Beruflich Dokumente
Kultur Dokumente
System Administration
AccessIntegrator V3.3
UMN:ADMN
A50010-T3-B100-1-7671
UMN:ADMN System Administration
AccessIntegrator V3.3
!
Important Notice on Product Safety
Elevated voltages are inevitably present at specific points in this electrical equipment. Some of the
parts can also have elevated operating temperatures.
Non-observance of these conditions and the safety instructions can result in personal injury or in prop-
erty damage.
Therefore only trained and qualified personnel may install and maintain the system.
The system complies with the standard EN 60950 / IEC 60950. All equipment connected has to
comply with the applicable safety standards.
AD – 2 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
1.1 Manual concept and target groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
1.2 Manual layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
1.3 Notational conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
6 Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AP-1
A50010-T3-B100-1-7671 AD – 3
UMN:ADMN System Administration
AccessIntegrator V3.3
Illustrations
Fig. 2.1 Checking a user’s function permissions . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Fig. 2.2 “User Roles” dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Fig. 2.3 “Define new User Role” dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Fig. 2.4 “User Rights” dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10
Bild 2.5 Modifying default user rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Fig. 3.1 Database backup procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Fig. 3.2 Backup progress window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Fig. 3.3 Database restore procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Fig. 3.4 Message indicating the progress of the restore procedure. . . . . . . . . . 3-4
Fig. 3.5 NE backup procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Fig. 3.6 NE restore procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Fig. 3.7 NE backup dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Fig. 3.8 Restore dialog for a single network element. . . . . . . . . . . . . . . . . . . . . 3-8
Fig. 4.1 Event log of applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Fig. 4.2 Event details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Fig. 4.3 ACI performance features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Fig. 4.4 Process information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Fig. 4.5 Performance Monitor log settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Fig. 5.1 Registry Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Fig. 5.2 Modifying a parameter value. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
AD – 4 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Tables
Tab. 1.1 Notational conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Tab. 2.1 Assigning permission classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Tab. 2.2 Permission classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Tab. 2.3 Default user rights according to ACI permission classes. . . . . . . . . . . . 2-6
Tab. 2.4 Internal Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Tab. 4.1 Event types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
A50010-T3-B100-1-7671 AD – 5
UMN:ADMN System Administration
AccessIntegrator V3.3
AD – 6 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
1 Introduction
This chapter is an overview of:
• The O.N.M.S AccessIntegrator documentation and the various target groups
(O.N.M.S = Optimized Network Management System)
• The manual concept
• The notational conventions used.
A50010-T3-B100-1-7671 1–1
UMN:ADMN System Administration
AccessIntegrator V3.3
1–2 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
6
4 7
5
ACI server
Permission classes: Global groups:
Super user Network
Operation & Maintenance Maintenance
Subscriber LineTest Customer Organization
Intelligence Features .
System Administration .
Subscriber Management .
1. The user logs in under his/her login name from an NT workstation in the network.
The validity of the login name is checked in the NT domain controller.
2. If the login procedure is successful, the NT domain controller grants the login name
access to the NT workstation.
3. The user then starts the ACI client.
4. The ACI client transfers the login name and the workstation ID to the selected ACI
server.
A50010-T3-B100-1-7671 2–1
UMN:ADMN System Administration
AccessIntegrator V3.3
5. The ACI server requests and receives from the NT domain controller a list of the
global groups to which the login name belongs.
6. The Domain server sends the list of groups to the ACI server. The ACI server then
checks whether a permission class has been assigned to one or more groups, and
if so, which functions are permitted in each class respectively.
7. If permission classes have been assigned, the ACI server sends a list of permitted
functions to the ACI client.
With a user name, that e.g. belongs to the global user group Network one can under the
control of :
– Server 1 execute all functions permitted in the Subscriber Line Test permis-
sion class
– Server n execute all functions permitted in the Intelligence Features permis-
sion class
2–2 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
“System Administration” In this class, permission classes are assigned to global user groups
and the functions permitted in a permission class are defined.
The global group to which permissions are assigned must have
administration rights for the domain.
“Super user” This class grants permission to use all ACI functions.
The global group to which permission is assigned must have local
administration rights.
“Operation and Maintenance” This class grants permission to use the functions required to
operate the Loop Manager and to configure and maintain NEs and
boards.
“Subscriber Line Test” This class grants permission to access the measuring equipment
(MEU= measurement unit) and functions used to test the line.
“Intelligence Features” This class grants permission to use the functions required to test
telephone connections.
When the ACI client is first started, all menus are disabled, and the appropriate permis-
i sions must first be assigned, and furthermore, the assigned permissions do not come
into effect until the ACI client is restarted.
One permission class can be assigned to each global NT user group. It is recommended
that you create separate global groups for ACI users which reflect the permission
classes.
A50010-T3-B100-1-7671 2–3
UMN:ADMN System Administration
AccessIntegrator V3.3
The “User Roles” window lists all global user groups in the “NT global groups” column.
The associated permission classes are listed in the “OS Permission Class” column.
2–4 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
2. In the “Windows NT global group” field, select the global group to which the new
permission class is to be assigned.
This list only includes those NT user groups which have no assigned ACI permission
class.
3. In the “Permission class” field, select the permission class.
4. By clicking “OK” , the selection is added to the database. The dialog window closes
and a corresponding entry appears in the “User Roles” window.
If you wish to cancel your selection, click the “Cancel” button. The “Define new
Permission Class Entry” dialog box is closed, and the list of assignments in the “User
Roles” window remains unchanged.
5. When you have defined all the desired assignments, click the “Close” button in the
“User Roles”.
New entries in the “User Roles” table do not become effective until ACI Client is
i restarted.
A50010-T3-B100-1-7671 2–5
UMN:ADMN System Administration
AccessIntegrator V3.3
Subscriber Management
System Administration
Intelligence Features
Subscriber Line Test
Super user
ACI-Commands in “User Rights” table
Connections X X X X X
Time-scheduled Jobs X X
Loop Management X X X X X
V5 Interface X X X X X
Parameter Download X X X
NE Backup X X X
NE Restore X X X
UAK Backup X X X
UAK Restore X X X
2–6 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Subscriber Management
System Administration
Intelligence Features
Subscriber Line Test
Super user
ACI-Commands in “User Rights” table
Subscriber Management X X X X X
Detached RNT’s X X X X X
Performance Data X X X X
Configuration X X X X
User Rights X X
Tab. 2.3 Default user rights according to ACI permission classes (Cont.)
A50010-T3-B100-1-7671 2–7
UMN:ADMN System Administration
AccessIntegrator V3.3
Subscriber Management
System Administration
Intelligence Features
Subscriber Line Test
Super user
ACI-Commands in “User Rights” table
Consistency Check X X X X X
Media Configuration X X X X X
Media Event List X X X X X
Options Views X X X X X
Startup Options X X X X X X
Internal Com- Cross Connect Conference X X X X X X
mands Configuration of CTM Global X X X X X X
Data
Tab. 2.3 Default user rights according to ACI permission classes (Cont.)
In addition to the permissions that can be allocated to a menu tree, it is also possible to
enable or disable particular functions. These functions are located under Internal
Commands in the “User Rights” table as well as in the Network Configuration
menu item.
These particular commands are shaded in the table above. They are defined as follows
in the table below:
2–8 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Configuration → Network Configuration → Recognizes existing physical paths in the network and create them au-
Service Management → Learn Service tomatically in path and service management (ACI database);
Enable/Diable “Learn” button in “Service Management” dialog box.
Configuration → Network Configuration → Start the creation of a service by selecting a line card in the Equipment
Equipment View → Create Service View; Enable/Disable the menu item “Create Service” in the context
menu.
Internal Commands → Configuration of CTM Configure DECT subscriber data global to all the CTM RDUs in the net-
Global Data work; Enable/Disable “CTM Global Data” button in “Configure CTM
Global Data” dialog box.
(Menu “Configuration” →“Mobility Administration” →“RDU Global
Data”).
Internal Commands → Open Air Interface dialog Configure the air interface for mobile services during the “Create
at path operation Service” function;
Open the “Air Connection Layer” dialog when creating a service/path.
Internal Commands → Export Subscriber Data Export the subscriber data on an RDU to a file, for use of the DECT
Locator; Enable/Disable “Export” button in “Air Connection Layer”
dialog box.
(Menu “Configuration” →“Network Configuration” →“Air Connection
Management”→ “Subscribers”).
Internal Commands → Open the job scheduler Issue, modify, or delete scheduled jobs (in this version only relevant for
SW download);
Enable/Disable “Schedule” button in “Download Mode” dialog box.
A50010-T3-B100-1-7671 2–9
UMN:ADMN System Administration
AccessIntegrator V3.3
The “User Rights” window contains the following information. In the field:
“Permission Classes” Select the permission classes for which enabled and disabled
functions are to be displayed.
“Enabled” Lists the menu items/functions enabled in the selected permis-
sion class.
“Disabled” Lists the menu items/functions disabled in the selected permis-
sion class.
2 – 10 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
If you click “Close” without first clicking “Apply”, the dialog is aborted. In this case, data
relating to the permitted functions remains unchanged in the database.
Changes to the “User Rights” table do not become effective until ACI Client is restarted.
i
3. Define Windows NT global groups (NT Domain Server) for the ACI user, if you have
not already done so.
4. Assign the global user groups according to an ACI permission class. To do so, open
the “User Roles” table, see section 2.2.2.
5. Modify, if desired, the function scope of the ACI permission classes in the “User
Rights” table. See section 2.3.1.
A50010-T3-B100-1-7671 2 – 11
UMN:ADMN System Administration
AccessIntegrator V3.3
2 – 12 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Weekly backups
Make sure you use a different tape set for each weekly backup.
Monthly backups
The network element files from the entire network should be saved on the ACI hard drive
once a month. By doing so, ACI creates a directory structure that corresponds to the
SISA tree. This directory structure should then be backed up on tape.
A50010-T3-B100-1-7671 3–1
UMN:ADMN System Administration
AccessIntegrator V3.3
3–2 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Database Backup
ACI Backup
DIR
NT
Tape
Backup
A50010-T3-B100-1-7671 3–3
UMN:ADMN System Administration
AccessIntegrator V3.3
Backup
DIR ACI Restore Database
NT
Tape Backup
3–4 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
3. In this dialog window, you will be asked whether you wish to add data records from
the current log file to your database in addition to the archived data records. If you
answer with
y all changes will be incorporated in the restore process. You must therefore save
the file logical.log to another location so that it is not overwritten during the
restoration. The current default storage location is C:\Versant\DB\MLOS.
As a new storage location, _backup_.log is suggested.
n the restore procedure begins immediately. n should be specified only if the
current database status is no longer required.
The progress of the restore procedure can be monitored in the dialog window. When
the entire database has been restored, the dialog box automatically closes.
A50010-T3-B100-1-7671 3–5
UMN:ADMN System Administration
AccessIntegrator V3.3
DIR
NE NE Backup
tree
NT
Tape
Backup
During restoration, the data is, if necessary, first transferred from tape into the directory
on the hard drive. Then the NE data can be restored from the directory structure.
DIR
tree NE Restore NE
NT
Tape Backup
3–6 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
3. Define the scope of backup (only for the entire network or subnetworks):
“Selected only” Only the network elements of the selected
subnetwork are backed up.
“Selected and below” All network elements belonging to the selected
subnetwork or to some subnetwork below the
selected one are backed up.
The file transfer option is preferable, as it is safer and faster. If an NE doesn’t support this
i mode, data transfer will automatically be done via QD2 telegrams .
5. Finally click “Start”. ACI will then warn you that the operation may take time.
6. Click “Yes” and the backup process begins.
The progress of the backup is displayed in the dialog “Backup of...” using the
counters “Finished :: Total” and/or progress bars.
A50010-T3-B100-1-7671 3–7
UMN:ADMN System Administration
AccessIntegrator V3.3
3–8 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
3. Define the scope of backup (only for the entire network or subnetworks):
“Selected only” Only the network elements of the selected
subnetwork are restored.
“Selected and below” All network elements belonging to the selected
subnetwork or to some subnetwork below the
selected one are restored.
The file transfer option is preferable, as it is safer and faster. If an NE doesn’t support this
i mode, data transfer will automatically be done via QD2 telegrams .
5. Finally click “Start”. ACI will then warn you that the operation may take time.
6. If you respond with “Yes”, the restore procedure is started.
The progress of the restoration is displayed in the dialog “Restore of...” using the
counters “Finished :: Total” and/or progress bars.
7. The following message indicates that restore procedure is complete:
Restore - Network Element(s) completed successfully or
Restore - Network Element(s) completed with errors.
8. The logfile can be viewed by clicking the “View” button.
A50010-T3-B100-1-7671 3–9
UMN:ADMN System Administration
AccessIntegrator V3.3
3 – 10 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
A50010-T3-B100-1-7671 4–1
UMN:ADMN System Administration
AccessIntegrator V3.3
A trace log file can be read with an ASCII-Editor. Send a copy of the file to the service
center for evaluation.
“System” The system log records all events logged by the Windows NT system
components.
“Security” The security log records all security-related events, allowing you to
monitor changes to the security system and possible violations.
“Application” The application log records all events logged by the applications. In
this log you can find all recorded ACI events.
The application log is opened:
1. In the Start-menu choose ”Programs” → “Administrative Tools (Common)” →
“Event Viewer”. This opens the “Event Viewer...” dialog.
2. Select menu “Log” → “Application”. The application log is displayed.
3. Use a filter to reduce the scope of the protocol. Select “View” → “Filter Events...”.
The “Filter” dialog appears.
4. Choose an application in the “Source” list, for which you will get the events, e.g.
ACISERVER (Fig. 4.1).
In the log, events are listed line by line. The type of event is indicated at the beginning
of the line:
Blue Information
i
Yellow Warning
!
Red Error
Stop
4–2 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Next to the event type the date and time, the application (source), the category, the ID
number, the login name, and the name of the computer are listed. You can display
detailed information on an event by double-clicking on the appropriate line (Fig. 4.2):
The logging must be set so that entries in the files are overwritten as soon as the log file
has reached the maximum capacity (Wrap Around). The ACI results are output in the
form of a message window when the log file is full.
Checking the log settings:
1. In the “Event Viewer” select the menu “Log” → “Log Settings”. The “Event Log
Settings” dialog window appears.
2. For the Application log, the “Event Log Wrapping” must be selected under the
“Overwrite Events as Needed” option.
Further information can be found in your Windows NT documentation or in the NT Help
system.
A50010-T3-B100-1-7671 4–3
UMN:ADMN System Administration
AccessIntegrator V3.3
4–4 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
A50010-T3-B100-1-7671 4–5
UMN:ADMN System Administration
AccessIntegrator V3.3
“Applications” tab
In this tab, all applications currently running as well as the current status is displayed.
Dependent on the type of your installation (ACI server or ACI client), refer to the
following ACI applications:
– DCNS
– AccessIntegrator startup information
– O.N.M.S AccessIntegrator Server
– O.N.M.S AccessIntegrator Client connected to ...
– API Client
More information on the applications (programs) is available when you click with the
right mouse button and in the context menu select “Go to process”. The “Processes” tab
comes up. The concerned process is highlighted in the list.
4–6 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
“Processes” tab
All processes are listed in this tab that are currently active (see Fig. 4.4 ). Here you will
find all initiated ACI processes, like:
– dcns.exe
– acis.exe
– acic.exe
– apic.exe
With the exception of the “Image Name” column, the other columns can be accessed via
the menu “View” → “Select Columns...”.
“Performance” tab
With this register, the system performance can be supervised. The individual function of
the system, like the processor capacity, available memory, used memory, cache etc.
“Chart” The selected objects, for example, the processor, a disk or a service can
be displayed during a certain time chart.
“Alert” The threshold values for objects can be defined, which will enable
threshold limit alarms. You can also define the actions subsequently initi-
ated by the Performance Monitor.
“Log” This view offers the option of monitoring objects over a longer period of
time and to log the results of the supervision. The log file can then be
evaluated at a later time.
“Report” This view displays an overview of several monitored objects.
The definition of monitored object is similar in all the views. When you, for example, wish
to save the supervision results from various objects in a log file, follow these steps:
1. Select in the menu “View” the “Log” item.
The display changes to log display.
2. Select in the menu “File” the “New Log Settings” item.
3. In the “Edit” menu, select the “Add To Log”.
The “Add To Log” window appears.
A50010-T3-B100-1-7671 4–7
UMN:ADMN System Administration
AccessIntegrator V3.3
4–8 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
A50010-T3-B100-1-7671 4–9
UMN:ADMN System Administration
AccessIntegrator V3.3
computer Name of a remote computer. If this parameter is not specified, the com-
mand is executed on the local system.
time Time at which the command is to be executed (range: 00:00 to
23:59).
interactive Parameter allowing the command to accept input from the user logged
in before being executed.
every:date The command is executed on each specified day of the week or month
next:date (every:) or on the next specified day of the week (next:). If date is not
specified, the current date is assumed.
Possible entries: M, T, W, Th, F, S, Su, or a number between 1 and 31
for the day of the month.
“command” Windows NT command to be executed (.exe or .com) or a batch file
(.bat or .cmd).
If you wish to find out which Schedule services are already available, enter the at
command without any parameters. The output includes the ID (id) required to delete a
service:
at [\\computer][[id] [/delete]]
If you do not specify id, all scheduled commands are deleted.
Further information on the at command can be found in the windows NT Help system.
4 – 10 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
5 Initialization parameters
Some initialization parameters are essential for the correct operation of the AccessInte-
grator applications. These include, for example, the name of the directory under which
the AccessIntegrator software is stored. Most of these parameters are generated during
installation and are preset to their default values. The initialization parameters of
AccessIntegrator are managed in the Windows NT registry under the key
HKEY_LOCAL_MACHINE.
The following sections list and describe the registry entries specific to AccessIntegrator
Registry entries should only be modified in exceptional circumstances. If the modifica-
! tion of an entry is likely to result in inconsistencies, the relevant entry is marked with an
asterisk (*) in the tables below.
In the window, the registry keys are listed on the left-hand side. The key is repre-
sented in the form of a directory containing subkeys.
3. Select HKEY_LOCAL_MACHINE and then the desired subkey.
The associated parameters and their values are displayed on the right-hand side.
4. To edit a parameter, double-click on it. The “Edit String” window opens.
A50010-T3-B100-1-7671 5–1
UMN:ADMN System Administration
AccessIntegrator V3.3
5. Enter the new value and confirm with the “OK” button.
The AccessIntegrator initialization parameters are listed in the registry editor under the
registry key
HKEY_LOCAL_MACHINE → SOFTWARE → Siemens AG → AccessIntegrator Vx
This part of the key is abbreviated to mandatory below. x stands for the ACI version
used. Under Siemens AG, the entries branch out as described below:
• Key: mandatory
Parameter name Description
OperLog* Full path name of the directory containing the log files.
Root* Full path name of the ACI root directory (installation directory).
If a value for the Root parameter is not found under this registry
! key, all mandatory parameters are set to their default values
during the start-up phase. This assumes that you are logged in
to Windows NT as the system administrator. If this is not the
case, the system (NT) will crash.
5–2 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
A50010-T3-B100-1-7671 5–3
UMN:ADMN System Administration
AccessIntegrator V3.3
If a value for the Root parameter is not found under this registry
! key, all mandatory parameters are set to their default values
during the start-up phase. This assumes that you are logged in
to Windows NT as the system administrator. If this is not the
case, the system (NT) will crash.
5–4 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
A50010-T3-B100-1-7671 5–5
UMN:ADMN System Administration
AccessIntegrator V3.3
RS232 Board with two ports. COM 1 is active and is used as the default port.
RS485 Board with eight ports.
5–6 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
Board parameters
The boards contain the ports which are used for communication.
A50010-T3-B100-1-7671 5–7
UMN:ADMN System Administration
AccessIntegrator V3.3
5–8 A50010-T3-B100-1-7671
System Administration UMN:ADMN
AccessIntegrator V3.3
6 Abbreviations
ACI AccessIntegrator
APS Application Program System
DCN Data Communications Network
LCT Local Craft Terminal
MEU Measurement Unit
NE Network Element
O.N.M.S Optimized Network Management System
OS Operations System
Pid Process identification
POC Public Operator Code
RAS Remote Access Service
RDU Radio Distribution Unit
TAC Technical Assistant Center
UI User Interface
A50010-T3-B100-1-7671 AP – 1
UMN:ADMN System Administration
AccessIntegrator V3.3
AP – 2 A50010-T3-B100-1-7671