the first symptoms of the failure
Operations made, which possibly caused the failure
Situation after the failure
Recovery actions made
Name and version of the possibly installed new software modules
Make sure that necessary attachments are included to the problem report
to avoid unnecessary information requests
In a multivendor environment, collect detailed information of other products
to the Description field of the problem report
Write down the SW Release used in the NE.
Write down the SW build of the SW Release and the implemented CD level
in RNC. This information can be obtained with the MML command
ZWQO:CR;
For filling in the severity of the problem, see the definition of the different
severities in Table 1, NSNs Problem Classification:
NSN Problem
Class
A-Critical
Only total or
major outages
that are not
avoidable with a
workaround
solution.
B-Major
The fault affects
traffic randomly
or problem
leads only to
degradation of
network
performance or
Examples
Company Confidential
5 (33)
C-Minor
Minor fault not
affecting
operation or
service quality.
not working
Performance measurement or alarm
management is not working
Activation of a new feature fails
A single performance measurement is
not working completely
Configuration changes (RNW, HW and
SW) are not working completely
Subscriber related functions are not
working completely
Alarm management of objects (BTS,
functional units) is not working
completely
Capacity/quality related functionality is
not working completely
Major errors in documentation, for
example, an alarm or description is
missing from documentation
Vital documents are missing from the
documentation library
Failures not seriously affecting traffic
Errors in MML syntax
Minor errors in MML/Statistic output
Minor errors in documentation
Company Confidential
6 (33)
5. SOLUTION / INSTRUCTIONS
5.1 Using the log collection macro rnclogcol.exe
Most of the RNC configuration data and logs for the call cases can be collected with the
rnclogcol macro. Download the rnclogcol macro from NOLS and extract rnclogcol.zip file
into the PC folder named e.g. C:\Temp\Rnclog\.
1. Create IP address file with *.txt extension and save it to C:\temp\rnclogcol\ folder.
It is possible to define name for your Network Element in NE IP-address file. This is
optional, so you can still use your old IP-address files.
Format:
10.11.12.13 RNC_NAME #comment
This will add RNC_NAME into log directory name.
Using new switch "-t" and parameter 0, it is possible to fall back to previous
functionality. This way time stamp will not be added to directory name
Example:
c:\temp\rnclogcol\rnclogcol.exe -c config_telecom_rn30.ini -i
rnc.txt t 0
Directory name would be e.g. 10.11.12.13_logs
Cases:
RN2.2 O&M cases
RN3.0 O&M cases
RN2.2 call cases
RN3.0 call cases
Company Confidential
7 (33)
If only few logs are need to be collected see the following chapters for more details and
collect logs manually. Rnclogcol *.ini files can be also edited to correspond the need of
required logs. Config *.ini is not configured by default to monitor different kind of call
scenarious. If logs are needed from call case activate message monitoring by changing
the get_monitorings line value from 0 to 1 and give monitoring time in seconds at *.ini
file.
Company Confidential
8 (33)
5.2 Basic instructions for displaying logs and for monitoring messages
Displaying computer logs and system logs from Chorus units.
The chorus units are: MXU, A2SU, NIP1, NIS1, DMCU, and SFU
ZDDE:<unit type>,<unit index>:clog sa; chorus unit log
5.3 Commands for displaying computer logs and system logs from DMX units
The DMX units are: OMU, RSMU, RRMU, ICSU, and GTPU
ZDDE:<unit type>,<unit index>:ZGDC; computer log in short format
ZDDE:<unit type>,<unit index>:ZGSC; computer log in long format
ZDDE:<unit type>,<unit index>:ZSLE; system log of other system errors
ZDDE:<unit type>,<unit index>:ZSLP; system log of frozen programs
Company Confidential
9 (33)
Collect monitoring from each unit. Use this (ZOEGF) command if there is expected
heavy data from monitoring. After running this command, copy the result file from disk
on shadows directory with FTP. After copying the file delete it from disk to save disk
space.
8. ZOEGF:<unit physical address>:W0-/<unit physical address>.BIN
Company Confidential
10 (33)
index>:cat
Display the interchangeability information of the plug-in unit that is attached to the
computer unit, in which the problem exists. This information is needed at least in case
of faults, which have led to a spontaneous restart of a computer unit. It can be obtained
by first finding out the HMS address of the plug-in unit with the MML command
ZWFI:P::::<unit type>,<unit index>;
After this, enter the HMS address (displayed in the first row of the execution printout)
as parameters to the WFL MML command. As an example, if the HMS address
displayed in the execution printout of the WFI command is CHMS: 01 SHMS: 2 PPA:
03, then the command for finding out the interchangeability information of the plug-in
unit would be
ZWFL:P:1,2,3;
Company Confidential
11 (33)
Company Confidential
12 (33)
Company Confidential
13 (33)
unit, as well as their control file, can be identified on the basis of the physical address
of the unit, which is used as a part of the name of these files. For example, as the
physical address of the OMU-1 is 0001 (obtained from the output of the USI MML
command), the back box files of the OMU-1 are named as 0001_00.bbox
0001_11.bbox, and the control file is named as 0001.seq.
7.2 Spontaneous restart of a DMX unit (OMU, RSMU, RRMU, ICSU, GTPU)
Black Box(es) of the restarted unit (store to a file named like omu_0_bbox.txt):
Display the black box with the following MML commands:
ZDDE:<unit type>,<unit index>:ZLP:1,BOX,Z1U,ZL:1;
ZDDE:<unit type>,<unit index>:ZLP:1,BOX,Z1U,ZL:1;
Note that there may be more than one unit restart occurring in a row in a certain fault
situation. In that case you should attach to the problem report all the stored black box
information of the DMX unit in question from the W0-/var/crash/ directory on the disk.
This directory contains max. 12 latest formed black boxes for each DMX unit. The
black box files of a certain unit, as well as their control file, can be identified on the
basis of the physical address of the unit, which is used as a part of the name of these
files. For example, as the physical address of the OMU-1 is 0001 (obtained from the
output of the USI MML command), the back box files of the OMU-1 are named as
0001_00.bbox 0001_11.bbox, and the control file is named as 0001.seq.
Printout of the MML command:
ZDVL::CONT:::::<unit type>,<unit index>;
For example: ZDVL::CONT:::::OMU,0;
7.3 Spontaneous restart of a CHORUS unit (MXU, A2SU, NIP1, NIS1, DMCU, SFU)
"Tip!
Sysdump and bblog data are stored in RAM memory of a Chorus unit. The data is lost if
the computer unit is powered down."
System dump of the restarted unit:
Display system dump and the stored computer logs and OS logs from the restarted
unit with the following commands
ZDDE:<unit type>,<unit index>:loadext sysdump;
ZDDE:<unit type>,<unit index>:sysdump W;
ZDDE:<unit type>,<unit index>:loadext bblog;
ZDDE:<unit type>,<unit index>:bblog c a <y>; where <y>=
210
Company Confidential
14 (33)
where <y>=
The parameter value y (where y = 210) in the commands above defines the
order number of the log. With the default parameter value 2, log data written the
previous unit restart is shown, and so on. Please make sure that you define the
value y correctly in order to display the logs that have been written just before
the unit restart(s) of interest.
Printout of the MML command:
ZDVL::CONT:::::<unit type>,<unit index>;
For example: ZDVL::CONT:::::DMPG,34;
Company Confidential
15 (33)
8. RESTART OF DSP/DMPG
"Tip!
Sysdump and bblog data are stored in RAM memory of a Chorus unit. The data is lost if
the computer unit is powered down."
ZAAP;
RNC alarm history from start date (default one is current date):
ZAHP:::[start date]:;
RN2.1
ZWPS:UNIT,DMCU,<unit index>;
Start remote session to the DMPG where the restarted DSP belongs to
Company Confidential
16 (33)
ZDDS:DMPG,<unit index>;
2.
3.
2.
3.
Print all system dump information from all available restarts (sysdump
can store at max ten latest restarts)
sysdump W
2.
3.
4.
2.
Company Confidential
17 (33)
Dump all saved memory regions from the system dump, where nb
indicates the restart number 1 - 10.
dprdump d -4 r <nb>
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Company Confidential
18 (33)
2.
3.
4.
5.
2.
3.
8.13 Monitor DSP message and DMX message to/from suspected faulty DSP
1.
to
Start a remote session to the DMPG which suspected faulty DSP belongs
ZDDS:DMPG,<unit index>;
2.
DSP
Monitor DSP message and DMX message in both directions for specific
p2dext monitor [p <dsp index>]
Company Confidential
19 (33)
Company Confidential
20 (33)
Company Confidential
21 (33)
A2SU
Unit
0
A2SPs
SUBRACK
0..3
4..7
8..11
12..15
1
(RNAC)
3
(RNAC)
4
(RNAC)
1
(RNBC)
16..19
2
(RNBC)
20..23
3
(RNBC)
24..27
4
(RNBC)
RN3.0:
After finding out A2SP handling the Iub AAL2 path take ddesk logs from affected
A2SP service terminal:
ZDDE:A2SP,<unit index>:loadext ddesk;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p aal2xc;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p ncid_all;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p ncid_hsdpa;
ZDDE:A2SP,<unit index>:ddesk p msg_counters;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p traffic;
ZDDE:A2SP,<unit index>:ddesk -a pq_alg_ncid p ncid;
Company Confidential
22 (33)
Before RN3.0:
Check with MML command the WO-EX MXU that is under the same subrack as the
A2SP: ZUSI:MXU;
Take desk logs from affected MXU service terminal:
ZDDE:MXU,<unit index>:loadext desk;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p aal2xc;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p ncid_all;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p ncid_hsdpa; only
in RN 2.1 and RN2.2 level if HSDPA problems
ZDDE:MXU,<unit index>:desk p msg_counters;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p traffic;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p ncid;
Company Confidential
23 (33)
Company Confidential
24 (33)
A2SU
Unit
0
A2SPs
SUBRACK
0..3
4..7
8..11
12..15
1
(RNAC)
3
(RNAC)
4
(RNAC)
1
(RNBC)
16..19
2
(RNBC)
20..23
3
(RNBC)
24..27
4
(RNBC)
RN3.0:
After finding out A2SP handling the Iub AAL2 path take ddesk logs from affected
A2SP service terminal:
ZDDE:A2SP,<unit index>:loadext ddesk;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p aal2xc;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p ncid_all;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p ncid_hsdpa;
ZDDE:A2SP,<unit index>:ddesk p msg_counters;
ZDDE:A2SP,<unit index>:ddesk a pq_alg_ncid p traffic;
ZDDE:A2SP,<unit index>:ddesk -a pq_alg_ncid p ncid;
Company Confidential
25 (33)
Before RN3.0:
Check with MML command the WO-EX MXU that is under the same subrack as the
A2SP: ZUSI:MXU;
Take desk logs from affected MXU service terminal:
ZDDE:MXU,<unit index>:loadext desk;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p aal2xc;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p ncid_all;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p ncid_hsdpa; only
in RN 2.1 and RN2.2 level if HSDPA problems
ZDDE:MXU,<unit index>:desk p msg_counters;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p traffic;
ZDDE:MXU,<unit index>:desk a pq_alg_ncid p ncid;
Company Confidential
26 (33)
Company Confidential
27 (33)
Company Confidential
28 (33)
Company Confidential
29 (33)
Company Confidential
30 (33)
e.g. EmiAccessInquirerSrv-1-1_trace.txt,
EmiAccessInquirerSrv-2-1_trace.txt,
emialarmservSrv-10-1_trace.txt,
emialarmservSrv-10-3_trace.txt, etc
The trace log file cannot be removed, if it is used by some process. So you cannot
remove all the trace log files when the NEMU PM is running. But cleaning up of trace
log files of the non-stop processes is not needed, because they cannot grow bigger
than defined in dwLogSizeInKB in the registry provided you have plenty of free disk
space in the NEMU.
"dwFlags"
"dwLogSizeInKB"
"dwMode1"
Original Value
dword:00000000
(0 means that NO
LOGGING at all)
dword:000000c8
dword:38000012
Changed Value
dword:00000003
dword:00002710
dword:3FFFFFFF
Company Confidential
31 (33)
16. NOTE
17. REFERENCES
Company Confidential
32 (33)
Disclaimer
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This documentation is intended for the
use of Nokia Siemens Networks customers only for the purposes of the agreement under which
the document is submitted, and no part of it may be used, reproduced, modified or transmitted in
any form or means without the prior written permission of Nokia Siemens Networks. The
documentation has been prepared to be used by professional and properly trained personnel,
and the customer assumes full responsibility when using it. Nokia Siemens Networks welcomes
customer comments as part of the process of continuous development and improvement of the
documentation.
The information or statements given in this documentation concerning the suitability, capacity, or
performance of the mentioned hardware or software products are given as is and all liability
arising in connection with such hardware or software products shall be defined conclusively and
finally in a separate agreement between Nokia Siemens Networks and the customer. However,
Nokia Siemens Networks has made all reasonable efforts to ensure that the instructions
contained in the document are adequate and free of material errors and omissions. Nokia
Siemens Networks will, if deemed necessary by Nokia Siemens Networks, explain issues which
may not be covered by the document.
Nokia Siemens Networks will correct errors in this documentation as soon as possible. IN NO
EVENT WILL NOKIA SIEMENS NETWORKS BE LIABLE FOR ERRORS IN THIS
DOCUMENTATION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL,
DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT
NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS
OPPORTUNITY OR DATA, THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR
THE INFORMATION IN IT.
This documentation and the product it describes are considered protected by copyrights and
other intellectual property rights according to the applicable laws.
The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark
of Nokia Corporation. Siemens is a registered trademark of Siemens AG.
Other product names mentioned in this document may be trademarks of their respective
owners, and they are mentioned for identification purposes only.
Copyright Nokia Siemens Networks 2008. All rights reserved.
Company Confidential
33 (33)