Сдам Сам

ПОЛЕЗНОЕ


КАТЕГОРИИ







Acquaintance with the application software of MN





 

The purpose of the work

To get familiar with the application software of MN. To consider the structure of every application, management principles, types of access, possibilities of seizure and leaving the nodes for administration. To study basic commands used for management in MN.

 

Key positions

2.1. General information. By means of the shortcut “ MN Login ” it is provided the access to the initial window of the management application “ Management Login ”, which will be used for the system management. In the main window of the program the list of all nodes created in the system is listed as well as corresponding buttons for running other utilities of the application software. The application software of MN provides performing functions of management and maintenance. It consists of the following applications:

CMG (Configuration Management) allows performing administration of hardware and global data, administration of access, administration of subscribers’ data and additional services, administration of calls routing and administration of signaling.

FMG (Fault Management) allows performing administration of current trials and trials on demand.

AMG (Accounting Management) allows administration of billing, sending and processing Call Detailed Records (CDR) and tariff meters, archiving CDR on data storage devices, sending data to the computing center and providing its security.

PMG (Performance Management) allows administration of measurements and collection of statistical data, showing results, obtained after measurements on customer units, Centrex groups, business groups and other groups, trunks.

SMG (Security Management) is intended for providing and cancellation of permissions to work with applications CMG, FMG, AMG, PMG, SYS and SMG on different nodes.

SYS (System Management) allows administration of the basic data of nodes, administration of the management network DCN, installing node software, backing databases and network configuration data up, administration of the real-time clock on the node, restoring data backups, executing procedures of database matching, preparing a numeration play, changing the numeration and managing of the call tracking program.

Applications for management and maintenance, which provide input, changing and deleting data, are located on the MN client side and are connected by corresponding software on the MN server side.

2.2. Seizure of the node. To prevent simultaneous changing of data of the node by several users, who use the same group of commands of the application, functions of seizure and releasing of the node.

Node occupation from the application software for changing data is performed in the window Set Mode & Select Node of the section Mode & Seizure. This menu is present in all applications CMG, FMG, AMG, PMG, SYS and SMG. To obtain permissions for changing data of the node it is necessary to select the mode Read/Write, then the node you want to seize (column Status -> Selected); by default the access to the node is in the mode Read Only.

The action of node seizure is necessary to be done every time during the work with applications and the necessity of applying changes in databases. The releasing of the node is performed automatically by the closing of the application window.

2.3. Possibilities during the work with the application software. During the work in all windows of the program the following commands can be executed:

Insert – a new window opens, by means of which information about a new object can be added;

Update – is intended for changing the record with information about the object;

Delete – is used for deleting the information about the object;

Apply – semipermanent data is recorded to the database;

Close – is used for closing the active window;

Query and Retrieve – is the combination used for search of necessary information, when the required data is not shown by itself.

Let’s consider more carefully the menu, included in the application software (e.g. CMG). For this purpose we select the necessary node for the configuration (for all examples in these methodical instructions it is necessary to use Node 6000, Node name: ics).

The main window of the application SI2000 – Configuration Management is opened by the command CMG in the window Management Login.

On the menu bar there are 2 main menus (File and Record), which appear in the most part of windows of different command, and menus, serving for:

• Administration of global data of the node (Global);

• Administration of access (Access);

• Administration of the data about subscribers and additional services (Subscriber);

• Administration of the call routing (Routing);

• Administration of the signalling (Signalling);

• Administration of subscribers of pre-paid services and accounts (Additional Features);

• Seizure and releasing of the nodes (Mode & Seizure).

In the window data of nodes, for which administration is enabled, is listed. For every separate node the following data is shown:

Node;

Node name

DB Synchronisation – is the indicator of matching of databases;

Area Code.

The data in this window can’t be modified because they are administrated in the application SYS.

Each of these applications will be considered more carefully during the study of main examples of nodes administration in the network.

 

Key questions

3.1. What application software is used in MN?

3.2. What modes of work can be used? What is this separation intended for?

3.3. What are the main commands used during the work with the application software of MN?

 

Hometask

4.1. Give answers to the key questions in the written form.

4.2. Study the designation and basic possibilities of the application software of MN.

 

Laboratory task

5.1. Turn the computer with software of MN.

5.2. Run MN Login. Sequentially run every program for the node ics (6000). Study all available menus for administration.

5.3. Open the application CMG. Change the access mode on the Read/Write, compare with the previous mode and mark what functions have become available.

5.4. Study the possibilities of creation of new objects (Insert), modifying (Update), deleting (Delete) and applying (Apply) changes. For acquaintance use the table CMG -> Subscriber -> Subscriber.

5.5. Consider the possibilities of search of the required information with the help of the combination Query and Retrieve. To perform the search the set search parameters must fully correspond to the data in the table. For example, for the search of all subscribers with Feature Set: Analog Public, it is necessary after the query to input in the column Featured Set the full record of required parameter: Analog Public, but not the part of it (no results will be shown if we set this parameter like: Analog)

5.6. Get familiar with the content of the tables of the CMG application more detailed.

 

The content of the protocol

6.1. The answers to the key questions 3.1-3.4.

6.2. The description of the appearance of MN applications.

6.3. The differences in possibilities of administration for different modes of access to the nodes.

6.4. The possibilities of the basic administration commands.

6.5. The content of the tables of CMG application.

6.6. Conclusions.


Laboratory work №3







ЧТО ТАКОЕ УВЕРЕННОЕ ПОВЕДЕНИЕ В МЕЖЛИЧНОСТНЫХ ОТНОШЕНИЯХ? Исторически существует три основных модели различий, существующих между...

ЧТО ПРОИСХОДИТ ВО ВЗРОСЛОЙ ЖИЗНИ? Если вы все еще «неправильно» связаны с матерью, вы избегаете отделения и независимого взрослого существования...

Конфликты в семейной жизни. Как это изменить? Редкий брак и взаимоотношения существуют без конфликтов и напряженности. Через это проходят все...

Что способствует осуществлению желаний? Стопроцентная, непоколебимая уверенность в своем...





Не нашли то, что искали? Воспользуйтесь поиском гугл на сайте:


©2015- 2024 zdamsam.ru Размещенные материалы защищены законодательством РФ.