You are on page 1of 221

2600-00CZ5YGAL

Ver. 2.0

410 LSM-R

User Manual
COPYRIGHT
This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright.
No information contained herein may be copied, translated, transcribed or duplicated for any commercial
purposes or disclosed to the third party in any form without the prior written consent of SAMSUNG Electronics
Co., Ltd.

TRADEMARKS
Product names mentioned in this manual may be trademarks and/or registered trademarks of their respective
companies.

This manual should be read and used as a guideline for properly installing and operating the product.

This manual may be changed for the system improvement, standardization and other technical reasons
without prior notice.
Updated manuals are available at:
https://systems.samsungwireless.com/

For questions on the manuals or their content, contact


NetSysTechWriter@sta.samsung.com

©2011 SAMSUNG Electronics Co., Ltd. All rights reserved.


LSM-R User Manual

INTRODUCTION

Purpose
This Long Term Evolution (LTE) evolved UTRAN Node-B (eNB) Element Management
System (EMS) user manual describes the information necessary for using the LTE eNB
EMS, e.g., how to register and manage users and how to use the menus.

Content and Organization


This manual consists of 7 Chapters and 1 Annex.

CHAPTER 1. EMS Interface


Describes the GUI for the EMS, the basic operation method of the system, and Help.

CHAPTER 2. Configuration Management


Describes the functions to view, modify, add and delete the information in the NE.

CHAPTER 3. Fault Management


Describes the functions to manage the faults occurring within the system.

CHAPTER 4. Performance Management


Describes the functions to manage the features related to the performance of the network
resource.

CHAPTER 5. General Management


Describes the functions to setup, control and monitor the operating environment.

CHAPTER 6. Security Management


Describes the functions to register, modify, search and/or delete the operator to access the
EMS system. For security purpose, the access to the system will be limited to the registered
operators only.

© SAMSUNG Electronics Co., Ltd. I


LSM-R User Manual

CHAPTER 7. SON Management


Provides the menu for the operation of the Self Organizing Networks (SON), including the
monitoring of the DHCP and SON statuses and the setting of the variables used in the SON
algorithm execution.

ANNEX A. Open Source Announcement


Describes the open source announcement.

Conventions
The following symbols are used in this manual. The following types of paragraphs contain
special information that must be carefully read and thoroughly understood.

Checkpoint
Provides the operator with checkpoints for stable system operation.

Note
Provides references for additional information.

Revision History
Version Date of Issue Remarks

1.0 09. 2011. First edition


2.0 11. 2011. Revised according to UI and menu modified.

© SAMSUNG Electronics Co., Ltd. II


LSM-R User Manual

TABLE OF CONTENTS

PurposeI
Content and Organization .......................................................................................................................... I
Conventions............................................................................................................................................... II
Revision History ........................................................................................................................................ II

CHAPTER 1. EMS Interface 1-1

1.1 Connecting to EMS ................................................................................................................ 1-1


1.1.1 Login .........................................................................................................................................1-1
1.1.2 Logout .......................................................................................................................................1-3

1.2 Interface Configuration ......................................................................................................... 1-4


1.2.1 Menu Frame .............................................................................................................................1-5
1.2.2 Main Frame ..............................................................................................................................1-7
1.2.3 Tree Viewer Frame ..................................................................................................................1-7
1.2.4 Event Viewer Frame ................................................................................................................1-8
1.2.5 Event Viewer Frame ................................................................................................................1-8

1.3 Basic Operation ..................................................................................................................... 1-9


1.3.1 Button........................................................................................................................................1-9
1.3.2 Basic Settings...........................................................................................................................1-9
1.3.3 Sitemap...................................................................................................................................1-10

1.4 Network Viewer .....................................................................................................................1-11


1.4.1 Tree Viewer ............................................................................................................................ 1-11
1.4.2 Map Viewer.............................................................................................................................1-14
1.4.3 Rack Viewer ...........................................................................................................................1-19
1.4.4 Group Management ...............................................................................................................1-27

1.5 Help 1-29

CHAPTER 2. Configuration Management 2-1

2.1 CLI 2-1


2.1.1 CLI Configuration .....................................................................................................................2-1
2.1.2 Basic CLI Functions .................................................................................................................2-3
2.1.3 Command Window ..................................................................................................................2-7
2.1.4 History Window ........................................................................................................................2-9
2.1.5 Response Window .................................................................................................................2-10

© SAMSUNG Electronics Co., Ltd. III


LSM-R User Manual

2.1.6 Autonomous Window ............................................................................................................ 2-15


2.1.7 Batch Window ....................................................................................................................... 2-18
2.1.8 Macro Execution.................................................................................................................... 2-24

2.2 NE Grow/Degrow .................................................................................................................. 2-27


2.2.1 NE Grow ................................................................................................................................ 2-27
2.2.2 NE Degrow ............................................................................................................................ 2-29

2.3 Cell Management .................................................................................................................. 2-30


2.3.1 Cell Grow and Degrow.......................................................................................................... 2-30
2.3.2 Administrative State Modification ......................................................................................... 2-31

2.4 Neighbor................................................................................................................................ 2-32


2.4.1 Neighbor Management ......................................................................................................... 2-32

2.5 Software ................................................................................................................................ 2-36


2.5.1 Package Upgrade ................................................................................................................. 2-36
2.5.2 Verify ...................................................................................................................................... 2-38
2.5.3 Software Update.................................................................................................................... 2-40
2.5.4 Firmware Update ................................................................................................................... 2-41
2.5.5 History .................................................................................................................................... 2-43
2.5.6 Schedule ................................................................................................................................ 2-45

2.6 Data Audit.............................................................................................................................. 2-47


2.6.1 Data Audit .............................................................................................................................. 2-47
2.6.2 Scheduling Function for Periodical Data Audit .................................................................... 2-50

2.7 SerialNo Management .......................................................................................................... 2-53

2.8 System Backup ..................................................................................................................... 2-55


2.8.1 Backup ................................................................................................................................... 2-55
2.8.2 Restore .................................................................................................................................. 2-56
2.8.3 System Backup History......................................................................................................... 2-58

CHAPTER 3. Fault Management 3-1

3.1 Event Viewer ........................................................................................................................... 3-1

3.2 Viewing the Event History ..................................................................................................... 3-5

3.3 Current Alarm ......................................................................................................................... 3-7

3.4 Alarm Statistics .................................................................................................................... 3-10

3.5 Audible Alarm ....................................................................................................................... 3-12

3.6 Visible Alarm ......................................................................................................................... 3-14

CHAPTER 4. Performance Management 4-1

4.1 Performance Statistics........................................................................................................... 4-2

© SAMSUNG Electronics Co., Ltd. IV


LSM-R User Manual

4.1.1 Viewing Statistics Data ............................................................................................................4-3


4.1.2 Viewing Statistics Chart ...........................................................................................................4-5

4.2 Collection Results.................................................................................................................. 4-8

4.3 PI Monitoring .......................................................................................................................... 4-9


4.3.1 PI Search ..................................................................................................................................4-9
4.3.2 PI Registration ........................................................................................................................ 4-11
4.3.3 PI Modification ........................................................................................................................4-13
4.3.4 PI Deletion ..............................................................................................................................4-14
4.3.5 PI Monitoring ..........................................................................................................................4-15
4.3.6 PI Trend Graph .......................................................................................................................4-16

4.4 On Demand Statistics .......................................................................................................... 4-17


4.4.1 On Demand Statistics View ...................................................................................................4-18
4.4.2 On Demand Statistics Registration .......................................................................................4-19
4.4.3 On Demand Statistics Deletion .............................................................................................4-21
4.4.4 On Demand Statistics Monitoring .........................................................................................4-22

4.5 Call Trace .............................................................................................................................. 4-24


4.5.1 Call Trace Window Configuration..........................................................................................4-24
4.5.2 Call Trace List Management..................................................................................................4-25
4.5.3 Call Trace Registration...........................................................................................................4-27
4.5.4 Call Trace Deletion .................................................................................................................4-28
4.5.5 Call Trace Monitoring .............................................................................................................4-29
4.5.6 Call Trace History View..........................................................................................................4-31

CHAPTER 5. General Management 5-1

5.1 Network Monitoring ............................................................................................................... 5-1

5.2 Process Management ............................................................................................................ 5-3

5.3 Resource Monitoring ............................................................................................................. 5-5

5.4 Resource Management.......................................................................................................... 5-6


5.4.1 CPU ..........................................................................................................................................5-6
5.4.2 Memory.....................................................................................................................................5-8
5.4.3 File System .............................................................................................................................5-10
5.4.4 Database ................................................................................................................................ 5-11

5.5 Resource Statistics.............................................................................................................. 5-14

5.6 Database ............................................................................................................................... 5-16


5.6.1 Log Management ...................................................................................................................5-16

5.7 Self Diagnosis ...................................................................................................................... 5-17

5.8 Log Viewer............................................................................................................................ 5-19

© SAMSUNG Electronics Co., Ltd. V


LSM-R User Manual

CHAPTER 6. Security Management 6-1

6.1 User Manager .......................................................................................................................... 6-1

6.2 Changing Password ............................................................................................................... 6-5

6.3 Group Management ................................................................................................................ 6-6

6.4 IP Manager .............................................................................................................................. 6-9

6.5 Login History ........................................................................................................................ 6-13


6.5.1 History .................................................................................................................................... 6-13
6.5.2 Logon Session....................................................................................................................... 6-14

6.6 Operation History ................................................................................................................. 6-15

CHAPTER 7. SON 7-1

7.1 SON Option ............................................................................................................................. 7-1

7.2 SON Property .......................................................................................................................... 7-5

© SAMSUNG Electronics Co., Ltd. VI


LSM-R User Manual

LIST OF FIGURES

Figure 1.1 Log-in Window ...................................................................................................... 1-1


Figure 1.2 Main Window ......................................................................................................... 1-2
Figure 1.3 Log-out Button ....................................................................................................... 1-3
Figure 1.4 EMS Frame Configuration ..................................................................................... 1-4
Figure 1.5 Map Viewer of the Main Frame ............................................................................. 1-7
Figure 1.6 Tree Viewer Frame ................................................................................................ 1-7
Figure 1.7 System Viewer Frame ........................................................................................... 1-8
Figure 1.8 Event Viewer Frame .............................................................................................. 1-8
Figure 1.9 Example of Search Period Setting ........................................................................ 1-9
Figure 1.10 Calendar Window ................................................................................................ 1-9
Figure 1.11 Tree Viewer ........................................................................................................1-11
Figure 1.12 Tree Viewer ....................................................................................................... 1-12
Figure 1.13 Map Viewer ....................................................................................................... 1-14
Figure 1.14 Legend .............................................................................................................. 1-15
Figure 1.15 Status ................................................................................................................ 1-16
Figure 1.16 eNB Tooltip ........................................................................................................ 1-17
Figure 1.17 Rack Viewer Window ........................................................................................ 1-19
Figure 1.18 Main Board Alarms ............................................................................................ 1-20
Figure 1.19 RRH Configuration and Alarms ......................................................................... 1-20
Figure 1.20 RRH Grow Context Menu .................................................................................. 1-21
Figure 1.21 RRH Grow CLI Edit Dialog Window .................................................................. 1-21
Figure 1.22 RRH Degrow Context Menu .............................................................................. 1-22
Figure 1.23 RRH Degrow Password Confirmation ............................................................... 1-22
Figure 1.24 Reset Context Menu.......................................................................................... 1-23
Figure 1.25 Inventory Menu.................................................................................................. 1-24
Figure 1.26 Inventory ........................................................................................................... 1-24
Figure 1.27 Alarm Inhibit/Allow Context Menu...................................................................... 1-25
Figure 1.28 Alarm Inhibit/Allow Dialog .................................................................................. 1-25
Figure 1.29 Alarm Inhibit/Allow Modification ......................................................................... 1-26
Figure 1.30 Alarm Inhibit/Allow Result Dialog....................................................................... 1-26
Figure 1.31 Registering Groups ........................................................................................... 1-27
Figure 1.32 Group Registration Result ................................................................................. 1-27
Figure 1.33 Modifying Group Information ............................................................................. 1-28
Figure 1.34 Deleting Groups ................................................................................................ 1-28
Figure 1.35 About EMS Window .......................................................................................... 1-29

Figure 2.1 CLI Window ........................................................................................................... 2-2


Figure 2.2 Selecting the Target ID .......................................................................................... 2-3

© SAMSUNG Electronics Co., Ltd. VII


LSM-R User Manual

Figure 2.3 Selecting from Command Tree .............................................................................. 2-3


Figure 2.4 Entering Command ................................................................................................ 2-4
Figure 2.5 Execution History ................................................................................................... 2-4
Figure 2.6 Execution Result .................................................................................................... 2-5
Figure 2.7 Event Message Display ......................................................................................... 2-5
Figure 2.8 Command Window................................................................................................. 2-7
Figure 2.9 Command History Window .................................................................................... 2-9
Figure 2.10 Successful Execution of the Command ............................................................. 2-10
Figure 2.11 Unsuccessful Execution of the Command .......................................................... 2-10
Figure 2.12 Copying a Message ........................................................................................... 2-11
Figure 2.13 Saving a Message ............................................................................................. 2-11
Figure 2.14 Saving All Messages .......................................................................................... 2-12
Figure 2.15 Changing the Font ............................................................................................. 2-12
Figure 2.16 Selecting a Background Color ........................................................................... 2-13
Figure 2.17 Background Color Selection Result ................................................................... 2-13
Figure 2.18 Changing the Request Color .............................................................................. 2-14
Figure 2.19 Adding Filter ....................................................................................................... 2-15
Figure 2.20 AutoMessage Color Modification ....................................................................... 2-17
Figure 2.21 Batch Window .................................................................................................... 2-18
Figure 2.22 Command Input Error Dialog ............................................................................. 2-19
Figure 2.23 Executing a Batch Job ....................................................................................... 2-20
Figure 2.24 Batch Job Result (1) .......................................................................................... 2-20
Figure 2.25 Batch Job Result (2) .......................................................................................... 2-21
Figure 2.26 Saving a Batch File (1) ....................................................................................... 2-21
Figure 2.27 Saving a Batch File (2) ....................................................................................... 2-22
Figure 2.28 Opening a Batch File ......................................................................................... 2-22
Figure 2.29 Adding a Batch File Directory ............................................................................ 2-23
Figure 2.30 Macro Execution ................................................................................................ 2-24
Figure 2.31 Modifying the Macro (1) ..................................................................................... 2-25
Figure 2.32 Modifying the Macro (2) ..................................................................................... 2-25
Figure 2.33 Modifying the Macro (3) ..................................................................................... 2-25
Figure 2.34 Modifying the Macro (4) ..................................................................................... 2-25
Figure 2.35 Deleting the Macro (1) ....................................................................................... 2-26
Figure 2.36 Deleting the Macro (2) ....................................................................................... 2-26
Figure 2.37 Duplicated Macro Dialog .................................................................................... 2-26
Figure 2.38 NE Grow ............................................................................................................ 2-27
Figure 2.39 Grow Window(1) ................................................................................................ 2-28
Figure 2.40 Grow Window(2) ................................................................................................ 2-29
Figure 2.41 NE Degrow ........................................................................................................ 2-29
Figure 2.42 Cell Grow and Degrow ....................................................................................... 2-30

© SAMSUNG Electronics Co., Ltd. VIII


LSM-R User Manual

Figure 2.43 Neighbor Management GUI .............................................................................. 2-32


Figure 2.44 Neighbor Import/Export GUI .............................................................................. 2-34
Figure 2.45 Neighbor Integrity Check ................................................................................... 2-35
Figure 2.46 Package Upgrade.............................................................................................. 2-36
Figure 2.47 Verify Window ................................................................................................... 2-38
Figure 2.48 Package Compare Information Window ............................................................ 2-39
Figure 2.49 S/W Update ....................................................................................................... 2-40
Figure 2.50 Firmware Update ............................................................................................... 2-41
Figure 2.51 History Window ................................................................................................. 2-43
Figure 2.52 Schedule Window.............................................................................................. 2-45
Figure 2.53 Configuration Information Sync ......................................................................... 2-47
Figure 2.54 Viewing the Configuration Information Synchronization .................................... 2-48
Figure 2.55 Selecting an eNB from the tree ......................................................................... 2-49
Figure 2.56 Verifying the eNB infor4-mation selected from Sync Data ................................. 2-49
Figure 2.57 Viewing the Scheduler ....................................................................................... 2-50
Figure 2.58 Adding Scheduler .............................................................................................. 2-51
Figure 2.59 Viewing the Scheduler ....................................................................................... 2-51
Figure 2.60 Date Selection Calendar ................................................................................... 2-51
Figure 2.61 Selecting the Scheduler Period ......................................................................... 2-51
Figure 2.62 SerialNo Management ....................................................................................... 2-53
Figure 2.63 Backup Window................................................................................................. 2-55
Figure 2.64 Execution Result of System Backup.................................................................. 2-55
Figure 2.65 Restore Window ................................................................................................ 2-56
Figure 2.66 Selecting File to restore ..................................................................................... 2-57
Figure 2.67 Execution Result of Restoring ........................................................................... 2-57
Figure 2.68 System Backup History Window........................................................................ 2-58

Figure 3.1 Event Viewer Window ........................................................................................... 3-1


Figure 3.2 Event Viewer Filter Window .................................................................................. 3-3
Figure 3.3 Detailed Event Information Window ...................................................................... 3-4
Figure 3.4 Event History Window ........................................................................................... 3-5
Figure 3.5 Current Alarm Window .......................................................................................... 3-7
Figure 3.6 Detailed Information of Current Alarm ................................................................... 3-9
Figure 3.7 Fault Statistics Window ....................................................................................... 3-10
Figure 3.8 Audible Alarm Window ........................................................................................ 3-12
Figure 3.9 Visible Alarm Setting Window .............................................................................. 3-14
Figure 3.10 Visible Alarm Output Window ............................................................................ 3-15
Figure 3.11 Setting the Visible Alarm by Fault Code............................................................. 3-16
Figure 3.12 Selecting the Visible Alarm Code ...................................................................... 3-17
Figure 4.1 Selecting the Performance Menu .......................................................................... 4-1

© SAMSUNG Electronics Co., Ltd. IX


LSM-R User Manual

Figure 4.2 Statistics Data View Window.................................................................................. 4-2


Figure 4.3 Filter Setting ........................................................................................................... 4-4
Figure 4.4 Statistics Chart ....................................................................................................... 4-5
Figure 4.5 Disabling the Graph Overlap .................................................................................. 4-6
Figure 4.6 Chart Option Setting .............................................................................................. 4-6
Figure 4.7 PM Collection Results ............................................................................................ 4-8
Figure 4.8 PI Management...................................................................................................... 4-9
Figure 4.9 PI Registration ..................................................................................................... 4-11
Figure 4.10 PI Registration Result ........................................................................................ 4-12
Figure 4.11 PI Modification.................................................................................................... 4-13
Figure 4.12 PI Deletion ......................................................................................................... 4-14
Figure 4.13 PI Monitoring ...................................................................................................... 4-15
Figure 4.14 PI Trend Graph .................................................................................................. 4-16
Figure 4.15 On Demand Statistics Management .................................................................. 4-17
Figure 4.16 On Demand Statistics Management Screen ...................................................... 4-18
Figure 4.17 On Demand Statistics Registration Screen ........................................................ 4-19
Figure 4.18 On Demand Statistics Deletion Result Window ................................................. 4-21
Figure 4.19 On Demand Statistics Monitoring Screen .......................................................... 4-22
Figure 4.20 Chart Option Setting .......................................................................................... 4-23
Figure 4.21 Trace Main Window ........................................................................................... 4-24
Figure 4.22 Selecting the Target ID ....................................................................................... 4-25
Figure 4.23 Trace List View Window ..................................................................................... 4-25
Figure 4.24 Trace Registration .............................................................................................. 4-27
Figure 4.25 Deleting a Trace ................................................................................................. 4-28
Figure 4.26 Starting the Trace Monitoring ............................................................................. 4-29
Figure 4.27 Trace Message Details ...................................................................................... 4-30
Figure 4.28 Viewing the Trace History .................................................................................. 4-31

Figure 5.1 Network Monitoring Window .................................................................................. 5-1


Figure 5.2 Process Monitoring Window .................................................................................. 5-3
Figure 5.3 Resource Monitoring Window ................................................................................ 5-5
Figure 5.4 CPU Window ......................................................................................................... 5-6
Figure 5.5 CPU Details Window.............................................................................................. 5-7
Figure 5.6 Memory Window .................................................................................................... 5-8
Figure 5.7 File System Window ............................................................................................ 5-10
Figure 5.8 Database Window ................................................................................................ 5-11
Figure 5.9 Resource Statistics Window ................................................................................ 5-14
Figure 5.10 Log Management Window ................................................................................. 5-16
Figure 5.11 Self Diagnostic Window ..................................................................................... 5-17
Figure 5.12 Log Viewer Window (1) ...................................................................................... 5-19

© SAMSUNG Electronics Co., Ltd. X


LSM-R User Manual

Figure 5.13 Log Viewer Window (2) ..................................................................................... 5-19


Figure 5.14 Log Viewer Window (3) ..................................................................................... 5-20

Figure 6.1 Operator Management Window ............................................................................ 6-1


Figure 6.2 Operator Registration Window .............................................................................. 6-2
Figure 6.3 Operator Information Change Window .................................................................. 6-3
Figure 6.4 Operator Information Deletion Window ................................................................. 6-4
Figure 6.5 Operator Lockout Window ..................................................................................... 6-4
Figure 6.6 Changing Password Window ................................................................................ 6-5
Figure 6.7 Group Management Window ................................................................................. 6-6
Figure 6.8 Group Addition Window ......................................................................................... 6-7
Figure 6.9 Group Information Change Window ...................................................................... 6-8
Figure 6.10 Group Deletion Window ...................................................................................... 6-8
Figure 6.11 IP Management Window...................................................................................... 6-9
Figure 6.12 IP Registration Window ..................................................................................... 6-10
Figure 6.13 IP Information Change Window ..........................................................................6-11
Figure 6.14 IP Deletion Window ........................................................................................... 6-12
Figure 6.15 History Window ................................................................................................. 6-13
Figure 6.16 Logon Session Window ..................................................................................... 6-14
Figure 6.17 Operation History Window ................................................................................. 6-15

Figure 7.1 SON Management Window ................................................................................... 7-2


Figure 7.2 SON Option Search Criteria Selection .................................................................. 7-3
Figure 7.3 Changing SON Option........................................................................................... 7-3
Figure 7.4 Batch Modifying SON Option ................................................................................ 7-4
Figure 7.5 SON Property Window .......................................................................................... 7-5
Figure 7.6 SON Property Window Failure Verification ............................................................ 7-7

© SAMSUNG Electronics Co., Ltd. XI


LSM-R User Manual

CHAPTER 1. EMS Interface

This chapter describes the Graphic User Interface (GUI) of the EMS and the basic method
needed for the operation of the system.

1.1 Connecting to EMS


Describes the log-in and log-out procedures.

1.1.1 Login
The log-in procedure for the EMS operation is explained below:

1) Open Microsoft Internet Explorer to connect to EMS.

Recommended Requirements for EMS Client


The client machine should be running Windows 7 and Internet Explorer 8. The
Java version should be JRE 1.6.0_20.

2) Enter the IP address of the EMS server in the address field of the Internet Explorer and
press Enter to bring up the log-in window. (https ://{ ip.address})

Figure 1.1 Log-in Window

© SAMSUNG Electronics Co., Ltd. 1-1


LSM-R User Manual

3) Enter the operator‟s User id and Password in the input fields of the login window and
click the Login button.

4) Once the log-in information is verified, the EMS will be executed and the main
window will be displayed.

Figure 1.2 Main Window

Internet Explorer Settings


If a message reading ‘Downloads from this site to the computer is blocked by
Internet Explorer for security purpose. Click here to view the options.’ appears for
a short time in the Internet Explorer, change the Internet options as follows:
- In the Internet Explorer, go to Tools  Internet Options  Security  Custom
Level. Under Downloads > ‘Automatic prompting for file downloads’, select
‘Enable’.
Under ActiveX Controls and Plug-ins > ‘Automatic prompting for ActiveX controls’,
select ‘Allow’.
- In the Internet Explorer, go to Tools > Internet Options > Privacy > Pop-up
Blocker. Then, check the ‘Block pop-ups’ option.

© SAMSUNG Electronics Co., Ltd. 1-2


LSM-R User Manual

1.1.2 Logout
The EMS logout procedure is as follows:

Figure 1.3 Log-out Button

1) Among the buttons shown on the upper right corner of the EMS window, click Logout.
A log-out confirmation message will be displayed.
2) Click „OK‟ to log-out.

© SAMSUNG Electronics Co., Ltd. 1-3


LSM-R User Manual

1.2 Interface Configuration


The EMS main window consists of the following five frames:
Menu Frame
Main Frame
Tree Viewer Frame
System Viewer Frame
Event Viewer Frame

Menu Frame

Tree Viewer Main Frame


Frame

System Viewer Event Viewer Frame


Frame

Figure 1.4 EMS Frame Configuration

© SAMSUNG Electronics Co., Ltd. 1-4


LSM-R User Manual

1.2.1 Menu Frame


The EMS menu consists of 6 management groups. The EMS menu frame displays the
entire EMS management groups, and allows the execution of various commands for each
management group.
It also provides other additional functions.

The menu frame consists of the following elements:

: Project title

: User information (user ID and group)

: Additional function buttons

: User menu

: Toolbar buttons for main menus

: Controls the audible alarm

: Hides/shows a specific frame in the main window

: Checks connection status between the server and client

Additional Function Buttons


Buttons for additional functions are as follows:

Button Description

Shows the site map to see the entire EMS structure.

Provides the help.

Logs out from the currently connected EMS.

© SAMSUNG Electronics Co., Ltd. 1-5


LSM-R User Manual

Toolbar Buttons
Buttons for the direct link to the principal menus are as follows:

Button Description

Links to the server’s resource management function.

Links to the network management function.

Audible Alarm Control Buttons


Buttons for the audible alarm control are as follows:

Button Description

On/Off control of the audible alarm.

Turns off the currently active audible alarm.

Hide/Show Frame Buttons


Buttons for hiding/showing frames are as follows:

Button Description

Hides/shows the system viewer frame.

Hides/shows the event viewer frame.

© SAMSUNG Electronics Co., Ltd. 1-6


LSM-R User Manual

1.2.2 Main Frame


The main frame displays the map viewer among the network viewers. Once the operator
executes a command in the menu frame, the corresponding function window will be
displayed in the main frame.

Figure 1.5 Map Viewer of the Main Frame

1.2.3 Tree Viewer Frame


The tree viewer frame displays the network elements in tree format.

Figure 1.6 Tree Viewer Frame

© SAMSUNG Electronics Co., Ltd. 1-7


LSM-R User Manual

1.2.4 Event Viewer Frame


The System Viewer frame displays EMS resource status, representative alarm of node, and
number of managed NE.

Figure 1.7 System Viewer Frame

1.2.5 Event Viewer Frame


The event viewer frame shows the various errors collected by the EMS to the operator.

Figure 1.8 Event Viewer Frame

Event Viewer Frame


Refer to ‘Event Viewer’ for specific details about the event viewer frame.

© SAMSUNG Electronics Co., Ltd. 1-8


LSM-R User Manual

1.3 Basic Operation


This section describes the basic elements for the operation of the EMS.

1.3.1 Button
The command buttons used in EMS are designed to run the same functions in different
window. The command buttons commonly used in the EMS are as follows:

Button Description

Add Adds new data.


Apply Sets the properties for the data and/or function.
Close Closes the window.
Delete Deletes the data.
OK Confirms and executes the command.
Search Searches the data that have been previously configured or saved.
Set Sets the properties for the data and/or function.

1.3.2 Basic Settings


The operator will typically perform a series of configuration while executing the EMS
functions.
Some tasks require the operator to set the search period.

Figure 1.9 Example of Search Period Setting

The date can either be directly entered in the text box in the required format or be selected
in the calendar by clicking the calendar button and click „Apply‟ button.

Figure 1.10 Calendar Window

© SAMSUNG Electronics Co., Ltd. 1-9


LSM-R User Manual

1.3.3 Sitemap
EMS provides a site map to assist the operator through the operation menu.
The site map gives an overall view of the menu configuration and allows the operator to
execute the desired function directly from the map.

© SAMSUNG Electronics Co., Ltd. 1-10


LSM-R User Manual

1.4 Network Viewer


The network viewer provides various functions to assist the operation of the network
elements. The network viewer consists of tree viewer, map viewer and rack viewer.

Network Elements
Network elements are called „nodes‟, and they are classified by hierarchy.

Node Description

EMS A node used to indicate the top parent class in the Tree Viewer.
Group A node used to manage NE by grouping them
NE A node representing a specific system.
Rack The rack class of the NE.
Shelf The shelf class of the NE.
Board A node the represents the board, which is the unit of the NE.

Node and Configuration


The NE and the board are the nodes that represent physical configurations.
The remainders represent the virtual class hierarchy added for easier
management of the system.

1.4.1 Tree Viewer


The tree viewer displays the network elements in tree format.

Figure 1.11 Tree Viewer

© SAMSUNG Electronics Co., Ltd. 1-11


LSM-R User Manual

Select a specific node in the tree viewer, then right-click it. A popup menu for the
corresponding node will be displayed within the tree viewer.

Figure 1.12 Tree Viewer

Icons
The tree viewer uses the following icons to indicate the parent-child relationship between
the networks and to display the alarms.
The tree viewer of the main window will display up to the shelf level. In the function
window, it will display up to the board level as necessary.

Normal Critical Major Minor Disabled


Node
(Blue) (Red) (Orange) (Yellow) (Gray)
EMS
Group
eNB

Rack - - - - -
Shelf - - - - -
Board -

© SAMSUNG Electronics Co., Ltd. 1-12


LSM-R User Manual

Displaying Representative Alarm


The NE will be shown as disabled if the IP ping and SNMP ping results are
abnormal. The representative alarm will not be displayed when the NE is in
disabled state.

NE Sorting

1) Select „Sort‟ from the top of the tree viewer (available by name and IP).
2) The NE of the tree viewer will be sorted accordingly.

NE Search

1) Select „Search‟ from the top of the tree viewer.


2) Enter the content to be searched in the text field and press the Enter key.
The Search supports partial search option.
Search terms are case-sensitive.
3) The corresponding NE in the tree viewer will be selected.
4) Press the Enter key again, the next NE will be selected.

© SAMSUNG Electronics Co., Ltd. 1-13


LSM-R User Manual

1.4.2 Map Viewer


The map viewer displays the eNB class among the network elements in grid map format.
The status map consists of the following four elements:
A toolbox providing the tool functions, a status providing the status of the overall eNBs,
a grid map displaying all the eNBs along with the overall alarm status for each eNB, and an
eNB information showing the basic information of the selected eNB.

Figure 1.13 Map Viewer

© SAMSUNG Electronics Co., Ltd. 1-14


LSM-R User Manual

Toolbox
Refresh
Gets the tree list of the main window again to re-display the status map.
Legend
Provides the description of the alarms and symbols used in the status map.
The information shown in legend is as follows:

Figure 1.14 Legend

Server Time
Shows the time of the EMS server, not the time of the device logged in with the WEB
EMS (web client).

© SAMSUNG Electronics Co., Ltd. 1-15


LSM-R User Manual

Status
Displays the status and alarm information of the eNB shown in the status map.

Figure 1.15 Status

The status icons provide the following information:

Status Description

Total Number of all eNBs registered to the LSM (LTE System Manager).
In svc Number of eNB in normal call processing.
SH.down Number of eNB which wireless resource is preparing to be blocked.
Lock Number of eNB which wireless resource is currently blocked.
Dis conn Number of eNB in ping down state.
Not init Number of eNB in SNMP up state, for which the initialization is not complete.
Cri Number of eNB which representative alarm is in critical state.
Maj Number of eNB which representative alarm is in major state.
Min Number of eNB which representative alarm is in minor state.
Normal Number of eNB with no alarm.

Basic Information of eNB


Find eNB
Allows to find an eNB equipment with its name. A partial name search function is also
provided.
Name
Displays the name of the eNB equipment.
ID
Shows the system ID of the eNB equipment.
IP Address
Shows the IP address of the eNB equipment.

© SAMSUNG Electronics Co., Ltd. 1-16


LSM-R User Manual

Grid Viewer
Tooltip
Shows a brief description of the eNB that the mouse cursor is pointing at.

Figure 1.16 eNB Tooltip

The right-click popup for the registered grid map cell.


Provides the following functions for the selected eNB:

Menu Description

NE Information Displays the basic information of the selected eNB equipment.


Rack Viewer Displays the rack viewer information of the selected eNB equipment.
Failure Sync Attempts to sync the failure information for the selected eNB equipment.
NE Information Attempts to initialize (sync) the NE information of the selected eNB
Loading equipment.
Cell Management Displays the cell management information of the selected eNB equipment.
PI Monitoring Displays the PI monitoring information.
NE Reset Attempts to run the reset command on the selected eNB equipment.
Remote Reset Attempts to run the remote reset command on the selected eNB equipment.
General  Displays the Main Window  General  Surveillance information.
Surveillance
Security  User Displays the Main Window  Security  User Management information.
Management
AdministrativeState Attempts to run the command to block the wireless resource of the
 Locked selected eNB equipment.
AdministrativeState Attempts to run the command to release the blocked wireless resource of
 Unlocked the selected eNB equipment.
AdministrativeState Attempts to run the command to prepare to block the wireless resource of
 Shuttingdown the selected eNB equipment.
Delete NE Deletes the selected eNB equipment.
Force Delete NE Force delete the disconnected eNB equipment.

© SAMSUNG Electronics Co., Ltd. 1-17


LSM-R User Manual

The right-click popup for the dismounted grid map cell.


Allows to register a new eNB equipment.

Menu Description

Grow Displays the eNB equipment registration window.

Cell Status
The grid viewer displays the eNB alarms in following colors:

Alarm Color Description

Red Critical alarm information.


Orange Major alarm information.
Yellow Minor alarm information.
Blue Normal alarm information.

The grid viewer displays the eNB status with the following symbols:

Status Description

X Ping down state.


? SNMP up state, initialization incomplete.
L Wireless resource preparing to be blocked.
S Wireless resource blocked.

About the ‘X’ state


The NE will be shown as disabled if the IP ping and SNMP ping results are
abnormal.
The representative alarm will not be displayed when the NE is in disabled state.

© SAMSUNG Electronics Co., Ltd. 1-18


LSM-R User Manual

1.4.3 Rack Viewer


You can display the Rack Viewer to check status of rack and board using the context menu
displayed when you right-click an NE in the Tree Viewer or double-click an NE in the Map
Viewer.

The rack viewer provides the following functions:


Displays the rack configuration information and current alarm information.
Displays the board configuration information and current alarm information.
Displays the representative alarm of the board.
Displays the RRH configuration information and current alarm information.
Displays a popup menu to grow the RRH.
Displays a popup menu to degrow the RRH.
Displays a popup menu to reset the resource.
Displays a popup menu for the resource inventory.
Displays a popup menu to inhibit/allow the alarm.

Displaying Current Alarm Information


The rack viewer does not reflect the current alarm information in real time.
It searches the database and shows the corresponding information when the
node is double-clicked.

Figure 1.17 Rack Viewer Window

© SAMSUNG Electronics Co., Ltd. 1-19


LSM-R User Manual

Rack Configuration and Current Alarms


1) Click the rack in the left pane of the Rack Viewer.
2) The node information and current alarm information are displayed in the right pane.

Board Configuration and Current Alarms


1) Double-click the board in the left pane of the Rack Viewer.
2) The node information and current alarm information for the board are displayed in the
right pane.

Main Board Alarms


Normal (None) Critical (Red) Major (Orange) Minor (Yellow)

Figure 1.18 Main Board Alarms

RRH Configuration and Current Alarms


1) Click the „RRH‟ tab in the right pane of the Rack Viewer.
2) This displays the RRH information and current alarms for the board.

Figure 1.19 RRH Configuration and Alarms

© SAMSUNG Electronics Co., Ltd. 1-20


LSM-R User Manual

Popup menu to grow the RRH


1) Click the „RRH‟ tab in the right pane of the Rack Viewer.
2) Select and right-click the RRH to grow.
3) Select „Create RRH‟ in the context menu.
4) In the CLI Edit Dialog popup window, select the desired option and click „Execute‟.

Figure 1.20 RRH Grow Context Menu

Figure 1.21 RRH Grow CLI Edit Dialog Window

© SAMSUNG Electronics Co., Ltd. 1-21


LSM-R User Manual

Context Menu to Degrow the RRH


1) Click the „RRH‟ tab in the right pane of the Rack Viewer.
2) Select and right-click the RRH to degrow.
3) Select „Delete RRH‟ in the context menu.
4) Enter the password in the password confirmation window and click „OK‟.

Figure 1.22 RRH Degrow Context Menu

Figure 1.23 RRH Degrow Password Confirmation

© SAMSUNG Electronics Co., Ltd. 1-22


LSM-R User Manual

Context Menu to Reset Resources


The rack viewer provides a popup menu to reset the resources including the board resource.

1) Select and right-click the board in the left pane of the Rack Viewer.
2) Select „Reset‟ in the context menu.
3) A window will pop up to display the command execution result.

Figure 1.24 Reset Context Menu

© SAMSUNG Electronics Co., Ltd. 1-23


LSM-R User Manual

Popup menu for the resource inventory


The rack viewer provides a popup menu to view the resource inventory including the board
resource.
1) Select and right-click the board in the left pane of the Rack Viewer.
2) Select „Inventory‟ in the context menu.
3) The Inventory dialog window will pop up to display the command execution result.

Figure 1.25 Inventory Menu

Figure 1.26 Inventory

© SAMSUNG Electronics Co., Ltd. 1-24


LSM-R User Manual

Popup menu to inhibit/allow the alarm.


The rack viewer provides a popup menu to inhibit/allow alarms for the resources including
the board resource.

1) Select and right-click the board in the left pane of the Rack Viewer.

2) Select „Alarm Inhibit/Allow‟ in the context menu.

3) The Alarm Inhibit/Allow dialog window will pop up to display the command
execution result.

Figure 1.27 Alarm Inhibit/Allow Context Menu

Figure 1.28 Alarm Inhibit/Allow Dialog

© SAMSUNG Electronics Co., Ltd. 1-25


LSM-R User Manual

4) Click on the „Status‟ item of the alarm type you wish to modify from the displayed list,
then select „INHIBIT/ALLOW‟.

5) Click „Apply‟ to apply the change.

6) A dialog window will pop up to display the application result for each corresponding item.

Figure 1.29 Alarm Inhibit/Allow Modification

Figure 1.30 Alarm Inhibit/Allow Result Dialog

© SAMSUNG Electronics Co., Ltd. 1-26


LSM-R User Manual

1.4.4 Group Management


The tree viewer provides a popup menu to register, modify and/or delete groups.

Registering Groups
1) Right-click the EMS node of the tree viewer to display a popup menu, then select
„Create Network‟.

2) When the information Input Window is displayed, enter the name and position and
click „OK‟.

Figure 1.31 Registering Groups

3) If the command is successful, the corresponding group will be added to the tree viewer.

Figure 1.32 Group Registration Result

© SAMSUNG Electronics Co., Ltd. 1-27


LSM-R User Manual

Modifying Group Information


1) Select „Network Information‟ from the group node popup menu of the tree viewer.
2) The node information window will be displayed. Enter the information in the node
information window and click „OK‟.
3) If the command is successful, the corresponding group information will be applied to
the tree viewer.

Figure 1.33 Modifying Group Information

Deleting Groups
1) Select „Network Information‟ from the group node popup menu of the tree viewer or
map viewer.
2) When the password Input Window is displayed, enter the password of your log-in account.
3) Enter the password and click „OK‟.
4) If the command is successful, the corresponding group will be deleted from the tree

viewer and the map viewer.

Figure 1.34 Deleting Groups

Restrictions on Deleting Groups


A group can only be deleted if it has no NE registered to it.

© SAMSUNG Electronics Co., Ltd. 1-28


LSM-R User Manual

1.5 Help
The Help allows to view the information of the EMS server. The server information
provided by the Help menu is as follows:
Sever version
Sever copyright
Server‟s management target

Figure 1.35 About EMS Window

© SAMSUNG Electronics Co., Ltd. 1-29


LSM-R User Manual

CHAPTER 2. Configuration
Management

The configuration management allows the operator to view, modify, add and/or delete the
NE information. The operator can check the current configuration and/or setup or control
the NE with the functions provided in the configuration management.
Also, the configuration management offers a CLI window supporting the operator commands.

2.1 CLI
The CLI can be executed by selecting „Configuration‟  „CLI‟. The CLI is a module
which allows the operator to execute the commands for the NE through the GUI.

2.1.1 CLI Configuration


When the CLI is executed, the following information will be displayed.
The CLI provides 3 types of layouts. The description in this manual is based on Layout 3
which includes all possible cases.

© SAMSUNG Electronics Co., Ltd. 2-1


LSM-R User Manual

Figure 2.1 CLI Window

Layout Selection
You can select the layout using the following three methods:

Menu & Icon Description

From the menu, click Layout. A sub-menu will be displayed as shown on the left.
Select the desired layout. The layout of the window will be adjusted accordingly.

Select the desired layout icon in the toolbar. The layout of the window will be
adjusted accordingly.
Ctrl-1, 2, 3 In the CLI window, press Ctrl+1 (Layout 1), Ctrl+2 (Layout 2), or Ctrl+3
(Layout 3). The layout of the window will be adjusted accordingly.

© SAMSUNG Electronics Co., Ltd. 2-2


LSM-R User Manual

2.1.2 Basic CLI Functions


Once the CLI is executed, the following window will be displayed.

Selecting a Target
In the initial CLI window, select the combo list of the target to select the target ID.
The following tree will be displayed. Select the NE you wish to execute the command on.

Figure 2.2 Selecting the Target ID

Command Window
: Click the corresponding button to activate the command tree input window.
The command tree allows the operator to select the desired command from the tree.
If you select a command from the command tree, the corresponding parameter attribute
values will be displayed in the command parameter input window in the right pane.

Figure 2.3 Selecting from Command Tree

© SAMSUNG Electronics Co., Ltd. 2-3


LSM-R User Manual

Input Window
To enter a command, proceed as follows:

1) Select a command from command tree, then enter the parameter. The command will be
automatically created in the Input Window below command tree.
2) Use the ↑ and ↓ keys to select a command from the command list.

Figure 2.4 Entering Command

Button Description

Execute Executes the selected/entered command.


Previous Executes a command repeatedly by selecting a specific NE or group.
Repeat Initializes the parameter values of the currently selected command.
Reset Clears the input field’s data.

History Window
You can re-execute the previously executed command as follows:

1) In the History window, double-click the previous command log.


2) Use the ↑ and ↓ keys in the command Input Window to browse through the commands
saved in the history list, select the desired command, then click „Execute‟.
: Click the corresponding button to activate the history window.

Figure 2.5 Execution History

© SAMSUNG Electronics Co., Ltd. 2-4


LSM-R User Manual

Response Window
The result of the command executed by the operator will be displayed as illustrated below.

Figure 2.6 Execution Result

Autonomous Window
The alarm and status messages generated during the system operation will be displayed as
illustrated below.

Figure 2.7 Event Message Display

© SAMSUNG Electronics Co., Ltd. 2-5


LSM-R User Manual

Exiting the CLI


On the menu bar, click „File‟  „Close‟ to close the CLI window. The CLI can also be
closed with the hot key „Ctrl-o‟.

© SAMSUNG Electronics Co., Ltd. 2-6


LSM-R User Manual

2.1.3 Command Window


Searching for a Command
1) Select a target NE/Group from the top of the CLI.
2) In the command window, select the Search tab.
3) Select the Command Search mode or the Parameter Search mode.
4) The Command Search mode will search for the command which matches the input
string.
5) Click on the searched command.
6) The selected command will be entered as the input command.

Figure 2.8 Command Window

The command input window provides the following functions:


Displays the command search failure.
Restricts the command execution if the mandatory parameter is not entered.
Parameter Filtering: Restricts the input of the parameter value exceeding the allowed range.
Allows to input a numeric type parameter.
Allows to input an enum type parameter.

© SAMSUNG Electronics Co., Ltd. 2-7


LSM-R User Manual

Allows to input a normal type parameter.


Allows to input an IP type parameter
Allows to input a date type parameter
Verifies the command error.
Allows to reset the parameter.
Confirms the main command.
Verifies the main command‟s Password.
Restricts the execution permission by operator level.
Allows to execute a command repeatedly on multiple NEs.
Displays help when the operator enters a question mark (?).
Displays a list of the commands beginning with the input string when the operator enters a
command string in the Input Window.
Applies the command searched in the Input Window.
Allows to browse the command history in the Input Window.
Allows to enter a command in lowercase.

© SAMSUNG Electronics Co., Ltd. 2-8


LSM-R User Manual

2.1.4 History Window


On the toolbar, click the command execution history icon. The following command
execution history window will be displayed

Selecting a Command in the History Window


1) Click a command in the History Window.
2) The selected command will be displayed in the Input Window.

Executing a Command in the History Window


1) Double-click a command in the History Window.
2) The command will be executed.

Clearing the Execution History


1) After executing the command, right-click in the History Window.
2) Select „Remove All‟, „Remove Selected‟ or „Remove COMPLD Only‟.
3) The corresponding execution history will be deleted.

Figure 2.9 Command History Window

© SAMSUNG Electronics Co., Ltd. 2-9


LSM-R User Manual

2.1.5 Response Window


Displaying Successful Command Execution Result
1) After a command is executed, the corresponding command will be displayed.
2) If the execution of the command was successful, the result will be displayed in the
Response Window.

Figure 2.10 Successful Execution of the Command

Displaying Unsuccessful Command Execution Result


If the execution of the command was unsuccessful, the corresponding execution result will
be displayed along with the reason of failure.

Figure 2.11 Unsuccessful Execution of the Command

© SAMSUNG Electronics Co., Ltd. 2-10


LSM-R User Manual

Copying a Message
1) Select a specific area of the Response Window.
2) Right-click the Response Window to display the context menu.
3) Select „Copy‟ to copy the selected message.

Figure 2.12 Copying a Message

Saving a Message
1) Select a specific area of the Response Window.
2) Right-click the Response Window to display the context menu.
3) Select „Save‟, designate a path in the dialog window, then click „OK‟.
4) The selected message will be saved in the designated path.

Figure 2.13 Saving a Message

© SAMSUNG Electronics Co., Ltd. 2-11


LSM-R User Manual

Saving All Messages


1) Right-click the Response Window to display the context menu.
2) Select „SaveAll‟, designate a path in the dialog window, then click „OK‟.
3) All messages of the Response Window will be saved in the designated path.

Figure 2.14 Saving All Messages

Clearing a Message
1) Right-click the Response Window to display the context menu.
2) Select „Clear‟.
3) All messages in the Response Window will be cleared.

Changing the Font


1) Right-click the Response Window to display the context menu.
2) Select „Change Font‟, and select the desired font from the dialog window.
3) The message will be displayed in the selected font.

Figure 2.15 Changing the Font

© SAMSUNG Electronics Co., Ltd. 2-12


LSM-R User Manual

Changing the Background


1) Right-click the Response Window to display the context menu.
2) Select „Change Background‟.
3) Select the desired color from the Color Chooser dialog window.

Figure 2.16 Selecting a Background Color

4) The background of the Response Window will be displayed in the specified color.

Figure 2.17 Background Color Selection Result

© SAMSUNG Electronics Co., Ltd. 2-13


LSM-R User Manual

Changing the Request Color


1) Right-click the Response Window to display the context menu.
2) Select „Change Message Color‟.
3) Select „REQUEST COLOR‟.
4) Select the desired color from the Color Chooser dialog window.
5) The request will be displayed in the specified color.

Figure 2.18 Changing the Request Color

Changing the Response Color


1) Right-click the Response Window to display the context menu.
2) Select „Change Message Color‟.
3) Select „RESPONSE COLOR‟.
4) Select the desired color from the Color Chooser dialog window.
5) The response will be displayed in the specified color.

Changing the Error Color


1) Right-click the Response Window to display the context menu.
2) Select „Change Message Color‟.
3) Select „ERROR COLOR‟.
4) Select the desired color from the Color Chooser dialog window.
5) Check if the error is displayed in the specified color.

Pause On
1) Right-click the Response Window to display the context menu.
2) Selecting „Pause‟ will pause the response message at current state.

Pause Off
1) Right-click the Response Window in „PauseOn‟ state to display the context menu.
2) Selecting „PauseOff‟ will resume the paused response message.

© SAMSUNG Electronics Co., Ltd. 2-14


LSM-R User Manual

2.1.6 Autonomous Window


The Autonomous window will display the autonomous messages occurring from the
equipment.

Adding Filter
1) Right-click the event window to display the context menu.
2) Select „Add Filter‟.
3) Select a target in the Add Filter window.
4) The filter window of the corresponding target will be added.
5) The added window will only display the events of the selected target.

Figure 2.19 Adding Filter

Copying Event
1) Select a specific area of the event window.
2) Right-click the event window to display the context menu.
3) Select „Copy‟.

Saving Event
1) Select a specific area of the event window.
2) Right-click the event window to display the context menu.
3) Select „Save‟.
4) Designate a path to save the event.

© SAMSUNG Electronics Co., Ltd. 2-15


LSM-R User Manual

Saving All Events


1) Right-click the event window to display the context menu.
2) Select „Save All‟.
3) Designate a path in the dialog window to save the events.

Clearing Event
1) Right-click the event window to display the context menu.
2) Select „Clear‟.
3) All messages in the event window will be cleared.

Pause On
1) Right-click the event window to display the context menu.
2) Selecting „Pause‟ will pause the output event at current state.

Pause Off
1) Right-click the event window in „PauseOn‟ state to display the context menu.
2) Selecting „Pause Off‟ will resume the paused event.

Changing Font
1) Right-click the event window to display the context menu.
2) Select „Change Font‟.
3) Select the desired font in the dialog window.
4) The message will be displayed in the specified font.

Changing Background
1) Right-click the event window to display the context menu.
2) Select „Change Background‟.
3) Select the desired color in the dialog window.
4) The background of the event window will be displayed in the specified color.

Changing Critical Alarm Color


1) Right-click the event window to display the context menu.
2) Select „Change AutoMessage Color‟.
3) Select „CRITICAL ALARM COLOR‟.
4) Select the desired color from the Color Chooser dialog window.
5) The Critical Alarm will be displayed in the selected color.

Changing Major Alarm Color


1) Right-click the event window to display the context menu.
2) Select „Change AutoMessage Color‟.
3) Select „MAJOR ALARM COLOR‟.
4) Choose a desired color from the „Color Chooser Dialog‟ window.
5) The Major Alarm is displayed in the specified color.

© SAMSUNG Electronics Co., Ltd. 2-16


LSM-R User Manual

Changing Minor Alarm Color


1) Right-click the event window to display the context menu.
2) Select „Change AutoMessage Color‟.
3) Select „MINOR ALARM COLOR‟.
4) Choose a desired color from the „Color Chooser Dialog‟ window.
5) The Minor Alarm is displayed in the specified color.

Figure 2.20 Auto Message Color Modification

Changing Alarm Clear Color


1) Right-click the event window to display the context menu.
2) Select „Change AutoMessage Color‟.
3) Select „ALARM CLEAR COLOR‟.
4) Choose a desired color from the „Color Chooser Dialog‟ window.
5) The specified color will be displayed when the alarm is cleared.

Changing Status Event Color


1) Right-click the event window to display the context menu.
2) Select „Change AutoMessage Color‟.
3) Select „STATUS COLOR‟.
4) Select the desired color from the Color Chooser dialog window.
5) The status will be displayed in the specified color.

© SAMSUNG Electronics Co., Ltd. 2-17


LSM-R User Manual

2.1.7 Batch Window


Click the batch icon ( ) on the toolbar to display the „Batch Window‟ as shown below.
The Batch Window allows the operator to save a list of commands to be executed in batch.

Figure 2.21 Batch Window

Adding a Batch Job


Adding from the command tree
1) Select a command from the command window.
2) Click „Add‟ in the Batch Window.
3) The selected command will be added to the batch job.
Adding a Batch Job in the History Window
1) Select a command in the History Window.
2) Click „Add‟ in the Batch Window.
3) The selected command will be added to the batch job.
Adding a Batch Job from the Input Window
1) Enter a command in the Input Window.
2) Click „Add‟ in the Batch Window.
3) The entered command will be added to the Batch Window.

© SAMSUNG Electronics Co., Ltd. 2-18


LSM-R User Manual

If an invalid command is entered in the Input Window while adding the commands in
the batch job, the following error dialog will be displayed.

Figure 2.22 Command Input Error Dialog

Specifying the Batch Job Interval


1) Select a command from the command window.
2) Specify a value for the „Gap‟ in the Batch Window.
3) Click „Add‟ in the Batch Window.
4) The selected command will be added to the batch job with the specified interval.

Deleting a Batch Job


1) Select a command in the Batch Window.
2) Click „Delete‟ in the Batch Window.
3) The selected command will be deleted from the Batch Window.

Modifying a Batch Job


Modifying a target in the batch job
1) Select a command in the Batch Window.
2) Modify the target in the target window.
3) Click „Modify‟ in the Batch Window.
4) The batch job will be changed with the new target.
Modifying a command in the batch job
1) Select a command in the Batch Window.
2) Select a command to modify from the command window.
(You may also select a command in the History Window or enter it in the Input
Window.)
3) Click „Modify‟ in the Batch Window.
4) The batch job will be changed with the new command.
Modifying the batch job execution interval
1) Select a command in the Batch Window.
2) Change a value for the „Gap‟ in the Batch Window.
3) Click „Modify‟ in the Batch Window.
4) The execution interval of the corresponding command in the batch job will be
changed.
Changing the Batch Job Order
1) Select a command in the Batch Window.
2) Click the up/down arrows in the Batch Window.
3) The batch job‟s command execution order will be changed.

© SAMSUNG Electronics Co., Ltd. 2-19


LSM-R User Manual

Executing a Batch Job


1) In the target, select the NE to execute the batch job, then click „Apply‟.
(Select the checkbox in the tree to select multiple NEs.)

2) Add a command to the batch job list.

3) Click „Start‟.

Figure 2.23 Executing a Batch Job

4) The corresponding command execution result will be displayed in the Response


Window.

Figure 2.24 Batch Job Result (1)

© SAMSUNG Electronics Co., Ltd. 2-20


LSM-R User Manual

5) The command execution result will be displayed in the Batch Window.

Figure 2.25 Batch Job Result (2)

Stopping a Batch Job


1) Register a command to the batch list and click „Start‟.
2) While the command is being executed, click „Stop‟.
3) The execution of the command will be stopped.

Saving a Batch File


Saving the batch job list in a file

1) Click „Save‟ in the Batch Window.

Figure 2.26 Saving a Batch File (1)

2) Enter the file name in the popup window.

3) Click „Save‟.

© SAMSUNG Electronics Co., Ltd. 2-21


LSM-R User Manual

4) The commands in the Batch Window will be saved in the specified file.

Figure 2.27 Saving a Batch File (2)

Checking the Batch File Redundancy


1) Click „Save‟ in the Batch Window.
2) Enter an existing batch file name in the popup window.
3) Click „Save‟.
4) A Duplicated Batch File message will be displayed.

Opening a batch file


Opening a batch file
1) Click „Open‟ in the Batch Window.
2) Select a file.
3) Click „Open‟.
4) The commands of the selected file will be applied to the Batch Window.

Figure 2.28 Opening a Batch File

© SAMSUNG Electronics Co., Ltd. 2-22


LSM-R User Manual

Adding a batch file directory


1) Click „Save‟ in the Batch Window.
2) Click on the Add Directory icon at the top right corner of the popup window.
3) Enter the directory name in the popup dialog window.
4) Click „OK‟.
5) The batch file directory will be added.

Figure 2.29 Adding a Batch File Directory

Deleting a Batch File


Deleting a Batch File
1) Click „Save‟ in the Batch Window.
2) Select a batch file to delete from the popup window.
3) Click on the Delete icon at the top right corner of the window.
4) The batch file is deleted.
Deleting a batch file directory
1) Click „Save‟ in the Batch Window.
2) Select a batch file directory to delete from the popup window.
3) Click on the Delete icon at the top right corner of the window.
4) The batch file directory is deleted.

© SAMSUNG Electronics Co., Ltd. 2-23


LSM-R User Manual

2.1.8 Macro Execution


The macro execution icon allows the operator to add shortcut icons for the frequently used
command lists and execute the registered commands by clicking on the shortcut icons.

Figure 2.30 Macro Execution

Adding the Macro


Selecting a command from the command window to add to the macro list
1) Select a command from the tree in the command window.
2) Click „Macro‟.
3) The corresponding command will be added to the Macro List and its icon will be
activated.
Entering a Command in the Input Window to Add to the Macro List
1) Enter a command in the Input Window.
2) Click „Macro‟.
3) The corresponding command will be added to the Macro List and its icon will be
activated.

Applying the Macro


1) Select a command from the macro list.
2) The selected command will be applied to the command window.
3) The input parameters of the selected command will be applied to the parameter window.
4) The selected command will be applied to the Input Window.
5) The Help for the selected command will be displayed on the Help window.

Executing the Macro


Executing the macro in the same way as a basic command
1) Select a command from the macro list.
2) Click „Execute‟ in the Input Window.
3) The command‟s execution result will be displayed in the Response Window.
(You can also execute the command by pressing the Enter key.)
4) The command‟s execution log will be displayed on the execution history window.
Executing the macro with double-click
You can execute a command by double-clicking the corresponding command icon in
the macro list.

© SAMSUNG Electronics Co., Ltd. 2-24


LSM-R User Manual

Modifying the Macro


1) Select an icon from the macro list.

Figure 2.31 Modifying the Macro (1)

2) Right-click the icon and select „Edit‟.

Figure 2.32 Modifying the Macro (2)

3) Enter a command in the Input Window.

4) Click „OK‟.

Figure 2.33 Modifying the Macro (3)

5) The icon will be changed to the corresponding command in the macro list.

Figure 2.34 Modifying the Macro (4)

© SAMSUNG Electronics Co., Ltd. 2-25


LSM-R User Manual

Deleting the Macro


1) Select an icon from the macro list.

2) Right-click the icon and select „Delete‟.

Figure 2.35 Deleting the Macro (1)

3) The corresponding command will be deleted from the macro list.

Figure 2.36 Deleting the Macro (2)

Checking the Macro Command Redundancy


1) Select a command which already exists in the macro list from the command window.
2) Click „+‟.
3) A Duplicated Macro command message will be displayed.

Figure 2.37 Duplicated Macro Dialog

Saving and Importing the Macro List for Each Operator


1) Register a command to the macro list.
2) Close the CLI window.
3) Select „Configuration‟  „CLI‟ to restart the CLI window.
4) The commands registered to the macro for each operator will be loaded.

© SAMSUNG Electronics Co., Ltd. 2-26


LSM-R User Manual

2.2 NE Grow/Degrow
The tree viewer and map viewer provide a popup menu to register, modify and/or delete the NE.

2.2.1 NE Grow
There are two methods to register the NE. One method is to select „Configuration‟ 
„Grow‟, the other method is to select the „Grow‟ context menu from the group node of the
tree viewer or map viewer. A window to register the NE will then be displayed.

Figure 2.38 NE Grow

To enter the NE information, proceed as follows:

1) Select „Grow‟ from the NE Node popup menu of the tree viewer or map viewer, or
select „Configuration‟  „Grow‟ from the main menu.

© SAMSUNG Electronics Co., Ltd. 2-27


LSM-R User Manual

2) Once the grow window appears, enter the NE information, then click „Next‟.

Figure 2.39 Grow Window (1)

Group Item Description

Group - Select the upper group where the NE belongs to.


Type MACRO_OUTDOOR_RACK macro outdoor rack type configuration
MACRO_OUTDOOR_DIST Macro outdoor DU/RU separated configuration
PICO_OUTDOOR_RACK Pico outdoor rack type configuration
MACRO_OUTDOOR_MIG Macro outdoor migration configuration
MACRO_INDOOR_DIST Macro indoor DU/RU separated configuration
Version - Version of the NE. Manages the configuration in
XML.
ID * - The eNB ID value, 1-20 bit (1048575).
Serial No. - The eNB’s serial number
Name * - The NE name (unique within the system)
MM Type - Multi Mode Type
Bank Slot ID - The eNB’s Bank Slot ID
Location - System’s mount location
MME IP - IP address of MME
Information
External Link - External connection port

© SAMSUNG Electronics Co., Ltd. 2-28


LSM-R User Manual

3) In the second step window, enter the cell information. Click on each grid in the cell
information window to add or delete a cell.

Figure 2.40 Grow Window (2)

4) When you have finished entering all the cell information, click „Finish‟. A progress bar
will be displayed to show the progress of the grow process. The process will be
completed when the progress reached 100%.

Grow/Degrow Input Parameters


For the detailed information on the grow/degrow input parameters, see the
Network Resource Management (NRM) interface specification.

2.2.2 NE Degrow
If you select „Delete NE‟ from the NE node popup menu of the tree viewer or map viewer,
a password Input Window will be displayed. Enter the password and click „OK‟ to delete
the corresponding NE.

Figure 2.41 NE Degrow

© SAMSUNG Electronics Co., Ltd. 2-29


LSM-R User Manual

2.3 Cell Management


2.3.1 Cell Grow and Degrow
1) There are two methods to launch the cell management window.
One method is to select „Configuration‟  „Cell Management‟, the other method is to
select the „Cell Management‟ context menu from the NE node of the tree viewer or
map viewer. A window to perform the cell grow/degrow will then be displayed.

Figure 2.42 Cell Grow and Degrow

2) Upon the initial cell management window launch, the cells in the cell information will
be displayed in the following two types:
Cells in Grow status: The cells are displayed in yellow. If you right-click a cell and select
„Cell Delete‟ from the popup window, the text „Delete‟ will appear in red in the State
column of the Detail Cell Information section.
Cells not in Grow status: The cells are displayed in white. If you click a cell, the color will
be changed to pale yellow. A new row for the selected cell will be added to the Detail
Cell Information section, and the text „Add‟ will appear in blue in the State column.
Enter the information of the cell to add in each column of the newly added row.

3) When you have finished entering all the delete/add information of each cell in the
Detail Cell Information section, click „Apply‟. A progress bar will be displayed to
show the progress of the cell grow/degrow process.

© SAMSUNG Electronics Co., Ltd. 2-30


LSM-R User Manual

2.3.2 Administrative State Modification


You can change the administrative state of the cell in grow status to Locked or Unlocked
from the cell management window. A Locked state cell will be shown with a lock on it.
An UnLocked state cell will be shown without lock. Below is the procedure to change the
locked/unlocked state:

Locked  Unlocked Change


1) Right-click a locked cell, and select „UnLock‟ from the popup window.
2) A popup window will be displayed to show the administrative state modification status,
and the change will be subsequently applied.

Unlocked  Locked Change


1) Right-click an unlocked cell (cell shown without lock), and select „Lock‟ or „Shutting
Down‟ in the context menu.
2) A popup window will be displayed to show the administrative state modification status,
and the change will be subsequently applied.

© SAMSUNG Electronics Co., Ltd. 2-31


LSM-R User Manual

2.4 Neighbor
2.4.1 Neighbor Management
Double-click a station from the tree at the left of the window to display the neighbor
information of the corresponding station.

The neighbor function provides the following information:


The neighbor information of the selected eNB (displayed in Neighbor Relation Info at the
bottom of the middle pane).
The station in neighbor relationship with the selected eNB and the station which isn‟t
(displayed in Neighbor eNB Info at the top right pane): The station in neighbor
relationship with the selected eNB will be show in the „Neighbor eNB‟ tab.
The station which isn‟t, but which resides within the area of the neighbor relationship
with the selected eNB, will be shown in the „Other eNB‟ tab.
The information of the cells in the eNB (displayed in Cell Detail Info at the middle of the
right pane): Select an eNB information on the Neighbor eNB Info to display the cell
information of the selected eNB.
The neighbor add/modify/delete history (displayed in Neighbor Operation History at the
lower right of the window).

Figure 2.43 Neighbor Management GUI

© SAMSUNG Electronics Co., Ltd. 2-32


LSM-R User Manual

Adding a Neighbor
1) Double-click the eNB you wish to add the neighbor from the tree at the left of the window.
2) In Neighbor Relation Info, select the tab corresponding to the network (LTE, WCDMA,
CDMA1XRTT, CDMAHPRD) you wish to add the neighbor, then click „Add‟.
3) Enter each and every parameter in the popup window, then click „Add‟ in the popup
window to execute the command.
4) The execution result will be updated to the neighbor operation history.

Modifying a Neighbor
1) Select a neighbor in Neighbor Relation Info. The „Change‟ button at the top of the
table will be activated.
2) Click the activated „Change‟ button, then modify the parameters as necessary in the
popup window.
3) Click „Change‟ in the popup window.
4) The execution result will be updated to the neighbor operation history.

Deleting a Neighbor
1) Select a neighbor in Neighbor Relation Info. The „Delete‟ button at the top of the table
will be activated.
2) Click on the enabled „Delete‟ button. A warning popup will be displayed. Click „OK‟
in the warning popup.
3) The execution result will be updated to the neighbor operation history.

Additional Functions
The neighbor GUI allows the operator to easily view the related information.
If you select a neighbor relation in the Neighbor Relation Info, the information of the
source eNB of the corresponding relation will be highlighted, and the information of
the cell of the corresponding eNB will be displayed.
The Status in the Neighbor Relation Info represents the status of the corresponding
neighbor.
Green: Bi-directional neighbor
Yellow: Uni-directional neighbor
Red: Neighbor which related cell has been deleted
White: Neighbor which target eNB does not exist in the LSM (remote neighbors and
other PLMN neighbors will also be shown in white)
With the Neighbor Relation Info containing valid data, select a number in the Cell Num
selection combo box at the top of the window. The neighbor relation having the selected
number‟s cell as the source cell will change to blue, and when you select a relation in
blue color, the information of the corresponding source cell in the Cell Detail Info will
be displayed in green.
Right-click the Neighbor Operation History to delete the information in the table.

© SAMSUNG Electronics Co., Ltd. 2-33


LSM-R User Manual

Neighbor Import/Export
(This function allows to import/export the neighbor information, and can be executed
from the menu bar at the top of the window.)

Figure 2.44 Neighbor Import/Export GUI

Import
1) Click „File‟ to import the file from the PC.
2) The imported data will be displayed in the table.
3) Make the desired modification to the table, then select one of the commands at the top
of the window.
4) Check on the relation you wish to execute the selected command, then click „Apply‟.

Export
1) Check on the station to view the neighbor from the tree at the left of the window, then
click „Inquiry‟ at the top of the window. (If you checked on bi-direction, each neighbor
relation will be viewed in both directions.)
2) The neighbor relation of the selected eNB will be displayed on the table. Click „Save‟
to save it to the PC (.csv or .xls).
3) You can also view and modify the data in the table, then apply to the server.

© SAMSUNG Electronics Co., Ltd. 2-34


LSM-R User Manual

Neighbor Integrity Check


This function allows to check the integrity of the neighbor information, and can be
executed from the menu bar at the top of the window.

Figure 2.45 Neighbor Integrity Check

The integrity check will verify the following criteria:


DELETED ENB OR REMOTE RELATION: The relation‟s target eNB has been deleted or
is a remote neighbor. If corrected, the corresponding relation will be deleted.
DELETED ENB FROM EXTERNAL: The relation‟s target eNB has been deleted.
If corrected, the corresponding relation will be deleted.
DELETED CELL 1: The relation‟s target cell information does not exist in the LSM.
If corrected, the corresponding relation and the external-cell information will be
deleted.
DELETED CELL 2: The relation‟s target cell information exists in the LSM, but the
external-cell information is missing. If corrected, the corresponding relation will be
deleted.
NOT DUPLEX: Represents an uni-directional neighbor relation. If corrected, a bi-
directional relation with default values will be added.
Non-IDENTICAL PARAMETER: The target cell‟s parameter value (external-cell value) of
the corresponding relation does not correspond to the actual cell‟s parameter value.
The displayed parameter values will not correspond to each other. If corrected, the
target cell‟s parameter value (external-cell value) will be changed to the actual cell‟s
parameter value.

© SAMSUNG Electronics Co., Ltd. 2-35


LSM-R User Manual

2.5 Software
The „UI_SWM (UI_SW Management)‟ provides the user interface for the commands
necessary to perform the package upgrade, software (SW) update and firmware (FW)
update through the GUI. In addition, the UI_SWM provide the functions for the eNB to
download and activate the package, SW and FW, as well as the functions to verify the
package installation of the LSM/NE.

The UI_SWM provides the package upgrade, software update and firmware update functions,
as well as the functions to schedule their execution and save the execution history.
The operator can perform the package upgrade, software update and firmware update at the
desired time.

2.5.1 Package Upgrade


In case of upgrading version of total package, performs the package upgrade below.

Figure 2.46 Package Upgrade

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
The check tree option allows the selection of multiple NEs.
The NEs in the tree can be displayed selectively, per NE type or NE version. If you
check on a NE in the tree, the check will also be applied to the NE status table.
NE Status Table: Provides the information of the current and download package versions of
each NE. Click on the right buttons of the table ( ) to display the information of the
package, active software and firmware applied to each eNB. If the information of both
current and download package versions exist, the package status will be displayed
with the priority given to the download package version.
Upgrade Information: Executes the command based on the selections in the Command
Type, Package Version, Mode, Execute Type and Execute Schedule options.

© SAMSUNG Electronics Co., Ltd. 2-36


LSM-R User Manual

Package Upgrade Information, Download Information of SW/FW Update


Group Item Description

Command Type Download Executes the download.


Activation Activates a downloaded package.
Download + Activation Processes the activation after completing the
download.
Package Version - Displays the version of the package to download.
- Click the picture ( ) on the right to display
the list of the current package version.
Mode AP_RESET Resets after completing the activation.
REBOOT Reboots after completing the activation.
Execute Type immediate Executes the command immediately.
schedule Executes the command in schedule.
Execute Schedule - Sets the time for the scheduled execution.
Estimated time - Displays the time the corresponding function is
expected to complete when the apply button is
clicked.
Elapsed time - The completion time.

Package Upgrade Sequence


1) Check the desired NE in the tree.
2) Select the command type in „Upgrade Information‟.
3) Select the package to upgrade in „Package Version‟.
4) To execute the command immediately, select „immediate‟ in „Execute Type‟.
5) If you select „schedule‟, enter the desired time for the scheduled execution to the right
field.
The entered time should be at least 2 minutes later than the current time.
6) If you select „Download + Activation‟ or „Activation‟ in „Command Type‟, also select
the mode.
7) Click „Apply‟.
The value of the progress bar will change as the package upgrade proceeds.

© SAMSUNG Electronics Co., Ltd. 2-37


LSM-R User Manual

2.5.2 Verify
Compares the package and firmware between the LSM and NE.

Figure 2.47 Verify Window

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
Verification Criteria: Sets the criteria for the verification.
Verification Information: A list of NEs to perform the verification. Provides the Compare
( ) icon to view the verification result and detailed information. Click the Compare
icon of the corresponding NE to view the detailed information.

The parameters for the verification criteria are as follows:

Parameter Description

Package Version Verify package version


Type Verify Type
- Software
- Firmware

1) Check the desired NE in the tree.


2) Click „Add‟ in „Verification Criteria‟.
3) Select the version and type of the package to verify in „Verification Criteria‟.
4) Click „Verify‟ in „Verification Criteria‟.

© SAMSUNG Electronics Co., Ltd. 2-38


LSM-R User Manual

5) Click „Compare‟ to view the detailed comparison for each file.

Figure 2.48 Package Compare Information Window

Background Color Description

White Normal (Same Image)


Red The same file exists in both the LSM and NE, but the content is different.
Yellow The file exists only in the LSM or NE.

Save: Saves the contents of the comparison to an Excel file.


Update: In case of red or yellow background (the file exists only in the LSM), check on the
checkbox on the left then click „Update‟. The update list will be added to the
corresponding software/firmware update tab. Note: The task will not be performed if a
software/firmware update is already running.

© SAMSUNG Electronics Co., Ltd. 2-39


LSM-R User Manual

2.5.3 Software Update


In case of updating specified software, performs the software update below.

Figure 2.49 S/W Update

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
Software List: Displays a downloadable list based on the NEs selected in the tree viewer.
The [2.0.0] next to the title represents the version of the checked eNBs.
Download Software: The list of the actual tasks to be performed, added from the software
list.
Download Information: Executes the command based on the Command Type, Execute
Type or Execute Schedule.

Software Update Sequence


1) Check the desired NE in the tree.
2) Click „Search‟ in „Software List‟.
3) Check the software to update in „Software List‟.
4) Click „Add‟ in „Software List‟.
5) Verify if the software list is displayed in „Download Software‟.
6) Select „Command Type‟ in „Download Information‟.
7) To execute the command immediately, select „immediate‟ in „Execute Type‟.
If you select „schedule‟, enter the desired time for the scheduled execution to the right
field. The entered time should be at least 2 minutes later than the current time.
8) Click „Apply‟.
The value of the progress bar will change as the software upgrade proceeds.

© SAMSUNG Electronics Co., Ltd. 2-40


LSM-R User Manual

2.5.4 Firmware Update


Performs the firmware update.

Figure 2.50 Firmware Update

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
Firmware List: Displays a downloadable list corresponding to the version selected in the
version combo box. The [2.0.0] next to the title represents the version of the checked
eNBs.
Download Firmware: The list of the actual tasks to be performed, added from the firmware
list.
Download Information: Executes the command based on the Command Type: Reboot,
Execute Type or Execute Schedule.

Firmware Update Sequence


1) Check the desired NE in the tree.
2) Click „Search‟ in „Firmware List‟.
3) Check the firmware to update in „Firmware List‟.
4) Click „Update‟ in „Firmware List‟.
5) Check if the firmware list is displayed on „Download Firmware‟.
6) Select the „Board‟ information in „Download Firmware‟. (This setting is not required
for the download.)
7) Select the „Side‟ information in „Download Firmware‟. (This setting is not required for
the download.)

© SAMSUNG Electronics Co., Ltd. 2-41


LSM-R User Manual

8) Select „Command Type‟ in „Download Information‟.


9) To execute the command immediately, select „immediate‟ in „Execute Type‟.
If you select „schedule‟, enter the desired time for the scheduled execution to the right
field. The entered time should be at least 2 minutes later than the current time.
10) Click „Apply‟.
The value of the progress bar will change as the firmware upgrade proceeds.

© SAMSUNG Electronics Co., Ltd. 2-42


LSM-R User Manual

2.5.5 History
Views the Command History

Figure 2.51 History Window

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
Search Criteria: Allows you to select the history search criteria.
Command History: Displays the search result. The results of the command executed
based on the EMS will be displayed in the table. Double-click the table to display the
details of the command execution for each NE in „Detail‟. (Clicking the Detail ( )
icon will generate the same result as above.)
Detail: Displays the command execution result for the NE upon clicking „Command
History‟.

The parameters for the search criteria are as follows:

Parameter Description

Type Command history type


- All
- Package
- Software
- Firmware
Command Type Command type
- All
- Download + Activation
- Download
- Activation

© SAMSUNG Electronics Co., Ltd. 2-43


LSM-R User Manual

(Continued)

Parameter Description

Execute Type Task type


- All: All tasks
- Immediate: Tasks executed immediately
- Schedule: Scheduled tasks
Status Task Status
- All: All tasks
- Running: Tasks currently running
- Complete: Completed tasks
- Cancel: Cancelled tasks
- Fail: The scheduled task failed to run due to another running task.
- Process Restart: The EMS (mf) restarted during the execution of the task.
Period Search Period

1) Select the criteria in „Search Criteria‟.


2) Click „Search‟ in „Search Criteria‟.
3) Check if the search result is displayed in „Command History‟.
4) Double-click a table value in „Command History‟.
5) Check if the corresponding details are displayed in „Detail‟.
Clicking the Detail icon ( ) in „Command History‟ will create the same result as above.

© SAMSUNG Electronics Co., Ltd. 2-44


LSM-R User Manual

2.5.6 Schedule
Views the scheduled task.

Figure 2.52 Schedule Window

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
Search Criteria: Allows you to select the schedule search criteria.
Schedule List: Displays the search result. The results of the command executed based on
the EMS will be displayed in the table. Double-click the Detail ( ) in the table to
display the details in „Detail‟.
Detail: From „Schedule List‟, click the Detail ( ) icon to view the details.

The parameters for the search criteria are as follows:

Parameter Description

Type Scheduled task type


- All
- Package
- Software
- Firmware
Command Type Scheduled task’s command type
- All
- Download + Activation
- Download
- Activation

© SAMSUNG Electronics Co., Ltd. 2-45


LSM-R User Manual

1) Select the criteria in „Search Criteria‟.


2) Click „Search‟ in „Search Criteria‟.
3) Check if the information of the schedule registered in „Schedule List‟ is displayed.
4) From „Schedule List‟, click the Detail icon ( ) and check if the corresponding
information is displayed in „Detail‟.
5) To delete the schedule containing search criteria, check on the schedule registered to
the „Schedule List‟ then click „Delete‟.

© SAMSUNG Electronics Co., Ltd. 2-46


LSM-R User Manual

2.6 Data Audit


From the Data Audit window, check the data versions of eNB and LSM and then select an
eNB that the operator want to synchronize, and execute the configuration synchronization
manually.

2.6.1 Data Audit


Executing Data Audit
1) From the LSM main window, select the „Configuration‟  „Data Audit‟ menu.
2) Launch the Data Audit window.
3) Once the Data Audit window opens, the data version of the LSM for all eNBs
registered to the tree will be retrieved and displayed in the data version of the
configuration at the right as illustrated below.

Figure 2.53 Configuration Information Sync

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
Data Audit: Allows the operator to view the eNB data version and LSM data version of the
NE registered to the EMS and decide whether to perform the Data Audit.
Network Group: The name of the network group where the eNB belongs to.
eNB Name: The name of the eNB registered by the operator.
eNB Id: The eNB‟s independent, unique ID.
eNB Data Version: The eNB data version checked in the eNB through the cdd.
LSM Data Version: The data version managed in the LSM DB.
Result: Result of the execution.

© SAMSUNG Electronics Co., Ltd. 2-47


LSM-R User Manual

Scheduler: instead of performing the Data Audit manually, the operator can schedule the
EMS to perform it periodically by registering the task to the scheduler and view the
corresponding information in the scheduler.

Viewing Data Audit


1) From the LSM main window, select the „Configuration‟  „Data Audit‟ menu.
2) Launch the Data Audit window.
3) Select the desired criteria from NE Type and NE Version at the top of the tree view
(type or version, or type and version).
4) Once you select type and/or version, the eNB information corresponding to the criteria
will be retrieved from the LSM and displayed on Data Audit at the right of the window.

Figure 2.54 Viewing the Configuration Information Synchronization

System: Select the criteria to view the NE.


NE Type: Select the type of the eNB.
NE Version: Select the version of the eNB.
If you select the NE type and/or version, the information of the eNBs corresponding to
the criteria will be displayed. Otherwise, all eNBs‟ information will be displayed.
Tree Viewer: The information of the eNBs corresponding to the criteria selected in System
will be displayed in the tree.
Data Audit: The information of the eNBs corresponding to B will be displayed along with
the data version.

© SAMSUNG Electronics Co., Ltd. 2-48


LSM-R User Manual

Synchronize Data
1) From the LSM main window, select the „Configuration‟  „Data Audit‟ menu.

2) Launch the Data Audit window.

3) In the tree view, select an eNB as illustrated below to launch the Data Audit.

Figure 2.55 Selecting an eNB from the tree

4) Once an eNB is selected from the tree, the same eNB information will be selected
from Synchronize Data as below:

Figure 2.56 Verifying the eNB infor4-mation selected from Sync Data

5) Click „Execute‟.

6) The result will be displayed in the „Result‟ section.

© SAMSUNG Electronics Co., Ltd. 2-49


LSM-R User Manual

2.6.2 Scheduling Function for Periodical Data Audit


Viewing the Scheduler
1) From the LSM main window, select the „Configuration‟  „Data Audit‟ menu.
2) The Data Audit window will be displayed.
3) Select the Scheduler tab from Data Audit.
4) The registered scheduler information will be displayed as below:

Figure 2.57 Viewing the Scheduler

Id: The ID registered to the scheduler.


Start Date: The time and date of the initial Data Audit.
End Date: The time and date the Data Audit is scheduled to end.
Period: The period the Data Audit will be performed (day, week, month)
Network Group: Network group information.
eNB Name: The name of the eNB registered by the operator.
Registration Date: The registration date.

© SAMSUNG Electronics Co., Ltd. 2-50


LSM-R User Manual

Adding Scheduler
1) From the LSM main window, select the „Configuration‟  „Data Audit‟ menu.

2) The Data Audit window will be displayed.

3) The tree and the data version of the eNB will be displayed as illustrated below.

4) Select the eNB to add to the scheduler from the tree.

5) Select „Add Scheduler‟ from „Configuration Information Sync‟ as below:

Figure 2.58 Adding Scheduler

6) Enter the desired start date, end date and period as below:

Figure 2.59 Viewing the Scheduler

You can also use the calendar to enter the start date and end date.

Figure 2.60 Date Selection Calendar

Enter the period. (Select between day, week or month.)

Figure 2.61 Selecting the Scheduler Period

© SAMSUNG Electronics Co., Ltd. 2-51


LSM-R User Manual

7) Click „Execute‟.

8) The scheduler for the periodic Data Audit will be added to


$nms_home/data/xml/schedule.xml.

Deleting Scheduler
1) From the LSM main window, select the „Configuration‟  „Data Audit‟ menu.
2) The Data Audit window will be displayed.
3) Select the Scheduler tab to view the scheduler information.
4) Select the scheduler information to delete.
Click „Delete‟ to delete the selected scheduler information.

© SAMSUNG Electronics Co., Ltd. 2-52


LSM-R User Manual

2.7 SerialNo Management


The SerialNo Management allows the operator to add, modify and delete Serial Number.

Figure 2.62 SerialNo Management

Adding a Serial Number


1) From the LSM main window, select the „Configuration‟  „SerialNo Management‟
menu.
2) Select the check box of eNB to add Serial Number, and enter the value in
„Serial_Number‟ field.
3) Click the „Apply‟ button. The operator can check Serial Number added on the popup
menu of „Success SerialNumber change‟.

Modifying a Serial Number


1) From the LSM main window, select the „Configuration‟  „SerialNo Management‟
menu.
2) Select the check box of eNB to modify Serial Number, and modify the value in
„Serial_Number‟ field.
3) Click the „Apply‟ button. The operator can check Serial Number modified on the
popup menu of „Success SerialNumber change‟.

© SAMSUNG Electronics Co., Ltd. 2-53


LSM-R User Manual

Deleting a Serial Number


1) From the LSM main window, select the „Configuration‟  „SerialNo Management‟
menu.
2) Select the check box of eNB to delete Serial Number, and delete the value in
„Serial_Number‟ field.
3) Click the „Apply‟ button. The operator can check Serial Number deleted on the popup
menu of „Success SerialNumber change‟.

© SAMSUNG Electronics Co., Ltd. 2-54


LSM-R User Manual

2.8 System Backup


„System Backup‟ allows the operator to backup/restore PLD.

2.8.1 Backup
„PLD Backup‟ window and procedure are as follows:

Figure 2.63 Backup Window

Tree Viewer: Displays all NEs registered to the EMS in tree structure.
System Backup : Register PLD Backup schedule or execute PLD Backup immediately.

Executing PLD Backup


1) From the LSM main window, select the „Configuration‟  „System Backup‟ menu.
2) Select the eNB to backup PLD in Tree Viewer.
3) Select „Immediately‟ in „Type‟ field.
4) Click the „Execute‟ button.
5) The execution result is displayed in System Backup window.

Figure 2.64 Execution Result of System Backup

© SAMSUNG Electronics Co., Ltd. 2-55


LSM-R User Manual

Registering Backup Schedule


1) From the LSM main window, select the „Configuration‟  „System Backup‟ menu.
2) Select the eNB to backup PLD in Tree Viewer.
3) Select „Schedule‟ in „Type‟ field.
4) Set backup interval.
Daily (1 day interval): set Hour, Minute.
Weekly (1 week interval): set Day, Hour, Minute.
Monthly (1 month interval): set Date, Day, Hour, Minute.
5) Click the „Execute‟ button.

Deleting Backup Schedule


1) Select the check box of schedule to delete.
2) Click the „Delete‟ button.

2.8.2 Restore
„PLD Restore‟ window and procedure are as follows:

Figure 2.65 Restore Window

© SAMSUNG Electronics Co., Ltd. 2-56


LSM-R User Manual

1) From the LSM main window, select the „Configuration‟  „System Backup‟ menu.
2) Select the eNB to restore PLD in Tree Viewer.
3) Click the „File‟ button of the corresponding eNB in Restore table.

Figure 2.66 Selecting File to restore

3) Double-click the file to restore.


4) Click the „Execute‟ button.
5) The result of restore is displayed in Result and Reason column.

Figure 2.67 Execution Result of Restoring

© SAMSUNG Electronics Co., Ltd. 2-57


LSM-R User Manual

2.8.3 System Backup History


The window and procedure to view execution history of PLD Backup and Restore are as
follows:

Figure 2.68 System Backup History Window

1) From the LSM main window, select the „Configuration‟  „System Backup‟ menu.
2) Select the eNB to view execution history in Tree Viewer.
3) Select Backup/Restore „Type‟ field.
4) Select Success/Failed „Result‟ field.
4) Click the „Search‟ button.

© SAMSUNG Electronics Co., Ltd. 2-58


LSM-R User Manual

CHAPTER 3. Fault Management

The fault management provides various functions to manage the faults occurring in the
system.

3.1 Event Viewer


The „Event Viewer‟ displays the events received through the server in real time.

Fault  Event Viewer

Figure 3.1 Event Viewer Window

The parameters of the event viewer are as follows:

Parameter Description
Severity Indicates an event grade.
- Critical: critical fault
- Major: major fault
- Minor: minor fault
- Warning: fault information
- Indeterminate: fault whose severity is not defined
- Status: general information
Code The event code.
Group Displays the event groups in the following types:
- Communication: communication process/procedure
- Processing: software/processing procedure
- Environment: external equipment environment
- QoS: degradation of service quality
- Equipment: fault in equipment
- etc.: other faults & statuses.
Location Location of the event.
Probable Cause Cause of the event.

© SAMSUNG Electronics Co., Ltd. 3-1


LSM-R User Manual

Time Time of the event occurrence.

© SAMSUNG Electronics Co., Ltd. 3-2


LSM-R User Manual

Event Viewer Filter


The „Event Viewer‟ can be set to display only the specific events. Click the „Filter‟ button
( ) at the top of the „Event Viewer‟ to display the following window, then select the
criteria of the event you wish to display.

Figure 3.2 Event Viewer Filter Window

Pausing/Receiving Events
If you click the „Play‟ button ( ) at the top of the „Event Viewer‟, the „Play‟ button will be
changed to „Pause‟ ( ) and the events will not be displayed anymore. If you click the
„Pause‟ button again, it will be changed back to „Play‟ and all the events not displayed
during the pause will be displayed.

Deleting Displayed Events


Click the „Clear‟ button ( ) at the top of the „Event Viewer‟ to delete the events currently
displayed on the „Event Viewer‟. However, the history saved in the database will not be
deleted.

Printing Events
Click the „Print‟ button ( ) at the top of the „Event Viewer‟ to print the events currently
displayed on the „Event Viewer‟.

Saving Events
Click the „Save‟ button ( ) at the top of the „Event Viewer‟ to save the events currently
displayed on the „Event Viewer‟ in an Excel file.

© SAMSUNG Electronics Co., Ltd. 3-3


LSM-R User Manual

Event Details
Double-click a data in the „Event Viewer‟ to display the detailed information of the
corresponding data on the popup window as below.

Figure 3.3 Detailed Event Information Window

© SAMSUNG Electronics Co., Ltd. 3-4


LSM-R User Manual

3.2 Viewing the Event History


The „Event History‟ menu allows viewing and modifying the fault information saved in the
database.

Fault  Event History

Figure 3.4 Event History Window

The parameters of the EMS history are as follows:

Parameter Description

Target The NE to view


Period Time lapse from when the event occurred to when it was canceled.
Event Type The event type to view (All/Alarm/Status/Fault)
Severity Event severity
- Critical: critical fault
- Major: major fault
- Minor: minor fault
- Warning: fault information
- Indeterminate: fault whose severity is not defined
- Status: general information
Group Type of the event group
- Communication: communication process/procedure
- Processing: software/processing procedure
- Environment: external equipment environment
- QoS: degradation of service quality
- Equipment: fault in equipment
- etc.: other faults & statuses

© SAMSUNG Electronics Co., Ltd. 3-5


LSM-R User Manual

(Continued)

Parameter Description

Code Alarm code


Ack Fault recognition
Clear Fault clear type

Searching the EMS History


1) In the tree view of the main window, select an NE to view. The selected NE will be
displayed in the „Target‟ field of the window. Select „All‟ to view all the system faults
including the EMS faults, „EMS‟ to view only the faults occurred in the EMS.
2) You can select „Alarm‟, „Status‟ or „Fault‟ for the „Event Type‟. If you select „Alarm‟,
you can select the field values „Severity‟, „Group‟, „Ack‟, „Clear‟ and/or „Code‟ for
viewing.
If you select „Status/Fault‟, the „Severity‟, „Group‟, „Ack‟, „Clear‟ and „Code‟ values
will not be applied.
3) Click „Search‟.
4) Check if the fault information corresponding to the selected criteria is displayed on the
result table.
5) Click „Save‟ to save the result.

Enabling/Disabling Fault Recognition


1) From the result table, select the fault you wish the system to recognize.
2) Click „Ack‟.
3) From the „No.‟ column of the result table, check if the selected fault has been enabled
for recognition.
4) To disable the fault recognition, select a fault from the result table and click „Unack‟.

Clearing a Fault
1) From the result table, select the fault you wish to clear.
2) Click „Clear‟.
3) Check the background color of the „Severity‟ column and the „Clear Time‟ column of
the table to see if the selected fault has been successfully cleared.

© SAMSUNG Electronics Co., Ltd. 3-6


LSM-R User Manual

3.3 Current Alarm


This function displays the unclear faults, and applies the alarms occurring afterwards in
real time. You can change the information of a specific fault.

Fault  Current Alarm

Figure 3.5 Current Alarm Window

The parameters of the Current Alarm are as follows:

Parameter Description

Severity the severity of the event.


Code the alarm code.
Group the event group where the event belongs to.
Location location of an event
Probable Cause cause of an event
Alarm time time the event has occurred
Clear time time the alarm was cleared
Clear type if the fault was cleared, the type of the fault clearance ‘Auto/Manual’

© SAMSUNG Electronics Co., Ltd. 3-7


LSM-R User Manual

Viewing Current Alarm


1) From the menu, select „Fault‟ then „Current Alarm‟ to display the uncleared alarms on
the table.
2) When a fault occurs, the corresponding information is displayed on the table. When an
alarm is cleared, the background color of the „Severity‟ column and the „Clear Time‟
column for the corresponding alarm will be updated.
3) If you click the „No.‟, „Severity‟, „Group‟ or „Alarm Time‟ column‟s header, the
information in the table will be sorted accordingly.
4) You can filter the faults displayed on the screen by clicking the icon.
5) If you click the „Refresh‟ button, only the uncleared information will be displayed on
the table again.
6) If you click the „Pause‟ button, the button will change to „Resume‟, and the newly
occurring faults will not be displayed on the table. Click the „Pause‟ button again to
display the faults which were not displayed during the pause.
7) Click the icon to print the result.
8) Click the icon to save the result table in an Excel or CSV file.

Modifying Current Alarm


To select a specific fault information or select/clear the entire alarms in the table, check on
the checkbox ( ) and click „Ack‟/„Unack‟ or „Clear‟.
If you select „Ack‟, the background color of the „No.‟ column will be changed to gray.
If you select „Unack‟ for an alarm which was previously active in Ack state, it will return to
the pre-Ack status.
If you select „Clear‟, the background color of the „Severity‟ column will be changed to
green, and the value of the „Clear Time‟ column will be updated.

© SAMSUNG Electronics Co., Ltd. 3-8


LSM-R User Manual

Viewing the Detailed Fault Information

Figure 3.6 Detailed Information of Current Alarm

If you double-click the data on „Current Alarm‟ or select „Show Details‟ on the popup menu,
the detailed information of the corresponding data will be displayed on a popup window.
If you click the „Code Information‟ button, the information of the corresponding alarm
code will be displayed on a popup window.
A „Severity‟ column which color is in „Clear‟ state represents an alarm that has been
cleared. The time the alarm was cleared will be displayed along with its clearance type.

© SAMSUNG Electronics Co., Ltd. 3-9


LSM-R User Manual

3.4 Alarm Statistics


The „Alarm Statistics‟ function allows the operator to search the fault statistics information
saved in the database of the EMS using various search criteria.

Fault  Alarm Statistics

Figure 3.7 Fault Statistics Window

The parameters of the fault statistics are as follows:

Parameter Description

Target The command execution target value.


Series Used to select the series of the chart. (Severity/Code)
Item Used to select the value for the X axis of the chart.
If the ‘Location’ value is selected, you cannot select the summary by time slot in
the ‘Time Type’ field.
Time Type Used to select the time unit for the statistics.
‘Hourly, Daily, Monthly, Hourly Sum., Daily Sum., Monthly Sum.’
Group Used to select a fault group.
Period Used to select the time to view.

© SAMSUNG Electronics Co., Ltd. 3-10


LSM-R User Manual

Searching the Fault Statistics


1) In the tree view of the main window, select an NE to view. The selected NE will be
displayed in the „Target‟ field of the window. Select „All‟ to view the statistics of all
the system faults including the EMS faults, „EMS alarm only‟ to view only the faults
occurred in the EMS.
2) You can select and view a specific group from the „Group‟.
3) Select the data corresponding to the series of the result chart from the „Series‟ field.
4) Select the data corresponding to the X-axis of the result chart from the „Item‟ field.
5) Specify the type of the statistics time in the „Time Type‟ field. The initial value of the
„Period‟ field will be changed accordingly.
6) Click „Search‟.
7) Check if the „Alarm statistics‟ data satisfying the search criteria are displayed on the
result table and chart.
If you drag the mouse cursor over the chart, the selected part will be zoomed in and
displayed with a scroll bar.
If you click the „Zoom Out‟ button, the scroll bar will disappear and the chart will
revert to its original size.
8) Click „Print‟ to print the result.
9) Click „Save‟ to save the result table in an Excel file and the result chart in a PDF file.

© SAMSUNG Electronics Co., Ltd. 3-11


LSM-R User Manual

3.5 Audible Alarm


The „Audible Alarm‟ allows to set the audible alarm generation policy for each operator.

Fault  Audible Alarm

Figure 3.8 Audible Alarm Window

The parameters of the audible alarm are as follows:

Parameter Description

Mute Sets the entire audible alarms on/off.


Play - Repeat: Used to specify the number of times the audible alarm will be played.
If unchecked, the alarm will be played only once.
- No Interception: If checked, the audible alarm that occurred first will be played all
the way through even if another audible alarm is generated. The next alarm will be
played afterwards.
Grade Used to select the grade to generate the audible alarm. ‘Critical/Major/Minor’
Policy Used to select the audible alarm generation policy. ‘Representative Alarm/Final Alarm’

© SAMSUNG Electronics Co., Ltd. 3-12


LSM-R User Manual

Setting Audible Alarms by Level


1) From the menu, select „Fault then „Audible Alarm‟ to pop up the „Audible Alarm‟
setup window.
2) Select or deselect the „Mute‟ option.
3) Select „by Grade‟.
4) Using the „Repeat‟ button, specify whether to allow repetition and the repetition count.
5) Select or deselect „No Interception‟.
6) From „Grade‟, select the grade in which the audible alarm will be generated.
7) From „Policy‟, select the audible alarm generation policy.
8) Click „Set‟ o complete the setup.
9) You can click „Pause‟ to pause the current audible alarm.

Setting Audible Alarms by Fault Code


1) From the menu, select „Fault‟ then „Audible Alarm‟ to pop up the „Audible Alarm‟
setup window.
2) Select or deselect the „Mute‟ option.
3) Click „by Alarm Code‟.
4) Using the „Repeat‟ button, specify whether to allow repetition and the repetition count.
5) Select the sound source by fault code.
Click „Add‟ to select a fault code. You can specify the sound source by clicking the
„Browse‟ button at the right of the fault code. If you click the Set button, both the fault
code and sound source information will be saved.
6) Click „Set‟ to complete the setup.
7) You can click „Pause‟ to pause the current audible alarm.

© SAMSUNG Electronics Co., Ltd. 3-13


LSM-R User Manual

3.6 Visible Alarm


The „Visible Alarm‟ allows to set the visible alarm for each operator. The Visible Alarm
function opens an alarm window automatically when a fault is generated, and displays the
alarms occurred until the operator recognizes them.

Fault  Visible Alarm


The visible alarm is initially set to OFF, and can be manually set to ON. It can also be
configured for each corresponding level and/or specific fault code.

Figure 3.9 Visible Alarm Setting Window

The parameters of the visible alarm are as follows:

Parameter Description

OFF Sets the entire visible alarms on/off.


- By Level: Used to specify whether to filter the visible alarms by level.
- By Fault Code: Used to specify whether to filter the visible alarms by fault code.
Grade Used to select the grade in which the visible alarm will be generated.
‘Critical/Major/Minor’

© SAMSUNG Electronics Co., Ltd. 3-14


LSM-R User Manual

Setting the visible alarm by level


1) From the menu, select „Fault‟ then „Visible Alarm‟ to pop up the „Visible Alarm‟ setup
window.
2) Deselect the „OFF‟ check box.
3) Select „by Grade‟, to specify the grade.
4) Specify the level of the alarms you wish to receive as visible alarm to „Critical/Major/
Minor‟.
5) Click „Set‟ to verify the application of the settings.
6) When a fault is generated, the Visible Alarm window will be opened automatically if
not already open.

Clearing the Visible Alarm


1) From the menu, select „Fault‟ then „Visible Alarm‟ to pop up the „Visible Alarm‟ setup
window.
2) Select the „OFF‟ check box.
3) Click „Set‟.
4) The visible alarm will not be displayed even if the pre-defined alarm is generated.

Automatic Generation of Visible Alarm


1) When the Visible Alarm is set to „ON‟, the alarm will be automatically generated as
below if it meets the predefined criteria (level and alarm code).
2) If the window is closed, it will be opened automatically if the alarm meeting the
criteria is generated.

Figure 3.10 Visible Alarm Output Window

© SAMSUNG Electronics Co., Ltd. 3-15


LSM-R User Manual

Setting Visible Alarms by Fault Code


1) From the menu, select „Fault‟ then „Visible Alarm‟ to pop up the „Visible Alarm‟ setup
window.

2) Deselect the „OFF‟ check box.

3) Select „by Alarm Code‟ to specify the fault code.

4) Click „Add‟ to register a fault code.

Figure 3.11 Setting the Visible Alarm by Fault Code

5) Select an NE type in the Fault Code Search window.

6) Select the version of the selected NE type.

7) Select an event type.

8) Click „Search‟ to display the alarm code information of the selected NE type.

9) Select the alarm code to be displayed as a visible alarm (by checking on the check-
box), then click „Add‟.

10) If you click „Add‟ button, the code selection window disappears.

11) Click „Set‟ on the visible alarm setting window.

© SAMSUNG Electronics Co., Ltd. 3-16


LSM-R User Manual

12) If an alarm that meets the criteria occurs, the visible alarm window will automatically
appear.

Figure 3.12 Selecting the Visible Alarm Code

© SAMSUNG Electronics Co., Ltd. 3-17


LSM-R User Manual

CHAPTER 4. Performance
Management

The performance management manages the functions related to the performance of the
network resource.
The following key functions are provided by the performance management:
Performance Statistics
Collection Results
PI Monitoring
On Demand
Call Trace

To manage the performance, select „Performance Management‟ from the main menu.

Figure 4.1 Selecting the Performance Menu

© SAMSUNG Electronics Co., Ltd. 4-1


LSM-R User Manual

4.1 Performance Statistics


To view the statistics data collected.

Performance  Performance Statistics

System Selection Area

Statistics Family
Selection Area Statistics Result
View Area

Parameter Area

Search Criteria
Area

Figure 4.2 Statistics Data View Window

© SAMSUNG Electronics Co., Ltd. 4-2


LSM-R User Manual

4.1.1 Viewing Statistics Data


Viewing Statistics Data
1) From the system selection area, select the NE you wish to view in the tree.
2) Search the Statistics Family in the order of Category, Statistics Family.
3) To search a specific LLOC in the parameter area, enter or select the corresponding
value. Skip this step if you want to search the entire items.
4) In the search criteria area, set the „Statistics Period‟ to 15MIN, HOURLY, DAILY,
MONTHLY.
5) You can also set the period automatically by selecting the „1 Hour‟, „12 Hours‟ or „1 Day‟
buttons.
6) Click „Search‟ to search the results. When the search is complete, the results are
displayed on the right pane.

Selecting Statistics Family


Select the Statistics Family in Statistics Family Selection Area.

Selecting Parameters
Enter the following values to the „Parameter‟ field according to the data type of the LLOC:

Type Description

enum If the data type is enum, a combo list will automatically appear when you click the
mouse button.
Ipv4 Enter the IPV4 type.
enbID Enter the ID of the eNB.
String Enter all other data as string type.

© SAMSUNG Electronics Co., Ltd. 4-3


LSM-R User Manual

Statistics Search Result Window


If you enter the search criteria and click „Search‟, the search results will be displayed on
the statistics result view window. Below are the details of the main items in the statistics
result view area.

Item Description

Hour The time the statistics were collected.


The latest data will appear in the highest row.
Location The logical location where the statistics were collected.
Statistics Item the items defined in the PmAttribute.xml will be displayed in sequential order.
The items set as visible=‘false’ or excluded from filtering will not be displayed.

Sorting Statistics Search Results


If you click the „Time‟ field in the table header of the search result window, the data display
will be changed from latest  oldest. These options will be toggled each time the button is
pressed.

Icons in the Statistics Result View


Item Description

Saves the statistics search results.

Prints the statistics search results.

Filters the statistics output items.

Shows the statistics output results in a chart.

Statistic Output Filtering

Figure 4.3 Filter Setting

1) Select to display the filter setting window as below.


2) Clear the check box of the item you do not want to display on the window.
3) Click the „Cancel‟ button to close the window.
4) Click the „Apply‟ button to hide the items excluded from filtering.

© SAMSUNG Electronics Co., Ltd. 4-4


LSM-R User Manual

4.1.2 Viewing Statistics Chart


Click the button in the statistic search results window to display the statistics
window as shown below:

(Statistics) Type
Selection Area Chart Area

Command
Execution Area

Figure 4.4 Statistics Chart

Creating Statistics Charts


1) Click the „Graph‟ icon in the statistics search result window.
2) Select the (Statistics) Type of the data you wish to compare in the chart.
3) Select the items you want to show in the chart. Up to 20 items can be shown
overlapped in a chart. If you wish to show the items in individual charts, up to five
charts can be created.
4) Set whether or not to show the items overlapped in one chart.
5) Click the „Apply‟ button to display the results on the right pane.

© SAMSUNG Electronics Co., Ltd. 4-5


LSM-R User Manual

Disabling the Graph Overlap


The following illustrates the chart with the Graph Overlap option disabled. The Graph
Overlap option is enabled by default.

Chart Area
(Statistics) Type
Selection Area

Figure 4.5 Disabling the Graph Overlap

Saving as PDF File


Click the „Save‟ button to save the chart as file. One chart is saved per page in the PDF file.
To print the chart, open the saved file with an explorer.

Setting Chart Options


The chart options can be set by right-clicking on the chart.

Figure 4.6 Chart Option Setting

© SAMSUNG Electronics Co., Ltd. 4-6


LSM-R User Manual

Item Description

Legend - Show: Outputs the legend (default)


- Hide: Hides the legend
Graph Type - PLOT: Line graph (default)
- BAR: Bar chart
3D - ON: 3D chart, bar graph only
- OFF: 2D chart (default)
X Axis - ON: X axis scale marks on (default)
- OFF: X axis scale marks off
Y Axis - ON: Y axis scale marks on (default)
- OFF: Y axis scale marks off

© SAMSUNG Electronics Co., Ltd. 4-7


LSM-R User Manual

4.2 Collection Results


Shows the results of the performance statistics collection.

Performance  Collection Results

System Selection
Area
Collection Results Area

Search Criteria

Figure 4.7 PM Collection Results

The result will be displayed as follows:

Item Description

Statistics Period Statistics Collection Period


Time Outputs the collected time.
Result Outputs the collected results. (Success, Fail)
Failure Outputs the number of failures. (Outputs the count collected every 5 minutes.)
Status Outputs the name of the collected file.

© SAMSUNG Electronics Co., Ltd. 4-8


LSM-R User Manual

4.3 PI Monitoring
PI monitors specific performance data by assigning threshold values. The PI monitoring
utility will alert the operator by triggering an alarm when the corresponding threshold is
met. If you click the „PI Management‟ button on the PI monitoring window, a registration
window will appear as below. You can set and manage the PI items through the following
registration procedure.

Performance  PI Monitoring

Figure 4.8 PI Management

4.3.1 PI Search
PI Management View
Item Description

System selection The units displayed in the system selection area at the bottom depend on the
NE Type and NE on the tab menu at the top.
- NE Type: Displays the items to allow the selection by NE type.
- NE: Displays all NE lists.
PI item selection The PI items selection area.
The PI items are displayed according to the NE type or NE selected in the
system selection area. The same data as the statistics family are displayed.
‘Search’ Button Select the system and statistics items, then click ‘View’ to display the data from
the PI settings in the result window on the right.
Search Result The window showing the results of the search on the left pane.
Window
‘Register’ Button Used to set new PI management items
‘Modify’ Button Used to modify the PI search results and apply the modification.
‘Delete’ Button Used to delete the selected PI items.

© SAMSUNG Electronics Co., Ltd. 4-9


LSM-R User Manual

PI Search Procedures
1) Select whether to search by NE or NE type in the system selection area using the tab
menu.
2) Select the tab, select the desired system or type in the NE Type or NE list, then click
„Search‟ to display all items that meet the corresponding system or type on the result
area.
3) To search for specific PI items, select the PI item or group and click „Search‟ to search
within the selected range.

© SAMSUNG Electronics Co., Ltd. 4-10


LSM-R User Manual

4.3.2 PI Registration
In the PI search window, select the desired system or type and click „Register‟ to display a
registration window as shown below. You can set the PI items through the following
registration procedure.

(Statistics) Type Threshold Input Area


Selection Area

Figure 4.9 PI Registration

PI Registration Window Description


Item Description

(Statistics) Type Displays the (Statistics) Type that belong to the selected Statistics Family.
Threshold Info Threshold setting area.
Direction Selects the direction for the threshold range.
- UP: Alarms are triggered when the thresholds are exceeded.
- DOWN: Alarms are triggered when the thresholds are not met.
Values Area to enter the threshold values.
For the up direction, the order is Critical > Major > Minor.
For the down direction, the order is Critical < Major < Minor.
Register A button used to register and execute the threshold value.

PI Registration Procedure
1) Click the NE Type or NE tab on the PI management screen.
2) Select the system type or system in the system area.
3) Select the statistics family to register, then click „Register‟ to display the „PI
Registration‟ screen.
4) Select the (Statistics) Type that belongs to the statistic family.
5) Select the threshold direction between UP and DOWN.
6) Enter the Critical/Major/Minor values.

© SAMSUNG Electronics Co., Ltd. 4-11


LSM-R User Manual

7) Click the „Register‟ button to start the registration.


8) When the registration is complete, the result window will be displayed as shown below.
This result window will also be displayed upon the modification and deletion
processes.
9) After the registration is complete, the statistics will be collected and the levels will be
defined to automatically trigger/restore the alarms and display the alarm history in the
event viewer.

Figure 4.10 PI Registration Result

PI Registration Result Description


Item Description

Target The NE name registered


Operation Commands used in the registration. Commands that already exist in the
database will be updated, and new commands will be automatically processed
through the registration.
- Registration: New registration
- Update: Registration modification
- Delete: Delete
Start Time Registration start time
End Time Registration end time
State - Ready: Preparing for the registration
- Processing: Processing the registration
- Completed: Complete
Result Displays the results

© SAMSUNG Electronics Co., Ltd. 4-12


LSM-R User Manual

4.3.3 PI Modification
The procedure to modify the registered PI value is given below. To register the change,
select the corresponding item in the search result area of the PI management window and
click „Modify‟.

Figure 4.11 PI Modification

PI Modification Procedure
1) Modify the values of items you want to change in the search result area of the PI
management window.
2) Once you change the values and move the mouse cursor, the corresponding fields will
turn red and the check boxes on the left will be checked on.
3) When the modification is complete, click „Modify‟.
4) When the change is registered, the registration result window will be displayed.
5) After the modification has been registered successfully, the statistics will be collected
and the levels will be defined to automatically trigger/restore the alarms and display
the alarm history in the event viewer.

© SAMSUNG Electronics Co., Ltd. 4-13


LSM-R User Manual

4.3.4 PI Deletion
Registered PI values can be deleted by selecting the corresponding item in the search result
area of the PI management window and click „Delete‟.

Figure 4.12 PI Deletion

PI Deletion Procedure
1) Select the check box of the item you wish to delete in the search result area of the PI
management window.
2) Select all items you wish to delete, then click „Delete‟.
3) When the deletion is complete, the registration result window will be displayed.
4) Once the deletion is complete, all active alarms related to the PI will be cleared
automatically..

© SAMSUNG Electronics Co., Ltd. 4-14


LSM-R User Manual

4.3.5 PI Monitoring

Figure 4.13 PI Monitoring

1) When the statistics collection for the PI is complete, the PI status is automatically
refreshed in the PI monitoring window, and the highest levels for each statistic item
are calculated and displayed.
2) Click on each item to display the list of the faults occurred on the right pane.
3) When an error occurs in the fault occurrence status, click the „Refresh‟ button to
display the latest status.

PI Monitoring Buttons
Item Description

Displays the predefined Critical value when selecting a PI in the left.


Displays the predefined Major value when selecting a PI in the left.
Displays the predefined Minor value when selecting a PI in the left.
Outputs the selected LLOC in graph and uses the graph for monitoring.

Refreshes the window.

© SAMSUNG Electronics Co., Ltd. 4-15


LSM-R User Manual

4.3.6 PI Trend Graph


When you click a specific PI item in the PI monitoring window, its location information
will be displayed on the right. Double-click the location or use the button to
view the trend graph.
When you click another LLOC, the current trend graph is changed to reflect the change.
There are five-minute trend and 60-minute trend graphs. They are refreshed after the five-
minute data and 60-minute data are collected, respectively.

Figure 4.14 PI Trend Graph

© SAMSUNG Electronics Co., Ltd. 4-16


LSM-R User Manual

4.4 On Demand Statistics


On Demand Statistics outputs the trend of the statistics data collected during a given period
in real time for specific items selected by the user to the screen in table and graph formats
for monitoring purpose.

Performance  On Demand

Figure 4.15 On Demand Statistics Management

© SAMSUNG Electronics Co., Ltd. 4-17


LSM-R User Manual

4.4.1 On Demand Statistics View


From the On Demand Statistics View screen, select a system and click „View‟ to view the
On Demand statistics as shown below.

System Selection Search Result


Area Area

Figure 4.16 On Demand Statistics Management Screen

Search Results Description


Item Description

Ne The registered NE name.


Statistics Family The registered statistics family name (statistics category/family).
Location The registered LLOC.
Period The registered collection cycle.
Duration The registered collection period.
Owner The ID of the operator who processed the registration.
Status The monitoring status.
- Ready: On Demand statistics registered. Ready to start the monitoring.
- Started: The monitoring has started.
- Stopped: The monitoring was interrupted by the operator.
- Complete: The monitoring is complete.

On Demand Statistics View


1) Select an NE tree in the system selection area.
2) Click „Search‟ to search the results. The results will be displayed on the right.

© SAMSUNG Electronics Co., Ltd. 4-18


LSM-R User Manual

4.4.2 On Demand Statistics Registration


From the On Demand Statistics View screen, select a system and click „Register‟ to view
the registration screen as below. You can register the On Demand statistics through the
following registration procedure.

Parameter Area

Statistics Family
Selection Area

Condition Input
Area

Figure 4.17 On Demand Statistics Registration Screen

Selecting Statistic Family


Select the statistics family in the statistics family selection area.

Selecting Parameters
Enter the following values to the „Parameter‟ field according to the data type of the LLOC:

Type Description

enum If the data type is enum, a combo list will automatically appear when you click the
mouse button.
Ipv4 Enter the IPV4 type.
enbID Enter the ID of the eNB.
long Enter the integer type. Position the mouse cursor on ‘Property’ to view the allowed
range in tooltip.
String Enter all other data as string type.

© SAMSUNG Electronics Co., Ltd. 4-19


LSM-R User Manual

Entering Criteria
In the criteria input area, select the „Collection Cycle‟ and the „Duration‟ from the
respective combo lists.

On Demand Statistics Registration


1) From the On Demand Statistics View screen, select the NE you wish to register in the tree.
2) Click „Register‟ to display the „On Demand Statistics Registration‟ window.
3) Search the statistics family in the order of Category, family.
4) Enter or select the corresponding LLOC value in the Parameter area.
5) Select the collection cycle and duration in the Criteria Input area.
6) Click the „Register‟ button to start the registration.
7) You can register up to 2 entries per NE.

© SAMSUNG Electronics Co., Ltd. 4-20


LSM-R User Manual

4.4.3 On Demand Statistics Deletion


The registered On Demand statistics can be deleted by selecting the item in the search
result area of the On Demand Statistics View window and then clicking the „Delete‟ button.

Figure 4.18 On Demand Statistics Deletion Result Window

On Demand Statistics Deletion Result


Item Description

Target The NE name registered


Statistics Family The registered statistics family name (statistics category/family).
LLOC The registered LLOC.
Operation DELETE: Delete
Result Displays the results
Reason If failed, the reason of failure.

On Demand Statistics Deletion


1) Select the check box of the item you want to delete in the result area on the right of the
On Demand View window.
2) Click „Delete‟.
3) Upon successful deletion, the list in the result area on the right pane will be refreshed.
If any of the selected items were not deleted successfully, a result window will be
displayed. (This window will not be displayed if all items were deleted successfully.)
4) Operators with the Administrator permission can delete all the items.
Operators without the Administrator permission can only delete the items he/she
registered.

© SAMSUNG Electronics Co., Ltd. 4-21


LSM-R User Manual

4.4.4 On Demand Statistics Monitoring


Outputs the On Demand statistics data that the system is collecting on the screen in table
and graph formats.

(Statistics) Type
Selection Area Graph Output Area

Table Output Area

Command Execution Area


Status Bar Area

Figure 4.19 On Demand Statistics Monitoring Screen

(Statistics) Type Selection


Check on the check box of the (Statistics) Type in the (Statistics) Type list, then click
„Apply‟ to display the data of the selected (Statistics) Type in the graph.

Start
Click „Start‟ to request the NE to start monitoring the corresponding On Demand statistics.

Stop
Click „Stop‟ to request the NE to stop the current monitoring of the On Demand statistics.

Graph Output
Outputs the monitoring data to the graph in the predefined collection cycle interval.

© SAMSUNG Electronics Co., Ltd. 4-22


LSM-R User Manual

Table Output
Outputs the monitoring data to the table in the predefined collection cycle interval.

State Display
Displays the monitoring status change history, command execution results, monitoring data
collection history, etc.

Save
Click „Save‟ to save the graph and table as file.
The first screen allows to save the graph in a PDF file, and the second screen allows to save
the table in a CSV or Excel file.

Setting Chart Options


The chart options can be set by right-clicking on the chart.

Figure 4.20 Chart Option Setting

Item Description

Legend - Show: Outputs the legend


- Hide: Hides the legend (default)
Graph type - PLOT: Line graph (default)
- BAR: Bar chart
X Axis - ON: X axis scale marks on (default)
- OFF: X axis scale marks off
Y Axis - ON: Y axis scale marks on (default)
- OFF: Y axis scale marks off

© SAMSUNG Electronics Co., Ltd. 4-23


LSM-R User Manual

4.5 Call Trace


The call trace function monitors the status of the call flow for each call setup section in the
given terminal. It provides the function to view, register and delete the call trace, as well as
the function to view the corresponding history.

4.5.1 Call Trace Window Configuration


Performance  Call Trace

The Trace List window allows to view/register/delete the call trace from the NE via the
trace commands, and provides real-time monitoring in the LSM.

Figure 4.21 Trace Main Window

© SAMSUNG Electronics Co., Ltd. 4-24


LSM-R User Manual

4.5.2 Call Trace List Management


Selecting a Target
Click the combo box on the target search field at the top of the trace list window to display
the list of the NEs currently registered in the LSM on the tree. Select the NE in which to
perform the trace command. The command will be ready to be executed in the selected NE.

Figure 4.22 Selecting the Target ID

Viewing the Trace List


Select the top LSM in the „Target‟ section of the trace list to display all the registered traces
on the screen.
Select a NE in the „Target‟ section of the trace list to display the traces registered to the
corresponding NE on the screen.
If you select a NE in the Target section of the trace list and click „Retrieve‟, the LSM will
request the list of the currently registered traces to the corresponding NE and display the
response on the trace list.

Figure 4.23 Trace List View Window

© SAMSUNG Electronics Co., Ltd. 4-25


LSM-R User Manual

Trace List Output


Below is the description of the table shown on the trace list window.

Item Description

Status : Trace monitoring is paused.


: Trace monitoring is running.
Location Information of the layer managed by the EMS. (Level2/Level3)
Trace Key Key value for trace save/search.
Reference Trace ID managed by the NE.
List of interface Trace section.
Depth Trace level.
TCE address The section where the trace will be sent.

Trace List Window Icons


Below is the description of the icons in the trace list window.

Button Description

Register Register a trace.


Start Start a trace. (Disabled if no trace list is selected.)
Delete Delete a trace. (Disabled if no trace list is selected.)
Retrieve Execute the command to view the trace.

© SAMSUNG Electronics Co., Ltd. 4-26


LSM-R User Manual

4.5.3 Call Trace Registration


Registering a Trace
1) Select a target in the trace list window.

2) Click „Register‟ in the trace list window to display the registration window.

3) Select or enter the following items in the trace list window.

Figure 4.24 Trace Registration

4) Click „Execute‟.

5) If you click „Execute‟, a trace registration request will be sent to the NE.
If the result is successful, the trace list will be displayed with the newly registered
trace job.

© SAMSUNG Electronics Co., Ltd. 4-27


LSM-R User Manual

4.5.4 Call Trace Deletion


Deleting a Trace
1) Select a trace to delete from the trace list.
2) In the Trace List window, click „Delete‟.
3) If you click „Delete‟, a deletion confirmation window will be displayed.
4) Click „Yes‟ to send the trace list deletion command to the NE. If the command is
successful, the trace will be deleted from the NE.

Figure 4.25 Deleting a Trace

© SAMSUNG Electronics Co., Ltd. 4-28


LSM-R User Manual

4.5.5 Call Trace Monitoring


Start of Trace Monitoring
1) Select an item to monitor from the displayed trace list window.
2) If you select an item, the button will be enabled. Click the button
to display the trace monitoring window.

Trace Chart

Trace Data Trace Log

Figure 4.26 Starting the Trace Monitoring

© SAMSUNG Electronics Co., Ltd. 4-29


LSM-R User Manual

Trace monitoring
1) The data monitoring allows the client to poll the data saved in the server file
periodically (every second) and displays them on the window.
2) To view the details of a specific message, click the corresponding message in the chart
or table.

Trace Chart

Trace Data Trace Log

Figure 4.27 Trace Message Details

Trace Monitoring Window Icons


Below is the description of the icons in the trace monitoring window.

Button Description

Save the trace output data in a PDF file.

Clears the data displayed on the window, and displays the data collected
afterwards.
Resume the monitoring.
Stop the monitoring temporarily to click the message to view its details.

© SAMSUNG Electronics Co., Ltd. 4-30


LSM-R User Manual

4.5.6 Call Trace History View


Viewing a Trace History
To view the trace history, select Menu  Trace History Window from the trace window.
The trace history view function can display up to 10,000 messages from the data saved in
the server.

1) Select the NE to view in the „Target‟ section.


2) Enter the cell number to view in the Cell Number field.
3) Specify the period to view in the Period field.
4) Click „Search‟ to display the data that meets the criteria.
5) To view the detailed information, click the corresponding message in the search results.

This page is intentionally left blank.

Trace Chart

Trace Data Trace Log

Figure 4.28 Viewing the Trace History

Saving a Trace History


If you click „Save‟, the trace data will be saved in a PDF/Excel file.

© SAMSUNG Electronics Co., Ltd. 4-31


LSM-R User Manual

CHAPTER 5. General Management

The general management monitors various functional blocks an resources on the EMS
server. It also provides additional features to the operator to control the operating
environment on the EMS.

5.1 Network Monitoring


„Network Monitoring‟ periodically monitors the network connectivity status (using the
Ping test) and the snmp connectivity status (using the Hello message).

General  Surveillance  Network

Figure 5.1 Network Monitoring Window

© SAMSUNG Electronics Co., Ltd. 5-1


LSM-R User Manual

Searching the Network Status


1) Select a target to search the network status from the „Target‟ field in the setting table.
You can designate the target by selecting from the tree view or by entering the IP
address.
2) Click „Search‟.
3) The search results will be displayed in the result table.

The parameters for the network monitoring are as follows:

Item Description

NE Type Unique index for the NE.


Location Shows the location of the NE’s folder.
Master IP Active IP among the NE’s redundant IPs.
Vice IP Inactive IP among the NE’s redundant IPs.
Ping status Shows the Ping status via ICMP.
SNMP status Shows the SNMP status.

Viewing Network Status


Use the „Get‟ button to view the network status in real time. Select an NE List in the left,
then click „Search‟ to view the status of the network connections to the system devices
from the EMS in real time. (The window will display the result of periodic search from the
EMS server.)

Viewing/Setting the Network Status Check Period


The server checks the network status periodically. to view the check period, click „Get‟.
The results are displayed in the result table. The time is displayed in seconds, which can be
set between 10-999.

© SAMSUNG Electronics Co., Ltd. 5-2


LSM-R User Manual

5.2 Process Management


„Process Management‟ feature allows the operator to view the status of the processes
running in the EMS server. It also provides control to operator to start and stop the
processes running on the EMS. If a process running in the server is abnormal, you can try
stopping and restarting the corresponding process. If a process stops abnormally, it will be
automatically restarted.

General  Surveillance  Process

Figure 5.2 Process Monitoring Window

Viewing the Process Status


Click the „Search‟ button to display the process status on the result table.
The process status is displayed as follows:
Running: The process is running normally.
Stop: The process has stopped.

The parameters for the process management are as follows:

Item Description

Name Displays the process name.


Status Displays the status of the process as Running or Stop.
Start time Displays the start time if the process is running.
Restart count The number of times the process was executed.
Process ID Displays the ID of the process if the process is running.

© SAMSUNG Electronics Co., Ltd. 5-3


LSM-R User Manual

(Continued)

Item Description

CPU (%) Displays the CPU usage occupied by the process.


Memory Used/Total (Mbyte) Displays the memory bytes used by the process.
Threads Displays the number of threads running in the process.
DB Connections Used/Total Displays the maximum number of database connections allowed
for the process and its actual number of connections.
Log level Sets the process logging level.

The types of process are as follows:


Launcher: Runs each process. It also monitors the process status and restarts the process if
it stops functioning.
us: Controls the logins and delivers the server events to the client.
mf.dbld: Manages fault information occurring in NE.
mf.gm: Monitors the status of the NE and the server resources.
mf.cm: Manages the BS configuration and PLD data.
mf.fm: Manages the faults and events of the BS.
mf.pld: Creates the PLD of the BS.
ni.snmp: Communicates with the equipments supporting the SNMP protocol.
ni.init: Supports the BS loading.
ni.ftp: Collects the statistics files from the BS.

Stopping the Process


Select the checkbox of the process you wish to stop in the „Name‟ field of the result table.
Click the „Stop‟ button in the window to stop the process.

Restarting the Process


Select the checkbox of the process you wish to restart in the „Name‟ field of the result table.
Click the „Restart‟ button in the window to restart the process.

Changing the Process Log Level


Select the checkbox of the process you wish to change the log level in the „Name‟ field of
the result table. Select the desired log level. Click the „Modify‟ button in the window to
change the log level of the process.

The types of process log level are as follows:


Config > Info > Warning > Severe > OFF

Higher log level includes more log details.

© SAMSUNG Electronics Co., Ltd. 5-4


LSM-R User Manual

5.3 Resource Monitoring


„Resource Monitoring‟ shows the status of the EMS resources (CPU and memory), on a
regular basis. Resource monitoring feature on the LSMR monitors the status of the EMS
resources (CPU and memory) in the server on a regular basis and outputs the results to line
graphs.

General  Monitoring

Figure 5.3 Resource Monitoring Window

© SAMSUNG Electronics Co., Ltd. 5-5


LSM-R User Manual

5.4 Resource Management


„Resource Management‟ monitors the resources of the EMS server. (CPU, File System,
Memory, Database) It also provides the functionalities to set the threshold for generating
alarms and the function to set the monitoring period of the EMS server.

5.4.1 CPU
„CPU‟ management functionality allows to view the EMS server‟s CPU usage rate by CPU
ID and to set the threshold values.
For servers with more than 2 CPUs, the usage rate is displayed for each CPU.
The threshold is used to trigger an alarm if the CPU usage rate of the EMS server exceeds a
specific value.

General  Server Status  CPU

Figure 5.4 CPU Window

Viewing the CPU


Click the menu, and the followings are displayed in the result table.
Threshold to issue an alarm upon the CPU status.
CPU status retrieving period.
Current CPU status.

The current CPU status table is renewed automatically in every designated period.
Click „Get‟ to view the thresholds and cycles.

© SAMSUNG Electronics Co., Ltd. 5-6


LSM-R User Manual

The CPU parameters are as follows:

Item Description

Resource The CPU ID.


Usage (%) The current CPU usage rate.
User (%) The usage rate by user processes.
System (%) The usage rate by system processes.
Wait IO (%) The usage rate of the processes waiting for I/O.
Idle (%) The CPU’s inactivity rate.

Searching the CPU threshold


Click the menu to automatically search and display the threshold on the table. Click the
„Get‟ button on the window to refresh the threshold value and display the most recent
information.

Setting the CPU Threshold


The operators can set the desired threshold value in the threshold setting table. Click the
„Set‟ button to set the threshold.

Current CPU Status


If you click the Average of the current CPU status, the detailed information for each CPU
ID will be displayed.

Figure 5.5 CPU Details Window

© SAMSUNG Electronics Co., Ltd. 5-7


LSM-R User Manual

5.4.2 Memory
„Memory‟ management feature allows to view the EMS server‟s memory usage rates and to
set the threshold values. The memory usage rate is displayed as the percentage of the total
memory used by the server. The threshold is used to trigger an alarm if the memory usage
rate of the EMS server exceeds a specific value.

General  Server Status  Memory

Figure 5.6 Memory Window

Viewing the Memory Usage Rate


Click the menu, and the followings are displayed in the result table.
Threshold to issue an alarm upon the memory status.
Memory status retrieving period.
Current memory status.

The current memory status table is renewed automatically in every designated period.
Click „Get‟ to view the thresholds and cycles.

The memory parameters are as follows:

Item Description

Resource Memory type.


Current status (%) The current memory usage rate.
Total size (Mbytes) Total size of the memory in Mbytes.
Used size (Mbytes) Used space of the memory in Mbytes.
Free size (Mbytes) Available space of the memory in Mbytes.

© SAMSUNG Electronics Co., Ltd. 5-8


LSM-R User Manual

Viewing the Memory Threshold


Click the menu to automatically search and display the threshold on the table. Click the
„Get‟ button on the window to refresh the threshold value and display the most recent
information.

Setting the Memory Threshold


The operators can set the desired threshold value in the threshold setting table. Click the
„Set‟ button to set the threshold.

© SAMSUNG Electronics Co., Ltd. 5-9


LSM-R User Manual

5.4.3 File System


„File System‟ management feature allows to view the EMS server‟s file system usage rate
and set the threshold values.
The Detailed information of multiple file systems is displayed. The threshold is used to
trigger an alarm if the file system usage rate of the EMS server exceeds a specific value.

General Management  Server Status  File System

Figure 5.7 File System Window

Viewing the Usage Rate of the File System


Click the menu, and the followings are displayed in the result table.
Threshold to issue an alarm upon the file system status.
File system status retrieving period.
Current file system status.

The current file system status table is renewed automatically in every designated period.
Click „Get‟ to view the thresholds and cycles.
The parameters of the file system are as follows:

Item Description

Resource Types of the file system.


Current status (%) The current file system usage rate.
Total size (Kbytes) The size of the entire file system in Kbytes.

© SAMSUNG Electronics Co., Ltd. 5-10


LSM-R User Manual

(Continued)

Item Description

Used size (Kbytes) The size of the file system in use in Kbytes.
Free size (Kbytes) The size of the remaining file system in Kbytes.

Searching the Threshold Value of the File System


Click the menu to automatically search and display the threshold on the table. Click the
„Get‟ button on the window to refresh the threshold value and display the most recent
information.

Setting the Threshold Value of the File System


The operators can set the desired threshold value in the threshold setting table. Click the
„Set‟ button to set the threshold.

5.4.4 Database
„Database‟ management feature allows to view the EMS server‟s database information and
set the threshold values. The threshold is used to trigger an alarm if the database usage rate
of the EMS server exceeds a specific value.

General  Server Status  Database

Figure 5.8 Database Window

© SAMSUNG Electronics Co., Ltd. 5-11


LSM-R User Manual

Viewing the Database Usage Rate


Click the menu, and the followings are displayed in the result table.
Threshold to issue an alarm upon the database status.
Database status retrieving period.
Current database status.

The current database status table is renewed automatically in every designated period.
Click „Get‟ to view the thresholds and cycles.

© SAMSUNG Electronics Co., Ltd. 5-12


LSM-R User Manual

The database parameters are as follows:

Item Description

Resource The database type.


Current status (%) The current database usage rate.
Total size (Mbytes) Total size of the database in Mbytes.
Used size (Mbytes) Used space of the database in Mbytes.
Free size (Mbytes) Available space of the database in Mbytes.

Searching the Threshold of the Database


Click the menu to automatically search and display the threshold on the table. Click the
„Get‟ button on the window to refresh the threshold value and display the most recent
information.

Setting the Database Threshold


The operators can set the desired threshold value in the threshold setting table. Click the
„Set‟ button to set the threshold.

© SAMSUNG Electronics Co., Ltd. 5-13


LSM-R User Manual

5.5 Resource Statistics


„Resource Statistics‟ feature allows to view the hourly, daily, and monthly usage rate (%) of
the EMS resources such as CPU, file system, memory, and database. Each usage rate is
displayed in graphs and tables for your convenience.

General  Resource Statistics

Figure 5.9 Resource Statistics Window

Searching the Resource Statistics


The parameters of the resource statistics are as follows:

Item Description

Resource Type Types of the resources.


Resource Name Displays the names of the detailed items by the resource types.
Statistics Type The statistics type is divided into hourly, daily and monthly.
Period Displays the start time and the end time.

1) Select the resources to search for in the „Resource Type‟ field of the settings table.
2) Select the name to search for in the „Resource Name‟ field.
3) Select the statistics type to search for in the „Statistics Type‟ field.
4) Select the period to search for in the „Period‟ field.
5) Click „Get‟.

© SAMSUNG Electronics Co., Ltd. 5-14


LSM-R User Manual

Displaying the Resource Statistics


To print the searched contents, click the „Print‟ button. Use the print dialog window to print.

Saving the Resource Statistics


To save the searched contents to the client, click the „Save‟ button.
The resource statistics are saved in two formats: The graph in PDF format, and the table in
XLS format.

© SAMSUNG Electronics Co., Ltd. 5-15


LSM-R User Manual

5.6 Database
5.6.1 Log Management
„Log Management‟ allows to set the storing cycle of the PM, FM, and SM raw data, and the
hourly, daily and monthly statistics data. It also allows to automatically deletes the data
according to the predefined cycle.

General  Database

Figure 5.10 Log Management Window

Viewing and Changing the Database Log Information Storing Cycle


Select the database log management menu to display the current storing cycle information
for the FM, PM and SM data. Modify the storing cycle of the data you wish to change, then
click the „Set‟ button.

© SAMSUNG Electronics Co., Ltd. 5-16


LSM-R User Manual

5.7 Self Diagnosis


„Self Diagnosis‟ allows to view the status of the RMI connection, DB connection and event
channel of the processes running in the EMS server.

General  Self Diagnostic

Figure 5.11 Self Diagnostic Window

Viewing the Process Diagnosis Status


The parameters for the process diagnosis status are as follows:

Parameter Description

Process Name The name of the process.


DB Status The connection status between the process and the database.
( if normal, if abnormal.)
RMI Status The connection status between the process and the RMI.
( if normal, if abnormal.)

1) Select the „Self-Diagnosis‟ menu to display the status of the database connection and
RMI connection for each process in the results table.
2) The connection status will be displayed as if normal, and if abnormal.
3) Click the „Test‟ button in the window to test the status and refresh the window.

© SAMSUNG Electronics Co., Ltd. 5-17


LSM-R User Manual

Viewing the Event Channel Diagnosis Status


The parameters for the event channel diagnosis status are as follows:

Item Description

Publisher A process distributing the events.


Link Status The connection status between the processes will be displayed as if
normal, and if abnormal.
Subscriber A process receiving the events.

1) Select the „Self Diagnosis‟ menu to display the event channel status in the result table.
2) The event channel will be displayed as if normal, and if abnormal.
3) Click the „Test‟ button in the window to test the status and refresh the window.

© SAMSUNG Electronics Co., Ltd. 5-18


LSM-R User Manual

5.8 Log Viewer


The log viewer allows to view the log file saved in the LSM server.
In addition to viewing the log file details, the log viewer also allows to search by time and
message. Depending on the quantity of the data in the selected file, the information may be
displayed in multiple pages as illustrated below. Enter the keyword in the search Input
Window at the top of the main window to search and display the parts within the current
page that match the corresponding keyword. (The parts will be highlighted.)

Figure 5.12 Log Viewer Window (1)

Click „1 Hour‟, „12 Hours‟, „1 Day‟, or „Search‟ to perform the search by time or by
message. The following illustrates the search by time. The LSM‟s log file is created by time,
and thus only requires the search time to be provided by the user. Click the „Save‟ button to
save the displayed information to the PC. If there‟s no search result, the „Save‟ button will
be disabled.

Figure 5.13 Log Viewer Window (2)

© SAMSUNG Electronics Co., Ltd. 5-19


LSM-R User Manual

The following illustrates the search by message. The search by message is a feature
specific to the log file created in the LSM. (The search may not be performed correctly if
the format of the file is incorrect.)
The log message created in the LSM uses the „;‟ symbol to distinguish between each log.
The search by message will display all the log messages containing the keyword provided
by the operator.

Figure 5.14 Log Viewer Window (3)

Check the „special‟ option to perform a conditional search. The conditional search uses
special characters (&&, ||) between the keywords to add conditions (AND, OR) when
performing the search.

„&&‟ implies the AND condition, and „||‟ implies the OR condition.
ABC && DEF: Search only the messages containing both ABC and DEF.
ABC || DEF: Search the messages containing either ABC or DEF.

Up to three keywords can be entered per search. A space must be provided between the
keyword and the special characters.

© SAMSUNG Electronics Co., Ltd. 5-20


LSM-R User Manual

CHAPTER 6. Security Management

The security management feature allows to the operator to register, modify, search and/or
delete user accounts. The security management module ensure the authorized access to the
EMS system. Also this module will maintain the operation history for all the operators on
the system.

6.1 User Manager


„User Manager‟ feature provides facility to manage operator accounts on the EMS. This
module will provide facility to view, modify and delete operator accounts, change access
permission for users and assign the groups of NEs to specific user.

Security  User Manager

Figure 6.1 Operator Management Window

© SAMSUNG Electronics Co., Ltd. 6-1


LSM-R User Manual

The parameters for the operator management are as follows:

Parameter Description

User ID Operator’s ID.


Privilege Operator Level. The level includes Security Administrator, System Administrator,
Manager, Operator and Guest.
Status Operator’s status. The status includes Enable, Disable and Lockout.
Login Type Possibility of accessing with the same ID from different sessions at the same
time. If it is set to Single, operators cannot use the same ID to access from
more than one session. But if it is set to Multiple, operators can login as many
times as the designated number of sessions with the same ID.
Group Information of group to which the operator belongs.
E-mail Operator’s E-mail
Last Login IP Last accessed IP.
Last Login Time Last accessed time.
Managing node Managing node.

Searching Operators
1) If you select the Operator Management function, the currently registered operator
information will be displayed in the result table.
2) The detailed information of the selected operator is displayed on the right.
3) Click the „Get‟ button at the bottom of the window to refresh the operator information.

Operator Registration
1) Click „Add‟ at the bottom of the window.
2) The operator registration window appears on the right.
3) Enter the operator information and click „OK‟.
4) If the registration was successful, it will be shown in the result table.

The parameters for the operator registration are as follows:

Figure 6.2 Operator Registration Window

© SAMSUNG Electronics Co., Ltd. 6-2


LSM-R User Manual

Parameter Description

User ID Operator’s ID.


Password Operator’s password.
Re-Password Verification of the password.
Privilege Operator Level. The level includes Security Administrator, System Administrator,
Manager, Operator and Guest.
Group Operator’s group Different NE is assigned to each group to manage. The top
level operator must select the default group.
Login Type Specify whether to allow multiple logins using the same ID. If yes, enter the
maximum number of sessions allowed to login.
E-mail The operator E-mail address (optional).

Modifying Operator
1) Select an operator to modify from the result table.
2) Click on the „Modify‟ button to display the operator information change window on
the right.
3) Modify the operator information, then click „OK‟.
4) The changed information is reflected and displayed in the result table.

Figure 6.3 Operator Information Change Window

© SAMSUNG Electronics Co., Ltd. 6-3


LSM-R User Manual

Deleting Operator
1) Select an operator to delete from the result table.
2) Click the „Delete‟ button at the bottom of the window.
3) When the password input screen appears, enter the password of the operator currently
logged in.
4) In the password confirmation window, click „OK‟.
5) If the operator is successfully deleted, it will be reflected in the result table.
6) If a client was logged in with the deleted operator ID, it will be terminated forcefully.

Figure 6.4 Operator Information Deletion Window

Changing the Lockout Operator Status


1) If you enter a wrong password five times consecutively during the login, you will be
locked out. When locked out, you cannot log in for one hour.

Figure 6.5 Operator Lockout Window

2) From the Operator Management, select an operator in lockout status.

3) Click on the „Modify‟ button to display the operator information change window on
the right.

4) Change the operator status to Enable and click „OK‟.

5) The changed information will be reflected and displayed in the result table.

6) Check whether the corresponding operator can log in again.

© SAMSUNG Electronics Co., Ltd. 6-4


LSM-R User Manual

6.2 Changing Password


The „Changing Password‟ menu allows to change the his/her password.

Security  Change Password

Figure 6.6 Changing Password Window

The parameters for changing the password are as follows:

Parameter Description

Old Password Current login password.


Password New password.
Re-Password Confirmation of the new password.

Changing Password
1) Click „Change Password‟ to change the password of the current operator.
2) Fill in the „Old Password‟, „Password‟, and „Re-Password‟ fields then click „OK‟ to
change the password.

© SAMSUNG Electronics Co., Ltd. 6-5


LSM-R User Manual

6.3 Group Management


The „Group Management‟ menu allows to group the network elements.

Security  Group Management

Figure 6.7 Group Management Window

The parameters for the group management are as follows:

Parameter Description

Group Name Name of the network group.


Configuration Info. - Available Elements: Available network configuration elements displayed
in tree view.
- Selected Elements: Elements the operator selected from the Available
Elements.
User List The list of the users within the group.
Comment Description of the corresponding element.

Searching Groups
1) If you click the „Group Management‟ menu, the information on the currently registered
groups are searched and displayed on the result table.
2) Click the „View‟ button to refresh the registered group information.

© SAMSUNG Electronics Co., Ltd. 6-6


LSM-R User Manual

Adding a Group
1) Click „Add‟ at the bottom of the window.
2) Enter the group name in the window displayed on the right and select a group element.
3) Click the „OK‟ button in the window. Check if the registered group information is
displayed on the result table.

Figure 6.8 Group Addition Window

© SAMSUNG Electronics Co., Ltd. 6-7


LSM-R User Manual

Changing Group Information


1) Select a group to modify from the result table. Note: you cannot change the default
group information.
2) Click the „Modify‟ button at the bottom of the window.
3) Check if the detailed information of the selected group is displayed on the right.
4) Modify the group element information.
5) Click the „OK‟ button in the window to apply the change.

Figure 6.9 Group Information Change Window

Deleting Groups
1) Select the group to delete from the result table. Note: you cannot delete the default group.
2) Click the „Delete‟ button at the bottom of the window.
3) In the deletion confirmation window, click „OK‟.
4) You cannot delete the group if the group has an operator assigned to it.

Figure 6.10 Group Deletion Window

© SAMSUNG Electronics Co., Ltd. 6-8


LSM-R User Manual

6.4 IP Manager
The „IP Manager‟ menu allows to manage the login authorization by client IP address and
the number of sessions allowed for simultaneous access.

Security  IP Manager

Figure 6.11 IP Management Window

The parameters for the IP manager are as follows:

Parameter Description

IP Address The client IP address.


Login Allowance Whether to allow or deny login. If it is set to Allow, the login from the
registered IP is allowed. If it is set to Deny, the login from the registered IP
is not allowed.
Sessions If Login Allowance is set to Allow, this indicates the number of sessions
allowed for simultaneous access.
(The maximum number of allowed sessions is 20.)
Description Description of the IP.

Viewing the IP
1) The information of the currently registered IP is displayed on the result table.
2) To search by Login Allowance or IP, enter the search criteria in the search input table,
then click „Search‟.

© SAMSUNG Electronics Co., Ltd. 6-9


LSM-R User Manual

Registering IP
1) Click „Add‟ at the bottom of the window.
2) The IP registration window appears on the right.
3) Enter the IP registration information and click the „OK‟ button.
4) If the information is processed successfully, the registered IP information will be
displayed on the result table.
Note: If Login Allowance is set to Deny, the client running in the corresponding IP
address will be terminated forcefully.

Figure 6.12 IP Registration Window

© SAMSUNG Electronics Co., Ltd. 6-10


LSM-R User Manual

Changing the IP Information


1) Select the IP information to change in the result table.
2) Check if the detailed information of the selected IP is displayed on the right.
3) Click „Modify‟ at the bottom of the window to display the modification window.
4) Change the IP information in the modification window, then select „OK‟.
5) If the modification of the IP information is processed successfully, the modified IP
information will displayed in the result table.
Note: If Login Allowance is set to Deny, the client running in the corresponding IP
address will be terminated forcefully.

Figure 6.13 IP Information Change Window

© SAMSUNG Electronics Co., Ltd. 6-11


LSM-R User Manual

Deleting IP
1) Click the IP to delete in the result table.
2) Check if the detailed information of the selected IP is displayed on the right.
3) Click on the „Delete‟ button at the bottom of the window.
4) In the deletion confirmation window, click „OK‟.
5) If the IP is successfully deleted, it will be reflected in the result table.
Note: If an IP is deleted, the client running in the corresponding IP address will be
terminated forcefully.

Figure 6.14 IP Deletion Window

© SAMSUNG Electronics Co., Ltd. 6-12


LSM-R User Manual

6.5 Login History


„Login history‟ will provide facility to record and review the login history of various users
of the EMS system. It also provides information about active users logged in on the server.

6.5.1 History
„History‟ window allows the operator to view the login and logout history.

Security  Login History  History

Figure 6.15 History Window

The parameters for the history are as follows.

Parameter Description

User ID The account of the logged in operator.


IP Address The client IP address.
Login Time The time the operator logged in.
Logout Time The time the operator logged out.
Success/Fail Login success/fail for the operator.
Login Fail Reason The reason for the login failure (if any).
Logout Status Logout type.

Viewing History
1) Enter the search criteria in the search input table. The available search criteria are
Operator ID, IP Address, Login Success/Fail, and Login Time.
2) Click the „Search‟ button to search for login history.
3) The login history search results will be displayed in the result table.

Saving/Printing
1) Search the history data with the login history search function.
2) Click the „Save‟ button in the window to save the searched data in an Excel file.
3) To print the saved data, use the print function in Microsoft Excel.

© SAMSUNG Electronics Co., Ltd. 6-13


LSM-R User Manual

6.5.2 Logon Session


In the „Logon Session‟ menu, the operator can view all the users currently logged-in on the
server. Also the operator with proper permissions can forcefully terminate the user sessions.

Security  Login History  Logon Session

Figure 6.16 Logon Session Window

The parameters for the logon session are as follows.

Parameter Description

User ID The account of the logged in user.


Privilege The level of the logged in operator.
IP Address The client IP address.
Login Time The time the operator logged in.

Viewing the Logon Session


1) If you select the Logon Session menu, the sessions currently logged on are displayed
in the result table.
2) Click the „Search‟ button in the window to refresh the information of the session
currently logged on.

Forced Termination of the Logged on Session


1) Select a logged in session you wish to force to terminate.
2) Click the „Delete‟ button in the window to terminate the session of the corresponding
operator.
3) Check if the terminated session has been deleted from the logon session result table.

© SAMSUNG Electronics Co., Ltd. 6-14


LSM-R User Manual

6.6 Operation History


The Operation history module records all commands executed by all the operators and
stores it in the EMS database. The operator will have access to all the command/operation
history of all users under “Operation History” window on the LSMR. The operator can
search the operation history using various search criteria. The available search criteria are
operator ID, Function, Message, Command and search period.

Security  Operation History

Figure 6.17 Operation History Window

The parameters for the operation history are as follows.

Parameter Description

Target The target on which the command was executed.


User ID The account of the logged in user.
Function Separator for the EMS block which executed the command
Message Identifier for the command type.
Command The command executed.
Period The time the command was requested/completed.

Searching the Operation History


1) Select a system in which to search the operation history in tree view. The selected
system will be displayed in the „Target‟ field of the setting table.
2) Enter the desired search criteria, such as Period, Operator ID, Function, Message and
Command, in the search input table.
3) Click the „Search‟ button in the window to search the operation history.
4) The operation history search results will be displayed in the result table.

Saving/Printing
1) Search the history data with the operation history search function.
2) Click the „Save‟ button in the window to save the searched data in an Excel file.
3) To print the saved data, use the print function in Microsoft Excel.

© SAMSUNG Electronics Co., Ltd. 6-15


LSM-R User Manual

CHAPTER 7. SON

SON Management feature on the LSMR provides the menu for the operation of the Self
Organizing Networks (SON), including the monitoring of the DHCP and SON statuses and
the setting of the variables used in the SON algorithm.

7.1 SON Option


„SON Option‟ feature allows the operator to modify the configuration of the eNB‟s SON
function. The basic SON Option information is set during the new eNB expansion.
However, if you need to modify the SON Option after the initial setting, you will need to
use the SON Option window.

SON Option Window


1) Select the „SON‟ menu in the LSM Main Window.
2) If you select the „SON Option‟ menu, the following SON Option window will appear.
3) Once the SON Option window is open, the Option information for the eNB and cell
will be displayed.
4) Among the eNB Option information, LSM.NRT, LSM.PCID and LSM.RACH are the
SON Option information managed by the LSM. The eNB.Pci, eNB.Delay
compensation and eNB.Rpt Delay Compensation values are managed by the eNB.
5) Among the cell Option information, Anr, Energy Saving, Mobility Robustness, Rach
Opt, etc. are managed by each cell.

© SAMSUNG Electronics Co., Ltd. 7-1


LSM-R User Manual

Figure 7.1 SON Management Window

Tree Viewer: Displays all NEs registered to the LSM in tree structure.
eNB SON Option: Retrieves the registered eNB‟s SON Option information.
eNB Name: The name registered by the operator during the eNB expansion.
LSM.NRT: Whether to create the initial neighbor information during the expansion.
LSM.PCID: Whether to automatically allocate the physical cell id during the
expansion.
LSM.RACH: Whether to automatically allocation the RootSequenceIndex during the
expansion.
eNB.Pcid: Whether to use the pcid Enable function in he eNB.
eNB.Delay Compensation: Whether to use the Delay Compensation function in the
eNB.
eNB.Rpt Delay Compensation: Whether to use the Rpt Delay Compensation function
in the eNB
Result: Execution result.
Cell SON Option: Retrieves the registered cell‟s SON Option information.
eNB Name: The name registered by the operator during the eNB expansion.
Cell Number: Number of the cell.
Anr: Whether to use the anr function.
Energy Saving: Whether to use the energy saving function.
Mobility Robustness: Whether to use the Mobility Robustness function.
Mobility Load Balance: Whether to use the Mobility Load Balance function.
Rach Opt: Whether to use the Rach Optimize function.
Cnc Opt: Whether to use the Cnc Optimize function.

© SAMSUNG Electronics Co., Ltd. 7-2


LSM-R User Manual

Viewing SON Option


1) Select the „SON‟ menu in the LSM Main Window.
2) Select the „SON Option‟ menu to launch the SON Option window.
3) In the tree view, select the NE Type and NE Version to retrieve the corresponding NE
and SON Option that meet the criteria.
4) To retrieve the SON Option again without changing the NE Type and NE Version in
the tree view, click the „View‟ button at the bottom of the window.

Figure 7.2 SON Option Search Criteria Selection

Changing SON Option


1) Select the „SON‟ menu in the LSM Main Window.
2) Select the „SON Option‟ menu to launch the SON Option window.
3) In the tree view, select the eNB to modify the SON Option.
4) Modify the Option information of the corresponding eNB and cell as shown below.
5) After the modification, click the „Execute‟ button at the bottom of the window.
6) Once the Option change has been applied to the LSM database and eNB, „OK‟ will be
displayed on the result window.
7) If the change application fails, the reason of failure will be displayed in the result window.

Figure 7.3 Changing SON Option

© SAMSUNG Electronics Co., Ltd. 7-3


LSM-R User Manual

Batch Modifying SON Option


1) Select the „SON‟ menu in the LSM Main Window.
2) Select the „SON Option‟ menu to launch the SON Option window.
3) In the tree view, select the eNB to modify the SON Option.
4) Double-click the header of the table containing the SON Option information to pop up
a window to modify the flag information as shown below.
5) Modify the Option information in the popup window, then click „OK‟ to process the
batch modification of the SON Option for the selected eNBs in the tree.
6) You can also perform the batch modification of the cell Option similarly to the eNB by
selecting the cell information at the bottom.
7) After the modification, click the „Execute‟ button at the bottom to apply the SON Option.

Figure 7.4 Batch Modifying SON Option

© SAMSUNG Electronics Co., Ltd. 7-4


LSM-R User Manual

7.2 SON Property


SON Property provides a menu to set the values used in the SON algorithm.

SON  SON Property

Figure 7.5 SON Property Window

The SON property values that can be set are as follows:

Parameter Description

R Count Can set to 0 or a greater value.


Number of Cell to use for calculating average of NRT, PCI, RSI.
NRT Type Can set to minimum, average or distance.
Criteria of the effective radius when configuring NRT.
- minimum: using R as distance with nearest neighbor cell
- distance: criteria of fixed distance
- average: using R as average distance with cell inside initDistance
NRT Multiple Can set to 0 or a greater value.
Expansion range of calculating the effective distance when
configuring NRT
NRT Limit Distance Can set to 0 or a greater value.
Minimum of the effective radius when configuring NRT

© SAMSUNG Electronics Co., Ltd. 7-5


LSM-R User Manual

Parameter Description

PCI Type Can set to minimum, average or distance


Criteria of the effective radius when allocating PCI
- minimum : using R as distance with nearest neighbor cell
- distance : criteria of fixed distance
- average : using R as average distance with cell inside initDistance
PCI Multiple Can set to 0 or a greater value.
Expansion range of calculating the effective distance when allocating
PCI
PCI Limit Distance Can set to 0 or a greater value.
Minimum of the effective radius when allocating PCI
PCI Black List - Can set as number or number-number.
- Set PCI Black List.
- Can set up to 10 range.
- In case of entering none or space: unused Black List
ex) In case of setting 0-10,400-503: not allocated PCI of that range
PCI Reconfig Mode Can set to cellAdminShutDown, cellAdminLock
Mode of PCI Reconfiguration (eNB change Administrative Status in
case of PCI Reconfiguration)
. cellAdminShutDown : Unlock -> Shutting down
. cellAdminLock : Unlock -> Locked
PCI Reconfig Timeout Can set to 0 or a greater value.(unit: minute)
Timeout of PCI Reconfig Mode
RSI Type Can set to minimum, average, distance.
Criteria of the effective radius when allocating RSI
. minimum : using R as distance with nearest neighbor cell
. distance : criteria of fixed distance
. average : using R as average distance with cell inside initDistance
RSI Multiple Can set to 0 or a greater value.
Expansion range of calculating the effective distance when allocating
RSI
RSI Limit Distance Can set to 0 or a greater value.
Minimum of the effective radius when allocating RSI

© SAMSUNG Electronics Co., Ltd. 7-6


LSM-R User Manual

Changing SON Property


1) You can change the property value in the SON Property Modification window.
2) Click „Modify‟ to save the change to son_env.properties file in the server. The file will
later be applied to the SON algorithm.
If the property value is incorrect, the following window will be displayed upon clicking
the „Modify‟ button.

Figure 7.6 SON Property Window Failure Verification

Cancelling the SON Property Modification


1) You can change the property value in the SON Property Modification window.
2) Click „Cancel‟ to erase the current field values and import the property values from
son_env.properties file.

© SAMSUNG Electronics Co., Ltd. 7-7


LSM-R User Manual

ANNEX A. Open Source


Announcement

Some software components of this product incorporate source code covered under the
GNU General Public License (GPL), Apache License etc.

Acknowledgement:
This product includes software developed by the Apache Software Foundation
(http: //www.apache.org/).
This product includes software developed by the JDOM Project (http: //www.jdom.org/)
The software included in this product contains copyrighted software that is licensed under
the GPL/LGPL. You may obtain the complete Corresponding Source code from us for a
period of three years after our last shipment of this product by sending email to:
oss.request@samsung.com

If you want to obtain the complete Corresponding Source code in the physical medium
such as CD-ROM, the cost of physically performing source distribution may be charged.
This offer is valid to anyone in receipt of this information.

Below is the list of components covered under GNU General Public License (GPL),
Apache License etc.

Component License Component License

Apache Jakarta Apache 1.1 Apache Xerces Java Apache 2.0


Commons BeanUtils XML Parser
Apache Jakarta Apache 1.1 Apache XML Xalan- Apache 2.0
Commons Digester Java
Apache Jakarta Slide Apache 1.1 Apache XML- Apache 2.0
Commons Resolver
Apache Struts Apache 1.1 Jakarta Commons-IO Apache 2.0
Apache Xerces Java Apache 1.1 Jakarta Commons- Apache 2.0
XML Parser Logging
Apache XML Crimson Apache 1.1 xalan Apache 2.0
Apache-XMLBeans Apache 2.0 ISPConfig Hosting BSD 2.0
Control Panel

© SAMSUNG Electronics Co., Ltd. A-1


LSM-R User Manual

(Continued)

Component License Component License

Apache Ant Apache 2.0 JavaMail CDDL 1.0


Apache Axis2/Java Apache 2.0 JAXB 2.0 Project CDDL 1.0
Apache Jackrabbit Apache 2.0 backport-util- Creative Commons
concurrent Public Domain
Dedication
Apache Jakarta Apache 2.0 Cryptix JCE Cryptix General
Commons Codec License
Apache Jakarta Apache 2.0 J FTP GPL 2.0
Commons Email
Apache Jakarta Apache 2.0 jaxen Jaxen License
Commons FileUpload
Apache Jakarta HTTP Apache 2.0 JDOM Jdom License
Client
Apache Jakarta Log4j Apache 2.0 SACK License for SACK
Apache Struts Apache 2.0 Java Tar Public Domain
Apache Tomcat Apache 2.0 - -

© SAMSUNG Electronics Co., Ltd. A-2


LSM-R User Manual

GNU GENERAL PUBLIC LICENSE


Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but
changing it is not allowed.

Preamble
The licenses for most software are designed to take away your freedom to share and change
it. By contrast, the GNU General Public License is intended to guarantee your freedom to
share and change free software--to make sure the software is free for all its users.
This General Public License applies to most of the Free Software Foundation‟s software
and to any other program whose authors commit to using it. (Some other Free Software
Foundation software is covered by the GNU Library General Public License instead.)
You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price.


Our General Public Licenses are designed to make sure that you have the freedom to
distribute copies of free software (and charge for this service if you wish), that you receive
source code or can get it if you want it, that you can change the software or use pieces of it
in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these
rights or to ask you to surrender the rights. These restrictions translate to certain
responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must
give the recipients all the rights that you have. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps:


(1) copyright the software, and (2) offer you this license which gives you legal permission
to copy, distribute and/or modify the software. Also, for each author‟s protection and ours,
we want to make certain that everyone understands that there is no warranty for this free
software.

If the software is modified by someone else and passed on, we want its recipients to know
that what they have is not the original, so that any problems introduced by others will not
reflect on the original authors‟ reputations.

Finally, any free program is threatened constantly by software patents.


We wish to avoid the danger that redistributors of a free program will individually obtain
patent licenses, in effect making the program proprietary. To prevent this, we have made it
clear that any patent must be licensed for everyone‟s free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

© SAMSUNG Electronics Co., Ltd. A-3


LSM-R User Manual

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND


MODIFICATION
0) This License applies to any program or other work which contains a notice placed by
the copyright holder saying it may be distributed under the terms of this General
Public License. The „Program‟, below, refers to any such program or work, and a
„work based on the Program‟ means either the Program or any derivative work under
copyright law: that is to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language.
(Hereinafter, translation is included without limiation in the term „modification‟.)
Each licensee is addressed as „you‟.
Activities other than copying, distribution and modification are not covered by this
License; they are outside its scope. The act of running the Program is not restricted,
and the output from the Program is covered only if its contents constitute a work based
on the Program (independent of having been made by running the Program).
Whether that is true depends on what the Program does.
1) You may copy and distribute verbatim copies of the Program‟s source code as you
receive it, in any medium, provided that you conspicuously and appropriately publish
on each copy an appropriate copyright notice and disclaimer of warranty; keep intact
all the notices that refer to this License and to the absence of any warranty; and give
any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your
option offer warranty protection in exchange for a fee.
2) You may modify your copy or copies of the Program or any portion of it, thus forming
a work based on the Program, and copy and distribute such modifications or work
under the terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you
changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part
contains or is derived from the Program or any part thereof, to be licensed as a
whole at no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you
must cause it, when started running for such interactive use in the most ordinary
way, to print or display an announcement including an appropriate copyright
notice and a notice that there is no warranty (or else, saying that you provide a
warranty) and that users may redistribute the program under these conditions, and
telling the user how to view a copy of this License.
(Exception: if the Program itself is interactive but does not normally print such an
announcement, your work based on the Program is not required to print an
announcement.)
These requirements apply to the modified work as a whole.
If identifiable sections of that work are not derived from the Program, and can be
reasonably considered independent and separate works in themselves, then this
License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole
which is a work based on the Program, the distribution of the whole must be on
the terms of this License, whose permissions for other licensees extend to the
entire whole, and thus to each and every part regardless of who wrote it.

© SAMSUNG Electronics Co., Ltd. A-4


LSM-R User Manual

Thus, it is not the intent of this section to claim rights or contest your rights to work
written entirely by you; rather, the intent is to exercise the right to control the
distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the
Program (or with a work based on the Program) on a volume of a storage or
distribution medium does not bring the other work under the scope of this License.
3) You may copy and distribute the Program (or a work based on it, under Section 2) in
object code or executable form under the terms of Sections 1 and 2 above provided
that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code,
which must be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third
party, for a charge no more than your cost of physically performing source
distribution, a complete machine-readable copy of the corresponding source code,
to be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute
corresponding source code. (This alternative is allowed only for noncommercial
distribution and only if you received the program in object code or executable
form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making
modifications to it. For an executable work, complete source code means all the
source code for all modules it contains, plus any associated interface definition
files, plus the scripts used to control compilation and installation of the executable.
However, as a special exception, the source code distributed need not include
anything that is normally distributed (in either source or binary form) with the
major components (compiler, kernel, and so on) of the operating system on which
the executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy
from a designated place, then offering equivalent access to copy the source code
from the same place counts as distribution of the source code, even though third
parties are not compelled to copy the source along with the object code.
4) You may not copy, modify, sublicense, or distribute the Program except as expressly
provided under this License. Any attempt otherwise to copy, modify, sublicense or
distribute the Program is void, and will automatically terminate your rights under this
License. However, parties who have received copies, or rights, from you under this
License will not have their licenses terminated so long as such parties remain in full
compliance.
5) You are not required to accept this License, since you have not signed it.
However, nothing else grants you permission to modify or distribute the Program or its
derivative works. These actions are prohibited by law if you do not accept this License.
Therefore, by modifying or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Program or works based on it.

© SAMSUNG Electronics Co., Ltd. A-5


LSM-R User Manual

6) Each time you redistribute the Program (or any work based on the Program), the
recipient automatically receives a license from the original licensor to copy, distribute
or modify the Program subject to these terms and conditions.
You may not impose any further restrictions on the recipients‟ exercise of the rights
granted herein. You are not responsible for enforcing compliance by third parties to
this License.
7) If, as a consequence of a court judgment or allegation of patent infringement or for any
other reason (not limited to patent issues), conditions are imposed on you (whether by
court order, agreement or otherwise) that contradict the conditions of this License, they
do not excuse you from the conditions of this License.
If you cannot distribute so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may not
distribute the Program at all. For example, if a patent license would not permit royalty-
free redistribution of the Program by all those who receive copies directly or indirectly
through you, then the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply and the section as a whole
is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other
property right claims or to contest validity of any such claims; this section has the sole
purpose of protecting the integrity of the free software distribution system, which is
implemented by public license practices. Many people have made generous
contributions to the wide range of software distributed through that system in reliance
on consistent application of that system; it is up to the author/donor to decide if he or
she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence
of the rest of this License.
8) If the distribution and/or use of the Program is restricted in certain countries either by
patents or by copyrighted interfaces, the original copyright holder who places the
Program under this License may add an explicit geographical distribution limitation
excluding those countries, so that distribution is permitted only in or among countries
not thus excluded. In such case, this License incorporates the limitation as if written in
the body of this License.
9) The Free Software Foundation may publish revised and/or new versions of the General
Public License from time to time. Such new versions will be similar in spirit to the
present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a
version number of this License which applies to it and „any later version‟, you have
the option of following the terms and conditions either of that version or of any later
version published by the Free Software Foundation.
If the Program does not specify a version number of this License, you may choose any
version ever published by the Free Software Foundation.

© SAMSUNG Electronics Co., Ltd. A-6


LSM-R User Manual

10) If you wish to incorporate parts of the Program into other free programs whose
distribution conditions are different, write to the author to ask for permission.
For software which is copyrighted by the Free Software Foundation, write to the Free
Software Foundation; we sometimes make exceptions for this.
Our decision will be guided by the two goals of preserving the free status of all
derivatives of our free software and of promoting the sharing and reuse of software
generally.

NO WARRANTY
11) BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE
COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM
„AS IS‟ WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU
ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
12) IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO
MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED
ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF
THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR
LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE
PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.

END OF TERMS AND CONDITIONS

© SAMSUNG Electronics Co., Ltd. A-7


LSM-R User Manual

How to Apply These Terms to Your New Programs


If you develop a new program, and you want it to be of the greatest possible use to the
public, the best way to achieve this is to make it free software which everyone can
redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start
of each source file to most effectively convey the exclusion of warranty; and each file
should have at least the „copyright‟ line and a pointer to where the full notice is found.

<one line to give the program’s name and a brief idea of what it does.>
Copyright (C) <year> <name of author>

This program is free software; you can redistribute it and/or modify it under the terms of the
GNU General Public License as published by the Free Software Foundation; either version 2 of
the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
PURPOSE.
See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program;
if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-
1301 USA.

Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an
interactive mode:

Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with
ABSOLUTELY NO WARRANTY; for details type „show w‟.
This is free software, and you are welcome to redistribute it under certain conditions; type
„show c‟ for details.

The hypothetical commands „show w‟ and „show c‟ should show the appropriate parts of
the General Public License. Of course, the commands you use may be called something
other than „show w‟ and „show c‟; they could even be mouse-clicks or menu items--
whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to
sign a „copyright disclaimer‟ for the program, if necessary. Here is a sample; alter the names:

Yoyodyne, Inc., hereby disclaims all copyright interest in the program „Gnomovision‟
(which makes passes at compilers) written by James Hacker.

<signature of Ty Coon>, 1 April 1989


Ty Coon, President of Vice

© SAMSUNG Electronics Co., Ltd. A-8


LSM-R User Manual

This General Public License does not permit incorporating your program into proprietary
programs.
If your program is a subroutine library, you may consider it more useful to permit linking
proprietary applications with the library. If this is what you want to do, use the GNU Lesser
General Public License instead of this License.

Apache Software License


Version 1.1
Copyright (c) 2000 The Apache Software Foundation. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.

3. The end-user documentation included with the redistribution, if any, must include the
following acknowledgment:
„This product includes software developed by the Apache Software Foundation
(http://www.apache.org/).‟
Alternately, this acknowledgment may appear in the software itself, if and wherever such
third-party acknowledgments normally appear.

4. The names „Apache‟ and „Apache Software Foundation‟ must not be used to endorse or
promote products derived from this software without prior written permission.
For written permission, please contact apache@apache.org.

5. Products derived from this software may not be called „Apache‟, nor may „Apache‟
appear in their name, without prior written permission of the Apache Software
Foundation.

THIS SOFTWARE IS PROVIDED „AS IS‟ AND ANY EXPRESSED OR IMPLIED


WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.

© SAMSUNG Electronics Co., Ltd. A-9


LSM-R User Manual

This software consists of voluntary contributions made by many individuals on behalf of


the Apache Software Foundation. For more information on the Apache Software
Foundation, please see <http://www.apache.org/>.

Portions of this software are based upon public domain software originally written at the
National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.

Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION


1. Definitions.
„License‟ shall mean the terms and conditions for use, reproduction, and distribution as
defined by Sections 1 through 9 of this document.

„Licensor‟ shall mean the copyright owner or entity authorized by the copyright owner that
is granting the License.

„Legal Entity‟ shall mean the union of the acting entity and all other entities that control,
are controlled by, or are under common control with that entity. For the purposes of this
definition, „control‟ means (i) the power, direct or indirect, to cause the direction or
management of such entity, whether by contract or otherwise, or (ii) ownership of fifty
percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.
„You‟ (or „Your‟) shall mean an individual or Legal Entity exercising permissions granted
by this License. „Source‟ form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation source, and configuration
files.

„Object‟ form shall mean any form resulting from mechanical transformation or translation
of a Source form, including but not limited to compiled object code, generated
documentation, and conversions to other media types.

„Work‟ shall mean the work of authorship, whether in Source or Object form, made
available under the License, as indicated by a copyright notice that is included in or
attached to the work (an example is provided in the Appendix below).

„Derivative Works‟ shall mean any work, whether in Source or Object form, that is based
on (or derived from) the Work and for which the editorial revisions, annotations,
elaborations, or other modifications represent, as a whole, an original work of authorship.
For the purposes of this License, Derivative Works shall not include works that remain
separable from, or merely link (or bind by name) to the interfaces of, the Work and
Derivative Works thereof.

© SAMSUNG Electronics Co., Ltd. A-10


LSM-R User Manual

„Contribution‟ shall mean any work of authorship, including the original version of the
Work and any modifications or additions to that Work or Derivative Works thereof, that is
intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by
an individual or Legal Entity authorized to submit on behalf of the copyright owner.
For the purposes of this definition, „submitted‟ means any form of electronic, verbal, or
written communication sent to the Licensor or its representatives, including but not limited
to communication on electronic mailing lists, source code control systems, and issue
tracking systems that are managed by, or on behalf of, the Licensor for the purpose of
discussing and improving the Work, but excluding communication that is conspicuously
marked or otherwise designated in writing by the copyright owner as „Not a Contribution.‟
„Contributor‟ shall mean Licensor and any individual or Legal Entity on behalf of whom a
Contribution has been received by Licensor and subsequently incorporated within the Work.

2. Grant of Copyright License.


Subject to the terms and conditions of this License, each Contributor hereby grants to You a
perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license
to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense,
and distribute the Work and such Derivative Works in Source or Object form.

3. Grant of Patent License.


Subject to the terms and conditions of this License, each Contributor hereby grants to You a
perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated
in this section) patent license to make, have made, use, offer to sell, sell, import, and
otherwise transfer the Work, where such license applies only to those patent claims
licensable by such Contributor that are necessarily infringed by their Contribution(s) alone
or by combination of their Contribution(s) with the Work to which such Contribution(s)
was submitted. If You institute patent litigation against any entity (including a cross-claim
or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within
the Work constitutes direct or contributory patent infringement, then any patent licenses
granted to You under this License for that Work shall terminate as of the date such litigation
is filed.

4. Redistribution.
You may reproduce and distribute copies of the Work or Derivative Works thereof in any
medium, with or without modifications, and in Source or Object form, provided that You
meet the following conditions:
(a) You must give any other recipients of the Work or Derivative Works a copy of this
License; and
(b) You must cause any modified files to carry prominent notices stating that You changed
the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all
copyright, patent, trademark, and attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of the Derivative Works; and

© SAMSUNG Electronics Co., Ltd. A-11


LSM-R User Manual

(d) If the Work includes a „NOTICE‟ text file as part of its distribution, then any Derivative
Works that You distribute must include a readable copy of the attribution notices
contained within such NOTICE file, excluding those notices that do not pertain to any
part of the Derivative Works, in at least one of the following places: within a NOTICE
text file distributed as part of the Derivative Works; within the Source form or
documentation, if provided along with the Derivative Works; or, within a display
generated by the Derivative Works, if and wherever such third-party notices normally
appear. The contents of the NOTICE file are for informational purposes only and do not
modify the License. You may add Your own attribution notices within Derivative Works
that You distribute, alongside or as an addendum to the NOTICE text from the Work,
provided that such additional attribution notices cannot be construed as modifying the
License.

You may add Your own copyright statement to Your modifications and provide additional
or different license terms and conditions use, reproduction, or distribution of Your
modifications, or any such Derivative Works as a whole, provided Your use, production,
and distribution of the Work otherwise complies with the conditions stated in this License.

5. Submission of Contributions.
Unless You explicitly state otherwise, Contribution intentionally submitted for inclusion in
the Work by You to the Licensor shall be under the terms and conditions of this License,
without any additional terms or conditions. Notwithstanding the above, nothing herein shall
supersede or modify the terms of any separate license agreement you may have executed
with Licensor regarding such Contributions.

6. Trademarks.
This License does not grant permission to use the trade names, trademarks, service marks,
or product names of the Licensor, except as required for reasonable and customary use in
describing the origin of the Work and reproducing the content of the NOTICE file.

7. Disclaimer of Warranty.
Unless required by applicable law or agreed to in writing, Licensor provides the Work (and
each Contributor provides its Contributions) on an „AS IS‟ BASIS, WITHOUT
WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including,
without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT,
MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely
responsible for determining the appropriateness of using or redistributing the Work and
assume any risks associated with Your exercise of permissions under this License.

8. Limitation of Liability.
In no event and under no legal theory, whether in tort (including negligence), contract, or
otherwise, unless required by applicable law (such as deliberate and grossly negligent acts)
or agreed to in writing, shall any Contributor be liable to You for damages, including any
direct, indirect, special, incidental, or consequential damages of any character arising as a
result of this License or out of the use or inability to use the Work (including but not
limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or
any and all other commercial damages or losses), even if such Contributor has been
advised of the possibility of such damages.

© SAMSUNG Electronics Co., Ltd. A-12


LSM-R User Manual

9. Accepting Warranty or Additional Liability.


While redistributing the Work or Derivative Works thereof, You may choose to offer, and
charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations
and/or rights consistent with this License. However, in accepting such obligations, You
may act only on Your own behalf and on Your sole responsibility, not on behalf of any
other Contributor, and only if You agree to indemnify, defend, and hold each Contributor
harmless for any liability incurred by, or claims asserted against, such Contributor by
reason of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS

APPENDIX: How to apply the Apache License to your work.


To apply the Apache License to your work, attach the following boilerplate notice, with the
fields enclosed by brackets „„” replaced with your own identifying information.
(Don‟t include the brackets!) The text should be enclosed in the appropriate comment
syntax for the file format. We also recommend that a file or class name and description of
purpose be included on the same „printed page‟ as the copyright notice for easier
identification within third-party archives.

Copyright ‘yyyy’ ‘name of copyright owner’

Licensed under the Apache License, Version 2.0 (the ‘License’); you may not use this file
except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License
is distributed on an ‘AS IS’ BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
either express or implied. See the License for the specific language governing permissions and
limitations under the License

© SAMSUNG Electronics Co., Ltd. A-13


LSM-R User Manual

BSD License
Copyright (c) <YEAR>, <OWNER>
All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
Neither the name of the <ORGANIZATION> nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior
written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND


CONTRIBUTORS „AS IS‟ AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.

© SAMSUNG Electronics Co., Ltd. A-14


LSM-R User Manual

COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0


1.Definitions.
1.1. „Contributor‟ means each individual or entity that creates or contributes to the
creation of Modifications.
1.2. „Contributor Version‟ means the combination of the Original Software, prior
Modifications used by a Contributor (if any), and the Modifications made by that
particular Contributor.
1.3. „Covered Software‟ means (a) the Original Software, or (b) Modifications, or (c) the
combination of files containing Original Software with files containing
Modifications, in each case including portions thereof.
1.4. „Executable‟ means the Covered Software in any form other than Source Code.
1.5. „Initial Developer‟ means the individual or entity that first makes Original Software
available under this License.
1.6. „Larger Work‟ means a work which combines Covered Software or portions thereof
with code not governed by the terms of this License.
1.7. „License‟ means this document.
1.8. „Licensable‟ means having the right to grant, to the maximum extent possible,
whether at the time of the initial grant or subsequently acquired, any and all of the
rights conveyed herein.
1.9. „Modifications‟ means the Source Code and Executable form of any of the following:
A. Any file that results from an addition to, deletion from or modification of the
contents of a file containing Original Software or previous Modifications;
B. Any new file that contains any part of the Original Software or previous
Modification; or
C. Any new file that is contributed or otherwise made available under the terms of
this License.
1.10. „Original Software‟ means the Source Code and Executable form of computer
software code that is originally released under this License.
1.11. „Patent Claims‟ means any patent claim(s), now owned or hereafter acquired,
including without limitation, method, process, and apparatus claims, in any patent
Licensable by grantor.
1.12. „Source Code‟ means (a) the common form of computer software code in which
modifications are made and (b) associated documentation included in or with such
code.
1.13. „You‟ (or „Your‟) means an individual or a legal entity exercising rights under, and
complying with all of the terms of, this License. For legal entities, „You‟ includes any
entity which controls, is controlled by, or is under common control with You.
For purposes of this definition, „control‟ means (a) the power, direct or indirect, to
cause the direction or management of such entity, whether by contract or otherwise,
or (b) ownership of more than fifty percent (50%) of the outstanding shares or
beneficial ownership of such entity.

© SAMSUNG Electronics Co., Ltd. A-15


LSM-R User Manual

2. License Grants.
2.1. The Initial Developer Grant.
Conditioned upon Your compliance with Section 3.1 below and subject to third party
intellectual property claims, the Initial Developer hereby grants You a world-wide, royalty-
free, non-exclusive license:
(a) under intellectual property rights (other than patent or trademark) Licensable by Initial
Developer, to use, reproduce, modify, display, perform, sublicense and distribute the
Original Software (or portions thereof), with or without Modifications, and/or as part of
a Larger Work; and
(b) under Patent Claims infringed by the making, using or selling of Original Software, to
make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the
Original Software (or portions thereof).
(c) The licenses granted in Sections 2.1 (a) and (b) are effective on the date Initial
Developer first distributes or otherwise makes the Original Software available to a third
party under the terms of this License.
(d) Notwithstanding Section 2.1 (b) above, no patent license is granted: (1) for code that
You delete from the Original Software, or (2) for infringements caused by: (i) the
modification of the Original Software, or (ii) the combination of the Original Software
with other software or devices.
2.2. Contributor Grant.
Conditioned upon Your compliance with Section 3.1 below and subject to third party
intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free,
non-exclusive license:
(a) under intellectual property rights (other than patent or trademark) Licensable by
Contributor to use, reproduce, modify, display, perform, sublicense and distribute the
Modifications created by such Contributor (or portions thereof), either on an unmodified
basis, with other Modifications, as Covered Software and/or as part of a Larger Work; and
(b) under Patent Claims infringed by the making, using, or selling of Modifications made
by that Contributor either alone and/or in combination with its Contributor Version (or
portions of such combination), to make, use, sell, offer for sale, have made, and/or
otherwise dispose of: (1) Modifications made by that Contributor (or portions thereof);
and (2) the combination of Modifications made by that Contributor with its Contributor
Version (or portions of such combination).
(c) The licenses granted in Sections 2.2 (a) and 2.2 (b) are effective on the date Contributor
first distributes or otherwise makes the Modifications available to a third party.
(d) Notwithstanding Section 2.2 (b) above, no patent license is granted: (1) for any code
that Contributor has deleted from the Contributor Version; (2) for infringements caused
by: (i) third party modifications of Contributor Version, or (ii) the combination of
Modifications made by that Contributor with other software (except as part of the
Contributor Version) or other devices; or (3) under Patent Claims infringed by Covered
Software in the absence of Modifications made by that Contributor.

© SAMSUNG Electronics Co., Ltd. A-16


LSM-R User Manual

3. Distribution Obligations.
3.1. Availability of Source Code.
Any Covered Software that You distribute or otherwise make available in Executable form
must also be made available in Source Code form and that Source Code form must be
distributed only under the terms of this License. You must include a copy of this License
with every copy of the Source Code form of the Covered Software You distribute or
otherwise make available. You must inform recipients of any such Covered Software in
Executable form as to how they can obtain such Covered Software in Source Code form in
a reasonable manner on or through a medium customarily used for software exchange.
3.2. Modifications.
The Modifications that You create or to which You contribute are governed by the terms of
this License. You represent that You believe Your Modifications are Your original creation(s)
and/or You have sufficient rights to grant the rights conveyed by this License.
3.3. Required Notices.
You must include a notice in each of Your Modifications that identifies You as the
Contributor of the Modification. You may not remove or alter any copyright, patent or
trademark notices contained within the Covered Software, or any notices of licensing or
any descriptive text giving attribution to any Contributor or the Initial Developer.
3.4. Application of Additional Terms.
You may not offer or impose any terms on any Covered Software in Source Code form that
alters or restricts the applicable version of this License or the recipients rights hereunder.
You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability
obligations to one or more recipients of Covered Software. However, you may do so only
on Your own behalf, and not on behalf of the Initial Developer or any Contributor.
You must make it absolutely clear that any such warranty, support, indemnity or liability
obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer
and every Contributor for any liability incurred by the Initial Developer or such Contributor
as a result of warranty, support, indemnity or liability terms You offer.
3.5. Distribution of Executable Versions.
You may distribute the Executable form of the Covered Software under the terms of this
License or under the terms of a license of Your choice, which may contain terms different
from this License, provided that You are in compliance with the terms of this License and
that the license for the Executable form does not attempt to limit or alter the recipient‟s
rights in the Source Code form from the rights set forth in this License. If You distribute the
Covered Software in Executable form under a different license, You must make it
absolutely clear that any terms which differ from this License are offered by You alone, not
by the Initial Developer or Contributor. You hereby agree to indemnify the Initial
Developer and every Contributor for any liability incurred by the Initial Developer or such
Contributor as a result of any such terms You offer.
3.6. Larger Works.
You may create a Larger Work by combining Covered Software with other code not
governed by the terms of this License and distribute the Larger Work as a single product.
In such a case, You must make sure the requirements of this License are fulfilled for the
Covered Software.

© SAMSUNG Electronics Co., Ltd. A-17


LSM-R User Manual

4. Versions of the License.


4.1. New Versions.
Sun Microsystems, Inc. is the initial license steward and may publish revised and/or new
versions of this License from time to time. Each version will be given a distinguishing
version number. Except as provided in Section 4.3, no one other than the license steward
has the right to modify this License.
4.2. Effect of New Versions.
You may always continue to use, distribute or otherwise make the Covered Software
available under the terms of the version of the License under which You originally received
the Covered Software. If the Initial Developer includes a notice in the Original Software
prohibiting it from being distributed or otherwise made available under any subsequent
version of the License, You must distribute and make the Covered Software available under
the terms of the version of the License under which You originally received the Covered
Software. Otherwise, You may also choose to use, distribute or otherwise make the
Covered Software available under the terms of any subsequent version of the License
published by the license steward.
4.3. Modified Versions.
When You are an Initial Developer and You want to create a new license for Your Original
Software, You may create and use a modified version of this License if You: (a) rename the
license and remove any references to the name of the license steward (except to note that
the license differs from this License); and (b) otherwise make it clear that the license
contains terms which differ from this License.

5. DISCLAIMER OF WARRANTY.
COVERED SOFTWARE IS PROVIDED UNDER THIS LICENSE ON AN „AS IS‟
BASIS, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, WARRANTIES THAT THE COVERED
SOFTWARE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR
PURPOSE OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE COVERED SOFTWARE IS WITH YOU. SHOULD ANY
COVERED SOFTWARE PROVE DEFECTIVE IN ANY RESPECT, YOU (NOT THE
INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE COST OF
ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF
WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF
ANY COVERED SOFTWARE IS AUTHORIZED HEREUNDER EXCEPT UNDER
THIS DISCLAIMER.

6. TERMINATION.
6.1. This License and the rights granted hereunder will terminate automatically if You fail
to comply with terms herein and fail to cure such breach within 30 days of becoming
aware of the breach. Provisions which, by their nature, must remain in effect beyond
the termination of this License shall survive.

© SAMSUNG Electronics Co., Ltd. A-18


LSM-R User Manual

6.2. If You assert a patent infringement claim (excluding declaratory judgment actions)
against Initial Developer or a Contributor (the Initial Developer or Contributor against
whom You assert such claim is referred to as „Participant‟) alleging that the Participant
Software (meaning the Contributor Version where the Participant is a Contributor or
the Original Software where the Participant is the Initial Developer) directly or
indirectly infringes any patent, then any and all rights granted directly or indirectly to
You by such Participant, the Initial Developer (if the Initial Developer is not the
Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall,
upon 60 days notice from Participant terminate prospectively and automatically at the
expiration of such 60 day notice period, unless if within such 60 day period You
withdraw Your claim with respect to the Participant Software against such Participant
either unilaterally or pursuant to a written agreement with Participant.
6.3. In the event of termination under Sections 6.1 or 6.2 above, all end user licenses that
have been validly granted by You or any distributor hereunder prior to termination
(excluding licenses granted to You by any distributor) shall survive termination.

7. LIMITATION OF LIABILITY.
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER
TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU,
THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR
OF COVERED SOFTWARE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE
LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR
CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOST PROFITS, LOSS OF GOODWILL, WORK
STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER
COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE
BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION
OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL
INJURY RESULTING FROM SUCH PARTY‟S NEGLIGENCE TO THE EXTENT
APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT
APPLY TO YOU.

8. U.S. GOVERNMENT END USERS.


The Covered Software is a „commercial item,‟ as that term is defined in 48 C.F.R. 2.101
(Oct. 1995), consisting of „commercial computer software‟ (as that term is defined at 48
C.F.R. 252.227-7014 (a) (1)) and „commercial computer software documentation‟ as such
terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48
C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users
acquire Covered Software with only those rights set forth herein.
This U.S. Government Rights clause is in lieu of, and supersedes, any other FAR, DFAR,
or other clause or provision that addresses Government rights in computer software under
this License.

© SAMSUNG Electronics Co., Ltd. A-19


LSM-R User Manual

9. MISCELLANEOUS.
This License represents the complete agreement concerning subject matter hereof.
If any provision of this License is held to be unenforceable, such provision shall be
reformed only to the extent necessary to make it enforceable. This License shall be
governed by the law of the jurisdiction specified in a notice contained within the Original
Software (except to the extent applicable law, if any, provides otherwise), excluding such
jurisdiction‟s conflict-of-law provisions. Any litigation relating to this License shall be
subject to the jurisdiction of the courts located in the jurisdiction and venue specified in a
notice contained within the Original Software, with the losing party responsible for costs,
including, without limitation, court costs and reasonable attorneys‟ fees and expenses.
The application of the United Nations Convention on Contracts for the International Sale of
Goods is expressly excluded. Any law or regulation which provides that the language of a
contract shall be construed against the drafter shall not apply to this License. You agree that
You alone are responsible for compliance with the United States export administration
regulations (and the export control laws and regulation of any other countries) when You
use, distribute or otherwise make available any Covered Software.

10. RESPONSIBILITY FOR CLAIMS.


As between Initial Developer and the Contributors, each party is responsible for claims and
damages arising, directly or indirectly, out of its utilization of rights under this License and
You agree to work with Initial Developer and Contributors to distribute such responsibility
on an equitable basis. Nothing herein is intended or shall be deemed to constitute any
admission of liability.

Creative Commons Public Domain Dedication


Copyright-Only Dedication (based on United States law) or Public Domain Certification
The person or persons who have associated work with this document (the „Dedicator‟ or
„Certifier‟) hereby either certifies that, to the best of his knowledge, the work of authorship
identified is in the public domain of the country from which the work is published, or
hereby dedicates whatever copyright the dedicators holds in the work of authorship
identified below (the „Work‟) to the public domain.
A certifier, moreover, dedicates any copyright interest he may have in the associated work,
and for these purposes, is described as a „dedicator‟ below.
A certifier has taken reasonable steps to verify the copyright status of this work.
Certifier recognizes that his good faith efforts may not shield him from liability if in fact
the work certified is not in the public domain.
Dedicator makes this dedication for the benefit of the public at large and to the detriment of
the Dedicator‟s heirs and successors. Dedicator intends this dedication to be an overt act of
relinquishment in perpetuity of all present and future rights under copyright law, whether
vested or contingent, in the Work. Dedicator understands that such relinquishment of all
rights includes the relinquishment of all rights to enforce (by lawsuit or otherwise) those
copyrights in the Work.
Dedicator recognizes that, once placed in the public domain, the Work may be freely
reproduced, distributed, transmitted, used, modified, built upon, or otherwise exploited by
anyone for any purpose, commercial or non-commercial, and in any way, including by
methods that have not yet been invented or conceived.

© SAMSUNG Electronics Co., Ltd. A-20


LSM-R User Manual

Cryptix General License


Copyright (c) 1995-2004 The Cryptix Foundation Limited. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the copyright notice, this list of conditions and
the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED AND
CONTRIBUTORS „AS IS‟ AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE CRYPTIX FOUNDATION LIMITED OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.

jaxen License
Copyright 2003 (C) The Werken Company. All Rights Reserved.
Redistribution and use of this software and associated documentation („Software‟), with or
without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain copyright statements and notices.
Redistributions must also contain a copy of this document.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
The name „jaxen‟ must not be used to endorse or promote products derived from this
Software without prior written permission of The Werken Company.
For written permission, please contact bob@werken.com.
Products derived from this Software may not be called „jaxen‟ nor may „jaxen‟ appear in
their names without prior written permission of The Werken Company. „jaxen‟ is a
registered trademark of The Werken Company.
Due credit should be given to The Werken Company. (http://jaxen.werken.com/).

© SAMSUNG Electronics Co., Ltd. A-21


LSM-R User Manual

THIS SOFTWARE IS PROVIDED BY THE WERKEN COMPANY AND


CONTRIBUTORS „AS IS‟ AND ANY EXPRESSED OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE WERKEN COMPANY OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.

jdom License
Copyright (C) 2000-2004 Jason Hunter & Brett McLaughlin.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions,
and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions, and the disclaimer that follows these conditions in the documentation and/or
other materials provided with the distribution.
The name „JDOM‟ must not be used to endorse or promote products derived from this
software without prior written permission. For written permission, please contact
{request_AT_jdom_DOT_org}.
Products derived from this software may not be called „JDOM‟, nor may „JDOM‟ appear in
their name, without prior written permission from the JDOM Project Management
{request_AT_jdom_DOT_org}.
In addition, we request (but do not require) that you include in the end-user documentation
provided with the redistribution and/or in the software itself an acknowledgement
equivalent to the following:
„This product includes software developed by the JDOM Project (http://www.jdom.org/).‟
Alternatively, the acknowledgment may be graphical using the logos available at
http://www.jdom.org/images/logos.
THIS SOFTWARE IS PROVIDED „AS IS‟ AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE JDOM AUTHORS OR THE PROJECT
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
OF THE POSSIBILITY OF SUCH DAMAGE.

© SAMSUNG Electronics Co., Ltd. A-22


LSM-R User Manual

License of SACK
COPYRIGHT AND PERMISSION NOTICE for Simple AJAX Code Kit (SACK).
Copyright © 2005 Gregory Wild-Smith
Authors Website: http://www.twilightuniverse.com/
All rights reserved.

Permission is hereby granted, free of charge, to any person obtaining a copy of this
software and associated documentation files (the „Software‟), to deal in the Software
without restriction, including without limitation the rights to use, copy, modify, merge,
publish, distribute, and/or sell copies of the Software, and to permit persons to whom the
Software is furnished to do so, provided that the above copyright notice(s), authors website
url, and this permission notice appear in all copies of the Software and that the above
copyright notice(s), authors url, and this permission notice appear in supporting
documentation.

THE SOFTWARE IS PROVIDED „AS IS‟, WITHOUT WARRANTY OF ANY KIND,


EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE
COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE
FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES,
OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.

Except as contained in this notice, the name of a copyright holder shall not be used in
advertising or otherwise to promote the sale, use or other dealings in this Software without
prior written authorization of the copyright holder.

© SAMSUNG Electronics Co., Ltd. A-23


LSM-R
User Manual

©2011 Samsung Electronics Co., Ltd.


All rights reserved.

Information in this manual is proprietary to SAMSUNG


Electronics Co., Ltd.
No information contained here may be copied, translated,
transcribed or duplicated by any form without the prior written
consent of SAMSUNG.
Information in this manual is subject to change without notice.

You might also like