Professional Documents
Culture Documents
1 InputOutput Group 20 IOG 20 PDF
1 InputOutput Group 20 IOG 20 PDF
3. Hardware Structure 31
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2 Hardware structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.3 Hardware configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.4 Subracks and boards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.5 LED’s and Buttons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
3.6 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4. FMS applications 43
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.2 FMS Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.3 Storage medium. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
4.4 Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
4.5 Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.6 File attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
1
IOG 20
2
Table of Contents
3
IOG 20
4
1. Introduction to AXE IO System
Chapter Objectives
After completing this chapter the student will:
• Describe the two main tasks of the IO group
• Name the different units and buses that together constitute an IOG
20
• Explain the concepts node and link
• Explain the concept SPG and give the RP addresses used by the IO
system
• Explain the main usage of the hard disk drives, flexible disk drive
and optomagnetic disk drive
• Explain the main usage of data links in an IOG
Figure 1.1
Chapter Objectives
1.1 Introduction
This chapter gives an overview of the IO system IOG 20 in the AXE.
R1B 5
AXE IO System, IOG 20
Note that an IOG 20 and an IOG 11, theoretically may coexist in the same
switch, but its not recommended.
6 R1B
Introduction to AXE IO System
From the above considerations we see that the hardware of the IO system
must contain the following components:
• an interface to the Regional Processor Bus (RP Bus) for connection of
the IO to the central processor
• a processor with the necessary software to control the different units,
diagnose faults and to communicate with the CP
• external mass storage devices (hard disks, optical disks and flexible
disks)
• data links for both high speed and low speed traffic using both asyn-
chronous and synchronous transfer
• alphanumeric terminals for man-machine communication
As well as the above units, the IO group is also required to provide alarm
information on the alarm panels and alarm printer.
The alarm information concerns both internal alarms from APT, APZ and
the IOG itself, as well as external alarms (temperature, humidity, door
control, etc.).
R1B 7
AXE IO System, IOG 20
RP-bus
CP
SP ICB SP
RPV/RPV2 RPV/RPV2
HD HD
AT AT
Alarm HD HD
paneI
ALI
External FD FD
alarm
AT, printer
OD OD
DL DL
AMTP
Figure 1.2
Example of an IOG 20 HW configuration
Figure 1.2 shows a standard IO configuration for the products IOG 20 B-P
and IOG 20 B. The differences between the variants of IOG 20 will be
covered later.
The interface to the RP bus is called the RP Bus Adapter VME (RPV or
RPV2).
The RPV acts as a regional processor, with its own unique RP address, that
is adapted to the task of communicating between the control unit in IOG
20 and the CP. The RPV converts the RP bus interface to a VME bus inter-
face.
8 R1B
Introduction to AXE IO System
RP-bus
CP
Ethernet
SP ICB SP
RP bus
RPV/RPV2 RPV/RPV2
HD HD
AT AT
HD HD
ALI
FD FD
AT, printer
VME bus OD OD
PC/AT
DL DL VSA
SCSI-2
AMTP
VSA - VME to SCSI-2 adapter
Figure 1.3
IOG 20 buses
Internally in the IOG 20 the interfaces VME bus, SCSI-2 bus, PC/AT and
Ethernet are used.
The Ethernet bus follows ISO 8802-2 and IEEE 802.2, 802.3.
SCSI-2 - Small Computer Systems Interface.
VME - VERSA Module Eurocards.
VSA - VME to SCSI-2 adapter.
R1B 9
AXE IO System, IOG 20
P a r a ll e l R P SP
RPV VM E bus
bus
CP
S e ria l R P b u s
RPV2 SP
CP VM E bus
Figure 1.4
Interface between RP-bus and internal IOG bus
The RPV converts from a parallel RP bus interface while the RPV2 con-
verts from a serial RP bus to VME bus.
The control unit in IOG 20 is a processor called the Support Processor, or
SP for short.
The support processor in IOG 20 is based on the Motorola 68060 micro-
processor. The processor is called CPU60.
The CPU60 has an internal memory of 32 Mb. Furthermore, a certain
amount of data required by the SP is stored on the hard disks and used by
the SP when required.
The CP also contains a fairly large amount of software which is part of the
IO system. This is described more in detail later in the book.
As can be seen, the RPV (or RPV2) and SP are duplicated in the standard
IOG 20 configuration. This is done as a precaution against faults (HW or
SW) arising in one of the SP’s.
10 R1B
Introduction to AXE IO System
RP bus
CP
Node Node
ICB
SPG
Figure 1.5
Support Processor Group, SPG
The two SP’s in an IOG are connected by the Inter Computer Bus, ICB.
The ICB allows data to be transferred between the two SP’s. It is an Ether-
net bus.
The SP, file medias, and CP interface forms what is called a node.
The nodes in the duplicated configuration shown in Figure 1.2 are desig-
nated Node A and Node B.
The logical connection between the CP and SP, via the RPV (or RPV2)
and the RP bus, is called a Link.
The IO devices shown in the figure are the following:
AT Alphanumeric Terminal
AMTP Alphanumeric terminal over Ericsson MTP
ALI Alarm Interface
HD Hard Disk
FD Flexible Disk
DL Data Link
OD Optical Disk
An IOG 20 as described above - with two SP’s (or nodes) each controlling
a number of IO devices - is called a Support Processor Group, SPG. An
SPG and an Input output group, IOG, are equivalent concepts. An SPG
may only have two SP’s (or nodes).
R1B 11
AXE IO System, IOG 20
CP
RPB-A
RPB-B
Figure 1.6
Multi SPG configuration
12 R1B
Introduction to AXE IO System
R1B 13
AXE IO System, IOG 20
14 R1B
Introduction to AXE IO System
• 3 1/2 inch
The storing capacity of the 5 1/4” disk is 2x325 MB or 2x650 MB.
The storing capacity of the 3 1/2” is 1x640 MB.
The OD is readable, writeable and rewritable. Writing and rewriting is
realized by using the magnetic material on the disk. Before using the OD it
must be formatted.
Two formats exists:
• Ericsson-specific APN format
• the industry standard NSR02, or ISO 13346, complying to OSTA-UDF
(Optical Storage Technology Association-Universal Disk Format).
OD is mainly used for CP and SP backups but may also be used for charg-
ing and statistics data.
The opto disk drive is connected to the SP via an SCSI-2 bus and the VME
bus. In between the two buses is a converter named VSA, VME to SCSI
adapter. The reason the OD is not connected to the SCSI-2 bus, like HD, is
that it would slow down the access to HD.
IOG 20 B-P and IOG 20 B contains 3 1/2 or 5 1/4 inch OD.
IOG 20 C contains the 3 1/2 inch OD.
Data Links (DL) may be connected to the IOG via a number of different
interfaces and baud rates.
There are a number of different protocols implemented in IOG 20: the
Ericsson MTP, the File Transfer and Management, FTAM. An optional
protocol is the Direct Data Output, DDO.
R1B 15
AXE IO System, IOG 20
Data links are used for transferring charging or statistics data or for alpha-
numeric terminal connection.
16 R1B
2. Subsystems in the AXE IO System
Chapter Objectives
After completing this chapter the student will be able to:
• Name the subsystems incorporated in AXE IO system
• Describe the main functions of each subsystem
• Give the names of the hardware units that are included in each sub-
system
• Give account of the formal product and function structure
Figure 2.1
Chapter Objectives
2.1 Introduction
This chapter describes the different subsystems that implements the IO
system in AXE. It also describes the formal structure of IO products and
functions.
R1B 17
AXE IO System, IOG 20
CP
SP ICB
SP
RPV/RPV2 RPV/RPV2
HD HD
AT AT
HD HD
ALI AT
FD FD
AT, printer
OD OD
AMTP
DL DL
Figure 2.2
SPS hardware
18 R1B
Subsystems in the AXE IO System
The CPU60 also contains a VME bus interface and a SCSI-2 bus interface.
P a r a lle l R P SP
RPV VM E bus
bus
CP
S e r ia l R P b u s
RPV2 SP
CP VM E bus
Figure 2.3
Interface CP-SP
The RPV, or RPV2, is the interface unit between the RP bus and the SP. It
transfers and receives messages to and from the CP. RPV interfaces to par-
allel RP-bus and RPV2 interfaces to serial RP-bus.
It consists basically of a microprocessor M68360 with its own operating
system. The software is stored on hard disk (as part of the SP system) and
downloaded to RPV/RPV2 at start-up.
The RPV is implemented on boards PROVME and DRPBU.
The RPV2 is implemented in board RPV2.
The IOG 20B-P is configured with RPV.
IOG 20B and IOG 20C are configured with RPV2.
R1B 19
AXE IO System, IOG 20
As mentioned above, the SPS contains the operating system of the SP and
software for handling both CP-SP communication, maintenance of the
nodes and links and a number of SPS operation functions.
2.4.1 General
MCS supplies the man-machine interface for the AXE system.
MCS handles two types of information:
• Alphanumeric information (commands, printouts)
• Alarm information (internal, external)
The terminal interfaces belong to DCS as will be seen in the section on this
subsystem.
MCS interworks with all command receiving and printout generating
blocks. It also interworks with all SP and CP program blocks that generate
alarms.
20 R1B
Subsystems in the AXE IO System
CP
SP ICB SP
RPV/RPV2 RPV/RPV2
HD HD
AT AT
Alarm HD HD
paneI
ALI AT
FD FD
External
alarm AT, printer
OD OD
AMTP
DL DL
Figure 2.4
MCS hardware
R1B 21
AXE IO System, IOG 20
CP
SP ICB SP
RPV/RPV2 RPV/RPV2
HD HD
AT AT
HD HD
ALI AT
FD FD
DL DL
VSA
Figure 2.5
FMS hardware
22 R1B
Subsystems in the AXE IO System
R1B 23
AXE IO System, IOG 20
DCS software executes in the SP and in the Line Unit Module, LUM. The
subsystem is different from the other three IO subsystems which exist in
both the CP and SP.
Data to/from AT’s or data links enters the AXE IO system via DCS func-
tions and is then transferred to either MCS or FMS within the SP.
DCS interworks with SPS, FMS and MCS.
DCS offers communication services and provides interfaces to data net-
work users.
It provides network services comparable to a stand-alone X.25 packet
switching system, which allows connection to external X.25 equipment
and X.25 networks.
The EX node provides a data communication interface towards external
connected equipment.
A CM is a logical concept. It defines logically the presence of DCS in the
node. In most cases it is correct to say that CM and node are equivalent
concepts.
The CM are numbered according to SPG number as follow:
SPG0, node A CM-1
SPG0, node B CM-2
SPG1, node A CM-17
SPG1, node B CM-18
SPG2, node A CM-33
SPG2, node B CM-34
SPG3, node A CM-49
SPG3, node B CM-50
DCS also provides an alphanumeric terminal interface based on X.28/
X.3/X.29 recommendations for the connection of asynchronous terminals
to synchronous X.25 equipment.
24 R1B
Subsystems in the AXE IO System
CP
SP ICB SP
RPV/RPV2 RPV/RPV2
HD HD
AT AT
HD HD
ALI AT
FD FD
AT, printer
OD OD
AMTP
DL DL
Figure 2.6
DCS hardware
The hardware of the Line Unit is the Line Unit Module, LUM, boards.
This is a mother board which can hold up to four daughter boards. The
daughter boards interface to terminals and data links. Each daughter board
has one port.
The LUM board contains a Motorola M68360 and M68060 processors.
R1B 25
AXE IO System, IOG 20
D aughter boards:
Figure 2.7
DCS hardware
26 R1B
Subsystems in the AXE IO System
CP Other subsystems in CP
FILES PRINTOUTS
READ WRITE COMMANDS ALARMS
CP - SP communication SPS
SP
Alarm External
OD FD HD panel alarms Data links, terminals
Figure 2.8
The software structure of the IO system
Both data links and terminals are connected to DCS hardware. A com-
mand entered from an AT is thus transferred via DCS hardware and soft-
ware to MCS software. The command must then be sent to MCS software
in the CP for analysis and is thus transferred by SPS to the CP.
In the CP, the command is transferred from SPS to MCS. From MCS the
command is forwarded to the command owning block in the normal man-
ner. If the command was, for instance, to define a file in FMS then the
command owning block in FMS would - via SPS - communicate with the
required FMS software in the SP in order to write on the hard disks.
R1B 27
AXE IO System, IOG 20
2.7.2 CP software
The software belong to the IO system that is executing in the CP is written
in PLEX-C and ASA210C. A software unit in the CP is called a block.
2.7.3 SP software
The software executing in the SP is written in the programming language
EriPascal. In the SP software each software unit is called a module and
has its own unique name (compare to programs in RP and blocks in CP
and EMRP).
The module is the smallest unit which may be compiled in EriPascal.
One or more interrelated modules are grouped together into a function
block.
The function block concept in the SP is thus different to that in the CP. In
the software hierarchy, a module in the SP corresponds to the central (or
regional) software unit in a CP function block.
If a program in the SP has to be changed or corrected, the module has to be
recompiled. No correction system exists in the SP. If a module is changed
and recompiled only due to a fault correction (i.e. no change in function),
it is released in a so called Rapid Correction Note Issue, CNI. A Rapid
CNI may be compared to an approved program correction in CP, RP or
EMRP.
An IOG 20 system contains about 300 modules. The number of modules
varies from system to system.
28 R1B
Subsystems in the AXE IO System
Example:
• FAX 141 8105 - Alarm Administration in AXE10
• FAX 141 8024 - Transaction Log
The entire system contains about 110 Telecom Objects.
The product structure is divided in:
ANZ = subsystem
CNA = function block
COA = software unit
R1B 29
AXE IO System, IOG 20
30 R1B
3. Hardware Structure
Chapter Objectives
After completing this chapter the student will:
• Briefly account for the main differences between IOG 20 B-P, IOG
20 B and IOG 20 C
• Describe briefly the function of each board in the SPVM, SPVM-P
and SPVCM subracks
Figure 3.1
Chapter Objectives
3.1 Introduction
This chapter describes the different hardware configurations that exist
within IOG 20. Also described are the different boards of the IO system.
3.2.1 Introduction
This chapter will explain the differences between the hardware configura-
tions that exist in the SP-based IO systems IOG 20:
• IOG 20 B-P
• IOG 20 B
• IOG 20 C
Remember that a number of SP-based IO systems exist in the IOG11 fam-
ily: IOMC, IOG11A, IOG11B, IOG11C, IOG11B5 and IOG11C5. These
are not covered in this book.
All IO equipment is mounted in BYB 501 racks.
The IOG 20 rack contains one subrack:
SPVM-P in IOG 20 B-P
SPVM in IOG 20 B
SPVCM in IOG 20 C
R1B 31
AXE IO System, IOG 20
Figure 3.2
IOG 20 B-P
The IOG 20 B-P interfaces towards the parallel RP bus (this is indicated
by the ‘P’).
The IOG 20 B-P theoretically has a maximum capacity of:
• 32 terminals or
32 single data links or
16 duplicated data links or a combination of this
3 hard disks per node (2 or 4 Gb)
• 1 flexible disk per node
• 1x5 1/4 or 1x3 1/2 inch opto disk per node
• 32 external alarm connections per node
• 4 alarm panel interfaces per node
• 1 SCAN alarm interface per node
The IOG 20 B-P may be used as SPG>0 if the alarm interface boards are
removed.
Note: The 5 1/4 OD and 2GB HD will be phased out shortly.
32 R1B
Hardware Structure
3.3.2 IOG 20 B
Figure 3.3
IOG 20 B
R1B 33
AXE IO System, IOG 20
3.3.3 IOG 20 C
Figure 3.4
IOG 20 C
34 R1B
Hardware Structure
CPU60
HD3 drive
HD1 drive
VSA
PROVME
DRPBU
LUM
LUM
LUM
LUM
ALCPU
ALEXP
OD drive (5 1/4” or
3 1/2”)
HD2 drive
FD drive
Figure 3.5
SPVM-P subrack
CPU60
HD3 drive
HD1 drive
VSA
RPV2
ESDCV
LUM
LUM
LUM
LUM
ALCPU
ALEXP
OD drive (5 1/4” or
3 1/2”)
HD2 drive
FD drive
Figure 3.6
SPVM subrack
R1B 35
AXE IO System, IOG 20
HD drive
Power
CPU60
VSA
RPV2
LUM
LUM
LUM
ALCPU
ALEXP
LUM
LUM
LUM
RPV2
VSA
CPU60
Power
HD drive
OD drive
OD drive
(3 1/2”)
(3 1/2”)
Figure 3.7
SPVCM subrack
3.4.4 Boards
Power - supplies power for all boards in the subracks via the backplane.
The power-feeding is connected to the front plane. Input power is 48 volts
and output power is +5 and +/-12 volts.
CPU60 - processor board with microprocessor M68060. The primary
memory on the board is 32 MB. The CPU60 interfaces to the intercom-
puter bus (Ethernet) via the front plane and to the SCSI-2 bus, power and
VME bus in the back plane. The CPU60 has two RS232 ports on the front
plane for connection of IO terminal. The RS232 ports communicates at
4800 baud.
FD/HD drive - this board contains both 3 1/2 inch diskette drive and hard
disk drive. It interfaces to the SCSI-2 bus and power in the backplane.
HD drive - this board contains one or two hard disks. It interfaces to the
SCSI-2 bus and power in the backplane.
OD drive 3 1/2 inch - this board contains one opto disk drive. It interfaces
towards the VSA board via a separate SCSI-2 bus in the back plane. It is
also power-fed in the backplane.
OD drive 5 1/4 inch - this board contains one opto disk drive. It interfaces
towards the VSA board via a separate SCSI-2 bus in the back plane. It is
also power-fed in the backplane.
VSA - this board converts VME bus to a separate SCSI-2 bus which inter-
faces to the opto disk drive. It interfaces to VME bus, SCSI-2 bus and
power in the back plane.
36 R1B
Hardware Structure
DRPBU - this board interfaces to the parallel RP bus in the front plane. In
the back plane it interfaces to the PROVME board, via an internal inter-
face, and to power.
PROVME - this board interfaces to the DRPBU board via an internal
interface. It interfaces to the VME bus and power supply in the back plane.
RPV2 - this board interfaces to the serial RP bus in the front plane. In the
back plane it interfaces to the VME bus and to power.
LUM - this board contains a microprocessor Motorola M68060. It inter-
faces to the ‘daughter boards’ V.24/V.35/V.36/X.21 INTERFACE, G.703
E0 INTERFACE and G.703 E1 INTERFACE via a connecter on the
board. It can hold four ‘daughter boards’, each of which controls one phys-
ical port. The boards are fitted on the LUM board with four screws.
The LUM mother board interfaces to the VME bus and power in the back
plane.
V.24/V.28/V.35/V.36/X.21
B-node
G.703 E1 (2Mbit/s)
Figure 3.8
LUM board with daughter boards
R1B 37
AXE IO System, IOG 20
with four screws and is power-fed from the LUM board. It supplies the
interface G.703 E1 with a baudrate of 2 Mbit/s.
T- Ethernet INTERFACE daughter board - this board is not intro-
duced as an orderable product at the first IOG 20 release.
ALCPU - Alarm interface board. This board has two V.24 ports which
interface to the LUM board and to the fan. The board has a SCAN input
and input of external alarm. The board is connected to VME bus and
power in the back plane.
ALEXP- This board has four outputs for control of alarm displays. The
board is controlled by board ALCPU.
ESDCV - EMC shield and Daisy Chain VME bus circuit board. The pur-
pose of the board is to fill empty positions in the SPVM subrack. This in
order to maintain the electromagnetic shield that the subrack forms. The
board also connections the VME bus in the back plane of the SPVM sub-
rack.
Empty positions may occur if the subrack is not fully equipped with LUM
boards or if the RP bus interface is serial with one RPV2 board instead of
the DRPBU and PROVME boards. Empty positions may also occur if only
one hard disk is installed in an IOG 20 B-P or IOG 20 B node.
• Reset and restart switch buttons. The upper button restarts the support
processor when toggled once. When toggled twice it reloads the support
processor. The lower switch halts the execution of the SP when toggled
once, it generates a level 7 IRQ.
• Display for HW test (not used).
Figure 3.9
LED’s and buttons CPU60 board
38 R1B
Hardware Structure
Figure 3.10
LED’s on CPU60 board
There are also two flip buttons on the CPU60 board front. These buttons
should only be used in special situations. The lower button is for debug-
ging of SP programs. The upper (reset button) is for restarting (flip once)
or reloading (flip twice) of the SP.
A terminal can be connected straight in to the SP on the front of the
CPU60 board. This is referred to as a local terminal. From this terminal
only SP commands can be sent. There are two RS232 connections for this
but only the upper one is used.
A local terminal is, for instance, used at initial start of IOG 20.
Normally no terminal is connected to the CPU port.
R1B 39
AXE IO System, IOG 20
Figure 3.11
LED’s and buttons PROVME/RPV2 board
BM RUN Right LED ‘RUN’ indicates: green - processor running, red - processor
halted
Figure 3.12
LED’s on LUM board
40 R1B
Hardware Structure
Figure 3.13
LED’s on VSA board
R1B 41
AXE IO System, IOG 20
42 R1B
4. FMS applications
Chapter Objectives
After completing this chapter the student will:
• Name the basic concepts of FMS
• Know the different types of volumes in FMS and their use
• Describe the recommended contents of volumes PROG_A,
PROG_B, OMFZLIBORD and RELVOLUMSW
• Have knowledge about operational documents and commands
related to FMS
• Have knowledge about the Infinite Files function
Figure 4.1
Chapter Objectives
4.1 Introduction
This chapter describes the functions of the file management subsystem of
AXE. The chapter concentrates on media, volume and file handling and
file processing functions.
R1B 43
AXE IO System, IOG 20
4.3.1 Operation
The commands for handling medias are INMEI, INMEP and INATP.
Below is an example of a 2 GB hard disk attributes:
: INMEP:IO=HD-1,NODE=A;
MEDIA ATTRIBUTES
STATUS SECTS STRACK TRACKS
IN USE 512 139 36441
HEADS TOTSIZE(KBALLOCSIZE(KB)SUBUNITS
9 2096744 20757776
VOLUME SIZE(KB)
PROG_A 200000
OMFZLIBORD 100000
RELVOLUMSW 500000
EXCHVOLUME 400000
CALLVOLUME 400000
STATVOLUME 475777
END
44 R1B
FMS applications
4.4 Volumes
The storage area on a medium can be divided into one or more volumes.
Volumes on hard disks can be defined as being a part of one disk or they
can cover several disks, the latter is called volume across media border.
A volume is identified by a volume name of 1 to 10 characters.
Some volumes have the same names in SPG0, SPG1, SPG2 and SPG3. In
this case the contents are not the same and these volumes are completely
independent of each other.
External,
single volumes
Internal,
single volumes
Internal,
Opto disk 3 1/2 or duplicated
5 1/4 inch volume over
media border
Internal,
duplicated
volume
Figure 4.2
Volumes in AXE IO system
R1B 45
AXE IO System, IOG 20
A duplicated volume:
• is located in both nodes of an SPG, i.e. exists in two ‘copies’
• has a volume name of ten characters length
• the data in the duplicated volume is the same in both nodes in normal
operation
The reason for having duplicated volumes is security. When writing to a
file on a duplicated volume the data is physically written in both nodes of
the SPG. If the standby node is blocked nothing is written on the dupli-
cated volume of that node. If a difference between the contents of a dupli-
cated volume, between the nodes, is detected a recovery action is initiated.
This involves a restart of one of the nodes and an updating.
The data in the duplicated volumes is logically identical, not physically.
This means that the actual physical location on the hard disk may differ
between the nodes for a file in a duplicated volume.
Volume supervision. FMS has a supervision of the used space on a vol-
ume. The function issues the alarm VOLUME LIMIT EXCEEDED if the
supervision limit is passed. The supervision limit is set in percent of the
available volume space and the function is turned off by setting the limit to
0%.
Command example:
:INVOC:VOL=EXCHVOLUME,LIMIT=75;
In the example above the volume supervision of volume EXCHVOLUME
is set to 75%. If the volume is filled to more than 75% an alarm will be
issued.
4.4.1 Operation
The commands for handling volumes are INVOP, INVEP, INVOI,
INVOL and INVOC.
46 R1B
FMS applications
Command example:
:INVOP:VOL=OMFZLIBORD;
VOLUME ATTRIBUTES INTERNAL
REV DATE TOTSIZE(KB) USEDSIZE(KB LIMIT
1 991231 100000 5528 99
NODE1 IO1 SIZE1(KB)
A HD-1 100000
NODE2 IO2 SIZE2(KB)
B HD-1 100000
END
Example of formatting an opto disk:
< INMCT:SPG=0;
:INMEI:NODE=A,IO=OD-1,FORMAT=APN,VOL=TRAINING;
ORDERED
:END;
EXECUTED
VOLUME/MEDIA INITIATED
EXECUTED
NODE IO VOLUME FORMAT
A OD-1 TRAINING APN
END
Note: For diskette IO=FD-1
The volume name is written on the diskette or opto disk. The Support
Processor keeps no record of these volumes. Therefore, before working
with a diskette or an opto disk the volume table of contents (VTOC) has to
be loaded into the system. This is loading the volume and done with com-
mand INVOL.
Example of loading an external volume:
< INMCT:SPG=0;
:INVOL:NODE=A,IO=OD-1;
ORDERED
:END;
EXECUTED
VOLUME LOADED
EXECUTED
VOLUME NODE IO FORMAT
TRAINING A OD-1 APN
END
Before removing a diskette or opto disk, the volume must be unloaded
using the command INVOE. If this is not done, the device cannot be used
for another diskette or opto disk.
R1B 47
AXE IO System, IOG 20
The formatting of hard disk and definition of volumes is not part of the
ordinary operation and maintenance activities of the IO system.
Node A Node B
Mandatory
volumes
463+C% 463+C&
31*>0-&36( Optional
31*>0-&36(
volumes
6)0:30917; 6)0:30917;
)<',:3091) )<',:3091)
',%6:3091) ',%6:3091)
78%8:3091) 78%8:3091)
0-78:3091) 0-78:3091)
Figure 4.3
Standard internal volumes
The volumes are shown in Figure 4.3. In addition to these, some market
dependent volumes are usually defined for charging and statistics data
The volumes PROG_A and PROG_B are unduplicated, and usually the
only unduplicated volumes. PROG_A is located in node A and PROG_B
in node B. The volumes contain SP software, including RPV/RPV2 and
LUM software and the SP system files. If the SP Trace System function is
activated, the SP Trace logs are stored here.
The reason these volumes are unduplicated is that the SP software in two
different nodes need not be identical.
PROG_A and PROG_B reside in all SPG’s.
48 R1B
FMS applications
4.5 Files
Files are stored in volumes. A file contains data and is physically located
on one or more positions on the media (within a certain volume). A file
cannot be stored in two volumes at the same time. A file cannot start in
one volume and end in another.
A file is identified by a filename of 1 to 12 characters. A filename may
only be used once in an AXE system (exceptions to this rule exist).
Each file is divided in a number of records. Records are of predefined
lengths and, in certain file types, divided into subfields.
R1B 49
AXE IO System, IOG 20
A composite file is a file that consists of a mainfile and one or more sub-
files. The mainfile contains no data and operates as an ‘umbrella’ or
‘directory’ to the subfiles. All data in a composite file is stored in the sub-
files. There is no limit to the number of subfiles. A subfile name may be 1
to 12 characters long, if the subfile is located on hard disk. Subfile names
on other medias are shorter, see the command description for command
INFII.
Sub files
Figure 4.4
Simple and composite file types
50 R1B
FMS applications
According to the file name convention the third character in the device file
name indicates the SPG index and the fourth character the node.
Sequential Direct
access access
1
Record no. 1
Record no. 2
2
Read 3
3
4
4 from 5
5 top 6
6 down -
-
-
-
-
-
-
-
..or read Read
record record
no. 102 no. 765
Figure 4.5
Sequential and direct access file type
R1B 51
AXE IO System, IOG 20
Sequential files are files written in chronological order. Each new record is
written in sequence after the previous one. Each record is numbered.
Reading of the records from a sequential file is done in the same order as
they were written, or according to record number.
Direct access files consist of a finite number of records where each record
is given a record number, just like sequential file. Reading and writing in
the file is done directly using the record number. Direct access can be con-
sidered as a special case of sequential access.
Read all
records with
Fiat
Figure 4.6
File class key
A key access file may be compared to a very simple data base. The reading
of a key file is not done specifying a certain record but by specifying a
‘search criteria’ or a key. An example is given in the Figure 4.6 above
where a read order to the file system could be interpreted as ‘read all
records with FIAT in keyfield number 2’. Another example could be ‘read
all records with a value larger than 1973 in keyfield 1’.
Only one search key may be specified in a read operation.
A key access file consist of a number of records with one or more sub-
fields.
52 R1B
FMS applications
Write
Initial
size
Expansion Write
factor
Write
Expansion
factor
Record
length
Figure 4.7
R1B 53
AXE IO System, IOG 20
When defining a file the space allocated on the media is according to the
size attribute. The parameter indicates number of records.
When the initially allocated area is written, the file is expanded with the
number of records indicated in the expansion factor.
Note that the expansion factor may be overridden by the MAXSIZE
parameter in the Infinite Files function. See the Infinite Files section.
The record length indicates number of bytes per record. Which record
length is suitable depends on the format of the written data, i.e. on the
writing application. The suitable record length for a file can often be found
in the application information for the file-using application.
Physical space on
hard disk:
block 3
block 4
Start of file End of file
Blocking factor
n records block 1
block 2
Figure 4.8
Physical allocation of a file on hard disk
54 R1B
FMS applications
END
R1B 55
AXE IO System, IOG 20
Note that the file names above are Ericsson conventions. When using the
function Direct File Output the device files will have other names.
It is only necessary to have one device file for each file device e.g. FD0A1
is a pointer to the flexible disk drive in node A and FD0B1 is a pointer to
the flexible disk drive in node B, etc. All files on a diskette in node A will
come up as subfiles to the device file FD0A1.
If the same diskette is used in node B the files will come up as subfiles to
FD0B1. The files thus have unique names on the diskette, e.g. FDFILE1,
but they must be addressed however by the full name, e.g.
FD0A1-FDFILE1.
Example of files on a diskette in node A:
< INMCT:SPG=0;
:INFIP:FILE=FD0A1;
FILE ATTRIBUTES
RLENGTH BLK SIZE EXP
512 4 0 10
TYPE NFIELDS NKEYS NUSERS
SEQ 0 0
FCLASS
DEV
SUBFILES
FD0A1-FDFILE1
FD0A1-FDFILE2
END
Here we see that two files FDFILE1 and FDFILE2 exist on the diskette.
It should be noticed that diskette and opto disk files are not subfiles to the
device files in the same sense as subfiles to a composite file on HD. Only
composite files have subfiles. They appear as subfiles here because of the
standard text SUBFILES in the printout format. Only the actual file name
but not the device file name is written on the disk/opto disk.
As seen above, to print the attributes of a file the command INFIP is
used. The command can print a list of all defined files, all files of a given
file class, all files in a given volume or data for a unique file.
A printout of the data for the CP backup file defined earlier is given below:
:INFIP:FILE=RELFSW2;
FILE ATTRIBUTES
RLENGTH BLK SIZE EXP
2048 4 16 64
56 R1B
FMS applications
FCLASS
CMP
SUBFILES
RELFSW2-R0
RELFSW2-R1
RELFSW2-R2
RELFSW2-R3
RELFSW2-R4
RELFSW2-R5
END
R1B 57
AXE IO System, IOG 20
RPB-A
CP
RPB-B
SP ICB
RPV/RPV2
HD
AT
HD
Commands
ALI INFIT, IOFIT
FD
and INFET
OD
DL
Figure 4.9
External transfer of file information
Command example:
< INMCT:SPG=0;
:INFIT:FILE1=HDFILE1,FILE2=HDFILE2;
ORDERED
:END;
EXECUTED
FILE COPY INTERNAL
EXECUTED
SOURCE FILE DATA
FILE
HDFILE1
DESTINATION FILE DATA
FILE
HDFILE2
END
Command INFET is used to copy files between hard disk and movable
media, diskette or opto disk. The command is also used for copying a file
from one movable media to another. If copying to hard disk, the destina-
tion file must be created in advance.
Example of file copy from HD to OD:
< INMCT:SPG=0;
:INFET:FILE1=HDFILE,FILE2=FDFILE,NODE2=A,
58 R1B
FMS applications
IO2=OD-1;
ORDERED
:END;
HDFILE
FDFILE
END
Note that since parameters NODE and IO are given in the command, the
device file name (OD0A1) should not be used here. The copied file will
have the name FDFILE on the diskette. To read this file from the diskette
(command IOFAT), the name OD0A1-FDFILE must of course be used.
If a file is copied from hard disk to diskette or opto disk the record length
of the device file should be the same as the record length of the hard disk
file. If this differs from 512 bytes a new device file should first be defined.
Note: a keyed access file cannot be copied to external media.
R1B 59
AXE IO System, IOG 20
CRYSTAL-XUJING;
data to file
END OF BLOCK 0
data to file
END OF BLOCK 1
END
In the example above the data in subfile XUJING is printed on the opera-
tor terminal.
Note that in the printout FILE DUMP the END OF BLOCK must be inter-
preted as end of record. It must not be confused with the blocking parame-
ter (BLK) of the file.
D uplica te d D uplica te d
volum e a re a volum e a re a
F ile F ile
R e sult
Figure 4.10
Writing to a file in a duplicated volume
60 R1B
FMS applications
If the data contents of the duplicated volumes in the standby node happen
to be different from the data in the executive node, then the system will
initiate a recovery activity. The data in a duplicated volume is in all nor-
mal cases identical in executive and standby node. The reason why the
data would be different could for example be if the standby node has been
blocked for some time or because of a file system error.
Command example:
:IMCSP;
SPG
0
NPAIR EX SB
NODE CM STATUS STATE NODE CM STATUS STATE HDSTATE
1 A 1 WORKING NORMAL B 2 ISOLATED BLOCKED CORRUPT
END
The hard disk status may be printed with command IMCSP. The parame-
ter HDSTATE can take the values CORRUPT or CONSISTENT. Both
states will require an update. If the duplicated volumes are updated
(equal), which is the normal state, the HDSTATE parameter is excluded
from the printout.
R1B 61
AXE IO System, IOG 20
Duplicated Duplicated
volume area volume area
.......
Write sector n
Delete Create ...
sector y
Duplicated Duplicated
file system ... file system
Figure 4.11
Blocked node
The small update is done using the so called Sector Map. When the
standby node goes blocked a Sector Map is created in the executive node.
The table is stored in the primary memory of the SP and is discarded at SP
restart.
All sectors that are changed in the executive node are recorded in this
table. The table is finite, i.e. has a limited size.
Duplicated Duplicated
volume area volume area
.......
sector n
... sector n sector y
sector y
Duplicated Duplicated
file system .... file system
62 R1B
FMS applications
Figure 4.12
Small update
The small update updates the duplicated volumes in the standby node
according to the sector table, i.e. the changed sectors are written to the
standby node.
The small update will be performed when a valid sector map exists and:
• when deblocking the standby node or
• at manual SP restart or
• at spontaneous restart without response from the standby node
The large update will be performed when deblocking the standby node in
the following cases:
• at serious faults in the duplicated file system
• a restart in executive node has occurred (sector map discarded, cannot
perform small update).
R1B 63
AXE IO System, IOG 20
SPG
0
NPAIR EX SB
NODE CM STATUS STATE NODE CM STATUS STATE HDSTATE
1 A 1 WORKING NORMAL B 2 ISOLATED UPDATING S CORRUPT
END
During the small and large update the hard disk status (parameter
HDSTATE) is CORRUPT.
64 R1B
FMS applications
recovery of the file is unsuccessful, then the file remains blocked until the
operator manually deblocks the file.
The result printout states the success or failure of the recovery of the file.
The command INMFP prints the list of files currently in recovery, blocked
or corrupted.
The File Recovery function is implemented in the RECFILE module.
R1B 65
AXE IO System, IOG 20
SP or CP file user
Mainfile: STATFILE
Subfiles:
STATFILE-0001
STATFILE-0002
STATFILE-0003
STATFILE-0004
STATFILE-0005
-0001 -0002 -0003 -0004 -0005 .....
Figure 4.13
Infinite files
The user of the file writes towards the mainfile. The infinite file functions
distributes the data to subfiles belonging to the mainfile thus giving the
user the impression that it is writing to the mainfile. The subfiles are cre-
ated by the infinite files function.
Writing is always done to the active subfile, the previous subfile is closed
and the next subfile is waiting to receive data.
The size of the subfiles and the number of subfiles are defined by com-
mand IOIFI. The subfiles are named sequentially with a four digit subfile
name. When the last subfile is reached the infinite files will redirect the
data flow to the first subfile again (-0001). This subfile must by then be
transferred and deleted, i.e. the subfile name -0001 must be free to use a
second time. This will normally be the case due to storage considerations;
if all subfiles are still on hard disk the volume would be full.
The infinite files will create subfiles in an infinite sequence stepping from
-0001 to the highest subfile number (defined by command, usually -9999),
and back to subfile -0001 again.
If the subfile that infinite files attempts to create already exist, the infinite
files function will halt and issue the alarm INFINTE FILE END
WARNING. Infinite files never overwrites data.
An existing composite file is defined as infinite with command IOIFI.
66 R1B
FMS applications
Command examples:
<IOIFP;
FILE ATTRIBUTE INFINITE SEQUENTIAL FILE
FILE ACTIVESUB NEXTSUB NSUB MAXSIZE MAXTIME RELEASE COMP
TTFILE00 0231 0232 9999 4096 NO YES
TTFILE01 0001 0002 9999 4096 NO YES
TTFILE02 0001 0002 9999 4096 NO YES
TRARFILE 1201 1202 9999 512 YES NO
CMVNFILE 0007 0008 9999 1 YES NO
TRDIPFILE 0763 0764 9999 1024 YES YES
END
< INMCT:SPG=0;
:INFII:FILE=TTOPFILE,VOL=EXCHVOLUME,RLENGTH=2048,
TYPE=SEQ,SIZE=20,FCLASS=CMP,EXP=5;
:END;
< IOIFI:FILE=TTOPFILE,NSUB=9999,MAXSIZE=40,
MAXTIME=15,COMP=YES;
In this example the composite file TTOPFILE is defined as infinite. It can
have a maximum number of 9999 subfiles. The data in the subfiles will be
compressed with the FLAM compression method.
Note: the compression of data is not default in the infinite file function.
When subfile -0001 is full, i.e. has reached its maximum size (here 40
records) or if 15 minutes have passed before this, the subfile is automati-
cally closed. The storing of data continues in subfile -0002. When storage
starts in a subfile, the next subfile is automatically created to be used when
the first subfile is closed, and so on up to subfile -9999.
If the command parameter MAXSIZE is omitted, then the subfile will
close after 15 minutes. If the parameter MAXTIME is also omitted then the
expansion factor in command INFII must be set to zero for infinite files
(EXP=0), otherwise the subfile will continue to expand indefinitely.
A third parameter, RELEASE, is used for files receiving data in batch out-
puts. RELEASE=YES is used to ensure that the whole output goes into one
subfile. When the parameter RELEASE is set to YES the switch to the next
subfile is not done until the MAXTIME and/or MAXSIZE criterias are
fulfilled and a release order is sent from the file user. If parameter
RELEASE is omitted it takes the default value NO.
Different file users handles their files differently. Some users seizes their
file after restart and never release. An example is the Toll Ticketing func-
tion in the charging subsystem, CHS.
Other file users makes a seizure, writes to the file and then release it.
Examples of such functions are most statistic functions in OMS. Another
example is the command output of call counters. For these files the release
parameter is preferably set to YES.
R1B 67
AXE IO System, IOG 20
Note: setting the release parameter to yes for files with continuous output,
like the toll ticketing files, would be fatal. Since the toll ticketing function
never releases the file, the infinite files would never make a subfile switch.
The subfile would grow infinitely and the volume would eventually fill up,
causing a traffic stoppage.
-0064
Deleted
-0065
SUBFILE -0066
-- " -- -0068
Active subfile
-- " -- -0069 Data
(MAX -9999)
Figure 4.14
Infinite files without data compression
68 R1B
FMS applications
-0064
Deleted
-0065
Compressed
data
SUBFILE -0066
-- " -- -0068
Active subfile
-- " -- -0069 Data
Uncompressed
data
(MAX -9999)
Figure 4.15
Infinite files with compression
The infinite files function may compress the data in the subfiles with the
FLAM compression method. This is defined with parameter COMP in the
IOIFI command. The purpose with compressing the data is to save space
on hard disk (and possibly opto disk) and to save time when transferring
over data link.
4.11.1 Implementation
The infinite files function is implemented in CP block FIE for command
handling and modules INFFILECMD and INFFILEINT in the SP.
R1B 69
AXE IO System, IOG 20
70 R1B
FMS applications
SPG DEST
0 TTFILEOD
0 AOM
1 STATDEST
END
R1B 71
AXE IO System, IOG 20
END
FPU subfile data:
<INFSP:FILE=TTFILE00-2362,DEST=TTFILEOD;
FILE PROCESS UTILITY
SUBFILE DATA
72 R1B
FMS applications
END
Sequence number. The sequence number parameter is still in the printout
but is not used when dumping to an opto disk. It is used in IOG11 when
dumping to magnetic tape to keep track of which subfiles belongs to a cer-
tain magnetic tape. Although the use of the magnetic tape is not supported
in IOG20, the parameter SEQNUM still exists for compatibility reasons.
In the example it can be seen that the subfiles -2351 to -2362 are dumped
to an OD.
The subfiles -2363 to -2366 are not dumped at all and the reason is that
these have been reported to FPU after execution of the INFMT command.
The link transfer with the Ericsson MTP protocol may be performed in
four different ways:
• automatically - initiated from IOG
• automatically - initiated from remote destination
• manually
• manual re-transfer of an already transferred subfile
Automatic Transfer initiated from IOG
Command example:
< INFDI:FILE=SPFILE01,DEST=BC,EQUIP=MTP;
In the example above the mainfile SPFILE01 is connected to a destination
BC of equipment type MTP, i.e. data link with Ericsson MTP protocol.
Subfiles belonging to mainfile SPFILE01 may when reported to FPU be
sent over a data link with the Ericsson MTP protocol.
The automatic transfer of the subfiles from IOG with Ericsson MTP, may
be performed in two ways:
• immediate transfer
• transfer at a certain time
An immediate transfer is done when a subfile is reported to the FPU sub-
file list. This is usually done automatically by the Infinite files. It may also
be done by the command log function or by command (see above).
FPU then transfers all reported subfiles to the specified destination as soon
as possible.
R1B 73
AXE IO System, IOG 20
The manual transfer over data link with Ericsson MTP may be done in two
74 R1B
FMS applications
directions:
• from IOG to remote
• from remote to IOG
Command example:
<INFDI:FILE=SPFILE01,DEST=BC,EQUIP=MTP;
<INFTI:FILE=SPFILE01-2076,DEST=BC;
In the example above the subfile SPFILE01-2076 is transferred from IOG
to destination BC over Ericsson MTP.
Command example:
<INFDI:FILE=SPFILE01,DEST=BC,EQUIP=MTP;
<INFTI:FILE=SPFILE01,DEST=BC;
In the example above all subfiles belonging to SPFILE01 which are
reported to FPU are transferred from IOG to destination BC over Ericsson
MTP.
Command example:
<INFDI:FILE=RELFSW2,DEST=AOM,EQUIP=MTP;
<INFTI:FILE=RELFSW2-R5,DEST=AOM,REVERSE;
In the example above the subfile RELFSW2-R5 is transferred from an
operation and maintenance centre to IOG. The operation and maintenance
centre is destination AOM.
The mainfile RELFSW2 must exist on the hard disk.
A manually initiated file transfer may be interrupted by command INFTE.
The OPI to be used for manual transfer over a data link is called ‘File
Process Utility, Manual File Transfer, Start’.
Manual re-transfer of an already transferred subfile
Manual re-transfer may be performed on subfiles that already has been
sent once over data link with Ericsson MTP. Whether a certain subfile has
been sent or not can be seen in the FPU subfile list.
Both subfiles that are sent manually, automatically from IOG or automati-
cally from the remote destination (polled) may be re-transferred.
The re-transfer transfers not only the subfile indicated in the command but
all subfiles reported to the FPU subfile list after the indicated subfile. This
is referred to as a roll-back.
Command example:
<INFRI:FILE=SPFILE01-2076,DEST=BC;
R1B 75
AXE IO System, IOG 20
The link transfer with the FTAM protocol may be performed in two differ-
ent ways:
• automatically - initiated from IOG
• automatically - initiated from remote
The file connected to FPU must be defined as a virtual file in FTAM.
Automatic Transfer initiated from IOG
In this case the FTAM in the IOG acts as initiator.
Command example:
<INFDI:FILE=TRDIPFILE,DEST=AOM,EQUIP=FTAM;
Automatic Transfer initiated from remote
In this case the FTAM in the IOG acts as responder.
Command example:
<INFDI:FILE=TRDIPFILE,DEST=AOM,EQUIP=FTAM,POLL;
FILE=PERIODICACC DEST=ODDEST
76 R1B
FMS applications
0004 1000 NO NO
0005 1000 NO NO
0006 1000 NO NO
0007 1000 NO NO
END
Command example, transfer of subfiles to an opto disk:
<INFMT:DEST=ODDEST,VOL1=ODVOLSIDE1;
In the example above all reported and non-dumped subfiles of all files
connected to destination ODDEST will now be copied to the opto disk
having the volume name ODVOLSIDE1. In our example we assume that
the only file connected to destination ODDEST is PERIODICACC.
FPU subfile list:
<INFSP:FILE=PERIODICACC,DEST=ODDEST;
FILE PROCESS UTILITY
SUBFILE LIST
FILE=PERIODICACC DEST=ODDEST
END
The manual dumping to an opto disk may also be done in parallel, towards
two medias at the same time. This is called duplicated output and requires
that two different opto disks are inserted, one in each node, and the vol-
umes are loaded. Serial output is not possible.
Command example for parallel transfer:
<INFMT:DEST=ODDEST,VOL1=ODVOLSIDE1,VOL2=ODSTAT;
R1B 77
AXE IO System, IOG 20
Also, when more than one destination is defined, the removal conditions
relate to the first defined destination. Thus INFDI for destination
TTFILEOD must be given first in this case. If INFDI for the data link was
given first then the subfiles would not be removed even after the dump.
In the above example, transfer of the subfiles via data link does not affect
the removal of the subfiles from hard disk. They will only be removed
according to the removal conditions after the subfiles have been dumped
to opto disk.
78 R1B
FMS applications
In the first case the FMS file name is adapted to a file system where gener-
ations are supported. The mainfile name forms the file name in the exter-
nal file system and the subfile name are converted to file generation.
In the second case the FMS file name is adapted to a file system where
generations are supported. The mainfile and subfiles names are concate-
nated forming the file name in the external file system. The generation is
set to zeroes.
In the third case the external file system supports the same file structure as
in FMS. The file name is kept.
In addition to this adjustment a renaming may be done:
File in FMS: File in external file system:
PERIODICACC-0007 PERACCTOWN.0007
PERIODICACC-0007 PERACCTOWN0007.0000
PERIODICACC-0007 PERACCTOWN-0007
In the example above the file is renamed to indicate from which switch the
files originate, TOWN.
Which renaming method is defined with command INFDI, when connect-
ing a file to a destination.
Command example:
< INFDI:DEST=BC,EQUIP=MTP,FILEID1=PERACCTOWN,
RULE1=1;
File in FMS: File in external file system:
PERIODICACC-0007 PERACCTOWN.0007
Command example:
< INFDI:DEST=BC,EQUIP=MTP,FILEID1=PERACCTOWN,
RULE1=2;
File in FMS: File in external file system:
PERIODICACC-0007 PERACCTOWN0007.0000
Command example:
< INFDI:DEST=BC,EQUIP=MTP,FILEID1=PERACCTOWN,
RULE1=3;
File in FMS: File in external file system:
PERIODICACC-0007 PERACCTOWN-0007
R1B 79
AXE IO System, IOG 20
The removing of the subfiles is handled by FPU only for equipment types
NOLINK and MTP, i.e. if opto disk or data link with Ericsson MTP is
used.
If a data link with FTAM is used the removal of the subfiles from the IOG
hard disk is controlled and performed from remote via FTAM.
If the removal of the subfiles is handled by FPU it is controlled by two
parameters:
• removal conditions
• removal time
The removal of a subfile is done if both the removal conditions and
removal time are met.
The removal conditions depends on the equipment type of the destina-
tion, i.e. the way the data has been transferred.
The possible removal conditions are:
Equipment type: Removal condition:
NOLINK DUMP
DUPL
MTP AUTO
MAN
(No removal conditions are set for equipment type FTAM.)
The removal time is the time after which the subfiles may be removed.
The time is specified in hours and minutes. The time is calculated from the
time when the subfiles are reported to the FPU subfile list. So the count-
down starts when the subfile is reported to FPU, not when the subfile is
transferred over link or dumped to opto disk (which is done after the
reporting).
Note: this may be changed by a deferred constant!
The removal conditions and time are set by command INFCC.
Command example:
< INFDI:FILE=ICIFILE02,DEST=BILLING,EQUIP=MTP;
< INFCC:FILE=ICIFILE02,TRANSCOND=AUTO,
REMOVE=02400;
The subfiles of the file ICIFILE02 will be deleted from the hard disk 24
hours after they are reported to FPU, but only if the subfiles have been
automatically transferred over data link.
Command example:
< INFDI:FILE=TRACAFILE,DEST=OD,EQUIP=NOLINK;
< INFCC:FILE=TRACAFILE,DUMPCOND=DUPL;
80 R1B
FMS applications
The subfiles of the file TRACAFILE will be deleted from the hard disk
when the subfiles have been copied to opto disk twice.
The setting of the removal times for frequently output data must be done
calculating the traffic of the switch. The wish to keep the data on hard disk
as long as possible, for security, must be weighted against the need for
new hard disk space for new data.
If the telephony traffic and data output is high the removal times must be
set shorter.
R1B 81
AXE IO System, IOG 20
:IMDCP:METHODS;
In the example above all available decompression methods are listed.
Command example:
:IMDCP:STATUS;
In the example above all ongoing decompressions are listed.
An ongoing decompression may be interrupted with command IMDCE.
Note that the compression of files may in IOG20 only be done with the
FLAM compression method and only when using infinite files.
4.14.1 Implementation
The function is administered by the FMS block LOGB in the CP.
82 R1B
FMS applications
transferred, via the ICB, from the executive node to the standby node
• Three file types exist, namely sequential (SEQ), direct access (DIR)
and keyed access (KEY)
• Three file classes exist, namely simple (SPL), composite (CMP) and
device (DEV)
• A file has a unique name and belongs to a volume
• A file can be copied internally hard to hard disk or externally between
hard disk and moveable media or between to moveable medias
• Corrupt key files can be recovered by the operator
• The infinite file function will create subfiles in an infinite sequence
stepping from -0001 to the highest subfile number, usually -9999, and
back to subfile -0001 again
• The infinite file function may compress the data in the subfiles. The
compression saves space on the hard disk and time when transferring
• File process utility (FPU) administers the transfer of data from the hard
disk to an external media and removal of data from the hard disk
• Example of files defined in FPU: toll ticketing, pulse metering, call
specification, accounting, different statistics files, etc.
• The transfer of data to the external media can be done over data link
with Ericsson MTP or FTAM or transferred locally to an opto disk
• Subfiles can be decompressed by operator command
R1B 83
AXE IO System, IOG 20
84 R1B
5. System Backup Handling
Chapter Objectives
After completing this chapter the student will be able to:
• Perform a manual CP backup with the help of the relevant OPI
• Be familiar with the commands for rotating the file names for CP
backups and for changing the file names of these dumps
• Explain and carry out a Conversion of System Backup files from
external media or data link
• Explain the purpose and function of the command log
• Explain how the reloading of the CP is done and how this can be
controlled by operator
Figure 5.1
Chapter Objectives
5.1 Introduction
This chapter deals with the backup storage and handling of CP and SP
backups.
The CP and SP backups together contains all software and data in the AXE
system.
Other software which is stored in the AXE IO system but is not part of
AXE could for example be radio base software. This kind of software is
not described here.
R1B 85
AXE IO System, IOG 20
The reason to store a backup in CP primary memory is the short times for
backing up and for reload. The drawbacks are that about twice as much
primary memory is needed in the CP and that the backup doesn’t survive a
power reset. Backup in main store must always be combined with a
backup on hard disk.
The primary memory may hold only one backup copy.
When stored on hard disk the CP backup copies are stored in composite
sequential files with predefined names. The CP backup files are always
stored in volume RELVOLUMSW. The limitation to the number of CP
backup files that may be stored on the hard disk is the size of volume REL-
VOLUMSW.
86 R1B
System Backup Handling
R0 Control data
R1
Charging data, small backup, DS
R2
R3
Reload marked variables, large backup, DS
R4
R5 Contents of RS and PS
RS - Reference Store
PS - Program Store
DS - Data Store
Figure 5.2
CP backup file on hard disk
The subfile R0 contains control data for administration of the other sub-
files, such as information indicating the subfiles to be loaded in the event
of a reload. The CP dump header is stored in this subfile.
The subfiles R1 and R2 contain charging data, mostly private meters. The
automatic backup operation alternates between the two subfiles where the
older version is overwritten with new data. These data are dumped at small
automatic backups. In case of a reload the newest small dump will be
loaded into the system.
The subfiles R3 and R4 contain reload marked variables, i.e. variables to
be loaded in conjunction with a reload. This file stores the exchange data
of the system. R3 and R4 contain different versions of data dumped at dif-
ferent times at large automatic backups. For security reasons the older
large dump will be loaded into the system if an automatic reload occur as
it is less likely to contain a data fault that may have caused the reload.
The subfile R5 contains a copy of the Program Store (PS) and Reference
Store (RS) which are only dumped at manual dumps. This is usually the
largest subfile. R5 is always loaded at a reload.
R1B 87
AXE IO System, IOG 20
88 R1B
System Backup Handling
R1B 89
AXE IO System, IOG 20
The reason for keeping two file ranges is security. The second file range
contains older version of the CP backup while the first file range contains
newer. The reload function in the CP may select backups files from the
second file range if backup files reloaded from the first file range prove to
be corrupt.
Reload
CP RELFSW1 First
File Range
RS, PS
Manual dump
and DS
RELFSW2
RELFSW100
Second
RELFSW101 File Range
RELFSW102
Figure 5.3
Manual and automatic CP backup
90 R1B
System Backup Handling
<SYTUC; RELFSW0
First
File Range RELFSW1
RELFSW2
<SYTUC:SFR; RELFSW100
Second
File Range RELFSW101
RELFSW102
Figure 5.4
Rotation of CP backup files on hard disk
Command SYTUC can be used for name rotation of system backup files if
RELFSW2 is newer than RELFSW0 and RELFSW0 is not empty. Com-
mand SYTUC is normally used after a manual dump to RELFSW2. See
Figure 5.4.
R1B 91
AXE IO System, IOG 20
<SYNIC; RELFSW0
First
File Range RELFSW1
RELFSW2
<SYNIC:SFR; RELFSW100
Second
file Range RELFSW101
RELFSW102
Figure 5.5
Rotation of CP backup files on hard disk
Command SYNIC can be used to change the file names when RELFSW2
is newer than RELFSW0 or when RELFSW0 is empty. SYNIC is nor-
mally only used at the first load of the exchange when, after the first man-
ual dump, RELFSW2 is renamed RELFSW0. Figure 5.5.
There is a third way of rotating the files. With command INFIC the
backup files can change names or be given any name. This way of renam-
ing files is preferably avoided, particularly in a ‘live’ switch. This method
is however very useful during installation test or in a test plant environ-
ment where the conditions for sending the commands SYTUC or SYNIC
are not satisfied.
Command example:
< INMCT:SPG=0;
:INFIC:FILE1=RELFSW0,FILE2=RELFSWX;
:INFIC:FILE1=RELFSW2,FILE2=RELFSW0;
:INFIC:FILE1=RELFSWX,FILE2=RELFSW2;
:END;
This example could have been where an older generation has been loaded
into RELFSW2 from an opto disk, but is required to be in RELFSW0. In
this case commands SYTUC and SYNIC could not be used.
92 R1B
System Backup Handling
Note that the commands SYTUC and SYNIC are part of the system backup
functions and can only be used with the files with names RELFSWn.
<SYSFT; RELFSW0
First
RELFSW1
File Range
RELFSW2
RELFSW100
Second
RELFSW101
File Range
Old contents
RELFSW102
are overwritten
Figure 5.6
Transfer of CP backup from first to second file range
The command SYSFT will copy RELFSW1 from the FFR to the highest
consecutive number in the second file range. The old CP backup in the
destination file will be overwritten.
Command example:
<SYSFT;
Note that a manual backup cannot be performed towards the second file
range. The command SYSFT is the only way to write a CP backup file in
the second file range.
With the command SYBFP it is possible to check which CP backups exist
on hard disk or in primary memory.
Command example:
<SYBFP:MS;
In the example above data related to the backup in main store is printed.
Command example:
<SYBFP:FILE;
R1B 93
AXE IO System, IOG 20
In the example above data related to the backup files on hard disk is
printed.
RP bus A
CP RP bus B
SYBUP
SP ICB
RPV/RPV2
HD
AT
HD SYACI SYMTP
SYCFI
ALI
FD
OD
DL
(via FPU)
Figure 5.7
CP backup conversion to/from external media
The CP backup may be transferred to and from the AXE system in three
different ways:
• via external media opto disk
• via external media diskette
• via data link
The conversion to opto disk is done by command SYMTP. One side of an
opto disk is usually enough space to store more than one CP dump. The
CP backup is converted to six separate files which are named according to
what is specified in the command.
94 R1B
System Backup Handling
Command example:
< SYMTP:SPG=0,DIR=OUT,ECO,FILE1=RELFSW3,
FILE2=DUMP3,NODE=B,IO2=0D-1;
In the command example above the subfiles RELFSW3-R0, -R1, -R4 and
-R5 are output to the opto disk in the B-node. The volume of this opto disk
must be loaded. The files on the opto disk will be named DUMP3R0,
DUMP3R1, DUMP3R4 and DUMP3R5.
Command example:
< SYMTP:SPG=0,DIR=IN,FILE1=RELFSW101,FILE2=RELFP7,
NODE=A,IO2=OD-1;
In the command example above the files RELFP7R0, RELFP7R1,
RELFP7R2, RELFP7R3, RELFP7R4 and RELFP7R5 are input from the
opto disk in the A-node. The volume of this opto disk must be loaded. The
files on the hard disk will be RELFSW101-R0, -R1, -R2, -R3, -R4 and -
R5.
The conversion to/from flexible disk is done with the commands SYACI
and SYCFI. A flexible disk has a storage capacity of 1.44 MB therefore it
takes many diskettes to store a CP backup.
R1B 95
AXE IO System, IOG 20
96 R1B
System Backup Handling
the fault the system may reload a CP backup. An automatic CP reload will
cause a temporary traffic stoppage in the switch.
R1B 97
AXE IO System, IOG 20
END
Here is a short explanation of the different parameters in the example:
CLH Can be set to AUT for automatic handling of the backup
system or MAN for manual.
NTAZ Number of truncation attempts with RELFSW0. If this
parameter is set to zero, the following two parameters are
insignificant.
NTCZ Number of additional commands to be truncated at each
reload attempt. This parameter is set to 10 in the example.
This means that 10 commands from the latest command
log file are truncated (not loaded) for each retry.
LOAZ Log subfile omission attempt with RELFSW0. The
parameter can be used to indicate that the command log
subfile should be omitted completely (=2), that the
youngest subfile should be omitted (=1) or that there
should be no omission at all (=0). The last value is
default.
INCL1 This parameter indicates the reload file or files which
should be included from the first group (First File Range).
Either RELFSW0 or ANY is specified.
INCL2 Determines which files from the Second File Range
should be included in reload attempts. Either NONE or a
value from 100 to 127 is specified. In the example, 101 is
specified, which means that RELFSW100 and 101 are
tried.
98 R1B
System Backup Handling
END
During a function change in the CP the automatic reload function may be
turned off by command SYRBI.
Command example:
<SYRBI;
In the example above the automatic reload function is turned off. The sys-
tem will not reload. The alarm BACKUP INFORMATION FAULT is
issued.
The automatic reload function is turned on by command SYRBE.
R1B 99
AXE IO System, IOG 20
Command example:
<SYBCI:FILE=RELFSW101;
A backup check is made of the CP backup in file RELFSW101.
100 R1B
System Backup Handling
‘attached’ to -R3.
• The exchange data is modified and subscriber services are activated and
deactivated. The commands are stored in subfile -0100230.
• A large backup is made to subfile RELFSW0-R4. A new empty com-
mand log subfile, RELCMDHDF-0100231, is created and ‘attached’ to
-R4.
• The exchange data is modified and subscriber services are activated and
deactivated. The commands are stored in subfile -0100231.
By following this sequence the system will create and attach one and only
one command log subfile to each and every CP backup subfile -R3 or -R4.
The relation can be seen in the printout SYSTEM BACKUP FILES.
System backup files
<SYBFP:FILE=RELFSW3;
ORDERED
FILE IO EXCHANGE
RELFSW3 - TRX-C:9 APZ 211 11 R1
END
If a reload occurs the backup file RELFSW0, with the later small dump
and the older large dump, will be loaded into the system again.
In order to restore the system to the situation before the reload both com-
mand log subfiles (attached to backup subfiles -R3 and -R4) must be
loaded into the system. The reason is that it is always the older large data
dump that is loaded.
R1B 101
AXE IO System, IOG 20
Example:
A CNI shall be loaded in a switch. The CNI consist of a new block.
The new block is loaded with command FCSUL and furax table is loaded
with command FCTAL.
The new software is switched in with FCSUC. Data from the old version of
the block is converted and stored in the new block. The CP is separated
with the old block in the SB side and the new block in the EX side.
A new command log subfile is created.
After the switch, one hundred subscribers are changing their subscriber
services (activating/deactivating). All this is logged in the command log
subfile.
A software fault occurs in the EX side. The system automatically switches
back the old system. EX becomes SB and SB becomes EX. All changes in
subscriber services are lost.
The operator updates the new EX-side by executing the command log sub-
file.
102 R1B
System Backup Handling
The procedures of the Command Log are described in several OPI’s, all
named ‘Command Log......’.
R1B 103
AXE IO System, IOG 20
104 R1B
System Backup Handling
R1B 105
AXE IO System, IOG 20
106 R1B
6. MCS applications
Chapter Objectives
After completing this chapter the student will:
• Recall the main functions MCS
• Describe the alarm handling function in MCS
• Define data for routing of printouts to IO devices
• Understand how user authority data is used
• Write and execute command log
Figure 6.1
Chapter Objectives
6.1 Introduction
This chapter covers the functions and commands of the man-machine
communication subsystem.
R1B 107
AXE IO System, IOG 20
108 R1B
MCS applications
Device blocks are functions that are specific for each type of device and
are not handled by the device drivers in the SP. Reception of user identity/
password, queuing of printouts to busy devices and alphanumeric output to
file are examples of these functions. Four device blocks exist: AT (Alpha-
numeric Terminal), AF (Alphanumeric File), TW (Type Writer) and
AMTP (Alphanumeric transfer using Message Transfer Protocol). The
name of the device block plus a device individual is used as the IO param-
eter and is thus the name of the specific device.
MCS transaction log. The MCS transaction log is used to log transactions
on the alphanumeric terminals. Commands, printouts and logon ID’s are
logged. The MCS transaction log logs transactions on TW/AT and AMTP
devices, but not on AF devices and not on the CPU port of the IOG20.
Command file. Commands are usually executed manually from an alpha-
numeric terminal. Commands may however also be executed from a pre-
pared command file on hard disk or external media. The command file
may be executed manually or automatically according to a time schedule.
6.3.1 Introduction
AXE
Error
Error
remedied
Error
M anual
intervention
Alarm Alarm
issue cease
Alarm
issue External
alarm issue
MCS
Alarm list
.....
....
.......
Figure 6.2
Alarm handling in AXE
R1B 109
AXE IO System, IOG 20
alarm may also be an observation alarm, i.e. an alarm that is not issued to
indicate a fault but to indicate that a manual intervention has taken place.
All subsystems in AXE generates alarms.
Alarms may also originate outside the AXE system. These alarms are then
related to power, cooling, fans or attached to doors and windows of the
building. These are called external alarms.
The functions for receiving, storing, transmitting, and acknowledging
alarms are located in MCS. MCS provides an interface to the operation
staff for alarm information.
MCS provides interfaces in both the CP and SP for internally generated
alarms.
An AXE alarm is issued when the fault or error happens, and ceases when
the fault disappears or is remedied. Some alarms must be manually ceased
by command.
110 R1B
MCS applications
A la r m n u m b e r
A la rm
c la s s A la rm
c a te g o ry D a te T im e A la r m F id
E xchange
s lo g a n header
A la rm te x t
Figure 6.3
Example of an alarm in the alarm list
The alarm list may be printed out automatically at regular intervals. The
alarm list has a printout category of 36 and the printout is routed according
to this. The intervals are defined by command ALLTC.
Command example:
<ALLTC:TIME=0800,TIME2=1700;
In the example above the alarm list is defined to be printed at eight and
five o’clock every day. The times are printed with command ALLTP.
The alarm list has a finite size which is defined by a size alteration in the
system. If the alarm list is full when an alarm is reported an alarm list
overflow counter is stepped. The overflow counter is printed at the top of
the alarm list.
Alarm category. An alarm category indicates from which part of the AXE
system the alarm comes from. An alarm always has an alarm category.
There are 16 alarm categories in the AXE system. Each alarm category is
assigned a number, 0-15, see below. This is referred to as the alarm cate-
gory number (ALCATNO).
The alarm categories and their ALCATNOs are as follows:
0 Data processing system
1 Processors
2´ IO Device
3-15 System dependent data, determined by the system projecting
instance in question.
Normally, however, alarm categories 3-15 have the following meanings:
R1B 111
AXE IO System, IOG 20
3 Switch
4 Switching part
5 Switching device
6 Subscriber lines
7 Spare
8 Power alarm
9 House alarm
10 Alarm from subordinate exchange
11 Cable alarm
12-15 Spare
Further, the alarm category slogan (ALCAT), is also associated with each
alarm. It is the alarm category slogan which appears in the alarm printout
under the heading Alarm Category. The slogans are APZ, APT, POWER,
and EXT.
Example of alarm and display categories:
<ALACP;
END
To each alarm category one or more display categories can be connected.
A display category (DICAT) corresponds to a physical position (lamp) on
an alarm panel. DICATs 0-3 corresponds to the primary alarm panel, and
DICATs 4-15 corresponds to one position on each of up to 12 secondary
alarm panels.The relation between alarm category number, alarm category
slogan and display category is defined and printed by commands ALACC
and ALACP.
As DICAT 0 always corresponds to APZ ALCATNOs 0-2 must be con-
nected to DICAT 0 etc. See Figure 6.4.
112 R1B
MCS applications
Alarm categories
First alarm
panel 2:nd alarm panel 3:rd... ...13:th
A1 O1 A1 A1 A1
A2 O2 ATT A2 ATT A2 ATT A2 ATT
0 1 2 3 4 5... ... 15
Display
categories
Figure 6.4
Display categories
Alarm class. The alarm class of an alarm indicates the seriousness of the
fault. There are five alarm classes in AXE: A1, A2, A3, O1 and O2. Alarm
class A1 is the most serious, the recommendation is that alarms of this
class must be acted upon immediately. Alarm class A2 must be acted upon
immediately during office hours and alarm class 3 must be acted upon dur-
ing office hours.
Observation alarms are used to indicate that a manual intervention is done.
Examples of manual interventions that generates observation alarms is the
manual blocking of a regional processor or the manual blocking of a TSM.
To each alarm class an alarm class number is defined. The alarm class
numbers are 0-4. For each alarm class it is defined whether:
• the bell on the alarm display shall ring at alarm issue
• the bell on the IO device shall ring at alarm issue
• the alarm shall be automatically printed on the alarm printer at issue
Now days the IO device is usually a PC and the ringing of a bell on the IO
device is irrelevant, this was used with printers with bells.
The alarm class definitions are controlled by commands ALCLC and
printed by command ALCLP.
Example of alarm class definitions:
<ALCLP;
R1B 113
AXE IO System, IOG 20
1 A2 YES NO YES
2 A3 NO NO YES
3 O1 NO NO YES
4 O2 NO NO YES
END
ALCPU ALEXP
A larm panel, display
E xternal alarm sensor to categories 0-3.
E X R A N G 20. D evices U S version categories 0-2.
E X A L 2 0 - 31
A larm panel, display
categories 4-7.
U S version categories 3-5.
SC A N interface
categories 0-15.
U S version categories 0- A larm panel, display
11. categories 8-11.
U S version categories 6-8.
B us in backplane P ow er -48 V
Figure 6.5
Alarm interface, ALI
114 R1B
MCS applications
Burglar
alarm on Alarm on
door and cooling
window EXAL0- system
devices
Alarm on
cooling Alarm on
system power
system
Figure 6.6
External alarm sensors in AXE
R1B 115
AXE IO System, IOG 20
The external alarm sensors centrally in the SPG are implemented in the
EXRANG20 connector. The external alarm sensors are defined as EXAL2
devices.
1XPEHUVLQWKHILJXUHDUH
(; $/GHYLFHQXPEHUV
(DFKGHYLFHFRQVLVWRIWZR
FRQQHFWRUSLQV
&DEOHWR$/&38
ERDUG
Figure 6.7
EXAL2 devices in EXRANG20 alarm sensor
116 R1B
MCS applications
the two pins of the alarm sensor. The external alarm must be manually
reset by command ALEXR.
External alarms are defined using the OPI ‘External Alarm Connect’.
Scan interface. A separate physical interface is also provided for connec-
tion of external scanning equipment - the Scanning Interface provided by
the SCAN connector on board ALCPU in the ALI. Similar information as
is given in the alarm status printout see below, can be scanned at this inter-
face, but only four alarm classes are given for each alarm category.
Attendance is also given here as well as Exchange Alarm information.
Exchange Alarm is issued only via the Scanning Interface in the ALI. It
occurs directly at power failure to the CP or after eight minutes of no con-
tact between the ALI and the CP.
Command example:
<ALALI:ALI=0,IO=AT-1,EXAL=0,SCAN,ALDI;
<ALBLE:ALI=0;
In the example above an alarm interface, ALI-0, with SCAN interface is
connected in the A-node of SPG0. It is defined as AT-1, one or more alarm
panels is to be connected and it connects to external alarm receivers 0-31,
i.e. devices EXAL2-0&&-31. Finally the alarm interface is deblocked.
The scan category and alarm category number relation is defined by com-
mand ALSCC and printed by command ALSCP.
Heart beat. A heart beat signalling may be activated from the AXE to a
remote O&M centre (AOM). The purpose is of course that if the AXE
malfunctions the O&M centre will be informed by the fact that the heart
beat signalling stops. The heart beat itself is the printout HB which is
routed according to its printout category 35 to an AMTP device, i.e. an
alphanumeric terminal over data link. Since the heartbeat printout will
lock the terminal it is important that it is dedicated for the reception of
heart beat signals.
The heart beat signal is sent every 60 seconds.
Commands for operating the function are: ALHBI and ALHBE.
Alarm status is a printout with printout category 47. If the function is
activated it is sent continuously to an OMC over data link. The printout
routing is defined to send the information both when the exchange is
attended and unattended, see example below.
ALARM STATUS "HMBRG LOC 12.4/00/01"
ALARM CATEGORY 0 1 2 3 4 5 6 7 .... 12 13 14 15
ALARM CLASS O1 A2 A2 - - A2 - - .... - - - -
ATTENDANCE STATUS N N N N N N N N .... N N N N
END
The printout is a list of all ongoing alarms in the exchange. Only alarm
category numbers (0-15) and alarm classes (A1, A2, A3, O1 or O2) for
each category are given for the alarms. The printout also contains attend-
R1B 117
AXE IO System, IOG 20
ance information for each alarm category - in principle, attendance for the
exchange.
A new printout is sent each time the status changes. Thus when command
IODAC is given at the exchange the alarm status changes and the printout
is sent to the OMC. It is through this information that the OMC staff know
that an exchange is attended or unattended.
The sending of the alarm status printout must be activated by command
ALSTI. The alarm status can be printed manually by command ALSTP.
A LA
A LC O E X A L2 E XA L0
CP
SP
A LA R M A D M A LC PU E XA LI
Figure 6.8
Alarm system implementation
When ALA receives such a signal it seizes the alarm printer and writes the
label for the alarm printout. It then links the alarm printer to the supervi-
sion block and this in turn sends the rest of the alarm printout to the
printer. ALA then writes END in the printout and releases the terminal.
118 R1B
MCS applications
ALA informs block AL of the changed alarm status so that AL can make
the necessary changes on the alarm panel(s).
Block ALSA handles alarm printouts for external and observation alarms,
and the functions for connection, disconnection blocking, deblocking of
external alarm receivers. The receivers are contained in the ALI and corre-
spond to the external alarm sensors.
The block contains a table of the connected external alarm sensors, and a
table for alarm status, alarm resetting conditions, alarm class, alarm cate-
gory and printout strings for these. All the above information is set by
commands (see below).
When an external alarm is to be issued or ceased ALSA acts as a normal
user to the block ALA, as described above.
Blocks EXAL0 and EXAL2 both work as interfaces between the external
alarm sensors and the block ALSA. EXAL2 is the interface used when
using SP based IO systems. It uses the same hardware, ALI, as block AL.
Block EXAL0 is not part of SP based IO systems - it is used for alarm sen-
sors connected at EMRP, board EXALI.
The main functions of both these blocks are the translation of signals from
ALSA concerning changes of data for external alarm receivers and updat-
ing of the hardware. In the opposite direction, when an external alarm sen-
sor indicates a fault, the functions filter out non-persisting fault indications
and send a signal containing alarm information to ALSA if the fault per-
sists.
Block AL controls the alarm panels and scanning interface (SCAN). It
receives changes in alarm status from block ALA. The lamp on the alarm
panel is not extinguished until no alarms of that class and category remain.
The block also contains the function for control of the attendance indica-
tors and alarm panels depending on attendance.
Block ALIM provides maintenance functions for the ALI. The block con-
sists of software in the CP and the hardware of the ALI. The ALI controls
the alarm panels and scanning interface by receiving signals from block
AL.
If the CP stops for some reason, no alarms can be issued in the exchange
or sent to the OMC. In this case, the ALI will alone generate alarm infor-
mation (the Exchange Alarm) to the alarm panel and over the Scanning
Interface to the OMC. The Exchange Alarm is the final channel provided
by the Scanning Interface.
The ALI can also contain receivers for the information detected by the
external alarm sensors.The information received is sent to block EXAL2.
ALIM has the following functions:
• storing the equipment alternatives of each ALI
• supervising the ALI’s and issuing alarms on ALI fault detection
• isolating and testing of ALI functions.
R1B 119
AXE IO System, IOG 20
ALCO is the final alarm handling block in the CP. ALCO receives alarm
information from the module ALARMADM in the SP. ALCO thus han-
dles alarm information concerning faults in the SPG.
Block ALCO stores the information for all SPG alarms in a list and initi-
ates and ceases alarms in the same way as any other alarm user, as
described above. It thus works with block ALA in a similar way to ALSA
when this block administrates external alarms.
Module ALARMADM is the interface in the SP to all alarm generating
blocks in the SPG. Faults occurring in the SPG are detected and analysed
by maintenance functions in the SPG itself and alarm information is sent
to ALARMADM. The information is transferred to the ALCO block in the
CP as described above.
6.4.1 General
The assembly of printouts from the user blocks is one of the group of
alphanumerical administration (ANA) functions. This function is handled
by block AOT.
It should be born in mind when reading the following text that by IO
device is also meant:
• alphanumeric file device, i.e. AF device
• data link (with corresponding IO device), i.e. AMTP device.
120 R1B
MCS applications
<IOROL:PRCA=0&&31,IO=AT-0,DTYPE=FIRST;
<IOROL:PRCA=0&&31,IO=AT-4,DTYPE=NEXT;
<IOROL:PRCA=0&&31,IO=AT-2,DTYPE=NEXT;
A T-2
AT-0 AT -4
Figure 6.9
Device chain
The parameter DTYPE in the command IOROL is used to define the posi-
tion of each device in the device chain. The command must be given once
for each device.
For the first device, DTYPE has the value FIRST, for the second and
third devices, DTYPE has the value NEXT.
R1B 121
AXE IO System, IOG 20
The sequential order in which the devices are specified will determine
whether the device is the 2nd or 3rd device in a chain.
DTYPE=STB
DTYPE=STB
HD
AT-10
AFFILE-2
AT-2
AT-0 AT-4
Figure 6.10
Device chain with standby devices
For each device a standby device can be defined. DTYPE has the value
STB for a standby device.
Thus, in a chain of maximum size, the command IOROL must be given
six times: once for each device and once for each standby device. The
PRCA parameter is only given the first time i.e when DTYPE=FIRST is
specified.
The parameter COND in IOROL is used to define which of the devices in
the chain or chains is to receive the printout linked to the printout catego-
ries.
For each DTYPE, the device is assigned a value for the parameter COND,
as follows:
0 means that printouts will also be routed to the next
device in the chain.
1 means that the printout will only be routed to the
next device in the chain if the device (with
COND=1) is unattended (attendance: see below.)
2 means that printouts are never sent to the next
device in the chain.
It should be noted that the when defining the third device in the chain, the
parameter COND can be omitted as this is the last device.
When defining a standby device - DTYPE=STB - then the parameter
COND may not be given.
122 R1B
MCS applications
Thus whereas parameter DTYPE is used to define the chain, COND is used
to define which device(s) in the chain receive the printout.
Two further parameters of command IOROL are required to complete the
printout routing definition: CLASSA and CLASSUA. These parameters are
assigned to each device to determine which printouts belonging to the
printout category(ies) shall be output. This is done by using the printout
class, PCL, concept.
As well as belonging to a printout category, automatically initiated print-
outs are assigned a printout class. Some printouts have several printout
classes, see example below.
PCL-0 for spontaneous printouts that are not alarms:
ALARM CLASS, ACLPRINTOUT CLASS, PCL
A1 1
A2 2
A3 3
O1 4
O2 5
PCL can have the values 0-5 and these are defined as follows:
• PCL-0 is for automatically initiated printouts that are not alarms
• PCL-1 to PCL-5 are for alarm printouts, PCL-1 being the highest prior-
ity (A1 alarms) and PCL-5 being the lowest (O2 alarms).
An example of printout classes for alarm printouts is shown in Figure 6.4.
When defining the devices in the chain, each device is assigned those
PCL’s for which a printout shall be output on the device. This is done by
means of the parameters CLASSA or CLASSUA.
CLASSA refers to Attended devices and CLASSUA refers to Unattended
devices.
Thus when a printout is routed to a device, a check is made to see if the
PCL for the printout agrees with the CLASSA or CLASSUA value for the
device.
It should be noted that if CLASSA or CLASSUA is not specified, then all
printout classes will be output. CLASSA=6 or CLASSUA=6 can also be
specified. This means that no printouts will be output.
The parameter NOSYST can be given to indicate that no system defined
standby device exists for that device. If the parameter is not specified, the
default value is that, in addition to any specified standby device, the device
also has a system standby.
All the above parameters belong to the command IOROL. Once the data
for a given PRCA or PRCA’s has been defined for each device using
IOROL then the data must be entered into the device tables by the com-
mand IOROI.
R1B 123
AXE IO System, IOG 20
124 R1B
MCS applications
When working with the definition of printout routing data, quite complex
solutions are sometimes required - especially when routing of alarms to
different Operational and Maintenance Centres is required. The automatic
printout of alarm status - indicating changes in ongoing alarms - and heart-
beat supervision signals from the CP are also routed to the OMC.
It is important to follow the relevant OPI when defining printout routings.
The definition of printout routings is covered in the OPI ‘Printouts, Spon-
taneous, Route’.
The function is handled by the block SEC2.
R1B 125
AXE IO System, IOG 20
126 R1B
MCS applications
If unattended then the alarm panel will not receive any alarms - it will be,
in effect, switched off.
Alarms status printout and heart beat information is constantly sent via a
data link to the OMC using printout categories 47 and 35 even if the
exchange is unattended. The alarm status printout also contains attendance
information. Thus visual information on alarm status at all supervised
exchanges is always available at the OMC independent of control room
attendance status at the different exchanges.
Attendance for a device is defined by the command
<IODAC:ATT;
Unattendance is defined by the command
<IODAC;
The command must be given from the device that is to be attended/unat-
tended.
To simplify matters, devices can have so called common attendance. This
is defined for the devices when they are defined, by the command:
<IOIOI:IO=AT-4,COMMATT;
When changing the attendance status of a common attendance IO device
by use of command IODAC, all other common attendance IO devices will
also change status.
The attendance status is also indicated by the ‘ATT’ lamp on the alarm
panel.
When changing attendance status the OPI ‘Change of Attendance Status
for Control Room and IO Device’ should be used.
6.7.1 General
Printouts can be routed to a number of alphanumeric devices, either locally
in the exchange or over a data link to an operation and maintenance centre,
OMC.
However, some printouts are so long that they are often unsuitable for out-
put on an alpha device. Such printouts - e.g. statistics, CP error interrupts,
the printouts received in connection with the execution of command files,
etc. - sometimes occupy IO devices unnecessarily.
Other types of printouts must be stored at the exchange and may even be
required at another location, e.g. an OMC, either directly or at some later
time.
For all these types of printouts it is convenient to output the information
directly to a file on hard disk.
R1B 127
AXE IO System, IOG 20
Command example:
<IOIOI:IO=AF-3;
<IOAFC:FILE=AFFILE-3,IO=AF-3;
AT
AXE
Printout
....
... HD
...
.
File=AFFILE-3
Figure 6.11
Alphanumeric file
128 R1B
MCS applications
R1B 129
AXE IO System, IOG 20
130 R1B
MCS applications
R1B 131
AXE IO System, IOG 20
132 R1B
MCS applications
STDEP
AT PRINTOUT
CACLS AXE Logfile on hard disk
....
DATE TIME IO USER
STDEP
EXROI PRINTOUT
AT PRINTOUT CACLS
SYREI ....
PRINTOUT
DATE TIME IO USER
EXROI
LAFBP PRINTOUT
AMTP ALARM SYREI
... PRINTOUT
INFUI
DATE TIME IO USER
...
LAFBP
ALARM
...
INFUI
...
DATE TIME IO USER
Figure 6.12
MCS transaction log
A transaction log file can be defined to log data according to one of the
following types of logging criteria:
• Logging of all IO device transactions excluding certain printout catego-
ries, PRCA, if required
• Logging of all commands and result printouts on IO devices (like above
but without spontaneous printouts like alarms)
• Logging of printouts by printout category, PRCA
• Logging of log on attempts to IO devices
Only one of the listed types of logging criteria can be defined per log file.
In addition to this an exclusion may be added to each logging criteria:
• Exclusion of certain commands in combination with logging criteria
Up to five log files can be active at the same time. Each file must have a
unique name.
R1B 133
AXE IO System, IOG 20
The transaction log files are composite sequential files. The files must be
created before any logging conditions can be defined. Unlike the com-
mand log file, the transaction log files are not system dependent and can
have any name.
The transaction log files are normally defined in the volumes where statis-
tics data is recorded. The volume is preferably duplicated and must have a
certain size as the transaction log may store huge amounts of alphanumeric
data.
The operational instruction ‘MCS Transaction Log’ describes how to set
up, change and remove logging conditions and also how to deblock (acti-
vate) the log.
How to set up the MCS transaction log is market dependent and it may be
configured according to the local needs. A few things could be recom-
mended:
• Never log the transactions of the terminal which is connected to the
alarm interface. This device sends out ‘printouts’ which are orders to
the alarm panel and receives ‘commands’ which are input from the
external alarm interface. This information is not alphanumeric and is an
unnecessary waste of space in the log.
• Never log the transactions on a IO device which is connected to an
authentication centre in the GSM mobile network. The traffic on such
an IO device is very high and consists of ‘garbage’ from an alphanu-
meric point of view.
• Exclude the printout category for the heart beat printout, HB. If the
heart beat function is active this printout is emitted continuously. The
printout category is parameter set in block ALA, usually 35.
• In some markets the logging of the restart data and system restart print-
out is kept in a log of its own. Since this log contains very little data it
may be stored for a long time on the hard disk and can therefore serve
as a record when measuring the ISP. The printout category is 32 and
this includes CP, EMRP and RP restart as well as Error Interrupt in
APZ 212 20.
The logging of this printout is then preferably excluded from other logs.
• If the alarm status function is used (i.e. the alarm status printout is con-
tinuously sent to operation and maintenance centre), that printout is
preferably excluded. The printout category is 47.
Command example:
< IMLCT:SPG=0;
: MCTLS:FILE=TLOG,FILEDUR=72,IO=AT-0&AT-2&AT-4&
AT-5,XPRCA=32&35&47;
: MCTLS:FILE=TLOGRESTART,FILEDUR=240,PRCA=32;
: MCTLS:FILE=TLOGON,FILEDUR=120,LOGONS;
: MCTBE:FILE=TLOG;
: MCTBE:FILE=TLOGRESTART;
: MCTBE:FILE=TLOGON;
134 R1B
MCS applications
: END;
Command example of setting logging conditions. The first condition logs
all commands, printouts and alarms except the alarms of printout catego-
ries 32, 35 and 47. The second logs restart data only. The third logging
condition is only relevant if the authority system is used.
The log is deactivated by the command MCTBI.
The transaction log files are composite files with the record length 256
bytes. The function automatically creates a new subfile every hour. The
command parameter FILEDUR determine the file duration in hours, i.e.
the number of subfiles to be used. A maximum of 250 subfiles can be cre-
ated. When the specified time has expired the oldest subfile is deleted.
Thus, every hour, one new subfile is created and one is deleted, which
implies that the number of simultaneously kept subfiles, in one mainfile,
never exceeds the file duration value.
The subfile name indicates which time period the subfile contains logging
data for. The log subfile name construction is “ymmddhh” where “y” indi-
cates year, “mm” indicates month, “dd” day and “hh” hour.
By using File Process Utility, FPU, the transaction log subfiles can be sent
automatically to an operation and maintenance centre via data link.
The infinite files function is never used with MCS Transaction Log.
R1B 135
AXE IO System, IOG 20
AGKDI
Hard disk in IOG20, SPG0 PC or WS
EXRPI
EXROI
printout
printout
File
Encryption
Figure 6.13
Exclusion of printouts and commands
This file is loaded in SPG0 and encrypted before being stored on the hard
disk. This file is read by the MCS Transaction Log after restart and the
indicated commands and printouts excluded.
Since the file is encrypted there is no way to read the file and which com-
mands and printouts are excluded cannot be printed by command.
136 R1B
MCS applications
AT
AXE Logfile on hard disk
DATE TIME IO USER
STDEP
PRINTOUT
AT
CACLS
....
DATE TIME IO USER
EXROI
PRINTOUT
AMTP
SYREI
PRINTOUT
STDEP
PRINTOUT DATE TIME IO USER
CACLS EXROI LAFBP
.... PRINTOUT LAFBP ALARM
SYREI ALARM ...
PRINTOUT ... INFUI
INFUI ...
... DATE TIME IO USER
Figure 6.14
Search in transaction log
R1B 137
AXE IO System, IOG 20
ORDERED
: END;
This command will give a printout of all logon attempts (successful and
unsuccessful) from the terminals AT-2, AT-3 and AT-4 from midnight to
12:00 the current day. The search result will be printed on terminal
AMTP-2.
6.9.3 Implementation
The function is handled by the four modules TLOG, TLOGADM, TLOGS
and TLOGSADM.
The file TLOGCOND on hard disk stores the logging conditions.
138 R1B
MCS applications
R1B 139
AXE IO System, IOG 20
Command example:
<IOLRC:IO=AT-5,PRI=EMERGENCY;
In the example above the priority of IO device AT-5 is set to the highest,
emergency, indicating no load regulation at all. The definitions are printed
by command IOLRP.
6.11.1 Implementation
Block LRCIO.
140 R1B
7. MCS - Command handling
Chapter Objectives
After completing this chapter the student will:
• Explain the purpose of the entry commands used with IOG 20
• Name the entry commands for the different subsystems
Figure 7.1
Chapter Objectives
7.1 Introduction
This chapter describes command handling in AXE.
R1B 141
AXE IO System, IOG 20
SP CP
Alphanumeric terminal
Command
AT
Printout
Figure 7.2
Handling of CP commands
Entry Entry
a) c)
command command
AT SPG0 CP AT SPG0 CP
Printout Printout
b) Subcommand
SPG1
AT CP
SPG0
Printout d) Subcommand
AT
SPG0 CP
Printout
SPG1
Figure 7.3
SP command handling
a) Entry command and printout, SPG0
b) Subcommand and printout, SPG0
c) Entry command and printout, SPG1
d) Subcommand and printout, SPG1
142 R1B
MCS - Command handling
Note that terminals may be connected to LUM in SPG0 only. SPG1 does
not contain subsystem MCS.
Whether a command is implemented in CP or SP is in many cases indi-
cated in the command description. The operator usually knows this by
heart.
The entry command is also called a path building command i.e. it is used
to set up a path from the CP to the required command receiving block in
the required SPG for the following command sequence. The dialogue is
then carried out from the terminal side using so called subcommands.
Command example:
<IMMCT:SPG=1;
This entry command builds a path from the CP to SPG 1.
Entry commands are analysed in the normal manner by the ANA blocks in
the CP. Thus user authority and terminal authority verification can be pro-
vided by the ANA blocks for these commands.
Each entry command owns a given set of subcommands, so once an entry
command has been given correctly any of these subcommands can be
entered. During the dialogue with a certain entry command no other com-
mands can be given but the sub commands belonging to this particular
entry command.
The subcommands thus pass from the SP to the CP where they are directed
to the required SPG. The handling of the subcommands in the CP depends
on the entry command.
The printouts are sent back to the terminal on the same path.
An exception to the above (Figure 7.3 b) is the special case of certain large
result printouts received from the SP in own SPG. These can be sent
directly to the terminal from the SP without going via the CP in order to
gain CP capacity.
For MCS, DCS and several SPS user function blocks in the SP, a group of
MCS modules in the SP (MESSTRANS, COMANA and PRINTSERV)
have the same function in the SP as the ANA blocks in the CP. They per-
form the necessary interface between the incoming commands/outgoing
printouts and the user blocks.
R1B 143
AXE IO System, IOG 20
144 R1B
MCS - Command handling
7.4 Subcommands
To each of the entry commands belongs a set of subcommands. These are
also found in the Command Descriptions in the B-Module.
When a subcommand is entered with the necessary parameters (if any)
answer printouts are received in exactly the same way as with CP com-
mands. After each of these printouts a new colon is given so that a new
subcommand can be entered, and so on.
To end the dialogue the subcommand END must be given.
After this subcommand the communication returns to the CP and the ready
mark is obtained. Normal CP commands can now be given. A new entry
command must be given if a new session between the CP and an SPG is to
be initiated.
Then the procedure printout ORDERED is received in answer to a subcom-
mand, the dialogue must first be terminated before the terminal can be
released. Thus the subcommand END must be used.
After receiving printout EXECUTED the terminal can be released and the
result printout obtained.
As the dialogue has been terminated, if one wishes to continue with sub-
commands belonging to the original entry command then the entry com-
mand must be given again before it is possible to continue.
R1B 145
AXE IO System, IOG 20
Commands
AT
SP CP
Printouts
Figure 7.4
Local mode
146 R1B
MCS - Command handling
Within the SP software exists part of the CPT function (Central Processor
Test system). This software - a number of Maintenance Subsystem mod-
ules - allows us to access CPT hardware in the CP in order to facilitate
testing and loading of the CP from hard disk.
To do this we must use a set of CPT commands. To be able to give CPT
commands the SP must be accessed in local mode.
To use local mode a command is used: MCLOC. Access in local mode can
be made from any terminal having authority for this command.
At loss of contact with the CP for any reason the messages:
CP UNAVAILABLE, ENTER EXIT OR MCLOC or
CP SB UNAVAILABLE, ENTER EXIT OR MCLOC
is given. The command MCLOC will always be accepted provided that the
SP is running. The sequence is given below:
<MCLOC:USR=XUJING,PSW=CRYSTAL;
:
:EXIT;
EXECUTED
<
USR and PSW correspond to the operator’s user name and password
defined in the MCS User Directory.
A master user and password are defined in the initial data but can be
removed by the administration.
Commands can now be given to the support processor in the own SPG. It
should be noted that MCS, DCS, STS or RMS subcommands require no
entry command when issued in local mode.
The subsystem FMS has its own specific entry command and thus with
this subsystem the entry command must be given when FMS is to be
accessed in local mode.
The subsystem SPS is not accessible when accessing the SP in local mode
in the above manner.
Local mode can also be attained by making use of the local terminal men-
tioned earlier. If, for instance, all Line Units are blocked then no access
can be made to the system.
A terminal connected to the CPU60 board in the SP could be used to give
SP commands to deblock the LU’s.
When entering local mode using a local terminal then the command
MCLOC is not required.
All four subsystems can be accessed in this case. The entry commands for
SPS and FMS can be given without the SPG parameter.
R1B 147
AXE IO System, IOG 20
The AT must be working with capital letters in this case. If contact is lost
during a command sequence, then the terminal must be switched to TTY
mode and semicolon entered. On reception of the ready mark return to
buffer mode.
An important difference to notice between normal mode and local mode of
access is that when a terminal has to be released in local mode then the
command EXIT must be used. To return to local mode the command
MCLOC must be used again.
It is not usually necessary, however, to release a terminal on receiving
ORDERED when accessing in local mode. This depends on the command
used.
When working with a local terminal or with suitable authority on an IO
terminal the command HELP can be used to print all commands that can
be used in local mode.
148 R1B
8. DCS Applications
Chapter Objectives
After completing this chapter the student will be familiar with:
• The structure of DCS with line units and ports
• The commands and HW implementation
• The interfaces and protocols supported in IOG 20
• How to define a terminal in the AXE system
• How to define a data link
Figure 8.1
Chapter Objectives
8.1 Introduction
This chapter describes the different functions of the data communication
subsystem, DCS. DCS functions are also described in the next chapter.
R1B 149
AXE IO System, IOG 20
150 R1B
DCS Applications
USER USER
7 APPLICATION APPLICATION
6 PRESENTATION PRESENTATION
5 SESSION SESSION
4 TRANSPORT TRANSPORT
3 NETWORK NETWORK
2 LINK LINK
1 PHYSICAL PHYSICAL
PHYSICAL MEDIA
Figure 8.2
Open Systems Interconnection model
In the OSI model, the users (i.e. programs) at either end of the physical
connection are connected via the seven layers as shown in Figure 8.2. The
physical layer, is normally implemented in hardware only, but in some
cases - e.g. IOG 20 - software exists to support and supervise the hard-
ware. The other layers consist only of software.
Each layer performs specific functions and is independent of the other lay-
ers, apart from a well-defined interface to the layers directly above and
below. A layer can be changed without affecting the other layers, thus pro-
viding flexibility which, in turn, simplifies the interconnection of different
datacom systems.
R1B 151
AXE IO System, IOG 20
7 user data
APPLICATION APPLICATION
6 user data
PRESENTATION PRESENTATION
5
SESSION user data SESSION
4
TRANSPORT user data TRANSPORT
3
NETWORK user data NETWORK
2
LINK user data LINK
1
PHYSICAL user data PHYSICAL
Figure 8.3
Sending of data or message from A to B
Each layer provides a service to the layer above. A message from a user
program arrives at layer 7 where control information is prefixed by the
protocol for use by layer 7 at the other end. The message with this addi-
tional data is sent on to layer 6 where more information is prefixed and
then the message is sent on to layer 5 and so on.
At the receiving end, the control information is removed by each corre-
sponding layer until the original message can be sent by level 7 to the
required user. The layers are thus transparent for the data being sent from
user to user.
Layers 1-4 are used to set up a path from one user to another - they are net-
work dependent. Layers 5-7 define and maintain the communication
between the users - they are application dependent.
Layer 7 functions as an interface between the user programs and the net-
work, i.e. it gives the user access to the network services. It is, as such, the
network communication program as seen from the user’s point of view.
152 R1B
DCS Applications
Note that terminals may also be connected to an AXE exchange via MCS,
this in the case of terminals connected to EMRP.
Note that the CPT communication is not done via DCS but via RPS, for
some versions of APZ 211. Most versions of APZ 212 use DCS for CPT
communication.
CPT - Central Processor Test.
SPG
0
NPAIR EXSB
NODE CM STATUS STATE NODE CM STATUS STATE HDSTATE
1 A 1 WORKING NORMAL B 2 ISOLATED BLOCKED CORRUPT
END
R1B 153
AXE IO System, IOG 20
NP = CM-LM-LU-NP
PP = CM-LM-LU-PP
LU - Line Unit PP, NP - ports
VSA
RPV2
ESDCV
LUM
LUM
LUM
LUM
ALCPU
ALEXP
OD drive (5 1/4”)
Figure 8.4
DCS hardware
154 R1B
DCS Applications
Each line unit has its own VME-bus address. The address is the same as
the line unit index and is strapped on the LUM board. The only allowed
strapping addresses are 1, 2, 3 and 4 from left to right.
CPU60
VSA
RPV2
ESDCV
LUM
LUM
LUM
LUM
ALCPU
ALEXP
OD drive (5 1/4”)
Figure 8.5
Line unit addressing
Command examples:
<IMLCT:SPG=2;
:ILLUI:LU=33-2-1,CHAR=79;
:END;
<IMLCT:SPG=0;
:ILLUI:LU=1-1-4,CHAR=79;
:END;
In the command examples above the line units 1 and 4, located in the B-
node of SPG2 and the A-node of SPG0 are defined. The line units are sin-
gle (non redundant).
A line unit can take the status:
• Working Executive or Standby - WO/EX, WO/SB
• Manually Blocked - MBL
• Hardware Blocked - HBL
• Conditionally Blocked - CBL
• Automatically Blocked - ABL
The status of the line units is printed with command ILLUP.
R1B 155
AXE IO System, IOG 20
If a higher security is required the line unit may be defined as a twin (or
redundant) line unit.
SPG0 SPG0
Node A Node B
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
‘Y’-cable
Figure 8.6
Twin line unit
In a twin (or redundant) line unit, two line units in different nodes of one
SPG, are defined as one line unit. The purpose of having twin line units is
security. If something would malfunction in one node the traffic is auto-
matically switched over to the line unit in the other node. When the IOG
20 is started up, line units 1-1-1 and 1-1-2 are already twinned with the
line units 1-2-1 and 1-2-2 respectively.
Example: LU= 1-1-3 and LU=1-2-3 could be defined as being one twin
line unit.
Command example:
<IMLCT:SPG=0;
:ILLUI:LU=1-1-3,CHAR=79,TWIN;
:ILBLE:LU=1-1-3;
:ILBLE:LU=1-2-3;
:END;
In the command example above the logical line unit 1-1-3 is defined as
twin and the physical line units, 1-1-3 and 1-2-3 are deblocked.
156 R1B
DCS Applications
8.5.4 Port
The ports of DCS implements the interface towards data links, terminals
or CPT.
The ports are implemented on daughter boards attached to the LUM board.
There are four kinds of daughter boards, implementing different communi-
cation interfaces, as below:
V V.24/V.35/V.36/X.21
G G.703 E0 (64Kbps)
E G.703 E1 (2Mbps)
T Ethernet ***
*** Note: The optional ethernet connection (“T”), is not introduced as an
orderable product at the first IOG 20 release.
Each LUM board holds four ports.
Mother Screws
board
Daughter
board
.
.
. . .
. .
.
Each daughter board
implements
one physical port
Figure 8.7
LUM board
R1B 157
AXE IO System, IOG 20
PP = 17-1-1-1
PP = 1-1-1-1
PP = 17-1-3-4
PP = 1-2-1-1
PP = 1-2-4-4 PP = 17-2-4-1
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
LUM
Figure 8.8
Port designation SPG0, SPG1
When defining a port not only layer 1 but also the layer 2 and 3 character-
istics are specified. There are a number of different parameters related to
the three layers that may be modified for each port or link. The OPI ‘Sin-
gle Link Port, Initiate’ gives recommendations and explanations to all
158 R1B
DCS Applications
R1B 159
AXE IO System, IOG 20
The logical link ports 1-2-4-1-1, 1-2-4-1-2, 1-2-4-1-3 and 1-2-4-1-4 are
defined SDLC interface. Layers 3 and above are controlled by the Central
Processor Test function.
Note that the command ILLLC may change the characteristics of the logi-
cal link ports or physical ports (related to CPT ports).
The ports are blocked and deblocked by commands ILLBI and ILLBE,
and removed by command ILLLR.
The status of logical link ports is printed by command ILNPP.
8.6 Implementation
Modules PORTADM, LME, CMMAN and LUMAN. Files CMFILE,
LUFILEx and PEFILEx on hard disk (x indicates the SPG number).
MCS FMS
Users in SP
7 ATP
Ericsson MTP FTAM
6 Presenation (6)
X.29
5 Session (5)
4 X.224 RFC1006
3 X.28/X.3 X.25
Network (3)
TCP/ IP
Data Link (2)
2 SDLC HDLC / LAPB
Figure 8.9
AXE IOG 20 protocols and interfaces
160 R1B
DCS Applications
R1B 161
AXE IO System, IOG 20
8.6.2 Layer 2
Layer two in the OSI model is the Link layer. It provides reliable transfer
across the physical links. It establishes the beginning and the end of blocks
of data (with synchronisation), error detection and link flow control.
8.6.3 Layer 3
Layer three in the OSI model is the network layer. Here AXE supports
three protocols:
• X.25
• X28/X.3
• TCP (Transport Control Protocol)
The X.25 protocol is a packet switching protocol used by Ericsson MTP
and FTAM.
Asynchronous terminals access the IOG 20 via protocols X.28/X.3. The
asynchronous data from a terminal uses the X.28 protocol to access a
Packet Assembly/Disassembly (PAD)-function based on X.3 protocol.
162 R1B
DCS Applications
R1B 163
AXE IO System, IOG 20
8.7.1 Addressing
Basically, a network user is identified by a Network Terminal Number,
NTN.
An NTN could be compared to a telephone number in the telephone net-
work. Each country has its own numbering plan for NTN, just as they have
for telephone numbers.
An NTN has up to 15 digits, including of the prefix, called Number Direc-
tion, ND, which corresponds to the area code in the telephone network:
NTN =ND + internal digits
NTN=9873
NTN=905
NTN=94
Terminating function,
example X.29 or MTP
NTN=830968 Alphanumeric terminal
Figure 8.10
Addressing in data network
Structured number plans are used with routing cases and routes as in the
case of the B-Number Analysis tables for telephone traffic. The DCS digit
analysis may be compared to the B-number analysis table in TCS, where
the Origin for digit analysis, ODA, is the equivalent to the B-number ori-
gin, BO.
All ports in IOG 20 used for connection of AT devices are assigned net-
work terminal numbers.
Selection by name is an optional facility within the addressing service. By
this function, a name-to-address conversion facility allows the use of a
name, consisting of an alphanumerical identifier, instead of the NTN in the
selection information.
164 R1B
DCS Applications
ODA=0
ND
ODA=6
ND
7631 NEWODA= 0
7632 NEWODA= 0
7633 NEWODA= 0
7634 RC=127
7635 RC=127
....
7638 RC=127
7639 RC=127
ODA=99
ND
R1B 165
AXE IO System, IOG 20
76 NEWODA= 6
END
Command descriptions:
ILRAI The command defines number analysis data for a
given number direction, ND.
ILDAP The command gives a printout of number analysis
data for one or all number directions.
ILNAI The command is used to define a name for a pre-
defined NTN and insert the name and NTN in the
addressing by name analysis.
ILNAP The command is used to print the addressing by
name analysis data.
ILDNI Destination to network terminal relation.
ILDNP Destination to network terminal relation.
ILTEI Assigns a NTN to a network port, dedicated line.
ILTEP Prints NTN and terminals.
8.7.2 Routing
Routing of switched data traffic through the network is based on the NTN
address described above. The NTN is used to access a remote user, or a
name can be used if the selection by name facility is used.
The NTN is first analysed in the called address number analysis. The anal-
ysis is carried out by means of the number direction, ND, and indicates if
the called NTN is locally defined (terminating) or has to be reached by an
outgoing route. See fig. 9.11.
166 R1B
DCS Applications
Computer
Computer NTN=65392
NTN=42
ROT=76
ROT=75
ND=653:
RC=9, ROT=76, NP=1-2-3-1
ROT=75, NP=1-1-4-4
Figure 8.11
DCS routing
In the former case, the called NTN can correspond to either a terminal
reached by a dedicated line connected to a local Network Port in the
packet switch or to an internal software function within the packet switch.
In the latter case, a routing case, RC, is indicated. Each RC corresponds
to a unique destination directly connected to the own exchange, i.e. packet
switch. Each RC contains a list of routes toward the given destination.
Each route is identified by a routing number, ROT.
A routing case should include at least two routes. The first route defined in
the list is the primary. The other routes are alternative routes in case a call
cannot be established over the primary route.
A route may use one or several physical circuits, i.e. physical ports with
data links. To each route we thus define the network ports corresponding
to the data links in the route. A route should have at least two ports
defined. For a given route, the ports are chosen in the order that they are
defined.
After the called address, RC and route analyses, an idle network port is
thus chosen for the call. The destination (called) NTN complete with ND
is inserted by the network layer protocol into the message, together with
the calling NTN and sent on into the network.
The analysis can now be repeated at each switch in the network until the
final analysis at the terminating switch.
To define the data tables required for the analysis, the following com-
mands are used:
R1B 167
AXE IO System, IOG 20
168 R1B
DCS Applications
IOG20
X.29,
NTN=1015100
X.28/X.3 AT-7
NTN=1012104
Figure 8.12
Hot virtual circuit
Command example:
:ILPCI:NTNA=1012104,NTNB=1015100;
In the example above the network terminal number 1012104, which repre-
sents a terminal is connected to the network terminal number 1015100,
which represents the X.29 protocol in IOG 20. Each time a terminal sets
up a call towards DCS, i.e. when the operator starts using the terminal, a
connection will be established to the X.29 protocol. From there on the data
sent from the AT will be switched further on to the Asynchronous Termi-
nal Protocol OSI layer 7, and then passed on to MCS.
The circuits are printed with command ILPCP and removed with com-
mand ILPCR.
An example of a Hot Virtual Circuit is found in the definition of a port for
connection of an alphanumeric terminal. The network port and associated
X.28/X.3 protocols have to be connected to the Session Port X.29.
Direct call. The direct call function enables the setting up of a Switched
Virtual Circuit, SVC. The function assigns a B-side address (command
parameter DCALL) to the A-side address (command parameter NTN).
Command example:
:ILDII:NTN=9873562,DCALL=2984655;
The direct call function is removed from a certain NTN by command
ILDIR and printed with command ILTEP.
R1B 169
AXE IO System, IOG 20
170 R1B
DCS Applications
8.8.1 General
After initial start of IOG 20 line units 1-1-1 and 1-1-2 are already defined
and twinned with the line units 1-2-1 and 1-2-2 respectively. Further LUs
can be defined in the Data Transcript loaded after start up of the CP. The
number of LUs defined depends on the number required by the customer.
The ports 1-1-1-1, 1-1-1-2, 1-1-2-1 and 1-1-2-2 are defined in the initial
data. More ports can be defined in the DT at the requirement of the cus-
tomer.
R1B 171
AXE IO System, IOG 20
Check the line unit status. If the LU required is not defined, define it.
172 R1B
DCS Applications
NP = 1 - 1 - 4 - 1 NTN = 1 01 1 4 01
NP, PP
Line unit
Line module
Communication module
Always ‘1’
NP = 1 - 2 - 3 - 4 NTN = 1 01 2 3 04
NP, PP
Line unit
Line module
Communication module
Always ‘1’
Figure 8.13
Network terminal number convention
For ports defined for ATs, the value for parameter NTN consists of seven
digits and is constructed according to Figure 8.13. Note that this is the
internal number within the own IOG. (NTNs used for accessing remote
destinations over data links are constructed differently, as mentioned ear-
lier in the section on addressing).
:ILTEI:NTN=ntn,NP=np;
R1B 173
AXE IO System, IOG 20
The connection is now made between the NP (NTNA) and the SP (NTNB)
by the command ILPCI.
174 R1B
DCS Applications
<SAAII:SAE=344,NI=ni;
Check the IO device data records in the CP:
<SAAEP:SAE=800,BLOCK=AT;
If necessary, increase the size:
<SAAII:SAE=800,BLOCK=AT,NI=ni;
R1B 175
AXE IO System, IOG 20
In our case, the destination is the Session Port for Message Transfer Pro-
tocol (MTP) at the OMC. Each Session Port in a network is given its own
NTN. In IOG 20 this is done by use of the command ILSPI. At the desti-
nation AOM it would be defined using an AOM command.
ROT=1
IOG20
ROT=2
Routing in IOG20:
ND=15,RC=1
ROT=1
ROT=2 AMTP-n
Figure 8.14
Addressing in data network
For traffic in the opposite direction, it follows that, at the OMC, the Net-
work Port for the data link must be assigned the NTN of the MTP Session
Port at the home IOG.
The port defined below is a port in the home IOG. It will be a low speed
link: 19200 bit/s. The port is a single link port, SLP.
A corresponding Network Port must be defined in the DTE at the OMC,
using AOM commands.
Several OPIs exist for connection of data links to an IOG 20.
The connection below is performed in accordance with the OPI ‘ OMC
Using Message Transfer Protocol, Connect’
176 R1B
DCS Applications
:ILSLI:NP=np,RATE=rate,PROT=X25/V36;
The port is defined using protocol X.25 and interface V.36.
:ILNPP:NP=np,DETAIL;
:ILSLC:NP=np,TC=1-64;
All channels are defined as two-way channels.
X.25 data links contain many separate channels where each user is given
its own channel. TC: Interval range for the number of two way logical
channels - i.e. separate communication channels - in the link. Maximum
4095 separate channels can exist in the one link.
R1B 177
AXE IO System, IOG 20
178 R1B
DCS Applications
Using destination name (DEST) to get the destination NTN, the file is then
- in our example - sent on a dedicated line directly to the OMC from a port
having the same NTN as the destination.
If the destination AOM was to be reached by routing through the network
the following routing data would have to be defined as follows.
The NP in the home IOG is NP=1-2-2-1.
Define route:
<IMLCT:SPG=0;
:ILROI:NP=1-2-2-1,ROT=1;
Define routing case:
:ILRCI:ROT=1,RC=1;
Define Number Direction for Routing Case:
:ILRAI:ND=15,RC=1;
The file would now be routed through the network to destination in the
ILDNI command.
R1B 179
AXE IO System, IOG 20
180 R1B
9. Support Processor Subsystem
(SPS)
Chapter Objectives
After completing this chapter the student will:
• Know the hardware units included in SPS
Figure 9.1
Chapter Objectives
9.1 Introduction
This chapter describes functions in the support processor subsystem.
9.2 General
SPS is central to the work of the IOG in that SPS software implements the
program control of the Support Processor, the SP-CP communication
function and nearly all the maintenance functions for the SPG.
SPS has been looked at briefly in chapter two and three where the hard-
ware of the subsystem was described. In this chapter the above mentioned
software functions of SPS will be looked at in some detail. A brief recap of
chapter two is given first.
R1B 181
AXE IO System, IOG 20
182 R1B
Support Processor Subsystem (SPS)
Loading of SP modules from hard disk, starting of the software system and
restarts of SP software are also handled by the system executive.
The kernel is part of the EriOS.
SP HW administration administers devices connected to the SP such as
hard disks, flexible disks, etc.
Before an application program (e.g. in CHS) can perform any operations -
reading/writing on hard disk - the device administrator must be informed.
(Note that alphanumeric devices and data links are handled by subsystems
MCS and DCS).
Loading function is a complement to the PROM-stored bootstrap and the
loading function in the system kernel mentioned above. Briefly, it allows
modules to be designated as external so that they are only loaded from HD
to the primary memory when required.
The loading function is a part of EriOS.
Node communication is the function that supports the distribution of the
control system into two separate SPs (node A and B). It allows application
software functions to be partly located in one node, partly in the other, or
to be wholly located in both nodes.
The application processes can communicate via the Inter Computer Bus,
ICB. This function is implemented in both HW (on CPU60) and SW in
function block ENCS, Ethernet Network Communication System.
CP-SP communication will be covered separately in chapter 12.
SP statistics, Maintenance functions and SPS event log will be covered
separately in chapter 13.
SP exchange data administration, SP function change and SP software
module handling (including SP Backup) will be covered separately in
chapter 14.
The remaining functions are covered below.
9.5.1 General
The SP hardware administration function keeps a list of some of the hard-
ware installed in an SPG. This information is required by the HW driver
programs for operation and maintenance of each node.
R1B 183
AXE IO System, IOG 20
SP HARDWARE DATA
SPG NODE
0 A
END
The hardware table is loaded to the primary memory when the modules are
loaded from PROG_A or PROG_B at node reload. The hardware driver
programs in each node read the data in the table at each reload to find out
which, and how many, hardware units they have to drive.
The information in the hardware table is of special use to the driver pro-
grams during diagnostics and repair checks, when carrying out orders for
hardware tests. This will be covered in chapter 13 in the section on SP
diagnostics.
The hardware table may need to be changed from time to time, as and
when units are added to, or removed from, the node. This has to be done
by operator command. Each time a change has been made in the hardware
table, the node has to be reloaded to get the new table into the primary
memory.
The data in the hardware table for each unit is fairly complex and this
leads to an unusually complex command format. Therefore, to simplify the
handling of the table, a set of default data is already defined for each unit.
Thus, when making changes in the hardware table, only the name of the
unit has to be given. The rest of the data is fetched from the default data.
The default data is stored in a second table: the SP Hardware Default
Table.
184 R1B
Support Processor Subsystem (SPS)
Command
Hard disk IMHWP
A-node Volume Volume
PROG_A OMFZLIBORD
Default SP HW SP HW
SP HW table table
table
Primary Commands
memory IMHWI,
A-node IMHWC
Executing
SP HW
table
Figure 9.2
SP hardware table
At start up of an SPG, the hardware tables for each node and the default
table are thus identical. Those units that are not included in the actual
nodes must be removed from the hardware tables.
Thus in a working IOG20, the default table has the same format as the
hardware tables, but normally contains data about more units than those
found in the hardware tables. It contains default information for all possi-
ble units in the IOG20.
Default SP hardware data:
SP HARDWARE DATA
SPG NODE
0 A
R1B 185
AXE IO System, IOG 20
END
A simple printout of the hardware connected is obtained in the IO UNIT
MODES printout from command INIOP. The printout lists the units in the
node an their status (parameter OPMODE). The status may be READY or
BLOCKED. The status is controlled automatically by the system or by
commands BLSUI and BLSUE.
IO units:
:INIOP:NODE=A;
IO UNIT MODES
SPG
0
END
9.5.4 Operation
When the SPG is started, the hardware table must first be changed to
match the actual configuration. All changes in the hardware and hardware
default tables are made by commands. The procedures to be used are given
in the OPI: ‘Hardware in SP, Administration’.
The commands used are fully allocated in the SP and are assigned to the
path building command IMLCT.
To remove a hardware unit, e.g. OD-1, then the command IMHWR is used:
:IMHWR:NODE=B,UNIT=OD-1;
At a later stage it may be decided to add HD-3 to each node. Data for these
must be added to the hardware table for each node.
To add a new hardware unit or units, e.g. HD-3, the command IMHWI is
used:
:IMHWI:NODE=A,UNIT=HD-3;
After the command IMHWI a reload must be initiated in the influenced
node.
186 R1B
Support Processor Subsystem (SPS)
To print the data defined in the hardware table for a given node, the com-
mand IMHWP is used:
:IMHWP:NODE=A;
This gives the printout SP HARDWARE DATA, see Figure 9.2 for an
example.
It may happen that a new unit that does not have any data defined in the
module SPHWADM has to be added to the SPG. This means that no data
for the unit exists in the hardware default table.
The command IMHWI cannot be used alone in this case. If given, the com-
mand will result in a fault code and printout UNIT NOT DEFINED. This
means that the unit has to be defined first in the default table.
To define a unit in the default table the command IMHWL is used. The def-
inition is rather complex because of the nature of the data. However, it
should be remembered that this command is only given very rarely, and if
the command is needed the parameters would be supplied to site by Erics-
son together with the hardware unit(s).
After the command IMHWL has been given successfully, the command
IMHWI can then be given.
A more likely case than the above is the case of the default data for a unit
being incorrect and having to be changed, or when a unit is replaced by a
unit with different data. Changes to the data in the default table are made
by the command IMHWC. The parameters are the same as for the command
IMHWL and would be supplied by Ericsson.
An example is given below:
: IMHWC:NODE=A,UNIT=HD-3,NAME="DISK_SC",
UFIELD="H31001",INDEX=3;
Here, the default data for HD-3 has been changed.
An explanation of the parameters is given in the command descriptions
and the adaptation direction in the B-module. The adaptation direction is a
key document when defining the SP Hardware table.
9.5.5 Implementation
The function is handled by the function block SPHWADM which consists
of two modules: SPHWADM and SPHWTABLE.
The module SPHWADM administers the function. The module SPH-
WTABLE contains a table called the SP Hardware Table. This table thus
exists in the primary memory and in the volumes PROG_A and PROG_B
on the hard disks. The module SPHWTABLE also contains an interface
that enables reading and writing in the table on hard disk.
The files SPHWADAPT0 and SPHWUNITS0 in volume OMFZLIBORD
are used to store the SP hardware table in SPG0. The last character in the
file name identifies the SPG.
R1B 187
AXE IO System, IOG 20
188 R1B
10.Start of SPG
Chapter Objectives
After completing this chapter the student will:
• List the different parts of the software package required at startup
of an SPG
• Carry out a cold start of an SPG using OPI ‘SPG, Start’
Figure 10.1
Chapter Objectives
10.1 Introduction
This chapter describes the procedure and functions of the initial startup of
the AXE IO system.
10.2 General
Once all hardware has been installed in the exchange and the cabling con-
nected and tested then the first step in starting up the exchange is the start-
ing of the IOG20. Once this is running then the APZ can be started using
the functions of the IOG.
Starting an IOG20 implies starting up the nodes of each SPG in the IOG.
Note: Start of an SPG involves function change procedures. This chapter
has been written to be sufficient for an understanding of function change at
start up of an SPG. Function change is covered in more detail in chapter
14.
R1B 189
AXE IO System, IOG 20
190 R1B
Start of SPG
10.4 Requirements
The requirements for starting up the IOG once the hardware is installed are
as follows:
• a work order containing data about the volumes that are to be created on
R1B 191
AXE IO System, IOG 20
10.5 Procedure
As mentioned earlier the procedure differs slightly depending on whether
a cold start of the SPG is to be performed at installation, OPI ’SPG,
START ’, or whether one or both nodes are to be started singly during
operation, as described above. The latter case is described in the OPI
‘SPG In Single Node, Start’.
A summary is given below for the second case, where one node is started.
In the summary, node B is working as executive and node A has to be
started after the replacement of the hard disk containing the SP software.
The local terminal is first connected to the CPU60 board in the node to be
started and set for TTY (teletype) mode and capital letters.
After inserting the disk STARTSn in FD-1, or OD-1, for the node, the
reset switch is flicked twice. A loading program called Bootstrap, on a
PROM on the CPU60 board, then reads the bootblock from the FD/OD to
SP primary memory.
The bootblock is a small area on the STARTSn disk reserved for the infor-
mation containing a pointer to the so called System Start Information,
SSI, file on the disk.
192 R1B
Start of SPG
The SSI contains the disk addresses (tracks and sectors) of the modules
that are to be loaded. Using this information the bootstrap program loads
the modules of the start system into the SP’s primary memory.
After a successful loading from STARTSn diskette or OD a message will
be received saying that the bootblock has been read from Index 01 or 02
respectively.
A restart of the node will take place after a few minutes and the printout
SP INITIAL SYSTEM RESTARTED will be obtained. The communi-
cation is started by entering a ‘CTRL-E’ character from the local terminal.
The loaded software allows commands to be given for:
• entering SP initiation mode, formatting the hard disks, preparing the
system defined volumes on the hard disk and loading the SP exchange
data to these volumes
• performing the required function change in SP, i.e. loading the SP soft-
ware to the relevant volumes on hard disk and creating the required sys-
tem that will be installed and loaded to the SP
The command ISMCT is given to enter SP initiation mode.
ISMCT is a path building command to the own SP. Its purpose is to stop
the following "dangerous" commands from being used by mistake:
ISMCT must be given first to start an initiating procedure.
In SP initiation mode commands are given for:
• formatting or reformatting the hard disk(s). There is no need to specify
faulty sectors manually. Command ISMEI.
• creating the volumes according to the work order. Command ISVOI.
Note: Creation of the volumes and the subsequent work can be done when
local terminal is in Buffer mode. If contact is lost in Buffer mode, return to
TTY and enter semicolon and ENTER. Then return to Buffer mode.
The command END is used to exit initiation mode.
The SP_INITD_n disk is now inserted in FD-1 or OD-1 and the command
SYSBT is given to load the SP Exchange Data files on the OMFZLI-
BORD volume.
Note: The above step is only really required when starting both nodes. If
only one node is to be started, then these files will be copied from the
duplicated volume when the node is deblocked.
The next step is to perform the function change in the SP, i.e. loading of
the SP modules and creation and installation of the system.
The function change at cold start or start of one node differs somewhat
from a normal function change (as it is described in chapter 14). During
normal function change, the CP is normally working and the SPG must be
fault free - we have a so called ‘large’, or ordinary, system. At cold start
the start system is used.
R1B 193
AXE IO System, IOG 20
194 R1B
Start of SPG
The System Description File also sets values for the deferred constants in
the programs.
Command example:
<FCSDL:IO=OD-1,IONODE=A;
The TRANSP_01 diskette is then removed from FD-1 or OD-1.
The System File (.SYS) is created next. Command FCSSI.
This file is created using the SDF, but it also contains the FMS addresses
(i.e. volumes and files) of the program modules on the hard disk. Thus
information for both boot loading and file loading is contained in the sys-
tem file.
It takes about 10 minutes to create the system (.SYS) file, which is then
stored in PROG_A in our case.
Command example:
<FCSSI;
The next step is to create the Remote Installation Files (RIF and SSR)
for the node. These files are normally created by FCSSI, but in a small sys-
tem they have to be created separately. Command FCSRI.
These files are to allow a node (here called remote source) to reload the
other node (here called remote) when the latter is unable to reload from its
own hard disk. The loading is then via the Inter Computer Bus (ICB).
The remote and remote source nodes are not defined by FCSRI as this
command has no parameters. The remote and remote source nodes are the
nodes defined earlier by the parameters RNODE and RSNODE respectively
in the command FCSLS.
The remote node will request the remote source node to load it and thus
this node must contain information saying which system is to be loaded to
the remote node. When RIF is asked by the remote node to be loaded, it
uses that node’s designation to determine which system is to be used. The
system name corresponds to a file name that is used as an address to SSR.
SSR is, in effect, the required SSI for the remote node, and can thus be
used to load that node. Thus each node contains an SSI for loading it’s own
system and an SSR for loading the remote node’s system. The systems are
normally the same, of course, in both nodes, but do not have to be.
The remote installation files take about 10 minutes to create. They are
stored in PROG_A in our case.
Command example:
<FCSRI;
The next step is to install the system. Again, installation of a system dur-
ing function change would normally be done by the command FCSSI,
but in a small system has to be performed separately. Command FCSII.
R1B 195
AXE IO System, IOG 20
Installing the system implies creating the SSI and storing the address to
this file in the bootblock area on hard disk in the node(s) specified earlier
by parameter LNODE in command FCSLS - node A in our case.
The SSI is needed for all types of reloading, manual or automatic. It con-
tains the absolute addresses (tracks and sectors) of the modules in the sys-
tem.
When the system is later manually loaded using the reset switch, the load-
ing is similar to that of loading the STARTSn diskette mentioned earlier.
The PROM-ed Bootstrap reads the bootblock from Index xx, i.e. from the
PROG_A or PROG_B volumes, and this gives the address to the SSI. The
SSI in its turn gives the absolute addresses to the program modules on the
hard disk so that these can be loaded to the SP.
It takes about 5 minutes to install the system. The SSI file is stored in
PROG_A in our case.
<FCSII;
The function change is now ended using command FCSPE.
<FCSPE;
Once the function change is complete then the software contained in the
newly installed system is reloaded to the SP by flicking the reset switch
twice.
The local terminal connection can now be removed if required.
The node status can now be checked by the normal command IMCSP. The
entry command IMMCT must be used first. Before giving the commands
from a local terminal press carriage return to gain contact with the system.
(The same commands can now be given from any other AT connected to
the IOG).
The standby node status should now be SB - ISOLATED/BLOCKED
The next step would be to deblock the node so that it will be updated from
the executive node.
<BLSNE:SPG=spg,NODE=standby;
During the deblocking the node states will be reloading, diagnosing,
updating, reloaded and normal. During the updating phase all files in the
duplicated volumes will be copied over from the executive node.
It should be noted that the updating must be a large update to transfer over
all the contents of the duplicated volumes from the executive to standby
node.
196 R1B
Start of SPG
grams as and when required. (An example is the list of file attributes
defined by INFII).
In the case of starting just one node as described above, all files belonging
to the other duplicated volumes are created during the updating of the node
from the executive node.
In the case of a cold start of an SPG, or when starting both the nodes sin-
gly (reinitialisation of the hard disks in both nodes), all files belonging to
the other duplicated volumes - e.g. the CP backup files - must be defined
by the operation staff. This can be done using a command file or by direct
use of the command INFII. Some comments on these cases are given
below:
As the CP is normally not running at a cold start of an SPG, then the com-
mand INFII and its entry command will have to be entered from the
local terminal or an AT using local mode. The attributes of the defined
files will in this case be written directly on the relevant hard disks of both
nodes.
Once the CP is started the file attributes are copied to the CP’s file table at
the CP system restart. Data about each defined file is thus stored both in
the CP software and on hard disk.
If the CP is running during reinitialisation of the disks in both nodes, then
the files would be defined in the first node to be started before this is
switched to executive. On starting the second node the files would be cop-
ied over from the executive node during updating.
If the CP is running, files should always be defined from an alphanumeric
terminal connected to a LUM board. In this way the file attributes are writ-
ten directly on the disks and in the CP data.
The command INFUI can always be used to adjust the CP’s file table so
that it corresponds to the file attributes defined on hard disk. This com-
mand is always performed automatically at a system restart of the CP.
R1B 197
AXE IO System, IOG 20
198 R1B
Subject to alterations without prior notice. Printed in Sweden.
Ericsson Telecom AB
MV/ETX/X/HCX
S-126 25 Stockholm, Sweden
Telephone: +46 8 719 9222 EN/LZT 101 1611 R1C
© Ericsson Telecom AB