Académique Documents
Professionnel Documents
Culture Documents
Administration Guide
January 2018
Version 1.5
About This Document
This document describes the applications used for configuring and administering the Baicells
network components and subscribers. The scope includes how to use the eNodeB (eNB) and
user equipment (UE) Graphical User Interface (GUI) applications and the CloudCore suite of
applications. CloudCore includes the Operations Management Console (OMC), Business
Operations Support System (BOSS), and the forthcoming Evolved Packet Core (EPC). The EPC
information will be covered in separate documents, Baicells Enterprise EPC Deployment Guide
and Baicells Enterprise EPC User Guide.
The document is written to the following Baicells GUI software code levels:
• TDD eNB GUI version 100R001C00B110SPC003
• UE GUI version BCE-ODU-1.0.12
• CloudCore OMC version 3.2.2 and BOSS version 3.3.0
The document is intended primarily for network administrators who are responsible for adding
users to the system and configuring, monitoring, troubleshooting, and upgrading Baicells eNBs
and UEs. Appendix B provides a list of abbreviations and acronyms used.
Copyright Notice
Baicells Technologies, Inc., copyrights the information in this document. No part of this
document may be reproduced in any form or means without the prior written consent of
Baicells Technologies, Inc. The Baicells logo is a proprietary trademark of Baicells Technologies,
Inc. Other trademarks mentioned in this document belong to their owners.
Disclaimer
All products, services, and features bought from Baicells Technologies, Inc., are subject to the
constraints of the company's business contract and terms. All or part of the products, services,
or features described in this document might not be your specific Baicells network. Unless
stated in the contract, Baicells Technologies, Inc., does not make any explicit or default
statement or guarantee about the contents of this document.
Unless stated otherwise, this document serves only as a user guide, and all
descriptions/information/suggestions mean no guarantee, neither explicit nor implicit.
The information in this document is subject to change at any time without notice. For more
information, please consult with a Baicells technical engineer or the support team. Refer to
the “Contact Us” section.
ii
Revision Record
Date Version Description SMEs/Contributors Author/Editor
10-Jan-2018 V1.5 Updated to OMC v3.2.2 Cameron Kilton Sharon Redfoot
and BOSS v3.3.0; added Nitisha Potti
additional details on X2 Samuel (Tang) Weizhou
handoff and neighbor cells Wu Junfeng
config; updated terms UE Yang Yanan
and eNB for consistency
16-Nov-2017 V1.4 Updated for: Cameron Kilton Sharon Redfoot
• BS GUI version Wu Junfeng
100R001C00B110SPC003 Zhang Dandan
• CPE GUI version BCE- Nitisha Potti
ODU-1.0.12 Sonny May
• CloudCore OMC and Yang Yanan
BOSS version 3.0.1
21-Aug-2017 V1.3 Edited based on SME Rick Harnish Sharon Redfoot
review. Published. Cameron Kilton
Wu Junfeng
Tang Houcheng
Prior V1.2 Combined OMC User Jesse Raasch Sharon Redfoot
V1.1 Guide, Base Station Cameron Kilton
V1.0 Configuration Guide, and Rick Harnish
BOSS User Guide. Added Nitisha Potti
base station and CPE
GUIs.
Related Documents
Other Baicells technical documents may be found on the Baicells support website (refer to
Contact Us). Following is a list of the technical documents:
iii
Nova-243 Quick Start Guide (forthcoming)
Nova-436 Outdoor 4x1W CCA TDD eNB Installation Guide (forthcoming)
Nova-436 Quick Start Guide (forthcoming)
Nova-446 Outdoor 4x10W FDD eNB Installation Guide (forthcoming)
Nova-446 Quick Start Guide (forthcoming)
elfcell-220 Indoor 2x50mW FDD eNB Installation Guide (forthcoming)
elfcell-220 Quick Start Guide (forthcoming)
NeutralCell Indoor Multi FDD-TDD Small Cell Installation Guide
(forthcoming)
NeutralCell Quick Start Guide (forthcoming)
Neutrino-224 Indoor 2x125mW FDD-TDD eNB Installation Guide
(forthcoming)
Neutrino-224 Quick Start Guide (forthcoming)
SolarCell Outdoor Solution Installation Guide (forthcoming)
SolarCell Quick Start Guide (forthcoming)
Spectra LTE-U Outdoor 2x500mW FDD eNB Installation Guide
(forthcoming)
Spectra LTE-U Quick Start Guide (forthcoming)
System, CloudCore, OAM Baicells Configuration & Network Administration Guide
Baicells Handoff Configuration Guidelines (Beta trial)
Baicells BOSS API Manual
Baicells Operation, Maintenance, & Troubleshooting Guide (forthcoming)
Baicells Enterprise EPC Deployment Guide (forthcoming)
Baicells Enterprise EPC User Guide (forthcoming)
Baicells System Overview (forthcoming)
Contact Us
Baicells Technologies Co., Ltd.
China North America
Address: 3F, Bldg. A, No. 1 Kai Tuo Rd, Address: 555 Republic Dr., #200, Plano, TX
Haidian Dist, Beijing, China 75074, USA
Phone: +86-10-62607100 Phone: +1-888-502-5585
Email: sales_na@Baicells.com or
E-mail: contact@Baicells.com
support_na@Baicells.com
Website: www.Baicells.com Website: https://na.Baicells.com
iv
Table of Contents
1. INTRODUCTION ......................................................................................................................... 1
v
2.9.3.3 eNodeB ....................................................................................................................................... 48
2.9.3.4 GAP ............................................................................................................................................. 49
2.9.3.5 RRC Status................................................................................................................................... 49
2.9.3.6 SON Functional ........................................................................................................................... 50
2.9.3.7 Tx and Rx..................................................................................................................................... 50
2.9.3.8 Random Access........................................................................................................................... 50
2.9.3.9 Capacity ...................................................................................................................................... 51
2.9.3.10 Scheduling Algorithm ............................................................................................................... 51
2.9.3.11 Sync Adjust ............................................................................................................................... 52
2.9.3.12 Link Activation State Detector .................................................................................................. 52
2.9.4 Real-World LTE Configuration Example.............................................................................. 53
2.10 REBOOT ...................................................................................................................................... 56
2.11 LOGOUT ...................................................................................................................................... 56
3. UE GUI ..................................................................................................................................... 58
3.1 COMPUTER REQUIREMENTS .............................................................................................................. 58
3.2 LAUNCHING THE GUI....................................................................................................................... 58
3.3 OVERVIEW..................................................................................................................................... 60
3.4 NETWORK ..................................................................................................................................... 66
3.4.1 LTE Settings ........................................................................................................................ 69
3.4.2 Scan Mode ......................................................................................................................... 71
3.4.3 APN Management ............................................................................................................. 73
3.4.4 PIN Management ............................................................................................................... 74
3.4.5 SIM Lock ............................................................................................................................. 75
3.4.6 DMZ Settings ...................................................................................................................... 75
3.4.7 Static Route ........................................................................................................................ 76
3.4.8 LAN Settings ....................................................................................................................... 77
3.5 SECURITY....................................................................................................................................... 78
3.5.1 MAC Filtering ..................................................................................................................... 79
3.5.2 IP Filtering .......................................................................................................................... 80
3.5.3 URL Filtering ....................................................................................................................... 81
3.5.4 Port Forwarding ................................................................................................................. 82
3.5.5 Access Restriction............................................................................................................... 83
3.5.6 UPnP .................................................................................................................................. 84
3.6 VPN ............................................................................................................................................ 85
3.7 IPV6 ............................................................................................................................................ 86
3.8 SYSTEM......................................................................................................................................... 88
3.8.1 Maintenance ...................................................................................................................... 89
3.8.2 Version Manager................................................................................................................ 90
3.8.3 FTP Auto Upgrade .............................................................................................................. 90
3.8.4 TR069 ................................................................................................................................. 92
3.8.5 Date & Time ....................................................................................................................... 93
3.8.6 DDNS .................................................................................................................................. 95
3.8.7 Iperf.................................................................................................................................... 96
3.8.8 Diagnostics ......................................................................................................................... 97
vi
3.8.9 Port Mirror ......................................................................................................................... 99
3.8.10 SysLog ............................................................................................................................ 100
3.8.10.1 Network .................................................................................................................................. 100
3.8.10.2 Local ....................................................................................................................................... 100
3.8.11 Ping Watchdog............................................................................................................... 101
3.8.12 Simcard Checking ........................................................................................................... 102
3.8.13 WEB Setting ................................................................................................................... 103
3.8.14 Account .......................................................................................................................... 104
3.8.15 Logout ............................................................................................................................ 105
4. CLOUDCORE........................................................................................................................... 106
4.1 COMPUTER REQUIREMENTS ............................................................................................................ 106
4.1.1 Server ............................................................................................................................... 106
4.1.2 Client ................................................................................................................................ 106
4.2 GETTING STARTED ......................................................................................................................... 107
4.2.1 Accessing CloudCore ........................................................................................................ 107
4.2.2 Overview of CloudCore Users ........................................................................................... 107
4.2.3 Navigation ....................................................................................................................... 108
4.2.4 Online Help ...................................................................................................................... 110
4.3 SYSTEM....................................................................................................................................... 110
4.3.1 Operator Info ...................................................................................................................... 110
4.3.2 Users ................................................................................................................................... 111
4.3.3 Reset Password ................................................................................................................ 112
4.3.4 Logs .................................................................................................................................. 113
4.3.5 Security Rule .................................................................................................................... 113
4.4 OMC ......................................................................................................................................... 114
4.4.1 Dashboard........................................................................................................................ 115
4.4.1.1 Individual eNBs and UEs ....................................................................................................... 115
4.4.1.2 Alarms .................................................................................................................................. 116
4.4.1.3 Statistics ............................................................................................................................... 118
4.4.1.4 Performance ......................................................................................................................... 121
4.4.2 eNB .................................................................................................................................. 122
4.4.2.1 Monitor .................................................................................................................................... 122
4.4.2.1.1 Monitor Window ................................................................................................................. 122
4.4.2.1.2 Right-Click Actions ............................................................................................................... 125
4.4.2.1.2.1 Information .................................................................................................................. 126
4.4.2.1.2.2 Synchronize .................................................................................................................. 130
4.4.2.1.2.3 Settings ........................................................................................................................ 130
4.4.2.1.2.4 Reboot ......................................................................................................................... 136
4.4.2.1.2.5 Logs .............................................................................................................................. 136
4.4.2.1.2.6 CPEs ............................................................................................................................. 137
4.4.2.2 Strategy .................................................................................................................................... 137
4.4.2.2.1 Upgrades and Rollbacks .................................................................................................... 138
4.4.2.2.2 Reboot .............................................................................................................................. 141
4.4.2.2.3 Frequency & PCI ............................................................................................................... 142
vii
4.4.2.3 File Library ................................................................................................................................ 143
4.4.3 CPE ................................................................................................................................... 144
4.4.3.1 Monitor .................................................................................................................................... 144
4.4.3.1.1 Monitor Window ................................................................................................................. 144
4.4.3.1.2 Right-Click Actions ............................................................................................................... 148
4.4.3.1.2.1 Information ....................................................................................................................... 148
4.4.3.1.2.2 Settings ............................................................................................................................. 148
4.4.3.1.2.3 Synchronize ....................................................................................................................... 149
4.4.3.1.2.4 Frequency Lock ................................................................................................................. 149
4.4.3.1.2.5 Reboot .............................................................................................................................. 150
4.4.3.2 Strategy .................................................................................................................................... 150
4.4.3.3 File Library ................................................................................................................................ 152
4.4.4 Alarm ............................................................................................................................... 153
4.4.4.1 Query ........................................................................................................................................ 154
4.4.4.2 Settings ..................................................................................................................................... 157
4.4.4.2.1 Library ............................................................................................................................... 157
4.4.4.2.2 Notification ....................................................................................................................... 158
4.4.5 System .............................................................................................................................. 159
4.4.5.1 Device Management................................................................................................................. 159
4.4.5.2 User Management .................................................................................................................... 163
4.4.5.2.1 Modify System User Group ............................................................................................... 164
4.4.5.2.2 Add New System User Group............................................................................................ 165
4.4.5.2.3 Delete System User Group ................................................................................................ 166
4.4.5.3 Log Management ...................................................................................................................... 166
4.4.5.3.1 OMC Logs.......................................................................................................................... 166
4.4.5.3.2 Device Logs ....................................................................................................................... 168
4.4.6 Help .................................................................................................................................. 169
4.5 BOSS ......................................................................................................................................... 170
4.5.1 Overview .......................................................................................................................... 170
4.5.2 Subscriber ........................................................................................................................ 171
4.5.3 Network ........................................................................................................................... 174
4.5.3.1 SIM Card ................................................................................................................................... 175
4.5.3.2 SIM Audit Records .................................................................................................................... 177
4.5.4 System .............................................................................................................................. 178
4.5.4.1 Service Plans ............................................................................................................................. 178
4.5.4.1.1 Overview of Service Plans ............................................................................................... 178
4.5.4.1.2 Configure Service Plans ................................................................................................... 178
4.5.4.2 Logs .......................................................................................................................................... 181
4.5.5 Help .................................................................................................................................. 181
viii
List of Figures
FIGURE 1-1: EXAMPLE BAICELLS ARCHITECTURE .................................................................................................. 2
FIGURE 1-2: SAMPLE ENB GUI WINDOW.......................................................................................................... 3
FIGURE 1-3: SAMPLE UE GUI WINDOW ........................................................................................................... 3
FIGURE 1-4: ENB GUI AND UE GUI MENU TREES .............................................................................................. 4
FIGURE 1-5: SAMPLE CLOUDCORE OMC WINDOW ............................................................................................. 5
FIGURE 1-6: CLOUDCORE GUI MENU TREES ...................................................................................................... 5
FIGURE 2-1: LOCAL INTERFACE......................................................................................................................... 6
FIGURE 2-2: INTERNET PROTOCOL VERSION (TCP/IPV4) ...................................................................................... 7
FIGURE 2-3: ENB GUI LOGIN .......................................................................................................................... 8
FIGURE 2-4: ENB GUI MENU ......................................................................................................................... 8
FIGURE 2-5: INITIAL CONFIGURATION FLOW ....................................................................................................... 9
FIGURE 2-6: BASIC INFO WINDOW ................................................................................................................. 10
FIGURE 2-7: QUICK SETTING WINDOW ........................................................................................................... 13
FIGURE 2-8: NTP WINDOW .......................................................................................................................... 15
FIGURE 2-9: UPGRADE WINDOW ................................................................................................................... 17
FIGURE 2-10: BACKUP WINDOW ................................................................................................................... 18
FIGURE 2-11: PASSWORD WINDOW ............................................................................................................... 18
FIGURE 2-12: INTERNET / WAN FIELDS .......................................................................................................... 19
FIGURE 2-13: DHCP WINDOW ..................................................................................................................... 21
FIGURE 2-14: VLAN WINDOWS .................................................................................................................... 21
FIGURE 2-15: IPSEC/MME POOL WINDOW.................................................................................................... 22
FIGURE 2-16: TUNNEL CONFIGURE > BASIC SETTING ......................................................................................... 23
FIGURE 2-17: TUNNEL CONFIGURE > ADVANCE SETTING .................................................................................... 24
FIGURE 2-18: LGW SETTING WINDOW .......................................................................................................... 26
FIGURE 2-19: CERTSTORE WINDOW............................................................................................................... 27
FIGURE 2-20: SECURITY SETTING WINDOW ..................................................................................................... 28
FIGURE 2-21: MANAGEMENT SERVER WINDOW ............................................................................................... 28
FIGURE 2-22: SYNC SETTING WINDOW ........................................................................................................... 29
FIGURE 2-23: NEIGH FREQ TABLE .................................................................................................................. 31
FIGURE 2-24: LTE FREQ/CELL > NEIGH CELL TABLE SETTINGS ............................................................................. 33
FIGURE 2-25: TD-S FREQ/CELL > NEIGH FREQ TABLE SETTINGS .......................................................................... 34
FIGURE 2-26: TD-S FREQ/CELL > NEIGH CELL TABLE SETTINGS ........................................................................... 36
FIGURE 2-27: GSM FREQ/CELL > NEIGH FREQ TABLE SETTINGS .......................................................................... 37
FIGURE 2-28: GSM FREQ/CELL > NEIGH CELL SETTINGS .................................................................................... 38
FIGURE 2-29: HANDOFF ............................................................................................................................... 39
FIGURE 2-30: MOBILITY PARAMETERS ............................................................................................................ 40
FIGURE 2-31: A1, A2, A3, AND A5 EVENT THRESHOLDS ................................................................................... 41
FIGURE 2-32: B2 EVENT THRESHOLD .............................................................................................................. 42
FIGURE 2-33: MEASUREMENT CONTROL PARAMETERS ...................................................................................... 43
FIGURE 2-34: CELL SELECTION AND CELL RESELECTION PARAMETERS.................................................................... 44
FIGURE 2-35: ADVANCED PARAMETERS SUB-MENUS ........................................................................................ 45
ix
FIGURE 2-36: X2 PARAMETER ....................................................................................................................... 46
FIGURE 2-37: POWER CONTROL PARAMETERS.................................................................................................. 47
FIGURE 2-38: ENODEB SETTINGS ................................................................................................................... 48
FIGURE 2-39: GAP SETTINGS ........................................................................................................................ 49
FIGURE 2-40: RRC STATUS PARAMETERS......................................................................................................... 49
FIGURE 2-41: SON FUNCTIONAL PARAMETERS ................................................................................................ 50
FIGURE 2-42: TX AND RX SETTINGS ................................................................................................................ 50
FIGURE 2-43: RANDOM ACCESS PARAMETERS .................................................................................................. 51
FIGURE 2-44: CAPACITY PARAMETERS ............................................................................................................. 51
FIGURE 2-45: SCHEDULING ALGORITHM PARAMETERS ....................................................................................... 52
FIGURE 2-46: SYNC ADJUST PARAMETERS ....................................................................................................... 52
FIGURE 2-47: LINK ACTIVATION STATE DETECTOR PARAMETERS ........................................................................... 53
FIGURE 2-48: LTE FREQ/CELL > NEIGH FREQ AND NEIGH CELL TABLE SETTINGS ..................................................... 53
FIGURE 2-49: FLOWCHART OF HANDOFF EVENT THRESHOLDS ............................................................................. 54
FIGURE 2-50: A1 THRESHOLD ....................................................................................................................... 55
FIGURE 2-51: A2 THRESHOLD ....................................................................................................................... 55
FIGURE 2-52: A3 THRESHOLD ....................................................................................................................... 55
FIGURE 2-53: A5 THRESHOLD ....................................................................................................................... 55
FIGURE 2-54: X2 HANDOVER ........................................................................................................................ 56
FIGURE 2-55: REBOOT ACTION ...................................................................................................................... 56
FIGURE 2-56: LOGOUT ACTION ..................................................................................................................... 57
FIGURE 3-1: UE LAN INTERFACE EXAMPLE ...................................................................................................... 58
FIGURE 3-2: UE GUI LOGIN.......................................................................................................................... 59
FIGURE 3-3: UE GUI MAIN MENU ................................................................................................................ 59
FIGURE 3-4: CHANGE PASSWORD................................................................................................................... 60
FIGURE 3-5: OVERVIEW FIELDS (1 OF 5 SCREENS) ............................................................................................. 60
FIGURE 3-6: OVERVIEW FIELDS (2 OF 5 SCREENS) ............................................................................................. 61
FIGURE 3-7: OVERVIEW FIELDS (3 OF 5 SCREENS) ............................................................................................. 61
FIGURE 3-8: OVERVIEW FIELDS (4 OF 5 SCREENS) ............................................................................................. 62
FIGURE 3-9: OVERVIEW FIELDS (5 OF 5 SCREENS) ............................................................................................. 62
FIGURE 3-10: USIM STATUS ICON ................................................................................................................. 66
FIGURE 3-11: NETWORK SUB-MENUS ............................................................................................................ 66
FIGURE 3-12: NETWORK MODE .................................................................................................................... 66
FIGURE 3-13: NETWORK MODE > ROUTER SETTINGS ........................................................................................ 67
FIGURE 3-14: HOST NAME OPTIONS .............................................................................................................. 68
FIGURE 3-15: BRIDGE MODE ........................................................................................................................ 69
FIGURE 3-16: LTE SETTINGS ......................................................................................................................... 69
FIGURE 3-17: SCAN MODE SETTINGS ............................................................................................................. 71
FIGURE 3-18: PCI LOCK SETTINGS.................................................................................................................. 72
FIGURE 3-19: BAND/FREQUENCY PREFERRED SETTINGS ..................................................................................... 72
FIGURE 3-20: APN MANAGEMENT SETTINGS .................................................................................................. 73
FIGURE 3-21: PIN MANAGEMENT SETTINGS .................................................................................................... 74
FIGURE 3-22: SIM LOCK SETTINGS................................................................................................................. 75
FIGURE 3-23: DMZ SETTINGS ....................................................................................................................... 75
x
FIGURE 3-24: STATIC ROUTE SETTINGS ............................................................................................................ 76
FIGURE 3-25: LAN SETTINGS ........................................................................................................................ 77
FIGURE 3-26: SECURITY SUB-MENUS ............................................................................................................. 78
FIGURE 3-27: SECURITY SUB-MENUS ............................................................................................................. 79
FIGURE 3-28: MAC FILTERING SETTINGS ......................................................................................................... 79
FIGURE 3-29: IP FILTERING SETTINGS ............................................................................................................. 80
FIGURE 3-30: URL FILTERING SETTINGS .......................................................................................................... 82
FIGURE 3-31: PORT FORWARDING SETTINGS .................................................................................................... 82
FIGURE 3-32: ACCESS RESTRICTION SETTINGS .................................................................................................. 83
FIGURE 3-33: UPNP ................................................................................................................................... 84
FIGURE 3-34: VPN SETTINGS ........................................................................................................................ 85
FIGURE 3-35: IPV6 SUB-MENU ..................................................................................................................... 86
FIGURE 3-36: IPV6 SETTINGS > STATUS........................................................................................................... 86
FIGURE 3-37: IPV6 WAN SETTINGS ............................................................................................................... 87
FIGURE 3-38: IPV6 LAN SETTINGS ................................................................................................................ 87
FIGURE 3-39: SYSTEM SUB-MENUS................................................................................................................ 88
FIGURE 3-40: MAINTENANCE ........................................................................................................................ 89
FIGURE 3-41: VERSION MANAGER FIELDS........................................................................................................ 90
FIGURE 3-42: FTP AUTO UPGRADE FIELDS ...................................................................................................... 91
FIGURE 3-43: TR069 FIELDS ........................................................................................................................ 92
FIGURE 3-44: DATE & TIME - SET MANUALLY................................................................................................... 94
FIGURE 3-45: DATE & TIME - SYNC FROM NETWORK ......................................................................................... 94
FIGURE 3-46: DDNS SETTINGS ..................................................................................................................... 95
FIGURE 3-47: IPERF SETTINGS ....................................................................................................................... 96
FIGURE 3-48: DIAGNOSTICS – PING ................................................................................................................ 97
FIGURE 3-49: DIAGNOSTICS – TRACEROUTE .................................................................................................... 98
FIGURE 3-50: PORT MIRROR SETTINGS ........................................................................................................... 99
FIGURE 3-51: NETWORK SYSLOG SETTINGS ................................................................................................... 100
FIGURE 3-52: LOCAL SYSLOG SETTINGS ......................................................................................................... 101
FIGURE 3-53: PING WATCHDOG SETTINGS..................................................................................................... 102
FIGURE 3-54: SIMCARD CHECKING ............................................................................................................... 103
FIGURE 3-55: WEB SETTING FIELDS ............................................................................................................. 103
FIGURE 3-56: ACCOUNT SETTINGS ............................................................................................................... 104
FIGURE 3-57: LOGOUT ACTION ................................................................................................................... 105
FIGURE 4-1: CLOUDCORE SIGN UP AND LOGIN PAGE ....................................................................................... 107
FIGURE 4-2: CLOUDCORE USERS .................................................................................................................. 108
FIGURE 4-3: CLOUDCORE WEB PAGE ........................................................................................................... 108
FIGURE 4-4: CLOUDCORE NAVIGATION PANE ................................................................................................. 108
FIGURE 4-5: CLOUDCORE WELCOME MENU .................................................................................................. 109
FIGURE 4-6: CHANGE PASSWORD................................................................................................................. 109
FIGURE 4-7: LOCK SCREEN .......................................................................................................................... 109
FIGURE 4-8: OMC HELP > ABOUT ............................................................................................................... 110
FIGURE 4-9: CLOUDCORE > SYSTEM ............................................................................................................. 110
FIGURE 4-10: USER MANAGEMENT.............................................................................................................. 111
xi
FIGURE 4-11: SEARCH FOR USER.................................................................................................................. 111
FIGURE 4-12: MODIFY USER ....................................................................................................................... 111
FIGURE 4-13: LOCK/UNLOCK USER PASSWORD OR DELETE USER ....................................................................... 112
FIGURE 4-14: ADD USER ............................................................................................................................ 112
FIGURE 4-15: RESET PASSWORD .................................................................................................................. 113
FIGURE 4-16: OPERATION LOGS................................................................................................................... 113
FIGURE 4-17: SECURITY RULE...................................................................................................................... 114
FIGURE 4-19: DASHBOARD ......................................................................................................................... 115
FIGURE 4-20: ALARMS ............................................................................................................................... 116
FIGURE 4-21: ALARM DETAILS ..................................................................................................................... 117
FIGURE 4-22: CONFIRM OR CLEAR ALARM ..................................................................................................... 117
FIGURE 4-23: EXPORT................................................................................................................................ 118
FIGURE 4-24: STATISTICS ............................................................................................................................ 118
FIGURE 4-25: ENB ONLINE DETAILS ............................................................................................................. 119
FIGURE 4-26: ENB ACTIVE DETAILS (1 OF 2) .................................................................................................. 119
FIGURE 4-27: ENB ACTIVE DETAILS (2 OF 2) .................................................................................................. 120
FIGURE 4-28: CPE CONNECT DETAILS (1 OF 2) ............................................................................................... 120
FIGURE 4-29: CPE CONNECT DETAILS (2 OF 2) ............................................................................................... 121
FIGURE 4-30: PERFORMANCE ...................................................................................................................... 121
FIGURE 4-31: ENB MENU .......................................................................................................................... 122
FIGURE 4-32: ENB > MONITOR (1 OF 2) ....................................................................................................... 122
FIGURE 4-33: ENB > MONITOR (2 OF 2) ....................................................................................................... 123
FIGURE 4-34: DISPLAY ............................................................................................................................... 124
FIGURE 4-35: FILTER.................................................................................................................................. 125
FIGURE 4-36: RIGHT-CLICK ACTIONS ............................................................................................................ 125
FIGURE 4-37: RIGHT-CLICK > INFORMATION > STATISTICS ................................................................................. 126
FIGURE 4-38: RIGHT-CLICK > INFORMATION > ALARM ..................................................................................... 127
FIGURE 4-39: RIGHT-CLICK > INFORMATION > PERFORMANCE > KPI1: UL/DL THROUGHPUT................................. 128
FIGURE 4-40: RIGHT-CLICK > INFORMATION > PERFORMANCE > KPI2: UL/DL UTILIZATION ................................... 128
FIGURE 4-41: RIGHT-CLICK > INFORMATION > PERFORMANCE > KPI3: E-RAB ESTABLISHSUCCESSRATE ................... 128
FIGURE 4-42: RIGHT-CLICK > INFORMATION > PERFORMANCE > KPI4: E-RAB ESTABLISHFAILRATE ......................... 129
FIGURE 4-43: RIGHT-CLICK > INFORMATION > PERFORMANCE > KPI5: SUCCINTERENBS1RATE............................... 129
FIGURE 4-44: RIGHT-CLICK > INFORMATION > PERFORMANCE > KPI6: KPI6: RRC ESTABLISHDROPRATE.................. 129
FIGURE 4-45: RIGHT-CLICK > INFORMATION > LOGS > DEVICE REPORT LOG......................................................... 130
FIGURE 4-46: RIGHT-CLICK > INFORMATION > LOGS > DEVICE EXCEPTION LOG .................................................... 130
FIGURE 4-47: RIGHT-CLICK > SETTINGS > WIRELESS TAB .................................................................................. 131
FIGURE 4-48: WIRELESS SETTINGS > PB OPTIONS........................................................................................... 133
FIGURE 4-49: WIRELESS SETTINGS > BANDWIDTH OPTIONS .............................................................................. 133
FIGURE 4-50: WIRELESS SETTINGS > SFASSIGNMENT OPTIONS.......................................................................... 133
FIGURE 4-51: WIRELESS SETTINGS > SPECIAL SF PATTERNS OPTIONS .................................................................. 134
FIGURE 4-52: NETWORK SETTINGS............................................................................................................... 134
FIGURE 4-53: ICIC .................................................................................................................................... 135
FIGURE 4-54: NTP SETTINGS ...................................................................................................................... 135
FIGURE 4-55: REBOOT ............................................................................................................................... 136
xii
FIGURE 4-56: LOGS ................................................................................................................................... 137
FIGURE 4-57: CPES................................................................................................................................... 137
FIGURE 4-58: STRATEGY ............................................................................................................................. 138
FIGURE 4-59: NEW UPGRADE TASK.............................................................................................................. 139
FIGURE 4-60: SELECT UPGRADE FILE ............................................................................................................ 139
FIGURE 4-61: TASK RESULTS ....................................................................................................................... 140
FIGURE 4-62: OPERATION .......................................................................................................................... 140
FIGURE 4-63: REBOOT ............................................................................................................................... 141
FIGURE 4-64: CREATE REBOOT TASK ............................................................................................................. 141
FIGURE 4-65: REBOOT TASK WARNING ......................................................................................................... 142
FIGURE 4-66: OPERATION .......................................................................................................................... 142
FIGURE 4-67: FREQUENCY & PCI ................................................................................................................. 143
FIGURE 4-68: FILE LIBRARY ......................................................................................................................... 144
FIGURE 4-69: CPE MENU .......................................................................................................................... 144
FIGURE 4-70: CPE > MONITOR (1 OF 2) ....................................................................................................... 145
FIGURE 4-71: CPE > MONITOR (2 OF 2) ....................................................................................................... 145
FIGURE 4-72: CPE HISTORY ........................................................................................................................ 147
FIGURE 4-73: RIGHT-CLICK ACTIONS ............................................................................................................ 148
FIGURE 4-74: INFORMATION ....................................................................................................................... 148
FIGURE 4-75: SETTINGS ............................................................................................................................. 149
FIGURE 4-76: FREQUENCY LOCK .................................................................................................................. 149
FIGURE 4-77: STRATEGY ............................................................................................................................. 150
FIGURE 4-78: NEW UPGRADE TASK.............................................................................................................. 151
FIGURE 4-79: OPERATION .......................................................................................................................... 152
FIGURE 4-80: REBOOT ............................................................................................................................... 152
FIGURE 4-81: FILE LIBRARY ......................................................................................................................... 153
FIGURE 4-82: ALARM MENU ...................................................................................................................... 153
FIGURE 4-83: ACTIVE ALARMS .................................................................................................................... 154
FIGURE 4-84: ADVANCED QUERY ................................................................................................................. 154
FIGURE 4-85: RIGHT-CLICK ON AN ALARM ..................................................................................................... 155
FIGURE 4-86: ALARM DETAIL ...................................................................................................................... 155
FIGURE 4-87: ALARM CONFIRM................................................................................................................... 156
FIGURE 4-88: CLEAR ALARM ....................................................................................................................... 157
FIGURE 4-89: HISTORY ALARM .................................................................................................................... 157
FIGURE 4-90: LIBRARY ............................................................................................................................... 158
FIGURE 4-91: NOTIFICATION ....................................................................................................................... 158
FIGURE 4-92: SYSTEM MENU ...................................................................................................................... 159
FIGURE 4-93: DEVICE MANAGEMENT ........................................................................................................... 159
FIGURE 4-94: VIEW DEVICE GROUP INFORMATION.......................................................................................... 160
FIGURE 4-95: MODIFY DEVICE GROUP.......................................................................................................... 160
FIGURE 4-96: DELETE DEVICE GROUP ........................................................................................................... 161
FIGURE 4-97: DELETE ENB OR CPE .............................................................................................................. 161
FIGURE 4-98: ADD DEVICE ICON AND IMPORT DEVICE CONFIGURATION ICON ....................................................... 162
FIGURE 4-99: ADD DEVICE OR IMPORT DEVICE CONFIGURATION ........................................................................ 162
xiii
FIGURE 4-100: ADD DEVICE GROUP............................................................................................................. 162
FIGURE 4-101: MOVE TO DEVICE GROUP ...................................................................................................... 163
FIGURE 4-102: SELECT DEVICE GROUP ......................................................................................................... 163
FIGURE 4-103: SYSTEM USER MANAGEMENT ................................................................................................ 163
FIGURE 4-104: MODIFY USER GROUP > MENU TAB ........................................................................................ 164
FIGURE 4-105: MODIFY USER GROUP > OPERATION TAB.................................................................................. 164
FIGURE 4-106: MODIFY USER GROUP > DEVICE GROUP TAB............................................................................. 165
FIGURE 4-107: ADD USER GROUP ............................................................................................................... 165
FIGURE 4-108: LOG MANAGEMENT MENU ................................................................................................... 166
FIGURE 4-109: OMC OPERATION LOGS ........................................................................................................ 167
FIGURE 4-110: OMC OPERATION LOGS ........................................................................................................ 167
FIGURE 4-111: OMC SECURITY LOGS........................................................................................................... 168
FIGURE 4-112: OMC SYSTEM LOGS ............................................................................................................. 168
FIGURE 4-113: DEVICE LOGS ...................................................................................................................... 169
FIGURE 4-114: HELP ................................................................................................................................. 169
FIGURE 4-115: BOSS NETWORK ARCHITECTURE ............................................................................................ 170
FIGURE 4-116: BOSS MENU ...................................................................................................................... 170
FIGURE 4-117: SUBSCRIBER ........................................................................................................................ 171
FIGURE 4-118: QUERY............................................................................................................................... 171
FIGURE 4-119: ADD NEW SUBSCRIBER ......................................................................................................... 172
FIGURE 4-120: SIM QUERY ........................................................................................................................ 172
FIGURE 4-121: SERVICE PLAN SELECTION ...................................................................................................... 172
FIGURE 4-122: SUBSCRIBER DETAIL - OVERVIEW............................................................................................. 173
FIGURE 4-123: SUBSCRIBER DETAIL – SERVICE................................................................................................ 173
FIGURE 4-124: ARCHIVED SUBSCRIBERS ........................................................................................................ 174
FIGURE 4-125: RESTORE ARCHIVED SUBSCRIBER ............................................................................................. 174
FIGURE 4-126: NETWORK MENU ................................................................................................................ 175
FIGURE 4-127: NETWORK > SIM CARD ........................................................................................................ 175
FIGURE 4-128: IMPORT ............................................................................................................................. 175
FIGURE 4-129: IMPORT SIM CARD DIALOGUE ............................................................................................... 176
FIGURE 4-130: DOWNLOAD TEMPLATE ......................................................................................................... 176
FIGURE 4-131: IMPORT SIM CARD FILE ........................................................................................................ 177
FIGURE 4-132: SIM AUDIT RECORDS ........................................................................................................... 177
FIGURE 4-133: SYSTEM MENU .................................................................................................................... 178
FIGURE 4-134: SERVICE PLANS .................................................................................................................... 178
FIGURE 4-135: FILTER LIST OF SERVICE PLANS ................................................................................................ 179
FIGURE 4-136: ADD SERVICE PLAN .............................................................................................................. 179
FIGURE 4-137: ENABLE SERVICE PLAN .......................................................................................................... 180
FIGURE 4-138: LOGS ................................................................................................................................. 181
FIGURE 4-139: SERVICE PROCESSING FILTER LIST OPTIONS ............................................................................... 181
FIGURE 4-140: HELP ................................................................................................................................. 181
xiv
List of Tables
TABLE 2-1: COMPUTER REQUIREMENTS ............................................................................................................ 6
TABLE 2-2: BASIC INFO FIELDS ....................................................................................................................... 10
TABLE 2-3: STATUS INFO FIELDS ..................................................................................................................... 11
TABLE 2-4: UE STATUS FIELDS ....................................................................................................................... 12
TABLE 2-5: QUICK SETTING FIELDS ................................................................................................................. 13
TABLE 2-6: NTP FIELDS................................................................................................................................ 16
TABLE 2-7: INTERNET / WAN FIELDS .............................................................................................................. 20
TABLE 2-8: TUNNEL CONFIGURE > BASIC SETTING FIELDS ................................................................................... 23
TABLE 2-9: TUNNEL CONFIGURE > ADVANCE SETTING FIELDS .............................................................................. 25
TABLE 2-10: LTE NEIGH FREQ SETTINGS ......................................................................................................... 31
TABLE 2-11: LTE NEIGH CELL TABLE SETTINGS ................................................................................................. 33
TABLE 2-12: TD-S NEIGH FREQ TABLE SETTINGS .............................................................................................. 34
TABLE 2-13: TD-S CELL SETTING FIELDS.......................................................................................................... 36
TABLE 2-14: GSM FREQ/CELL > NEIGH FREQ TABLE SETTINGS ........................................................................... 37
TABLE 2-15: GSM FREQ/CELL > NEIGH CELL SETTINGS ..................................................................................... 38
TABLE 2-16: A1, A2, A3, AND A5 EVENT THRESHOLD FIELDS ............................................................................. 41
TABLE 2-17: B2 EVENT THRESHOLD FIELDS...................................................................................................... 42
TABLE 2-18: MEASUREMENT CONTROL FIELDS ................................................................................................. 43
TABLE 2-19: CELL SELECTION AND CELL RESELECTION FIELDS .............................................................................. 44
TABLE 2-20: POWER CONTROL PARAMETERS ................................................................................................... 47
TABLE 2-21: RRC STATUS PARAMETERS .......................................................................................................... 49
TABLE 2-22: SON FUNCTIONAL PARAMETERS .................................................................................................. 50
TABLE 2-23: RANDOM ACCESS PARAMETERS ................................................................................................... 51
TABLE 2-24: SYNC ADJUST PARAMETERS ......................................................................................................... 52
TABLE 2-25: LINK ACTIVATION STATE DETECTOR PARAMETERS ............................................................................. 53
TABLE 3-1: COMPUTER REQUIREMENTS .......................................................................................................... 58
TABLE 3-2: OVERVIEW FIELDS ....................................................................................................................... 63
TABLE 3-3: SIGNAL STRENGTH THRESHOLDS ..................................................................................................... 65
TABLE 3-4: NETWORK MODE > ROUTER SETTINGS ............................................................................................ 67
TABLE 3-5: LTE SETTINGS ............................................................................................................................. 70
TABLE 3-6: SCAN MODE SETTINGS ................................................................................................................. 71
TABLE 3-7: APN MANAGEMENT SETTINGS ...................................................................................................... 73
TABLE 3-8: DMZ SETTINGS .......................................................................................................................... 76
TABLE 3-9: STATIC ROUTE SETTINGS ............................................................................................................... 76
TABLE 3-10: LAN SETTINGS.......................................................................................................................... 77
TABLE 3-11: MAC FILTERING SETTINGS .......................................................................................................... 80
TABLE 3-12: IP FILTERING SETTINGS ............................................................................................................... 81
TABLE 3-13: PORT FORWARDING SETTINGS ..................................................................................................... 83
TABLE 3-14: ACCESS RESTRICTION SETTINGS .................................................................................................... 84
TABLE 3-15: UPNP STATUS FIELDS ................................................................................................................. 84
xv
TABLE 3-16: VPN SETTINGS AND STATUS ........................................................................................................ 85
TABLE 3-17: IPV6 STATUS AND SETTINGS ........................................................................................................ 87
TABLE 3-18: MAINTENANCE FIELDS................................................................................................................ 89
TABLE 3-19: FTP AUTO UPGRADE SETTINGS .................................................................................................... 91
TABLE 3-20: TR069 SETTINGS ...................................................................................................................... 93
TABLE 3-21: DATE & TIME – SYNC FROM NETWORK SETTINGS ............................................................................ 95
TABLE 3-22: DDNS SETTINGS ....................................................................................................................... 95
TABLE 3-23: IPERF SETTINGS AND RESULTS ...................................................................................................... 96
TABLE 3-24: DIAGNOSTICS – PING AND TRACEROUTE FIELDS .............................................................................. 98
TABLE 3-25: PORT MIRROR SETTINGS............................................................................................................. 99
TABLE 3-26: NETWORK SYSLOG SETTINGS ..................................................................................................... 100
TABLE 3-27: LOCAL SYSLOG SETTINGS .......................................................................................................... 101
TABLE 3-28: PING WATCHDOG SETTINGS ...................................................................................................... 102
TABLE 3-29: WEB SETTINGS....................................................................................................................... 103
TABLE 3-30: ACCOUNT SETTINGS ................................................................................................................. 104
TABLE 4-1: SERVER REQUIREMENTS.............................................................................................................. 106
TABLE 4-2: CLIENT REQUIREMENTS .............................................................................................................. 106
TABLE 4-3: ENB MONITOR FIELDS ............................................................................................................... 123
TABLE 4-4: WIRELESS SETTINGS ................................................................................................................... 131
TABLE 4-5: NTP SETTINGS.......................................................................................................................... 136
TABLE 4-6: CPE > MONITOR FIELDS ............................................................................................................. 145
TABLE 4-7: ALARM DETAIL .......................................................................................................................... 155
xvi
1. Introduction
Baicells products provide Wireless Internet Service Providers (WISPs), telecom operators, and
enterprises with the ability to offer users broadband wireless access to carrier networks that
are based on Frequency Division Duplexing (FDD) or Time-Division Duplexing (TDD) Long-Term
Evolution (LTE) technology. The Baicells system supports high-speed broadband data and voice
services, helping operators to serve users in locations that might otherwise be difficult to reach.
The software applications include an eNB Graphical User Interface (GUI), a UE GUI, and options
for local or centralized CloudCore network applications. CloudCore is a Software-as-a-Service
(SaaS) solution managed and hosted by Baicells via Azure, a Microsoft based and North
American hosted Cloud computing platform. CloudCore includes three service modules:
Operations Management Console (OMC), Business Operations Support System (BOSS), and the
forthcoming Evolved Packet Core (EPC).
Figure 1-1 illustrates a general Baicells system architecture. The photo is showing a Nova 1W
eNB.
1
Figure 1-1: Example Baicells Architecture
The GUI software applications typically are used to communicate with a specific device, i.e., a
single eNB or a single UE. Each eNB and each UE has their respective GUI application pre-
loaded on it from the manufacturer. The operator launches the GUI via an IP address using a
Web browser such as Google Chrome or Mozilla Firefox either locally or through the internet.
The GUI applications provide more configuration fields and data than does the CloudCore OMC.
Often, the additional fields are used to tune the radio frequency (RF) settings or network
settings of a given eNB or UE during troubleshooting or to improve the equipment’s
performance.
A sample window from the eNB GUI is presented in Figure 1-2. A sample window from the UE
GUI is presented in Figure 1-3. The GUI menu tree structures for both the eNB and the UE GUIs
are presented in Figure 1-4.
2
Figure 1-2: Sample eNB GUI Window
3
Figure 1-4: eNB GUI and UE GUI Menu Trees
The CloudCore apps provide access to all of an operator’s Baicells network components and
subscribers. Administrators use the OMC to configure or modify the eNB and UE components
and interfaces, monitor the network, troubleshoot issues, and perform software or firmware
upgrades. A sample window from the CloudCore OMC is presented in Figure 1-5.
Administrators use the BOSS application to add, modify, and delete subscriber information and
service plans. It is also in BOSS where the administrator can activate each Subscriber
Identification Module (SIM) card, also called Universal SIM (USIM), a chip that the end-user
inserts in the UE to uniquely identify that subscriber and UE device.
While the eNB GUI, UE GUI, OMC, and BOSS pertain to the LTE radio access network (RAN),
the EPC is part of an operator’s core LTE network. EPC provides session management, mobility
management, security authentication, and policy management functions. The EPC functions
are covered in separate documents.
Operators that have carrier Network Management Systems (NMS) can centralize the Baicells
CloudCore and NMS by connecting CloudCore to NMS via the northbound networking
interface. Figure 1-6 shows the CloudCore GUI menu tree structures.
4
Figure 1-5: Sample CloudCore OMC Window
The rest of this guide is organized by software application: eNB GUI, UE GUI, CloudCore OMC,
and CloudCore BOSS. Many of the device and subscriber parameters are preconfigured with
recommended default settings. However, every field and operation is explained and illustrated
in this guide to allow each operator the flexibility to use the Baicells solution to meet their
unique requirements.
5
2. eNB GUI
When accessing the eNB GUI locally, use an Ethernet cable to connect the computer Ethernet
interface to the MGMT interface port on the eNB unit. See example in Figure 2-1.
Figure 2-1: Local Interface
Before launching the GUI, you will need to set up the computer’s IP address to connect the
client to the server. The following steps are for a computer running Windows 7.
1. Select Start > Control Panel, and in the pop-up window click on Network and Internet.
2. Click on View network status and tasks, and then click on Local Connectivity.
3. In the window labeled Status of Local Connectivity, click on Properties. This will open
the Properties of Local Connectivity window.
4. Select Internet Protocol Version (TCP/IPV4), and click on Properties to see the pop-
up window shown in Figure 2-2.
6
Figure 2-2: Internet Protocol Version (TCP/IPV4)
5. Select either Obtain an IP address automatically and proceed to step 7, or select Use
the following IP address and follow steps 6 and 7. In general, if the option for
obtaining the IP address automatically fails, you will need to set up the IP address
manually.
6. Use the following IP address option: Input the IP address, subnet mask, and default
gateway, where:
a. IP address is 192.168.150.xxx (where xxx is a number from 100 to 254).
b. Subnet mask is 255.255.255.0.
c. Default gateway is 192.168.150.1.
7. In the command window, execute ping 192.168.150.1 and check whether the
connection between the local (client) computer and the server is working.
7
Figure 2-3: eNB GUI Login
After you log in, the main menus are shown in the left navigation pane. The fields that are
displayed on the right side of the window typically will be the last menu item that you looked
at. Use the up/down scroll bar on the right to see upper and lower fields, respectively. Use
the left/right scroll bar on the bottom to see fields on the left and right side of the window.
Refer to Figure 2-4.
Figure 2-4: eNB GUI Menu
8
2.4 Configuration Flow
This document is organized around the visual flow of the GUI menus and fields. However, for
the initial configuration of the eNB interfaces and parameters, refer to the recommended
configuration flow provided in Figure 2-5. Also, refer to the Getting Started BaiTip on the
Baicells website: https://na.baicells.com/getting-started/
Figure 2-5: Initial Configuration Flow
9
Figure 2-6: Basic Info Window
The Status Info fields provide high-level information on operation and connectivity. The
fields are described in Table 2-3.
10
Table 2-3: Status Info Fields
The UE Status fields provide a synopsis of the UEs connected to the eNB. The UE fields are
described in Table 2-4.
11
Table 2-4: UE Status Fields
12
2.5.2 Quick Setting
The Quick Setting fields must be configured to determine the cell parameters, and are often
planned as part of the operator’s overall network design. The Quick Setting window is shown
in Figure 2-7, and the fields are described in Table 2-5. After modifying the Quick Settings, click
on Save to save the configuration. Use the Reset button if you want to reset the configuration
to the original default settings.
Figure 2-7: Quick Setting Window
13
the hardware model being used.
Bandwidth Channel bandwidth the eNB may use: either 10 MHz or 20
MHz. Applies to both uplink and downlink. The default is 20
MHz.
Frequency The eNB’s operating frequency, selected by the operator.
The range depends on the eNB hardware model and
country code.
SubFrame Assignment Downlink (DL) and uplink (UL) subframe configuration,
either 1 or 2, where:
1 = DL:UL is 2:2 transmission ratio
2 = DL:UL is 3:1 transmission ratio (default)
14
is used to determine the range of the paging information.
The operator can use a number between 1 – 65,535. The
default is 1.
RF Status Enable or disable the eNB’s RF antenna. Default is enable.
Power Modify Output power on each port, typically left as the default
values. 30 dBm x2 = 33 dBm. Every 3 dB doubles the power.
This field may be used in situations where you need to
reduce the output power, such as testing the eNB before
installing it on a tower; restricting the eNB output to reduce
interference with other eNBs in the same geographical
area; or staying within Effective Isotropic Radiated Power
(EIRP) rules.
2.6 System
The System menus are used for setting the Network Time Protocol (NTP), for upgrading or
downgrading the eNB operating software, for backing up the configuration database, and for
resetting the password to access the eNB configuration. The menu items and associated
fields are described in this section.
2.6.1 NTP
The operator may use more than one NTP server to provide correct time-of-day to the eNB.
The NTP window is shown in Figure 2-8, and the fields are described in Table 2-6. After
modifying the NTP settings, click on Save to save the configuration. Use the Reset button if
you want to reset the configuration to the original manufacturer’s default settings.
Figure 2-8: NTP Window
15
Table 2-6: NTP Fields
2.6.2 Upgrade
The Upgrade menu shown in Figure 2-9 provides the ability for you to upgrade software and
firmware, perform a software rollback (downgrade), or install patches to the current software
running on the eNB. In each case you will click on Choose File in the dialogue window that
opens, find and highlight the target file, click on Open, and then click on the appropriate GUI
action button (Upgrade Now, Click Rollback, Upgrade Uboot, or Upgrade Patch).
A software upgrade (or rollback) will reboot the eNB automatically. More upgrade/rollback
capabilities are provided through the OMC. Refer to section 4.4.2.2.1.
16
Figure 2-9: Upgrade Window
2.6.3 Backup
The Backup function is where you can acquire the backup files for the current configuration,
and the backup log files and crash files for the eNB; import configuration files (e.g., to create
a new eNB using the configuration from an existing eNB); and restore all of the default
configuration settings for the eNB. The System > Backup window is shown in Figure 2-10.
To initiate one of the backup actions, click on the appropriate button, e.g., Get Backup Files.
The system will display “Preparing backup file” and then present you with a dialogue window
for you to select where you want to save the file.
To import a configuration file, under Import Configuration Files select Choose File. Navigate to
the file you want to import, highlight the file and click on Open, and then select Import LTE
Configurations.
To restore the default configuration of the eNB, under Restore Default Configuration select
Restore Settings. The eNB will reboot when you perform a restore action.
17
Caution: The reboot action will disrupt eNB service.
2.6.4 Password
The System > Password menu allows you to change the eNB administrator’s password. Enter
the new password, from 5 to 15 characters, and then enter it again to confirm it. Click on Save
to save the password change. Refer to Figure 2-11. Use the Reset button if you want to reset
the password to the original default setting.
Figure 2-11: Password Window
18
2.7 Network
The Network settings are where you configure the network interfaces for the eNB. The
interfaces include the wide area network (WAN) or local area network (LAN), the Dynamic Host
Configuration Protocol (DHCP), virtual LANs (VLANs), the IP security (IPSec) gateway and
Mobility Management Entity (MME) pools, and the Local Gateway (LGW) mode.
You also will upload the certificate authority (CA) document, equipment certificate document,
and/or the certificate key document as part of the Network settings. The certificates carry the
authorization credentials to operate the eNB.
2.7.1 WAN/LAN
The WAN interface is an external communication portal (internet connection) between the
eNB’s Network Management System (NMS) and the MME. The eNB’s NMS may be the Baicells
Operations Management Console (OMC) or the LTE NMS. A WAN interface supports multiple
VLANs.
The LAN interface is used only as a local maintenance port during initial eNB setup and basic
configuration. The LAN interface is not used during normal eNB operation.
Figure 2-12 shows the Internet / WAN and Local Network / LAN fields. The Internet / WAN
fields are described in Table 2-7. For the Local Network / LAN fields, simply enter the IP address
and subnet mask address for the local network connection. The default IP address for the LAN
interface is 192.168.168.1. Click on Save to save the data. Use the Reset button if you want to
reset the configuration to the original manufacturer’s default settings.
Figure 2-12: Internet / WAN Fields
19
Table 2-7: Internet / WAN Fields
2.7.2 DHCP
If a local DHCP server will be used, in the Network > DHCP menu check on the check box next
to LAN DHCP Server Enabled. You can enter the start (lowest) leased IP address and the end
(highest) leased IP address in the range.
The lease time field is used to indicate how long a leased IP address remains active before it
expires. The range of time may be up to 9,999 hours; the default is 12 hours.
Refer to Figure 2-13. After entering the information, click on Save to save the data. Use the
Reset button if you want to reset the configuration to the original manufacturer’s default
settings.
20
Figure 2-13: DHCP Window
2.7.3 VLAN
To add a virtual LAN, in the Network > VLAN window under VLAN Table click on New. This
opens a VLAN Setting window (Figure 2-14). Enter a 1- to 15-digit VLAN name and a VLAN ID
within the range of 2-4094. The VLAN ID must be a unique number from any other VLAN. Avoid
entering “12”, which is commonly used by the LAN interface.
For the Protocol Switch, select DHCP or Static. If you select Static, enter the IP address,
netmask, and gateway information. Then, click on Save.
For more information on setting up VLANs on the Nova eNBs, please refer to the BaiTip on the
Baicells website: https://community.na.baicells.com/t/setup-vlans-on-nova-enb/460
Figure 2-14: VLAN Windows
21
2.7.4 IPSec/MME Pool
The system will enable the IP Security (IPSec) gateway by default. The security protocols are
provided in the network layer to ensure the safety of message transmission. You can add,
modify, or delete an IPSec server using the Network > IPSec/MME Pool menu (Figure 2-15).
Figure 2-15: IPSec/MME Pool Window
Under IPSec Setting, the IPSec Status field should show a check mark in the box next to Enabled.
You can select the Internet Key Exchange (IKE) Negotiation Destination Port of either 4500 or
500. If you modify this information, click on Save to save the changes. Use the Reset button to
restore the default parameters.
Under the IPSec Tunnel List, you can define up to two sets of data per IPSec tunnel. Tunnel 0
and Tunnel 1 display information about the tunnel name, gateway, authorization method, and
status. If you click on the Edit button, a new window called Tunnel Configure opens (Figure 2-
16), where you can configure the tunnel fields. Two tabs, Basic and Advance Setting, appear.
The Basic Setting fields are shown in Figure 2-16 and described in Table 2-8. The Advance
Setting fields are shown in Figure 2-17 and described in Table 2-9. The advanced settings
become particularly important to network operations as areas become denser.
Please read the following caution concerning the advanced IPSec settings.
22
Caution: It is highly recommended that you use the default
values and not change the advance settings for IPSec.
Improper changes may lead to system exception.
23
right identifier, leave this field empty.
Left Interface Options are:
• WAN(eth2)
• PPPOE(pppoe-wan)
• None
AuthBy Caution: Change not recommended!
Authentication method of the IPSec server. Must be
consistent with the security gateway side. Options are:
• (psk) (default)
• (cert)
• (aka_psk)
• (aka_cert)
Pre Shared Key Caution: Change not recommended!
Pre Shared Key (PSK) must be consistent with the security
gateway.
LeftSourceIP : string Virtual address allocation. If absent, use the local IP
address.
24
Table 2-9: Tunnel Configure > Advance Setting Fields
[Recommend leaving at default values]
Field Name Description
IKE Encryption Internet Key Exchange (IKE) encryption method. IKE is a
protocol used to ensure security for virtual private network
(VPN) negotiation and remote host or network access.
Options are:
• aes128 (default)
• aes256
• 3des
IKE DH Group IKE Diffie-Hellman (DF) key computation, or exponential key
agreement, to be used between two entities.
Options are:
• modp768
• modp1024 (default)
• modp1536
• modp2048
• modp4096
IKE Authentication IKE authentication algorithm to be used:
• sha1 (default)
• sha512
ESP Encryption Encapsulating Security Payload (ESP) – a member of the
IPsec protocol suite that provides origin authenticity,
integrity, and confidentiality protection of packets.
Options are:
• aes128 (default)
• aes256
• 3des
ESP DH Group ESP Diffie-Hellman (DF) key computation, or exponential
key agreement, to be used between two entities.
Options are:
• modp768
• modp1024 (default)
• modp1536
• modp2048
modp4096
ESP Authentication ESP authentication algorithm to be used:
• sha1 (default)
• sha512
KeyLife IPsec security association (SA) renegotiation time.
Format: s (seconds), m (minutes), h (hours)
The default setting is 20 minutes.
IKELifeTime IKE security association renegotiation time.
Format: s (seconds), m (minutes), h (hours)
25
The default setting is 60 minutes.
RekeyMargin Renegotiation time before the expiry of IKELifeTime
(negotiate the IKE security association time before the
expiry of IKELifeTime).
Format: s (seconds), m (minutes), h (hours)
The default setting is 3 minutes.
Self Define Keyingtries Number of renegotiation attempts after an IKE negotiation
fails. The default is 3.
Dpdaction DPD stands for dead peer detection (DPD) protocol.
Determines what action to take when a gateway exception
occurs:
• None
• Clear
• Hold
• Restart (default)
Dpddelay Time interval for sending the DPD detection message.
Format: s (seconds), m (minutes), h (hours)
The default setting is 30 seconds.
The MME Pool fields shown above in Figure 2-15 allow you to enable an MME pool and
identify up to 2 MMEs in the core network using their IP addresses. The interface binding
should already be defined under the Network > WAN/LAN window.
If you make any changes to the IPSec gateway, tunnel list, or MME Pool, click on Save to
retain the configuration changes. Use the Reset button to restore the configuration settings
to their original default values.
2.7.5 LGW
The local gateway (LGW) fields shown in Figure 2-18 allow you to enable or disable the
gateway; to select an LGW Mode of Network Address Translation (NAT), router, or bridge;
and to select an LGW Interface Binding of WAN or PPPoE. Most operators use bridge mode.
In older versions of code, NAT was the default. You can then enter the LGW IP Pool address
and network. The IP binding range is 10.10.0.1 to 10.10.0.254.
Figure 2-18: LGW Setting Window
26
For guidance on setting the LGW to router mode, please refer to the BaiTip on the Baicells
website: https://community.na.baicells.com/t/enb-basestation-lgw-router-mode-
configuration-example/89
2.7.6 CertStore
The Certificate (Cert) Store is a place within the eNB database for storing authorization
credentials. To upload any of the files, simply click on the Choose File button and navigate to
the file to be uploaded. Once you highlight the file, click on Open. When you return to the
Certificate Upload window, click on Upload. This stores the documents with the other eNB
data. Refer to Figure 2-19.
Figure 2-19: CertStore Window
27
Figure 2-20: Security Setting Window
In the CloudKey field, enter the CloudKey identifier using a range of 0-6 a-z, or A-Z, or 0-9.
Click on Save to save the configuration. Use the Reset button to restore the configuration
settings to their original default values. Refer to Figure 2-21.
Figure 2-21: Management Server Window
28
2.8.3 Sync Setting
The LTE technology standards specify timing and synchronization requirements between
adjacent eNBs. Synchronized transmission helps to avoid eNBs interfering with one another,
optimize bandwidth usage, and enhance network capacity.
Baicells supports multiple eNB synchronization methods. Operators may choose the
synchronization method to meet their network requirements. The default priority among the
different Baicells methods is as follows: Over-the-air interface (OTA), Global Positioning System
(GPS), and 1588V2 synchronization. Whichever method you select, you will enter the
parameters for that method and disable the other synchronization methods in the BTS Setting >
Sync Setting window (Figure 2-22).
Figure 2-22: Sync Setting Window
For OTA Sync, enter the scanning Public Land Mobile Network (PLMN) number (5- or 6-digit
integer), the scanning band (38, 39, or 40, depending on your eNB model), and the scanning
frequency [ranges from 38700 (2305 MHz) to 39600 (2395 MHz)].
If you enable GPS Sync, you can then choose which time reference type(s) to use for the GPS
clock:
• GPS – choose this option if you installed a GPS antenna with the eNB; it will reference
the atomic clock at the monitor stations and satellites, accurate within 25 ns.
• Glonass – generated by the GLONASS Central Synchronizer, whose time scale
implements leap seconds like Coordinated Universal Time (UTC).
29
• BeiDou – a continuous time scale which is synchronized with UTC within 100 ns.
• Galileo - a continuous time scale maintained by Galileo Central Segment, with an offset
of below 50 ns.
• Qzss – Quasi-Zenith Satellite System (QZSS) is a highly precise three or four orbiting
satellite timing system that is in development for Japan. Expected availability is by the
end of 2017.
Click on Save to save the configuration data. Use the Reset button to restore the configuration
settings to their original default values.
2.9 LTE
The LTE parameters are important for efficient wireless network operation. Through this menu
you will establish the neighboring eNBs operating in the same geographical area as the eNB
that you are configuring. This information is completed for each eNB so that the eNBs
collectively work well with one another to handle mobile users and to balance the traffic load.
Under this LTE menu, you will (a) configure the neighboring eNBs’ frequencies and identify
each eNB running on that frequency (section 2.9.1); (b) configure the current eNB’s mobility
parameters (section 2.9.2); and (c) examine the current eNB’s advanced settings (section 2.9.3).
It is a good idea to review all of the information in this 2.9 LTE section to understand how the
configuration settings interact. Note that many, if not all, of the advanced settings should be
left with their default values; any modification should be determined only by experienced
wireless professionals.
Make sure the current and neighboring eNBs are both GPS enabled and synchronized. With
any changes to these configuration parameters, reboot the eNB for the new configuration to
take effect. A case study for LTE to LTE handoffs is provided in section 2.9.4 Real-World LTE
Configuration Example.
For each type of neighboring eNB, you will first add the neighbor frequency settings via the
Neigh Freq Table, and then you will add the cell information associated to the frequencies via
the Neigh Cell Table.
You can configure the Neigh Cell Table for both inter-frequency (between different frequencies)
and intra-frequency (within the same frequency) neighboring eNBs. For inter-frequency cells,
you must add the neighbor inter-frequency settings in the Neigh Frequency Table before you
try to add the neighbor inter-frequency cell (eNB) information. Conversely, if you need to
delete a neighbor inter-frequency record, you must first delete the neighbor inter-frequency
cells (eNBs) associated to it.
30
For an intra-frequency neighbor cell, meaning a neighbor eNB operates on the same frequency
as the eNB you are configuring, you do not need to configure the Neigh Freq Table but you do
need to configure the Neigh Cell Table.
31
at the UE. If the received signal level is better from a
neighboring eNB by at least this amount of difference in dB,
the UE will reselect the other cell. The range is +24 to -24 dB.
In this example, the recommended value is 0 dB.
Resel Timer Determines when the cell reselection timer expires. Range is
0-7 seconds. In this example, the recommended value is 0
seconds.
Resel Prior Priority of cell reselection to cells at this frequency. Range is 0-
7 (an integer). In this example, the recommended value is 4.
Resel Thresh High The cell reselection threshold for higher priority inter-band
frequency. Represents the access threshold level at which the
UE will leave the serving cell and reselect another cell at the
target frequency (assuming the target frequency cell has a
higher cell reselection priority than the serving cell). Range is
0-31 dB. In this example, the recommended value is 18 dB.
Resel Thresh Low The cell reselection threshold for lower priority inter-band
frequency. Represents the access threshold level at which the
UE will leave the serving cell and reselect another cell at the
target frequency (assuming the target frequency cell has an
absolute priority lower than the serving cell). Range is 0-31 dB.
In this example, the recommended value is 13 dB.
P-Max The maximum transmit power that UEs in this cell are allowed
to use in the uplink. Range is -30 to 33 dBm. In this example,
the recommended value is 23 dBm.
32
Figure 2-24: LTE Freq/Cell > Neigh Cell Table Settings
33
2.9.1.2 TD-S Freq/Cell
Using the TD-S Freq/Cell sub-menu, you can configure parameters related to how adjacent
eNBs operating with TD-SCDMA technology work with the Baicells eNB that you are
configuring. You will define for the Baicells eNB how to deal with any neighboring TD-SCDMA
eNBs.
2.9.1.2.1 TD-S Neigh Freq Table
Under TD-S Neigh Freq Table, select New. This will open the Neigh Freq Settings window, as
shown in Figure 2-25 and described in Table 2-12. Even though some of the field names are
the same as in Table 2-10 for LTE eNBs, in some cases the ranges are different for TD-SCDMA.
Click on Save to save the configuration data.
Figure 2-25: TD-S Freq/Cell > Neigh Freq Table Settings
34
Telecommunications System (UMTS) Absolute Radio
Frequency Channel Number.
Q-RxLevMin The minimum received signal level at which a UE will detect
a neighboring eNB’s signal. The range is -60 to -13 dBm.
Resel Prior Priority of cell reselection to cells at this frequency. Range is
0-7.
Resel Thresh High The cell reselection threshold for a higher priority inter-
band frequency. Represents the access threshold level at
which the UE will leave the serving cell and reselect
another cell at the target frequency (assuming the target
frequency cell has a higher cell reselection priority than the
serving cell). Range is 0-31.
Resel Thresh Low The cell reselection threshold for a lower priority inter-band
frequency. Represents the access threshold level at which
the UE will leave the serving cell and reselect another cell
at the target frequency (assuming the target frequency cell
has an absolute priority lower than the serving cell).
Range is 0-31.
P-Max The maximum transmit power that UEs in this cell are
allowed to use in the uplink. Range is -50 to -33 dB.
Q-Offset Indicates the difference in signal level between the serving
and neighboring eNBs, as determined by the received signal
level at the UE. If the received signal level is better from a
neighboring eNB by at least this amount of difference in dB,
the UE will reselect the other cell. The range is -15 to 15 dB.
35
Figure 2-26: TD-S Freq/Cell > Neigh Cell Table Settings
36
2.9.1.3.1 GSM Neigh Freq Table
Under GSM Neigh Freq Settings, select New. This will open the Neigh Freq Settings window,
as shown in Figure 2-27 and described in Table 2-14. Please note that even though some of
the field names are the same as in Table 2-10 for LTE eNBs, in some cases the ranges are
different for GSM. Click on Save to save the configuration data.
Figure 2-27: GSM Freq/Cell > Neigh Freq Table Settings
37
2.9.1.3.2 GSM Neigh Cell Table
Under Neigh Cell Table, select New. This will open the Cell Setting window, as shown in Figure
2-28 and described in Table 2-15. Click on Save to save the configuration data.
Figure 2-28: GSM Freq/Cell > Neigh Cell Settings
The process of a device moving from cell to cell and changing over from its serving eNB to a
neighbor (target) eNB is called handoff or handover*. The UE exchanges information with its
serving eNB to perform cell selection and reselection based on parameters which you will set
for each eNB. Refer to Figure 2-29.
*NOTE: The terms “handoff” and “handover” are used interchangeably in LTE.
38
Figure 2-29: Handoff
What the UE measures that determines cell selection and reselection is the Reference Signal
Received Power (RSRP) of the serving as well as neighboring eNBs. The measurements are sent
periodically to the serving eNB, which then determines if the UE would be better served by an
adjacent eNB. Refer to the case study in section 2.9.4 Real-World LTE Configuration Example.
The default settings in the Mobility Parameter sub-menus represent standard LTE deployments.
Many of the mobility settings should be left with their default values. Any modification should
be determined only by experienced wireless professionals.
Figure 2-30 shows the sub-menus for the mobility parameters. In terms of LTE to LTE handoff,
only the A1, A3, A5, Measurement Control, Cell Selection Parameter, and Cell ReSelection
Parameter fields are used. The B2 Event Thresholds pertain only to TD-SCDMA and GSM
adjacent cells, not to adjacent LTE cells.
You will configure these mobility parameters for every adjacent eNB. If the serving eNB
determines that more than one adjacent eNB meets the RSRP event thresholds, the Cell
Reselection settings will determine to which adjacent eNB the serving eNB would hand off.
39
Figure 2-30: Mobility Parameters
To begin the configuration, next to A1 Event Threshold select the + icon as shown in Figure 2-
30 above. The resulting window presents the fields for each sub-menu you open, as illustrated
in Figure 2-31, where A1, A2, A3, and A5 Event Threshold sub-menus have been opened.
The configuration values shown in Figure 2-31 are the recommended settings for the eNB in
this operator example*. Table 2-16 describes each of the A1, A2, A3, and A5 Event Threshold
fields. Click on Save to save the configuration data.
*NOTE: The Automatic Neighbor Relation (ANR) function is not supported at this time.
40
Figure 2-31: A1, A2, A3, and A5 Event Thresholds
41
baicellsoperatorsupportgroup/permalink/1760449424249426/
A3 Event Threshold
Intra-Freq Handover The LTE A3 event is triggered when a neighbor cell becomes
A3 Offset better than the serving cell by as much as the offset value. The
offset can be either positive or negative. Range is -30 dB to 30
dB. In this example, the recommended value is 10 (integer),
which means 10*0.5 = 5 dB.
Intra-Freq ANR A3 Automatic Neighbor Relation (ANR) – not supported at this
Offset time. Range is -30 dB to 30 dB. The integer should be less than
or equal to the Intra-Freq Handover A3 Offset parameter.
A5 Event Threshold
Inter-Freq Handover The LTE A5 event is triggered when the serving cell becomes
A5 RSRP Threshold 1 worse than Threshold 1 while a neighbor cell becomes better
than Threshold 2. Range is 0-97 dB. In this example, the
recommended value is 40 (integer), which equals -140 dBm +
40 = -100 dBm.
Inter-Freq Handover Range is 0-97 dB. In this example, the recommended value is
A5 RSRP Threshold 2 45 (integer), which equals -140 dBm + 45 = -95 dBm.
Inter-Freq ANR A5 Automatic Neighbor Relation (ANR) – not supported at this
RSRP Threshold 1 time. Range is 0-97. The integer should be larger than or equal
to the Inter-Freq Handover A5 RSRP Threshold 1 parameter.
Inter-Freq ANR A5 Automatic Neighbor Relation (ANR) – not supported at this
RSRP Threshold 2 time. Range is 0-97. The integer should be less than or equal
to the Inter-Freq Handover A5 RSRP Threshold 2 parameter.
The B2 Event Thresholds pertain only to TD-SCDMA and GSM adjacent cells, not to adjacent
LTE cells. The B2 Event Threshold fields are shown in Figure 2-32 and described in Table 2-17.
Click on Save to save the configuration data.
Figure 2-32: B2 Event Threshold
42
RSRP Threshold 2 Threshold parameter 2 of the Reference Signal Received
Power (RSRP) based B2 event. Range is -5 dB to 91 dB.
GERAN B2 RSRP Threshold parameter 1 of the GSM Edge Radio Access
Threshold 1 Network (GERAN) B2 event based on Reference Signal
Received Power (RSRP). Range is 0-97 dB. Default is 10 dB.
GERAN B2 IRAT Threshold parameter 2 of the GSM Edge Radio Access
Threshold 2 Network (GERAN) B2 event, based on Inter-Radio Access
Technology (IRAT). Range is 0-63 dB.
The Measurement Control parameters determine how frequently the UE measures the
serving and neighboring eNBs’ RSRP values and at what level of hysteresis-based RSRP
triggers a handoff (refer to Figure 2-33 and Table 2-18). The UE evaluates the RF conditions
around it, and reports the information to the serving eNB. The eNB’s radio resource
management function evaluates the measurements and determines whether or not to hand
off the session to a neighbor eNB.
The Measurement Control Parameters are shown in Figure 2-33 and described in Table 2-18.
The parameters shown in the figure reflect the recommended settings for this operator
example. Click on Save to save the configuration data.
Figure 2-33: Measurement Control Parameters
43
The Cell Selection Parameter and Cell ReSelection Parameter sub-menus are shown in Figure
2-34 and described in Table 2-19. The parameters shown in the figure reflect the settings
recommended in this operator example. Click on Save to save the configuration data.
Figure 2-34: Cell Selection and Cell ReSelection Parameters
44
Qhyst Delay time for reselection. Range is 0-24 dB. In this
example, the recommended value is 1 dB.
Reselection Priority Priority for reselection. Range is 0-7 (integer). In this
example, the recommended value is 4.
ThreshServingLow Threshold for selection to cells of low priority. Range is 0-31
dB. In this example, the recommended value is 31 dB.
Allowed Meas BW Sib3 Measurement bandwidth allowed. Choices are n15, n25,
n50, n75, or n100. The default value is n50.
45
2.9.3.1 X2
An X2 interface is a logical interface which may be enabled for intra-LTE eNB handovers when
the Mobility Management Entity (MME) being used for the UE is the same for both the
serving and the target eNB. If enabled, the two eNBs can communicate directly with one
another without communicating through a radio network controller (RNC). The X2 starts
buffering on the target eNB in advance of a handover. By default, the X2 interface parameter
is disabled.
46
Figure 2-37: Power Control Parameters
47
Max Pathloss Maximum threshold at which the UE determines not to
transmit to the eNB based on pathloss. Pathloss is the
difference between the transmitted reference signal
information and the actual received signal power. Range is
100 to 135.
Target ul sinr Desired Signal-to-Interference-Plus-Noise Ratio (SINR) level
to ensure an acceptable level of communication between
the UE and eNB, while also controlling interference that
might be caused to neighboring cells. Range is -6 dB to 10
dB.
Po_ue_pucch Initial UE transmit power when using Physical Uplink
Control Channel (PUCCH). Range is -8 dB to 7 dB.
Po_ue_pusch Initial UE transmit power when using Physical Uplink Shared
Channel (PUSCH). Range is -8 dB to 7 dB.
PA Physical Downlink Shared Channel (PDSCH) is the main data
bearing channel. Power boosting the reference signal is
allocated to UEs on a dynamic and opportunistic basis.
The relative PDSCH power is determined by two computed
parameters: PA and PB. Traffic loading must be balanced
with controlling interference to neighboring cells.
To optimize channel conditions on the eNB, please refer to the BaiTip posted on the Baicells
website: https://community.na.baicells.com/t/recommened-advanced-settings-on-the-
enb-to-optimise-channel-conditions/531
2.9.3.3 eNodeB
The eNodeB Settings sub-menu is used at this time to simply name the eNB you are configuring,
as shown in Figure 2-38. The types of characters and length of the name that may be used are
provided in the figure. Click on Save to save the configuration.
Figure 2-38: eNodeB Settings
48
2.9.3.4 GAP
The Inter-Frequency Measurement Gap pertains to how a UE measures the signal quality of a
neighbor cell that is operating at a different frequency from the serving cell. The gap
parameter creates a gap in which the UE will not receive or transmit with the serving cell,
switch its frequency to the target cell, and perform a measurement of signal quality before
coming back to the serving cell.
The Baicells eNB radio resource control (RRC) gap may be set to 1 or 2, where 1 is a GAP
measurement period of 40 ms and 2 is a GAP measurement period of 80 ms. The default is 1
(40 ms). See Figure 2-39. Click on Save to save the configuration.
Figure 2-39: GAP Settings
49
2.9.3.6 SON Functional
The Self-Organizing Network (SON) function refers to standards-based automation
technology designed to make the planning, configuration, management, optimization, and
healing of mobile radio access networks (RANs) simpler and faster. SON provides the plug-
and-play capability of newly deployed Baicells eNBs. When enabled, the new eNB will auto-
configure its Physical Cell Identifier (PCI). Refer to Figure 2-41 and Table 2-22. Click on Save to
save the configuration.
Figure 2-41: SON Functional Parameters
2.9.3.7 Tx and Rx
The Transmit (Tx) and Receive (Rx) Parameters PHY RXGAIN field controls how much RF signal
gain UEs will have in the uplink. Do not modify this field. The range is 0-76 dB. The default
value will be displayed. Refer to Figure 2-42.
Figure 2-42: Tx and Rx Settings
50
Figure 2-43: Random Access Parameters
2.9.3.9 Capacity
The Capacity parameters set a limit on the number of active UEs that can be supported
simultaneously by the eNB. If enabled, the eNB can support up to 96 UEs; if disabled, the
eNB can support a maximum of 32 UEs. Refer to Figure 2-44. Click on Save to save the
configuration.
Figure 2-44: Capacity Parameters
51
• MAXC/I or SCI– The maximum carrier-to-interference (C/I) ratio allocates resources
to UEs in favor of those with good channel quality. QoS is considered, but memory is
not.
• PFS – Proportionally Fair Scheduling (PFS) balances between user channel quality
and fairness, where both cell throughput and user fairness are not considered.
• RR – Round Robin (RR) scheduling allocates resources to all UEs equally. Neither QoS
nor memory is considered.
The uplink (UL) and downlink (DL) scheduling options are Max C/I or SCI, PFS, and RR. Refer
to Figure 2-45. Click on Save to save the configuration.
Figure 2-45: Scheduling Algorithm Parameters
52
Figure 2-47: Link Activation State Detector Parameters
53
Concerning the A1, A2, A3, and A5 event thresholds, review the flowchart shown in Figure 2-
49. The serving eNB starts what is called the A2 and A3 event threshold measurements. If the
A3 event threshold is met by a neighbor intra-frequency cell, the UE session will be handed off
to that target eNB. If the A2 event threshold is met, it stops the A2 measurement and triggers
the A1 and A5 measurements.
Then, if the A1 event threshold is met, it stops the A1/A5 measurements and starts the A2
evaluation again. Assuming the A5 measurement indicates the neighbor inter-frequency cell is
better than the serving cell, the serving eNB will hand off the session to the neighbor eNB.
Figure 2-49: Flowchart of Handoff Event Thresholds
For the A1 event threshold, assume the starting measurement is set to 45 (Figure 2-50). If the
UE measures RSRP > -95 dBm, the UE will report the A1 event and then the network will stop
the A1 and A5 event measurements and start the A2 event measurement.
54
Figure 2-50: A1 Threshold
Under the A2 Event Threshold, assume the LTE A2 RSRP threshold is set to 40 (Figure 2-51). If
the UE measures RSRP < -100 dBm, the UE will report the A2 event and the network will start
the A1 and A5 event measurements.
Figure 2-51: A2 Threshold
For the A3 Event Threshold, assume the offset value is set to 10 (Figure 2-52). If the UE reports
an A3 event (offset > 10*0.5 = 5 dB), the eNB may command the UE to hand off to the target
intra-frequency cell.
Figure 2-52: A3 Threshold
For the A5 Event Threshold, assume threshold 1 is set to 40 and threshold 2 is set to 45 (Figure
2-53). If the UE reports an A5 event (RSRP of the serving cell < -100 dBm, and the RSRP of the
neighbor cell is > -95 dBm), the eNB may command the UE to hand off to the target inter-
frequency cell.
Figure 2-53: A5 Threshold
55
Assume that X2 Handover is enabled (Figure 2-54). To ensure X2 handover is successful, the
Mobility Management Entity (MME) must support eNB configuration transfer and MME
configuration transfer S1 message handling.
Figure 2-54: X2 Handover
With any changes to these configuration parameters, reboot the eNB for the new configuration
to take effect.
2.10 Reboot
To reboot the eNB click on the Reboot menu item, and then click on Reboot Now as shown in
Figure 2-55. The eNB will automatically reboot.
NOTE: If you need to reboot the eNB, we recommend that you collect logs on the eNB
before you reboot it. That data may be needed for troubleshooting.
2.11 Logout
To log out of the eNB GUI, click on the Logout menu item shown in Figure 2-56. You will
automatically be logged out of the GUI and presented with the login screen.
56
Figure 2-56: Logout Action
57
3. UE GUI
You can also use a Web browser to log in to the Web GUI to configure and manage the UE.
NOTE: Some service providers pre-configure the device using a CloudKey, which means
the device may already be configured in the network. Refer to Appendix D.
58
1. Set up the UE as instructed in the user manual for the device.
2. Open a Web browser, and enter http://192.168.254.1 (or enter
http://192.168.1.1 if on older firmware than V1.0.3) and then press Enter.
3. At the login window (Figure 3-2), enter the default user name (admin) and password
(admin), and click on Login. To protect your UE from unauthorized access, change the
password after your first login. The steps for password change are explained below
Figure 3-3.
Figure 3-2: UE GUI Login
After you log in, the main menu is shown in the left navigation pane (Figure 3-3). The fields
displayed on the right side of the window may be the last menu item that you looked at.
Figure 3-3: UE GUI Main Menu
To change your password, go to System > Account. Here you can change the UE admin’s
password or the user’s password, as shown in Figure 3-4. Enter the current password, the
new password, and then re-enter the new password to confirm it. The password may be 5 to
15 ASCII characters (letters, numbers, and special characters). Click on Submit to save the
change. Select Enable User.
59
Figure 3-4: Change Password
3.3 Overview
The Overview menu provides system and device status information for the given UE. Scroll
down the page to see all of the fields (Figures 3-5, 3-6, 3-7, 3-8, and 3-9). The fields are
described in Table 3-2.
Figure 3-5: Overview Fields (1 of 5 Screens)
60
Figure 3-6: Overview Fields (2 of 5 Screens)
61
Figure 3-8: Overview Fields (4 of 5 Screens)
62
Table 3-2: Overview Fields
63
Max Displays the maximum percent of memory used since the
last reboot
Min Displays the minimum percent of memory used since the
last reboot
LTE Status
USIM Card Status The UE’s Universal Subscriber Identity Module (USIM) card
status, either normal or not ready
Status The UE is either connected or unconnected from the LTE
network
Mode LTE mode is Time Division Duplexing (TDD) or Frequency
Division Duplexing (FDD)
Operator The operator’s identification number
Signal Strength Indicates the strength of the signal between this UE and the
serving eNB, either Strong, Good, or Weak. Some UEs have
3 LEDs, and some have 5 LEDs. Signal strength thresholds
are determined per the values given in Table 3-3.
SINR Signal-to-Interference-Plus-Noise Ratio (SINR) of the signal
received from the eNB, expressed in decibels (dB)
DL MCS The downlink signal (eNB to UE) Modulation and Coding
Scheme (MCS) currently being used (index)
UL MCS The uplink signal (UE to eNB) Modulation and Coding
Scheme (MCS) currently being used (index)
DL Data Rate The current, maximum, and minimum downlink (eNB to UE)
data throughput rate
UL Data Rate The current, maximum, and minimum uplink (UE to eNB)
data throughput rate
DNS Server Domain Name Server (DNS) information:
• APN Name • Access Point Name (APN) for each eNB with which
the UE can communicate
• Status • The DNS server for each eNB reports as either
Enabled or Disabled
• IP Address • The IP address of the DNS server
• Subnet Mask • The subnet mask address of the DNS server
LAN Status
MAC Address The UE’s Media Access Control (MAC) address
IP Address The UE’s local Internet Protocol (IP) address
Subnet Mask The UE’s local subnet mask address
Throughput Statistics (for Access Point Names, or APNs, and LAN)
Port The Access Point Name (APN), or eNB, with which this UE is
communicating
Received Total Traffic Total amount of traffic received through this APN, in
64
megabytes (MB) since the last reboot
Received Packets The total number of packets received from this APN
Received Errors Number of errors reported on packets received from the
APN
Received Dropped Number of dropped packets received from the APN
Sent Total Traffic Total amount of traffic sent from the UE to this APN, in
megabytes (MB) since the last reboot
Sent Packets The total number of packets this UE sent to the APN
Sent Errors Number of errors reported on packets sent from this UE to
the APN
Sent Dropped Number of dropped packets sent from this UE to the APN
Device List
Index List number of device connected to the UE on the LAN port
Device Name Name of the device connected to the UE on the LAN port
MAC Address Media Access Control (MAC) address of the device
connected to the UE on the LAN port.
IP Address IP address of the device connected to the UE on the LAN
port
Lease Time Amount of time the UE’s IP address has been leased
Type Type of device, LAN or DHCP
3 0 1 1 1 1 1
SINR < -3
5 0 1 1 1 1 1
-3≤SINR<1 3 0 1 2 2 2 2
5 0 1 2 2 2 2
1≤SINR<4.6 3 0 1 2 2 2 2
5 0 1 2 3 3 3
4.6≤SINR<13 3 0 1 2 2 2 3
5 0 1 2 3 4 4
13≤SINR 3 0 1 2 2 2 3
5 0 1 2 3 4 5
In the top part of the UE GUI window are some icons. If you hover over the first icon you will
get a quick status on the Universal Subscriber Identity Module (USIM) card for the UE (Figure
3-10). You will also see the current signal strength; the more “bars” shown the better the
signal strength.
65
Figure 3-10: USIM Status Icon
3.4 Network
The Network menu opens to several sub-menus, as shown in Figure 3-11.
Figure 3-11: Network Sub-Menus
When you select Network, it opens to the first sub-menu, Network Mode (Figure 3-12). You
can select the network mode as either Network Address Translation (NAT), Router, or Bridge.
In older versions of code, NAT was the default. Most operators use bridge mode.
Figure 3-12: Network Mode
66
Depending on which mode you select, you may see additional configuration fields. The
Router settings are shown in Figure 3-13 and described in Table 3-4. The fields with an
asterisk (*) next to them are mandatory.
Figure 3-13: Network Mode > Router Settings
67
bytes.
DNS1 Enter the IP address of the primary Domain Name Server
(DNS).
DNS2 Enter the IP address of the secondary Domain Name Server
(DNS).
NTP1 Select the primary Network Time Protocol (NTP) server.
NTP2 Select the secondary Network Time Protocol (NTP) server.
Optional NTP Server If you wish to use additional NTP servers, select the check
box and enter the location.
When you are finished configuring the UE in router mode, click on the Submit button to save
the changes.
If you set the Network Mode to Bridge mode and click on Submit, the system will prompt
you to be sure you want to make that change. Selecting OK will cause the UE to restart, thus
interrupting current service. Refer to Figure 3-15.
The same warning message and restart will occur if you switch from Bridge to NAT or Router
mode.
68
Figure 3-15: Bridge Mode
69
Table 3-5: LTE Settings
70
3.4.2 Scan Mode
The Scan Mode setting determines which frequencies the UE’s routine scan of available
frequencies will cover. Scanning is a process of tuning to a specific frequency and measuring
the simplest signal quality [e.g, Received Signal Strength Indication (RSSI)]. As part of the cell
selection and reselection process, the UE performs the scan first and then selects a small
number of candidate cells to go through the next step of measuring and evaluating signals to
select the best eNB to serve it.
Refer to Figures 3-17, 3-18, and 3-19 to view the Scan Mode configuration fields based on
which mode you select. The fields are explained in Table 3-6. Click on Submit to save the
configuration.
Figure 3-17: Scan Mode Settings
71
open an EARFCN settings field (Figure 3-19). Select
the desired EARFCN from the drop-down list, and
then click on Add to add the list. Click on Submit to
save the changes.
72
3.4.3 APN Management
In the Access Points Name (APN) Management menu, you can configure up to 4 eNBs to
which this UE may connect. Refer to Figure 3-20 and Table 3-7 concerning the parameters.
Click on Submit to save your data.
Figure 3-20: APN Management Settings
73
PDN Type Select the type of Packet Data Network (PDN) the eNB can
use when communicating with this UE: IPv4, IPv6, or IPv4v6
MTU Required field: Enter the Maximum Transmit Unit (MTU),
which is the size of the largest network layer protocol data
unit (PDU) that the eNB can communicate in a single
transaction. The range is 576 to 1500 bytes.
Manage Interface To enable a management interface to this eNB, select the
check box next to Enable.
Default Gateway To enable a default gateway to this eNB, select the check
box next to Enable.
Select Enable or Disable for the PIN Verification setting, as shown in Figure 3-21. When you
enable PIN Verification, you are prompted to define a 4- to 8-digit PIN number. As indicated
in the figure, the user is allowed up to 3 attempts after the first attempt to enter the correct
PIN before being locked out. Note that you can elect to Remember My PIN. Click on Submit
to save your changes.
Figure 3-21: PIN Management Settings
74
3.4.5 SIM Lock
The UE’s Subscriber Identification Module (SIM) card may be locked to the operator’s network
based on the 3-digit Mobile Country Code (MCC) and the 2- or 3-digit Mobile Network Code
(MNC). Enter the settings as shown in Figure 3-22. The MCC + MNC = Public Land Mobile
Network (PLMN). Click on Submit to save your data.
Figure 3-22: SIM Lock Settings
Optionally, you can enable Internet Control Message Protocol (ICMP) redirect error messages,
for which you enter the host server IP address. Refer to Figure 3-23 and Table 3-8. Save any
changes by clicking on Submit.
Figure 3-23: DMZ Settings
75
Table 3-8: DMZ Settings
76
3.4.8 LAN Settings
In this sub-menu, you can enter or change the IP address settings for the UE. By default, the IP
address is 192.168.254.1 and the subnet mask is 255.255.255.0. If you change it, for example
to make the address easier to remember, make sure that the address you choose is unique to
your network. You will need to access the Web management page with the new IP address.
You can bind an IP address to the UE based on its Media Access Control (MAC) address. If
binding is configured, the UE will receive the same IP address each time it accesses the DHCP
server. When configured as a DHCP server, the UE automatically provides the TCP/IP
configuration for the LAN clients that support DHCP client capabilities. If DHCP services are
disabled, you must have another DHCP server on the LAN or each client must be configured
manually.
To add a device to the setup list, click on Add List. After entering the information, click on
Submit to save your data. Refer to Figure 3-25 and Table 3-10.
Figure 3-25: LAN Settings
77
DHCP Server Select the check box next to Enable to configure the UE as a
DHCP server
Start IP Address Enter the starting IP address that the DHCP server may use
for individual clients associated with this UE. Must be a
different IP address from the one set in the Network > LAN
Settings, but must be on the same network segment.
End IP Address Enter the ending IP address that the DHCP server may use
for individual clients associated with this UE. Must be a
different IP address from the one set in the Network > LAN
Settings, but must be on the same network segment.
Lease Time Enter the lease time (in minutes). The range is 2 to 1440
minutes. The default is 720 minutes (recommended).
Bundled Address List
Index List number
IP Address IP address of the device associating to the UE
MAC Address MAC address of the device associating to the UE
3.5 Security
The Security menu opens to several sub-menus, as shown in Figure 3-26.
Figure 3-26: Security Sub-Menus
When you select Security, it opens to the Firewall Setting (Figure 3-27). If you enable the
firewall, the other sub-menus allow you to configure the firewall ‘s MAC filter, IP filter, and so
forth. Each of these is explained in the following sections. If you make a change, click on Submit
to save the data.
78
Figure 3-27: Security Sub-Menus
79
Table 3-11: MAC Filtering Settings
3.5.2 IP Filtering
Internet Protocol (IP) filtering allows you to filter data based on the IP address of the source
device. You can define a list of devices either allowed to access or denied from accessing the
UE. The IP Filtering sub-menu enables you to configure the IP address range, as shown in Figure
3-29 and explained in Table 3-12. To add an IP filtering rule, under IP Filtering List select Add
List to open the configuration fields. Select Submit to save the data.
Figure 3-29: IP Filtering Settings
80
Table 3-12: IP Filtering Settings
81
Figure 3-30: URL Filtering Settings
To add a port forwarding rule, click on Add List as shown in Figure 3-31. The fields are
explained in Table 3-13. After entering the information, select Submit to save the data.
Figure 3-31: Port Forwarding Settings
82
Table 3-13: Port Forwarding Settings
83
Table 3-14: Access Restriction Settings
3.5.6 UPnP
Universal Plug and Play (UPnP) is a set of networking protocols that permits devices such as
personal computers, printers, internet gateways, Wi-Fi access points, and mobile devices to
discover each other's presence on the network and communicate. UPnP is intended primarily
for residential users and not enterprise-class devices.
In the UPnP sub-menu you can either enable or disable UPnP. To enable, select the check box
next to Enable, and then click on Submit. When enabled, the current status of each UPnP
device will be displayed under Current UPnP Status. Refer to Figure 3-33 and Table 3-15. To
disable UPnP, simply uncheck the check box next to Enable and again click on Submit.
Figure 3-33: UPnP
84
External Port Port number through which the UPnP device is
communicating with the WAN
Internal Port Port number through which the UPnP device is
communicating with the LAN
3.6 VPN
The Virtual Private Network (VPN) menu enables you to connect the UE to a VPN. To enable
the UE to use a VPN, select the check box next to Enable. Enter the settings as shown in
Figure 3-34 and described in Table 3-16. After entering the information, click on Submit to
save the changes. The status of the VPN will then display.
Figure 3-34: VPN Settings
85
Remote Address VPN address on the WAN
Online time Amount of time the VPN has been in use by this UE
3.7 IPv6
When IPv6 addressing has been enabled under Network > APN Management > PDN Type,
this sub-menu (Figure 3-35) allows you to enable or disable IPv6 on the WAN, and to set the
auto-configuration type for the LAN.
Figure 3-35: IPv6 Sub-Menu
The IPv6 status and configuration fields are shown in Figures 3-36, 3-37, and 3-38, and
described in Table 3-17. After entering the information, click on Submit to save the data.
Figure 3-36: IPv6 Settings > Status
86
Figure 3-37: IPv6 WAN Settings
87
on the WAN interface
WAN Connection Type AutoConfiguration is the only option you can select
IPv6 MGMT Global DHCPv6 is the only option you can select
Address DNS From
LAN Settings
IPv6 Link-Local Address Displays the MAC address for the DHCPv6 server
AutoConfiguration Type Select either SLACC (stands for StateLess
AutoConfiguration) or DHCPv6 for the autoconfiguration
type
3.8 System
The System menu provides a number of operations that affect the UE. The System sub-
menus are shown in Figure 3-39 and explained in the sections that follow.
Figure 3-39: System Sub-Menus
88
3.8.1 Maintenance
The Maintenance sub-menu shown in Figure 3-40 provides a quick, high-level way to
start/stop, reset, back up, and restore UE functions and data. Such functions are typically
used when troubleshooting UE issues. The Maintenance fields are described in Table 3-18.
Figure 3-40: Maintenance
89
factory settings
Backup Configuration File Clicking on the Backup button backs up the UE’s current
configuration
Restore Configuration File Clicking on Restore restores a UE’s configuration database
based on the target file that you select. The UE will upload
the configuration file and then restart automatically.
Navigate to the upgrade file and select it, click on Open, and then click on Submit to save the
changes. Refer to Figure 3-41. The software upgrade will start immediately. After the
upgrade the UE will restart automatically, running the newer version of code.
90
To perform an FTP auto-upgrade successfully, make sure the UE is connected to the internet.
At the FTP Auto Upgrade field, select the check box next to Enable. This will open the
configuration settings, as shown in Figure 3-42 and described in Table 3-19. Once you have
entered the information, click on Submit to save the data.
91
Check New FW Every Schedule how often the UE will check for a new software
version, e.g., every 24 hours. Select the check box, and
enter the time in hours. The range is 1 to 740 hours.
Start Time (24hrs) Enter the time-of-day you want the UE to check for newer
software
3.8.4 TR069
If your network operates using a TR-069 auto-configuration server (ACS), the ACS will
automatically provide the UE parameters. If you set the ACS parameters on both the ACS and
the UE, you do not need to set other parameters on the UE itself.
Use the TR069 sub-menu to implement the TR-069 function for the UE, as shown in Figure 3-
43 and explained in Table 3-20. After entering, click on Submit to save the data.
Figure 3-43: TR069 Fields
92
Table 3-20: TR069 Settings
Below the Settings, the window displays the Daylight Saving Time (DST) fields. If you enable
DST, the UE adjusts the system time for DST based on the start and end dates that you enter.
The DST window also displays the status of DST as either running or not running.
If you select Sync from Network (Figure 3-45), the UE regularly synchronizes the time with a
Network Time Protocol (NTP) server. Identify at least 2 NTP servers, and optionally a third
backup server. Enter the NTP information as explained in Table 3-21.
After entering the date and time information, click on Submit to save the data.
93
Figure 3-44: Date & Time - Set Manually
94
Table 3-21: Date & Time – Sync from Network Settings
3.8.6 DDNS
A Dynamic Domain Name Server (DDNS) is used to map a user’s dynamic IP address to a fixed
DNS service. Select the check box next to Enable to enable the DDNS service, as shown in
Figure 3-46. The fields are described in Table 3-22. After entering the information, click on
Submit to save the data.
Figure 3-46: DDNS Settings
95
3.8.7 Iperf
Many operators use an open-source, cross-platform tool referred to as Iperf to measure and
tune network performance. The tool can measure the throughput of Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP) packets in both directions.
In this sub-menu, you identify the server address and configure settings for the Iperf tool. Once
Iperf is set up, the resulting data for this UE is reported at the bottom of the screen. To run the
Iperf tool, after entering the settings click on Start. Refer to Figure 3-47 and Table 3-23.
Figure 3-47: Iperf Settings
96
Result
Status -
Uplink Speed Data throughput on the uplink (UE to eNB)
Downlink Speed Data throughput on the downlink (eNB to UE)
3.8.8 Diagnostics
The UE GUI offers 2 diagnostic tests that can be useful for troubleshooting issues with internet
connectivity: Ping and TraceRoute. Run the ping test to send a data packet of a specified size
to a target IP address or domain field to determine network speed. Run a traceroute test to
display the route a packet takes to a target IP address or domain field. The route may indicate
causes of delay in transmission.
Once you enter the ping or traceroute information, click on Ping or Traceroute, respectively,
to run the test. Each time you run a ping or traceroute, the results are displayed at the bottom
of the window. Refer to Figures 3-48 and 3-49. Table 3-24 describes each field.
Figure 3-48: Diagnostics – Ping
97
Figure 3-49: Diagnostics – TraceRoute
98
TraceRoute Settings
Target IP/Domain Enter the target IP or domain address
Maximum Hops Enter the maximum number of hops (network nodes) the
data packet should take to reach the target IP or domain
address. Range is 1-30. Default is 30.
Timeout Enter the length of time for the traceroute test to run, in
seconds. Range is 1-10. Default is 10 seconds.
TraceRoute Results
Result Displays the result of the traceroute test as successful or
failed
Details Displays the details of the traceroute test, showing the
target IP or domain address, the maximum number of hops,
and the packet size
99
3.8.10 SysLog
The UE can capture system logs (SysLog), which provide information about local or network
events. A syslog in general indicates where the event originated in the system and the
priority level. System logs are often useful when examining UE and network performance,
and to troubleshoot issues. You can select either Network or Local syslogs, which are
described in each section below.
3.8.10.1 Network
To forward network logs to a specified device such as a logging or syslog server, you will first
select the level of syslog you wish to forward and then enter the server’s IP address. Refer to
Figure 3-51 and Table 3-26. Click on Submit to save the configuration.
Figure 3-51: Network SysLog Settings
3.8.10.2 Local
For local logs you can specify different levels of system logs to capture and then search those
logs based on a keyword. For example, if you were looking for system events related to MAC
Filtering, you could search on a specific MAC address.
100
After you set the level of local syslog to capture, click on Submit. To search the local syslogs,
type in a keyword to search on and then click on Pull. Any results based on that keyword will
be displayed. Refer to Figure 3-52 and Table 3-27.
Figure 3-52: Local SysLog Settings
101
Caution: The reboot action will disrupt UE service.
To enable the ping watchdog, select the check box next to Enable. The other fields in the
sub-menu will become configurable, as shown in Figure 3-53 and described in Table 3-28.
Click on Submit to save the configuration.
Figure 3-53: Ping Watchdog Settings
102
Figure 3-54: Simcard Checking
103
Allow HTTPs Login from Select the check box next to Enable to log in to an HTTPs
WAN Web address from the WAN
Refresh Time Enter how often (in seconds) that you want the UE
information that is viewed from the Web to be refreshed.
Range is 5-60 seconds. Default is 10 seconds.
Session Timeout Enter the amount of time (in minutes) of inactivity in the
UE GUI before the session times out. Range is 5-1440
minutes. Default is 10 minutes.
Language Select either Chinese or English language for the UE GUI
3.8.14 Account
The Account sub-menu may be used to change the user’s or the administrative login
password, and to enable the user. The new password or user enablement will take effect
after you click on Submit. Refer to Figure 3-56 and Table 3-30.
Figure 3-56: Account Settings
104
3.8.15 Logout
To log out of the UE GUI, select the Logout sub-menu item. The system returns you to the
login page, as illustrated in Figure 3-57.
Figure 3-57: Logout Action
105
4. CloudCore
4.1.1 Server
If you are planning to use a local version of the CloudCore Operations Management Console
(OMC), refer to Table 4-1 for the minimum server requirements.
Table 4-1: Server Requirements
Item Description
CPU 2.0 GHz 8M cache, 2 Core CPU (Xeon E5 series)
Memory 16 GB
Disk 4T
NIC Gigabit Ethernet x 2
Operating System CentOS 7.0 @64bit
4.1.2 Client
Table 4-2 describes the minimum requirements for the client computer that you use to access
the CloudCore OMC and Business Operations Support System (BOSS) applications.
NOTE: Client computer requirements for the Evolved Packet Core (EPC) module are
different. Those requirements are provided in the Baicells EPC User Guide.
106
4.2 Getting Started
107
The primary administrator can then add:
• New OMC user groups and users.
• Other BOSS users, who are associated with the existing BOSS Carrier Oper (for
operator) user group.
OMC user groups are helpful when you want to set up different login rules for different
administrative users. How to create user groups is covered in section 4.4.5.2.
Figure 4-2: CloudCore Users
4.2.3 Navigation
After logging in, the CloudCore Web page shows the main modules across the top bar:
CloudCore system, OMC, and BOSS, as shown in Figure 4-3.
Figure 4-3: CloudCore Web Page
Click on CloudCore, and use the arrow icon to toggle the left navigation pane open or closed
in any of the modules (Figure 4-4).
Figure 4-4: CloudCore Navigation Pane
108
In the upper right corner, you will see “Welcome, <your name>”. Select the down arrow next
to welcome to view a drop-down menu of general functions (Figure 4-5).
Figure 4-5: CloudCore Welcome Menu
Select Change password to enter a new password for your account (Figure 4-6). The password
may be 6 to 16 characters.
Figure 4-6: Change Password
Choose the Lock screen menu item if you wish to lock your computer screen (Figure 4-7).
Choose Logout to log out of the system.
Figure 4-7: Lock Screen
109
4.2.4 Online Help
The online help menus in OMC and BOSS offer the ability to download this guide (forthcoming),
and provide an About description of the software version (Figure 4-8).
Figure 4-8: OMC Help > About
4.3 System
110
4.3.2 Users
Under System > Users, any users already defined in the system will be listed in the User
Management window on the right (Figure 4-10). Scroll to the right to see all of the information.
Figure 4-10: User Management
To search for a specific user(s) already defined in the system, enter the user name or sort the
list by status or user group, and then select Query (Figure 4-11).
Figure 4-11: Search for User
When you find the user you are looking for, if you need to modify the information you can
highlight the row with the user information and click on the pen icon under Operation (Figure
4-12). After entering any changes, select OK to save the data.
Figure 4-12: Modify User
The other functions under Operation allow you to lock/unlock the user’s password, and to
delete the user. Refer to Figure 4-13.
111
Figure 4-13: Lock/Unlock User Password or Delete User
From this window you also can add users to existing user groups. (How to create user groups
is explained in section 4.4.5.2.)
To add a user, in the User Management window click on the + (add) sign in the upper right-
hand corner. A new dialogue window will open (Figure 4-14). Complete the mandatory user
information, any optional information fields, and then click on OK to save the configuration.
Note that the password may include A-Z, a-z, 0-9, dash (-), and underscore (_).
Figure 4-14: Add User
112
Figure 4-15: Reset Password
4.3.4 Logs
From the CloudCore System page, selecting System > Logs opens the Operation log window.
An operation log is simply an account of events that have taken place in the operator’s
CloudCore account (Figure 4-16). Logs represent all CloudCore user activity, and are useful for
a quick look-up of activities across all users. The latest log appears on the top of the list.
Figure 4-16: Operation Logs
113
Figure 4-17: Security Rule
4.4 OMC
When you click on the OMC tab, you will see a Figure 4-18: OMC Menu
new menu in the left navigation pane (Figure 4-18).
Each OMC menu item is explained in this section.
114
4.4.1 Dashboard
The OMC dashboard appears on the right side window as you enter the OMC module (Figure
4-19). The dashboard provides operator personnel with a summary of network status,
statistics, and performance. This at-a-glance feature helps administrators to grasp the health
of the network overall and to quickly identify any issues.
Figure 4-19: Dashboard
The term, UE, stands for user equipment and refers to the subscriber or the device that the
subscriber is using. Another term sometimes used for UE is Customer Premise Equipment
(CPE). For simplicity, in most cases in this document the terms “eNB” and “UE” are used.
The eNB and UE sections of the dashboard contain a search bar so you can look up and check
the status of individual eNBs and UEs. All eNBs in the operator’s network are listed under eNB.
All UEs in the operator’s network are listed under CPE. Clicking on an eNB name or UE name
in either block will take you into the eNB Monitor page or CPE Monitor page, respectively. The
monitor functions are explained later in this document.
115
4.4.1.2 Alarms
The top, right window displays the number of active system alarms. Alarms are categorized
into 4 classes: Critical, Major, Minor, and Warning. Critical alarms are incidents that can cause
system outages, and should be attended to immediately. Major alarms are incidents that can
cause poor or degrading quality of service for subscribers, and therefore should be addressed
as soon as possible. Minor alarms indicate a possible issue that needs to be investigated but
will not disrupt service. Warnings are used to indicate errors that probably need to be
corrected or at least monitored, but may not require any action.
If you click on the double arrows icon in the upper right corner of this block (Figure 4-20), it
will take you into the Alarm Query menu and shows a list of active alarms. In the list of alarms,
you can also right-click on a specific alarm to bring up further details about that alarm, such as
suggestions for how to resolve it (Figure 4-21). The alarms are discussed in more detail later in
this document.
Figure 4-20: Alarms
116
Figure 4-21: Alarm Details
You can also select Alarm Confirm, which lets other OMC administrators know you have seen
an alarm reported and are working on it or resolving it. If you select Clear Alarm it will remove
the alarm from the active list and add it to the historical alarms list. The windows resulting
from these two actions are shown in Figure 4-22.
Figure 4-22: Confirm or Clear Alarm
Another function related to alarms in the dashboard is the ability to export the alarm details.
Click on the export icon in the upper right of the dashboard window, as shown in Figure 4-23.
You can then select the destination where you want to save the file.
117
Figure 4-23: Export
4.4.1.3 Statistics
The statistics block of the dashboard presents three sets of data: eNB Online, eNB Active, and
CPE Connect (Figure 4-24). The first statistic, eNB Online, shows the total number of eNBs that
are currently online – that is, operational and connected to the network - and the number that
are offline.
The second statistic, eNB Active, shows the total number of eNBs that are actively in service –
that is, receiving or transmitting data – and the number that are inactive. The third block, CPE
Connect, shows the total number of UEs connected to the network as well as the number of
UEs that are disconnected.
Figure 4-24: Statistics
Click on any of the statistics to bring up more detail. When you click on eNB Online, it will take
you into the eNB > Monitor page and show you eNB online statistics (Figure 4-25).
118
Figure 4-25: eNB Online Details
When you click on the eNB Active statistic, it will take you to eNB > Monitor and show you eNB
active statistics. See Figures 4-26 and 4-27.
Figure 4-26: eNB Active Details (1 of 2)
119
Figure 4-27: eNB Active Details (2 of 2)
When you click on CPE Connect statistic, it will take you to the CPE Monitor page and show
you the UE connect statistics. See Figures 4-28 and 4-29.
Figure 4-28: CPE Connect Details (1 of 2)
120
Figure 4-29: CPE Connect Details (2 of 2)
All of the eNB Monitor and CPE Monitor fields are explained later in this document.
4.4.1.4 Performance
The dashboard Performance block offers 3 types of network performance data: Throughput,
Physical Resource Block (PRB) Utilization, and UE Count. Hover your cursor over any of the
graphs to see more detailed data for that graph (Figure 4-30).
Figure 4-30: Performance
The Throughput is a measure of the average uplink and downlink data traffic being transmitted
over the last 5 minutes across all eNBs in the network. The PRB Utilization shows the average
number of subcarriers allocated to users across all eNBs over the last 5 minutes, an indicator
of system utilization. The UE Count shows the total number of connected users at that point
in time. Notice that you can slide the x-axis left and right to see data for different times of day.
121
4.4.2 eNB
The eNB menu includes 3 sub-menus: Monitor, Strategy (Upgrade and Reboot), and File Library
(Figure 4-31). Each of these functions is explained in this section.
Figure 4-31: eNB Menu
4.4.2.1 Monitor
4.4.2.1.1 Monitor Window
The first sub-menu you can select under eNB is Monitor. The monitor function allows you to
see any eNBs that are already defined in the system. See Figures 4-32 and 4-33, showing the
fields as you scroll left to right. The fields are explained in Table 4-3.
You can review the eNB list, or you can enter a specific serial number or cell name and click on
Filter to look it up. Clicking on the Refresh button will update the information on the page. If
you click on History, the system will display historical information about the eNB. The other
fields that are shown on the monitor page will be explained under System > Device
Management, which is where you add and configure eNB and UE devices.
Figure 4-32: eNB > Monitor (1 of 2)
122
Figure 4-33: eNB > Monitor (2 of 2)
123
eNB
Uptime Length of time this eNB has been operational -
dd:hh:mm:ss
Last Connection Time The last time this eNB was connected to the OMC/Cloud -
yy:mm:dd
Product Type The eNB description used in OMC
Hardware Version The version of hardware for this device
Software Version Software code level running on the device
Device Group The device group to which this device has been configured
UBoot Version Universal boot loader code level, information sometimes
needed when troubleshooting issues
Kernel Version Kernel code level, information sometimes needed when
troubleshooting issues
Looking again at Figure 4-32, notice in the upper right side of the window are 4 color blocks
with numerals that represent alarm counts. Alarms are an indication of an error or problem
regarding eNB operation. The 4 colors represent 4 classes of alarm priorities - Critical, Major,
Minor, and Warning – and the numerals are the number of active alarms in that class. Alarms
are explained in section 4.4.4 of this document.
You can show, hide, or rearrange most of the columns in the Monitor window when you click
on the Display button (Figure 4-34). Two columns, Operation and Serial Number, may not be
changed. After making any other display changes, select OK to save the changes.
Figure 4-34: Display
124
If you click on Filter you can customize the Monitor information further by selecting additional
display criteria (Figure 4-35). Each time you change the filter criteria, the Monitor display
changes automatically. Simply click on the X in the upper right corner of the Filter dialogue box
to exit the filter selection function.
Figure 4-35: Filter
125
4.4.2.1.2.1 Information
By right-clicking on an eNB listed in the Monitor window and selecting Information, the
Information pop-up window displays 4 tabs of information: Statistics, Alarm, Performance, and
Logs.
The Statistics tab provides the eNB’s Serial Number, MAC Address, UBoot Version, IP Address,
Software Version, and Kernel Version (Figure 4-37). The graph on the bottom of this window
presents the eNB’s active status vs inactive status across time.
Figure 4-37: Right-Click > Information > Statistics
When you select the Alarm tab, the window displays all alarms associated with this eNB
(Figure 4-38). The list of alarms identifies the alarm number, probable cause, status, event
time, and the last update time. For any alarm in the list, you can right-click to get more
details, or confirm or clear the alarm.
126
Figure 4-38: Right-Click > Information > Alarm
When you select the Performance tab, the window displays 6 key performance indicator
(KPI) graphs:
• KPI1: UL/DL Throughput (Figure 4-39) – A graph showing the uplink (red) and
downlink (black) data throughput rates for this eNB over the past “x” number of
hours per the date shown in the date field
• KPI2: UL/DL Utilization (Figure 4-40) – A graph showing the percentage of available
resource blocks used on the uplink (red) and downlink (black) during the past “x”
number of hours per the date shown in the date field
• KPI3: E-RAB* EstablishSuccessRate (Figure 4-41) – A graph showing the percentage
of time the eNB could be accessed successfully by subscribers attempting to connect
to the network.
• KPI4: E-RAB* EstablishFailRate (Figure 4-42) – A graph showing the percentage of
time the eNB could not be accessed successfully by subscribers attempting to
connect to the network
• KPI5: SuccInterEnbS1Rate (Figure 4-43) – A graph showing the percentage of
successful handoffs from this eNB to other eNBs
• KPI6: RRC EstablishDropRate (Figure 4-44) – A graph showing the percentage of
dropped sessions after the sessions had been established
*E-RAB is an LTE term that stands for E-UTRAN Radio Access Bearer.
Notice the 2 fields above the graphs, one called Time Granularity and one showing the date
(yyyy-mm-dd). You cannot change the time granularity as of this release; however, you can
change the date to go backward or forward in order to examine the eNB performance over
several days.
127
Figure 4-39: Right-Click > Information > Performance > KPI1: UL/DL Throughput
Figure 4-40: Right-Click > Information > Performance > KPI2: UL/DL Utilization
Figure 4-41: Right-Click > Information > Performance > KPI3: E-RAB EstablishSuccessRate
128
Figure 4-42: Right-Click > Information > Performance > KPI4: E-RAB EstablishFailRate
Figure 4-43: Right-Click > Information > Performance > KPI5: SuccInterEnbS1Rate
Figure 4-44: Right-Click > Information > Performance > KPI6: KPI6: RRC EstablishDropRate
129
When you select the Logs tab, you can view the device report log (Figure 4-45) and the
device exception log (Figure 4-46).
Figure 4-45: Right-Click > Information > Logs > Device Report Log
Figure 4-46: Right-Click > Information > Logs > Device Exception Log
4.4.2.1.2.2 Synchronize
When you right-click on an eNB listed in the Monitor window and select Synchronize, the OMC
refreshes the eNB status.
4.4.2.1.2.3 Settings
Right-click on an eNB in the Monitor list, and select Settings to bring up a configuration
window (Figure 4-47). You can configure any device that has been added under System >
Device Management using the Settings selection. The fields under each tab in Settings are
explained in this section.
130
Figure 4-47: Right-Click > Settings > Wireless tab
131
cells that share the same physical cell ID cannot be
geographically close to each other or they will interfere will
each other.
TAC Tracking Area Code (TAC) where the eNB is located. The TAC
is used to determine the range of the paging information.
The operator can use a number between 1 - 65,000. Default
is 1.
Band Indicator The eNB’s operating frequency band (hardware-specific)
Frequency (MHz) Select the eNB’s currently approved operating frequency
points (hardware-specific)
PB The index number which represents the difference of the RE
power between the symbol with RS and without RS. The
options are 0, 1, 2, or 3, which corresponds to the Physical
Random Access Channel (PRACH) configuration index
number to be used. Refer to Figure 4-39.
Bandwidth Determines the number of resource blocks (RB) to be used
in the frequency domain (in MHz) or the time domain (in
milliseconds).
132
Figure 4-48: Wireless Settings > PB Options
133
Figure 4-51: Wireless Settings > Special Sf Patterns Options
134
4.4.2.1.2.3.3 ICIC tab
Under Settings, the third tab is for Inter-Cell Interference Coordination (ICIC) (Figure 4-53). ICIC
is a type of interference mitigation. When enabled, ICIC applies restrictions to the radio
resource management (RRM) block, improving channel conditions across subscribers who may
be severely impacted by interference. ICIC thus enables higher spectral efficiency.
Figure 4-53: ICIC
135
Table 4-5: NTP Settings
4.4.2.1.2.4 Reboot
When you right-click on an eNB listed under eNB Monitor, if you select the Reboot option it
will ask if you are sure you want to take that action (Figure 4-55), as it will interrupt current
service to UEs. If you select OK, it will automatically reboot that eNB.
NOTE: If you need to reboot the eNB, we recommend that you collect logs on the
eNB before you reboot it. That data may be needed for troubleshooting.
4.4.2.1.2.5 Logs
When you right-click on an eNB listed under eNB Monitor, if you select the Logs option you
will get a pop-up window asking if you want to collect logs for this eNB (Figure 4-56). If you do,
click on OK.
136
Figure 4-56: Logs
4.4.2.1.2.6 CPEs
When you right-click on an eNB listed under eNB Monitor, if you select the CPEs option it brings
up the list of UEs connected to that eNB (Figure 4-57). For each UE you will see the serial
number, name, Media Access Control (MAC) address, and International Mobile Subscriber
Identity (IMSI) number.
Figure 4-57: CPEs
4.4.2.2 Strategy
The Strategy sub-menu under eNB (Figure 4-58) refers to software version control and how
you manage the eNB software code level. Baicells continually invests in software features and
functionality. Each version of code typically has new features, enhancements, or bug fixes;
therefore, in most cases you should keep the Baicells equipment at the highest available code
level. As of OMC version 3.2.2, you can also define a change task that will update the frequency
and Physical Cell Identifiers (PCI) for the UEs associated with up to 10 eNBs.
137
Figure 4-58: Strategy
Baicells notifies operators of newer software files via the OMC GUI, as well as through social
media and the Baicells website. Different versions of code are made available by Baicells
through the OMC portal under the eNB sub-menu called File Library.
Using the eNB > Strategy functions, you can define different software upgrade or rollback tasks,
e.g., one task per code level or per set of eNBs, and save the tasks in a task list. By defining
each code version or set of eNBs as a task, you can execute the task repeatedly as needed
across the network.
To define a new upgrade task, select + (add) in the upper right corner of the Upgrade Task
window. This will open a New Upgrade Task dialogue window (Figure 4-59).
138
Figure 4-59: New Upgrade Task
Enter a task name, and in the left eNBs pane search for the eNBs to be upgraded. Click on the
right arrow to “move” the eNBs into the Selected pane. Under Execute Type, you can
upgrade the selected eNBs immediately or schedule a time for the upgrade to occur. Once an
upgrade is scheduled, you can select Suspend if you need to suspend the upgrade activity. If
you wish to retain the new upgrade task you have defined, in the Retain Configuration field,
select “Yes”. Click on Next to select the correct software file to be used to upgrade the selected
eNBs (Figure 4-60).
Figure 4-60: Select Upgrade File
139
Once selected, when you click on Finish the OMC window presents the Task Results window
to display the status of the upgrade task (Figure 4-61). A software upgrade (or rollback) will
reboot the eNB automatically.
Due to the reboot action, most operators choose less busy network time periods to perform
software upgrade/rollback actions.
Figure 4-61: Task Results
If you need to downgrade the eNB software to a prior release of software code, in the Upgrade
Task window select Software Rollback from the Upgrade Task > Upgrade Type drop-down
menu (refer to Figures 4-59 and 4-60 previously shown). The procedure is the same as an
upgrade, except this time you would select the older version of code file. Sometimes, rolling
back to the previous release of code may be necessary when troubleshooting issues or to
restore equipment to a known, stable load.
Once an upgrade or rollback task is defined, you can use the fields under Operation to view,
make active/deactive, terminate, or delete a task (Figure 4-62). The difference between
terminate and delete is terminate will stop the task from occurring or progressing, whereas
delete will remove the task altogether from the task list.
Figure 4-62: Operation
140
4.4.2.2.2 Reboot
The eNB > Strategy > Reboot action (Figure 4-63) allows you to reboot the eNB. A software
reboot may be necessary sometimes to resolve operational issues. Since the reboot action
causes service disruption, most operators choose a window of time when there are fewer or
no users on the system to execute a reboot.
NOTE: If you need to reboot the eNB, we recommend that you collect logs on the
eNB before you reboot it. That data may be needed for troubleshooting.
To perform or schedule a reboot, use the same method as a software upgrade. Click on + (add)
to create a reboot task (Figure 4-64).
Figure 4-64: Create Reboot Task
Enter a task name, and in the left eNBs pane search for the eNB to reboot. Click on the right
arrow to “move” the eNB into the Selected pane. Under Execute Type, you can reboot
the selected eNB immediately or schedule a time for the reboot to occur. Once a reboot is
scheduled, you can select Suspend if you need to suspend the reboot activity.
141
Click on Next. You will receive a warning that the reboot action will disrupt eNB service, and it
will ask if you are sure you want to reboot it (Figure 4-65). Press OK to proceed. Once you
select OK, the window will display the Task Results in the same way it does for upgrade tasks
(refer to Figure 4-61 above).
Figure 4-65: Reboot Task Warning
As was true for upgrade and rollback tasks, once a reboot task is defined you can use the
options under Operation to view, activate, terminate, or delete a task (Figure 4-66).
Figure 4-66: Operation
142
Figure 4-67: Frequency & PCI
Looking at Figure 4-67, enter a task name for this task. At the bottom of the screen, you will
first you select the eNB(s) for which you want to change the frequency or PCI. To do this, select
the check box next to the eNB serial number.
Next, you can identify up to 10 UEs that are served by the eNB(s) to auto-change the PCI
locking configuration. To do this, enter the new frequency and new PCI information in their
respective fields, and slide the Modify the binding CPE button to the right (the slider will turn
green). You will do this for each UE.
Under Executed mode, select either Immediately or Schedule Time for the change to be
executed.
Any UEs that are offline during the execution of the task will not receive the change. You may
need to check the status of each one and possibly reinitiate the task to ensure all UEs
associated to the eNB(s) are updated.
143
Figure 4-68: File Library
4.4.3 CPE
When you expand the CPE menu in OMC, you will see 3 sub-menus: Monitor, Strategy, and File
Library. Refer to Figure 4-69. Each of these functions is explained in this section.
Figure 4-69: CPE Menu
4.4.3.1 Monitor
4.4.3.1.1 Monitor Window
The CPE > Monitor function presents status information about all UEs in the operator’s
network. You can enter a specific UE serial number, name, MAC address, or IMSI number, and
click on Search to find that UE and display its status. You can also export the data using the
arrow icon in the upper right section of the window.
The fields are shown in Figures 4-70 and 4-71, progressing from left to right using the scroll
bar. The fields are explained in Table 4-6.
144
Figure 4-70: CPE > Monitor (1 of 2)
145
PCI The currently serving eNB’s Physical Cell Identifier, or Layer 1
identity, which uniquely identifies each cell site in the
wireless network
History See Figure 4-72.
UL_MCS The currently serving eNB’s Modulation and Coding Scheme
(MCS) index value on the uplink. The value is based on
channel quality. If the value assigned reaches single digits,
you likely have channel quality problems.
DL_MCS The currently serving eNB’s Modulation and Coding Scheme
(MCS) index value on the downlink. The value is based on
channel quality. If the value assigned reaches single digits,
you likely have channel quality problems.
RSRP1 Reference Symbol Received Power (RSRP) is an LTE power
metric (dB) which provides information about signal
strength. RSRP is an average of the RF power in each
subcarrier. (There are 2 antenna cables from the eNB to the
RF antenna, with dual polarity. The system measures the
RSRP on each.)
RSRP2 Reference Symbol Received Power (RSRP) is an LTE power
metric (dB) which provides information about signal
strength. RSRP is an average of the RF power in each
subcarrier. (There are 2 antenna cables from the eNB to the
RF antenna, with dual polarity. The system measures the
RSRP on each.)
CINR1 Carrier-to-Interference-plus-Noise Ratio (CINR) is a
measurement (dB) of multiple subcarriers, which reflects the
signal quality of the LTE carrier system. (There are 2 antenna
cables from the eNB to the RF antenna, with dual polarity.
The system measures the CINR on each.)
CINR2 Carrier-to-Interference-plus-Noise Ratio (CINR) is a
measurement (dB) of multiple subcarriers, which reflects the
signal quality of the LTE carrier system. (There are 2 antenna
cables from the eNB to the RF antenna, with dual polarity.
The system measures the CINR on each.)
SINR Signal-to-Interference-plus-Noise-Ratio (SINR), also known
as the carrier-to-interference ratio (CIR or C/I), is a quantity
(dB) used to give theoretical upper bounds on channel
capacity. SINR is calculated based on the power of a certain
signal of interest divided by the sum of the interference
power from all the other interfering signals and background
noise.
DL Throughput (Mbps) The current downlink data rate from eNB to UE - in Megabits
per second (Mbps)
UL Throughput (Mbps) The current uplink data rate from UE to eNB - in Megabits
146
per second (Mbps)
Uptime(h) Number of hours the UE has been powered on
Last Connection Time The last time the UE was connected to the OMC/CloudCore
Serial Number The UE unit’s serial number
IP Address The UE’s current IP address
MAC Address The UE unit’s MAC address
Cell ID The cell ID of the currently serving eNB for this UE
Module IDU for indoor unit or ODU for outdoor unit
Model Name The specific UE hardware model
Software Version The current version of software loaded on this UE
Tx Power Current UE transmit power, in dBm
MCC Mobile Country Code - used to uniquely identify the
operator of a telecommunications network. MCC + MNC =
PLMN.
MNC Mobile Network Code - uniquely identifies a mobile network
operator (carrier) using the GSM (including GSM-R), UMTS,
and LTE public land mobile networks. MCC + MNC = PLMN.
Device Group The configured UE device group to which this UE belongs
If you click on the graph icon in the History column (Figure 4-72) for a particular UE, it will bring
up numerous fields of data about the UE’s performance. Scroll down to see all of the fields.
The meaning of the fields were explained above in Table 4-7, CPE > Monitor.
Figure 4-72: CPE History
147
4.4.3.1.2 Right-Click Actions
When you right-click on any UE listed in the Monitor window, you will get a drop-down menu
that allows you to select Information, Settings, Synchronize, Frequency Lock, or Reboot (Figure
4-73). Each of these items is explained in this section.
Figure 4-73: Right-Click Actions
4.4.3.1.2.1 Information
By right-clicking on a UE listed in the Monitor window and selecting Information, the
Information pop-up window displays the serial number, the International Mobile Subscriber
Identity (IMSI) number, the transmit (Tx) power, the Mobile Country Code (MCC), and the
Mobile Network Code (MNC) for the UE (Figure 4-74). Click on OK to exit the window.
Figure 4-74: Information
4.4.3.1.2.2 Settings
Right-click on a UE in the Monitor list, and select Settings to bring up a configuration window
(Figure 4-75). You can give the UE a name, and you can enable remote access to the UE by
checking the check box next to Https Login. Enabling this allows a technician to get into a user’s
Web GUI from the internet.
148
Figure 4-75: Settings
4.4.3.1.2.3 Synchronize
When you right-click on a UE in the Monitor list and select Synchronize, the OMC refreshes the
UE data that is displayed.
4.4.3.1.2.4 Frequency Lock
Right-clicking on a UE and then selecting Frequency Lock allows you to change the Scan Mode.
Current options are Full Band or PCI lock (Figure 4-76). Full band enables the UE to operate on
any frequency within the designated frequency band. PCI lock, referring to a cell’s Physical Cell
Identifier, specifies to which cell the UE must connect.
If you select PCI lock, the system will display the current E-UTRA Absolute Radio Frequency
Channel Number (EARFCN) and PCI to which the UE is connected, and then allow you to change
these parameters (Figure 4-76). Using PCI lock allows the operator to “force” a UE to connect
within a specific cell and use a specific channel number. This may be necessary to avoid the UE
from connecting to undesirable eNBs.
Figure 4-76: Frequency Lock
149
4.4.3.1.2.5 Reboot
To reboot a UE via the GUI, right-click on the UE in the Monitor window and select Reboot. A
software reboot is sometimes necessary when troubleshooting UE issues.
4.4.3.2 Strategy
The term “strategy” here refers to software version control and how you manage the UE
software code level. Baicells continually invests in software features and functionality. Each
version of code typically has new features, enhancements, or bug fixes; therefore, in most
cases you should keep the Baicells equipment at the highest available code level. The strategy
sub-menus are shown in Figure 4-77.
Figure 4-77: Strategy
Baicells notifies operators of newer software files via the OMC GUI, as well as through social
media and the Baicells website. Different versions of code are made available by Baicells
through the OMC portal under the CPE sub-menu called File Library.
Using the CPE > Strategy functions, you can define different software upgrade tasks, e.g., one
task per code level or per set of UEs, and save the tasks in a task list. By defining each code
version or set of UEs as a task, you can execute the task repeatedly as needed across the
network.
The steps for defining a CPE upgrade task follow the same format as described for eNBs in
section 4.4.2.2.1. To create a new upgrade task, click on the + Add icon and select an upgrade
type. The choices are ODU Software Upgrade (for outdoor UEs) or IDU Software Upgrade (for
indoor UEs). The New Upgrade Task dialogue window will open (Figure 4-78).
150
Figure 4-78: New Upgrade Task
Enter a task name, and in the left CPEs pane search for the UEs to be upgraded. Click on the
right arrow to “move” the UEs into the Selected pane. Under Execute Type, you can
upgrade the selected UEs immediately or schedule a time for the upgrade to occur. Once an
upgrade is scheduled, you can select Suspend if you need to suspend the upgrade activity. If
you wish to retain the new upgrade task you have defined, in the Retain Configuration field,
select “Yes”.
Click on Next to select the correct software file to be used to upgrade the selected UEs. Once
selected, when you click on Finish the OMC window presents the Task Results window to
display the status of the upgrade task. A software upgrade will reboot the UE automatically.
Due to the reboot action, most operators choose less busy network time periods to perform
software upgrade/rollback actions.
151
Once an upgrade task is defined, you can use the fields under Operation to view, make active,
terminate, or delete a task (Figure 4-79). The difference between terminate and delete is
terminate will stop the task from occurring or progressing, whereas delete will remove the
task altogether from the task list.
Figure 4-79: Operation
The reboot action for a UE is also the same procedure as for an eNB (refer to section 4.4.2.2.2
and see Figure 4-80 below).
Figure 4-80: Reboot
152
Figure 4-81: File Library
4.4.4 Alarm
The next menu item in the OMC is the Alarm section (Figure 4-82). The purpose of the Alarm
function is to observe active (unresolved) warnings regarding eNB operation, as well as review
historical alarm messages, customize the display, and set up notification messages.
Figure 4-82: Alarm Menu
Alarms are categorized into 4 classes: Critical, Major, Minor, and Warning. The upper right part
of the screen shown in Figure 4-82 displays the number of system alarms present in each
category.
Critical alarms are incidents that can cause system outages, and should be attended to
immediately. Major alarms are incidents that can cause poor or degrading quality of service
for subscribers, and therefore should be addressed as soon as possible. Minor alarms indicate
a possible issue that needs to be investigated but will not disrupt service. Warnings are used
to indicate errors that probably need to be corrected or at least monitored, but may not
require any action.
153
4.4.4.1 Query
When you select Alarm > Query, the window on the right defaults to the list of active alarms.
Notice the search and export icons (Figure 4-83). Use the query (search) bar to enter the serial
number of a specific eNB, or use advanced query to find alarms based on severity, alarm
identifier, event type, probable cause, or event window of time (start and end). The advanced
search window is shown in Figure 4-84.
Figure 4-83: Active Alarms
If you right-click on an alarm shown in the list, you will be given 3 options: Detail, Alarm
Confirm, and Clear Alarm (Figure 4-85).
154
Figure 4-85: Right-Click on an Alarm
Selecting Detail will display information about the specific alarm (Figure 4-86). The information
is explained in Table 4-7.
Figure 4-86: Alarm Detail
155
Alarm Identifier Alarm number that identifies the type of alarm
Network Element Type Type of entity incurring the alarm, e.g., OMC, eNB, UE
Network Element Provides more detail about which device reported the alarm,
Positioning such as the eNB serial number or name
Event Type Alarm classification – either communications, QoS,
processing error, equipment, or environmental
Alarm Status Current state of the alarm – confirmed and active, confirmed
and inactive, unconfirmed and active, unconfirmed and
inactive
Event Time Date and time when the alarm occurred
Confirmed User Indicates if the alarm was confirmed (acknowledged) by an
OMC administrator
Confirmed Time Indicates the time at which the alarm was confirmed
(acknowledged) by an OMC administrator
Update Time Last time the alarm status was updated
Probable Cause Reason alarm probably occurred – for example, clock source
synchronization, network problems, GPS unavailable, etc.
Specific Problem Further detail about why the alarm may have occurred –
information varies per alarm
Suggestion Actions you may need to take to resolve the alarm –
suggestions vary per alarm
Selecting Alarm Confirm acknowledges you have seen the alarm. Doing this lets other OMC
administrators know that the problem has been seen and is, hopefully, in the process of being
resolved. You can add a description or notes about the alarm. Click on Confirm to save the
information. Refer to Figure 4-87.
Figure 4-87: Alarm Confirm
156
To clear an alarm that has been resolved and remove it from the alarm list, right-click on the
alarm in the list and select Clear Alarm. You will be prompted to confirm you want to take this
action (Figure 4-88). If you select OK, the selected alarm will disappear immediately from the
active list.
Figure 4-88: Clear Alarm
Once cleared, an active alarm becomes an historical alarm. Looking at the History Alarm tab,
you have the same regular and advanced query capabilities as for Active Alarm. When you
right-click on a history alarm, you can still select Detail and Alarm Confirm, but notice two new
options: Restore alarm and Delete Alarm (Figure 4-89).
Figure 4-89: History Alarm
If you select Restore alarm, the system will immediately remove the alarm from the history list
and put the alarm in the active alarm list. If you want to remove the alarm permanently from
either list, when you right-click on the history alarm select Delete Alarm.
4.4.4.2 Settings
The alarm settings allow you to view and customize the display of a list of all alarms, with the
option to export the data to a file. It is in this section that you can also set up notifications for
alarm occurrences. These functions are explained in this section.
4.4.4.2.1 Library
Clicking on Alarm > Library displays a list of all alarms that have occurred in the system (Figure
4-90). Using the adaptive display feature, you can sort the list in ascending or descending order
by the alarm identifier or by severity level. To record or further manipulate usage of the data,
you can select the export icon to send the data to a file.
157
Figure 4-90: Library
4.4.4.2.2 Notification
The Alarm > Notice function allows you to set up automatic notification emails based on the
alarm severity level that you select. To enable this feature, slide the Enable bar to the right
(Figure 4-91). Enter the email address(es) to which the notification is to be sent; use a semi-
colon (;) to separate each email address. Notifications will be sent every 10 minutes to the
email addresses specified.
Next, choose the alarm severity level(s) for which you want to be notified by clicking on the
check box next to the alarm level. Click on the Save button to save the notifications
configuration.
Figure 4-91: Notification
158
4.4.5 System
The OMC System menu includes device management for both eNBs and UEs; user
management of individual users and user groups; and log management (Figure 4-92). It is
under these System functions that you can add eNBs and UEs to the network.
Optionally, you can create device groups for eNBs and UEs, or user groups for users, when
multiple devices or users share the same configuration settings or to simply make it easier to
manage multiple devices or users, e.g., based on location, service level, and so forth. Each
System sub-menu is explained in this section.
Figure 4-92: System Menu
159
In the list of device groups, you can use the eye icon under Operation to see more information
about a specific group. An example is shown in Figure 4-94.
Figure 4-94: View Device Group Information
Use the pencil icon under Operation to modify a device group (Figure 4-95).
Figure 4-95: Modify Device Group
You can delete a device group using the trash can icon under Operation. The system will
prompt you to be sure before you delete the group. Taking this action will result in the users
assigned to that group being moved to the default group. Click on OK to continue the action.
Refer to Figure 4-96.
160
Figure 4-96: Delete Device Group
In the list of eNBs or UEs, you have the option to delete a device by selecting the trash can
icon under Operation. The system will prompt you to be sure you want to continue the delete
action (Figure 4-97). If you do, select OK.
Figure 4-97: Delete eNB or CPE
In the upper right corner of the Device Management window, you will see a + icon to add
devices and an import icon to import device configuration data. Refer to Figure 4-98.
161
Figure 4-98: Add Device Icon and Import Device Configuration Icon
Using the + add icon, you will be prompted to enter the device’s serial number and click on
Add. After you enter the serial number and press OK, the Device Management window will
now include that new device in the list on the right. Using the import function, you will be
asked to identify the file path to the file to be uploaded. Click OK after you have selected the
file. Refer to Figure 4-99.
Figure 4-99: Add Device or Import Device Configuration
Unless the device is added to a device group that you have defined, the new device will be
placed automatically in the Default Device Group.
To create a device group, in the left pane called Device Group, click on + add (Figure 4-100).
Enter a group name and description, and then click on OK.
Figure 4-100: Add Device Group
162
Once the device group has been created, you can select the check box next to each device in
the list on the right, and then select Move to Device Group (Figure 4-101). Select the device
group name that you want to move the device to, and then click on OK (Figure 4-102).
Figure 4-101: Move to Device Group
The page is organized like the Device Management page, where the list of administrative user
groups appears on the left and the list of individual administrative users appears on the right.
You will see the user name, the user group to which the user is assigned, current status (e.g.,
active or inactive), a description, and the last login time (Figure 4-103).
Figure 4-103: System User Management
163
4.4.5.2.1 Modify System User Group
To modify an existing system user group, click on the pen icon under Operation. This will open
a dialogue box with 3 tabs: Menu, Operation, and Device Group. See Figure 4-104.
Figure 4-104: Modify User Group > Menu tab
The Menu tab allows you to select the OMC functions that you want users in that group to
have access to. Click on OK to save the configuration.
Under the Operation tab (Figure 4-105), for all users in the user group you can select Reboot
to reboot the UEs, select Factory Reset to reset the UEs to the original settings they had from
the manufacturer, or select Delete to delete the UEs. Click on OK to save the configuration.
164
The Device Group tab allows you to change the user group name or description for the selected
user group (Figure 4-106), and to associate the user group with a device group.
Figure 4-106: Modify User Group > Device Group tab
165
4.4.5.2.3 Delete System User Group
Use the trash can icon under Operation to delete an existing system user group. The system
will prompt you to be sure before you take this action.
166
Figure 4-109: OMC Operation Logs
You can use the query or advanced query to sort the list of logs by operation name, operator
(if you manage more than one account), administrative user name, operate [operator] IP,
record details, start time, or end time (Figure 4-110). The query functions are similar across
the log categories.
Figure 4-110: OMC Operation Logs
The OMC operation logs are very useful for determining which users have been using the
operator’s OMC account, what actions they took, and so forth. The adaptive display of the logs
enables you to toggle the columns in order to customize your view. For instance, toggling on
Operation Name sorts the list alphabetically in either ascending or descending order. Toggling
on Record Detail sorts the list by date and time in either ascending or descending order.
When you click on the Security tab at the top, you will see a list of OMC events related to OMC
system security (Figure 4-111).
167
Figure 4-111: OMC Security Logs
Clicking on the System Log tab displays logs pertaining to the Baicells network devices (Figure
4-112). Use the query function to find a specific device.
Figure 4-112: OMC System Logs
168
Figure 4-113: Device Logs
The Device Report Log is for collecting periodic log reports from eNBs. The Device Exception
Log will report when an eNB crashes or something else causes it to reboot.
4.4.6 Help
The Help > About menu displays the software version number and name (Figure 4-114). In a
future CloudCore release, this Baicells Configuration and Network Administration Guide will
be a pdf download option from the Help menu.
Figure 4-114: Help
169
4.5 BOSS
4.5.1 Overview
Individual users (subscribers) are added to the network using the Baicells Business and
Operation Support System (BOSS). Sometimes referred to as BaiBOSS, this application is part
of the CloudCore suite of applications for managing the network.
The subscriber information configured in BOSS is used for multiple purposes. First, operators
can connect BOSS to their billing systems to manage subscriber accounts, and second, BOSS
information is available to the OMC for easier network management. The Baicells BOSS is
comprised of 3 parts: BOSS server, BOSS client, and a database. Figure 4-115 illustrates a
typical network architecture with BOSS components.
Figure 4-115: BOSS Network Architecture
In CloudCore, when you click on the BOSS tab you will see a menu in the left navigation pane
(Figure 4-116). This section will explain the functions for each of the menu items.
Figure 4-116: BOSS Menu
170
4.5.2 Subscriber
The BOSS Subscriber function is where you can view, modify, or delete any existing subscribers
and where you will add new subscribers to your network. Clicking on the Subscriber menu
brings up a list of existing active subscribers (Figure 4-117).
Figure 4-117: Subscriber
Use the Query button to display only the SIM cards you wish to view or change. You can filter
the list by SIM code, subscriber name, status (Figure 4-118), etc.
Figure 4-118: Query
When planning to add a new subscriber, you will need two special pieces of information that
must be pre-configured: the SIM code for the card the user inserts in the UE, and the service
plan for the subscriber. The SIM cards are identified to the system under BOSS > Network,
covered later in this section. The service plans are created under BOSS > System > Service Plans,
also covered later in this section. You will need to add the SIM cards and define the service
plans prior to adding a new subscriber. Additionally, we recommend that you review those
sections and gather the required information before you begin using BOSS to add new
subscribers in the system.
To add a new subscriber, click on the New button. This will bring up a New Subscriber dialogue
window, as shown in Figure 4-119. The fields highlighted in red are mandatory fields; also, you
must enter an email address for the subscriber to receive invoices. For the SIM Card field, click
on the magnifying glass icon to search for the correct SIM card number (Figure 4-120). When
you find the SIM card number, highlight the row and click on Select. The SIM Card field will
then be populated with the subscriber’s SIM code.
171
Figure 4-119: Add New Subscriber
For the Service Plan, you will use the magnifying glass to bring up a list of available plans
defined under System > Service Plans and select the service level the user wishes to subscribe
to (Figure 4-121). Many operators offer different service level packages at different rates. A
subscriber’s service can be changed only one time per month. How to add service plans is
covered in section 4.5.4.1.
Figure 4-121: Service Plan Selection
Once you complete the new subscriber information, click on Save to save the configuration.
You will see the new subscriber information in the list under the Subscriber tab (Figure 4-122).
However, initially the subscriber will be in suspended status. When you are satisfied that the
subscriber’s information is correct, find the subscriber in the list and select Active under the
Operation field. The system will ask you to confirm the operation. Click on OK to activate the
subscriber. The subscriber should now be able to access the operator’s network.
172
To edit a subscriber’s information, highlight the subscriber in the subscriber list, and then
select Detail under the Operation column (Figure 4-122). This will bring up most of the
subscriber’s detailed information. The subscriber detail window has 2 sub-menus, Overview
and Service. While in the Overview sub-menu, click on Edit to open fields where you can make
general changes. Clicking on the Edit button changes the button to a Save button. When
finished making the changes, click on Save.
Figure 4-122: Subscriber Detail - Overview
To change the subscriber’s service plan or SIM card number, click on the Service sub-menu on
the left under Subscriber (Figure 4-123). If the service plan type is “free”, it can be modified to
any type of service plan. If the type is “pre-pay” or “invoice”, it can only be modified to the
same type of service plan. Select the Change button, make the changes, and select Save to
retain the changes.
Figure 4-123: Subscriber Detail – Service
173
After a service plan is modified, BaiBOSS will calculate the balance of the previous service plan
automatically according to the service plan type:
• Data Plan – After the data plan is changed, the bill is created at once. The amount of
the bill will include the balance of the previous service plan and the amount of the
new service plan. Data Plan is not activated in the software as of this release.
• Time Plan – After the time plan is changed, the bill will be created on the first day of
the second month. The amount of the bill will include the balance of the previous
service plan and the amount of the second month of the new plan.
Notice that you can also delete the subscriber using the Delete button under the Operation
field. As with the Active operation, using the Delete operation will bring up a confirmation
window. When you delete a subscriber record, it is maintained in the Archive list. Click on OK
to save the configuration.
To see a list of subscribers that have been deleted (archived), select the Archive tab at the top
left of the Subscriber list window. You can run a query to locate a subscriber, reset subscriber
information, and restore a subscriber to active status. Refer to Figure 4-124.
Figure 4-124: Archived Subscribers
To restore a subscriber whose account was archived, in the Subscriber > Archive list use the
Restore button under Operation (Figure 4-125).
Figure 4-125: Restore Archived Subscriber
4.5.3 Network
The Network menu under BOSS is where you will define and manage SIM card information
(Figure 4-126). Typically, the Baicells super administrator will import the SIM card information
into BOSS, send the operator an activation code, and then the operator’s administrator can
import the information into their BOSS account. It is this list of SIM cards that you search on
when adding a new subscriber or editing an existing subscriber’s SIM information.
174
Figure 4-126: Network Menu
The BaiBOSS system provides two ways for the administrator to import the operator’s SIM
cards. One is to activate the SIM cards using the activation code provided by Baicells. The other
is to import the SIM card information using an Excel template.
To activate SIM cards using the Baicells activation code, follow the steps below.
1. In the SIM Card list window, select the Import tab as shown in Figure 4-128.
Figure 4-128: Import
2. Click on the Import SIM Card button to open a dialogue box (Figure 4-129).
175
Figure 4-129: Import SIM Card Dialogue
3. For Activate Code, input the activation code and click on Import. One activation code
supports up to 100 SIM cards.
4. To view the list of SIM cards that correspond to the activation code, in the SIM Card
list click on Detail.
The other method for importing SIM cards is to import the SIM information using an Excel
template. In Network > SIM Card, click on the Import sub-menu at the top of the window, and
then select the File sub-menu. Click on the Download Template button to save the Excel file
format for entering the SIM card information (Figure 4-130).
Figure 4-130: Download Template
In the Excel file you will enter the IMSI of the SIM cards to be imported. After you complete
and save the file, back in the Import > File dialogue box click on the pen icon next to the File
field and navigate to the file with the SIM card information (Figure 4-131). When you have
found the file, select the Import button.
NOTE: If an operator attempts to import SIM cards that do not belong to them, the
system will auto-generate an audit request to the Baicells super administrator.
176
Figure 4-131: Import SIM Card File
Once the SIM information, specifically the IMSI, is imported or assigned, when the UE is
installed and powered on it will trigger the automatic UE registration in the operator’s OMC
account. This is part of the CloudKey activation process described in Appendix D.
177
4.5.4 System
The BOSS System menu (Figure 4-133) enables you to define subscriber service plans and to
look at logging events for each subscriber (e.g., password resets, service plan changes, etc.).
Figure 4-133: System Menu
BaiBOSS allows subscriber payment through cash or online bill payment. If payment is by cash,
the operator’s administrator can input in BOSS the amount of cash paid.
178
When you select System > Service Plans the list of existing service plans defaults to service
plans that are in use. Service plans can be in one of three states, and you can filter the list by
using the Status pull-down menu, as shown in Figure 4-135. Select Disabled for a list of service
plans that have been defined but disabled. Select In Use for a list of service plans currently in
use (assigned to active users). Select Ready for a list of service plans that have been defined
but not yet enabled. After making your selection, click on Query to refresh the list.
Figure 4-135: Filter List of Service Plans
To add a new service plan, select the Add Service Plan button to open the dialogue window
(Figure 4-136). Even once you save the new service plan, it will not be enabled for use to assign
to subscribers until you select Enable (shown in Figure 4-137).
Figure 4-136: Add Service Plan
179
Figure 4-137: Enable Service Plan
Each new service plan that you configure is automatically assigned a code number in the
system. Currently, the service plan period covers one month, as most operators bill subscribers
on a monthly basis. You must complete the Add New Subscriber fields highlighted in red.
Assign a unique name to this service plan in the Name field. The UL Rate Limit (M) equates to
the bandwidth that subscribers with this service plan will receive when uploading data to the
network, e.g., 5 Mbps or 10 Mbps. The DL Rate Limit (M) equates to the bandwidth that
subscribers with this service plan will receive when downloading data from the network.
Typically, users will download data more often than upload data, and for that reason the DL
Rate Limit may be a higher bandwidth, e.g., 25 Mbps or 35 Mbps. The maximum UL and DL
limits are determined by several factors, including which equipment models are used.
Enter the UL and DL Rate Limit based on Mbps. The entry supports up to 3 decimal points (e.g,
0.001 Mbps for UL Rate Limit means the user would get a maximum of 125 bps on the uplink).
The Based field uses the default time plan in this version of software. The Period field choice
in this release is 1month only. Enter the dollar amount in the Amount ($) field indicating the
amount of money you wish to charge subscribers associated with this plan. You have the
option to add further information under the Notes field. Click on Save to save the information.
The new service plan will appear in the Service Plans list.
Under the Operation field in the list of plans are 3 choices: Enable/Disable, Delete, and Edit.
Select Enable to enable the new service plan so that you can assign subscribers to it. If you
wish to temporarily disable a service plan, highlight the row for the target plan and click on
Disable. The system will return a confirmation window, and the plan will be suspended until
you enable it again. Use Delete if you want to completely delete the plan. When this action is
taken, subscribers assigned to this service plan will be moved to the default service plan.
To edit details of an existing service plan, highlight the row for the target plan and click on Edit.
This will bring up the same dialogue window as when you first created the plan. Enter your
changes, and then select Save to save the revised plan.
180
4.5.4.2 Logs
The event logs under BOSS > System > Logs display information about any action in BOSS that
was taken for a given subscriber or service plan. You can query for a subscriber’s records using
their name, SIM code, and so forth. The system will list details about any actions taken
concerning a subscriber; for instance, if you change a subscriber’s service plan, the event log
reflects details about the action, such as old and new service plan names, and date and time
of the change. Refer to Figure 4-138.
Figure 4-138: Logs
You can filter and run a query to sort the list of logs based on name, SIM code, or time period.
You can also filter the list based on type of activity you need to see. To do this, use the Service
Processing pull-down menu (Figure 4-139). The choices are SIM Changes, Active users, New
users, Service Changes, Deletions, and Deactivated users. After making your selection, click on
Query.
Figure 4-139: Service Processing Filter List Options
4.5.5 Help
When you click on Help > About, the system displays the BOSS software version level (Figure
4-140). In a future CloudCore release, the Help menu will include this document.
Figure 4-140: Help
181
Appendix A: MML Commands
Man-Machine Language (MML) refers to the commands that the administrator enters to “talk”
to and manage the system. The MML commands used with Baicells systems are defined in the
format shown in the table below.
Note: When importing MML scripts, the instructions need to be separated line by line and
stored in .txt format.
182
Appendix B: Abbreviations and Acronyms
Acronyms related to the Baicells network or that are used in this document are listed in
alphabetical order and described in the table below.
183
AMBR Aggregate Maximum Bit AMBR is the maximum possible bit rate configured
Rate by the LTE operator for a particular LTE user.
AMC Adaptive Modulation AMC is used to denote the matching of the
and Coding modulation, coding, and other signal and protocol
parameters to the conditions on the radio link.
AN Access Network AN is the part of a telecommunications network that
connects subscribers to their immediate service
provider.
ANR Automatic Neighbor ANR is a third-generation (3G) telecommunications
Relation specification for automating the identification of an
eNB’s neighboring cells regardless of which Universal
Mobile Telecommunications System (UMTS)
technology those eNBs are running. Having ANR
capabilities relieves the operators of having to
manually provision each neighbor cell.
APN Access Point Name An access point (AP) is an eNB gateway between a
Global System for Mobile Communications (GSM),
General Packet Radio Service (GPRS), third-
generation (3G) or fourth-generation (4G) mobile
network, and another computer network, frequently
the public internet. An AP name (APN) is an
identifier for a specific AP/eNB.
ARP Address Resolution ARP is a telecommunication protocol used for
Protocol resolution of internet layer addresses into link layer
addresses, a critical function in multiple-access
networks.
ARP Allocation and Priority level assigned to bearer traffic. In a mobile
Retention Priority network, ARP decides whether to accept a request
to establish a bearer or reject the request when
resources are limited.
ARQ Automatic ARQ is an error-control method for data transmission
Repeat reQuest that uses acknowledgements and timeouts to
achieve reliable data transmission over an unreliable
service.
AS Access Stratum The AS is a functional layer in the Universal Mobile
Telecommunications System (UMTS) and LTE
wireless telecom protocol stacks between radio
network and user equipment.
AS Application Server An AS is a component-based product that resides in
the middle tier of a server-centric architecture. It
provides middleware services for security and state
maintenance, along with data access and
persistence.
184
BCCH Broadcast Control BCCH is a logical broadcast channel used by the eNB
Channel in a Global System for Mobile Communications
(GSM) network to send information about the
identity of the network. This information is used by a
mobile station to get access to the network.
BCH Broadcast Channel A BCH is a downlink channel in a Global System for
Mobile Communications (GSM) that is used by the
eNBs to provide signaling information to the mobile
stations.
BER Bit Error Rate A BER is the percentage of bits that have errors
relative to the total number of bits received in a
transmission, usually expressed as ten to a negative
power.
BLER Block Error Rate BLER is used in LTE/4G technology to identify the in-
sync or out-of-sync status during radio link
monitoring.
BOSS Business Operations BOSS is a Baicells CloudCore application that enables
Support System operator administrators to add, modify, and delete
subscriber information and service plans.
Administrators also use BOSS to activate each
Subscriber Identification Module (SIM) card, a chip
that the end-user inserts in the UE to uniquely
identify that subscriber and UE.
BPSK Binary Phase Shift BPSK is a digital modulation scheme that conveys
Keying data by changing, or modulating, two distinct phases
of a reference signal (the carrier wave).
BW Bandwidth BW refers to the range of frequencies within a given
band used for transmitting a signal.
CBRS Citizens Broadband CBRS is a somewhat new shared spectrum scheme
Radio Service that was introduced in the US at 3.5 GHz. It is
especially well suited for in-building small cells. CBRS
could result in improved LTE services from service
providers, as well as enable enterprises to build their
own private LTE networks.
C-RNTI Cell Radio Network C-RNTI is a unique temporary identification used for
Temporary Identity identifying Radio Resource Control (RRC) connection
and scheduling dedicated to a particular subscriber.
CDMA Code Division Multiple CDMA is a wireless technology where several
Access transmitters can send information simultaneously
over a single communication channel.
CE Customer Edge The CE is the router at the customer’s premises that
is connected to the edge of a service provider’s
Internet Protocol (IP) / Multiprotocol Label Switching
185
(MPLS) network. MPLS is a type of data-carrying
technique for high performance telecommunications
networks.
CFI Channel Format In LTE, the CFI value defines the time span, in
Indicator Orthogonal Frequency Division Multiplexing (OFDM)
symbols, of the physical downlink control channel
transmission (the control region) for a downlink
subframe.
CG Charging Gateway An open system that formats and integrates charging
data records between standard and non-standard
systems
CINR Carrier-to-Interference- CINR is a measurement of multiple subcarriers; it
plus-Noise Ratio reflects the signal quality of the LTE carrier system.
CN Core Network A CN is the central part of a telecommunications
network that provides various services to customers
who are connected through the access network.
CoA Care-of Address The CoA identifies a mobile node’s current point of
attachment to the internet and makes it possible to
connect from a different location without changing
the device’s home address.
CP Cyclic Prefix CP refers to the prefixing of a symbol with a
repetition of the end. As a guard interval, it
eliminates the inter-symbol interference from the
previous symbol.
CPE Customer Premise CPE, also called User Equipment (UE), is the
Equipment equipment used by a network subscriber to connect
to the backhaul carrier network through the access
network.
CQI Channel Quality The CQI is an indicator which carries the information
Indicator on how good or bad the communication channel
quality is.
CRC Cyclic Redundancy CRC is an error-detecting code commonly used in
Check digital networks and storage devices to detect
accidental changes to raw data.
CS Circuit-Switched CS is a type of network in which a physical path is
obtained for and dedicated to a single connection
between two end-points in the network for the
duration of the connection.
CSCF Call Session Control The CSCF is responsible for the signaling that
Function controls the communication of Instant Messaging
Service (IMS) user equipment with IMS enhanced
services across different network accesses and
domains.
186
CS-CN Circuit Switched Core In a CS-CN, the bit delay is constant during a
Network connection. No circuit can be degraded by
competing users because it is protected from use by
other users until the circuit is released and a new
connection is set up.
CSI Channel State CSI refers to known channel properties of a
Information communications link. The information describes how
a signal propagates from the transmitter to the
receiver.
DCCH Dedicated Control The DCCH is a single timeslot on a radio frequency
Channel (RF) carrier that is used to convey eight stand-alone
dedicated control channels.
DCI Downlink Control In LTE, DCI is based upon a process defined as a blind
Information decoding which depends on several decoding
attempts on several Physical Downlink Control
Channels (PDCCH) candidate locations for several
defined DCI formats.
DFT Discrete Fourier The DFT converts a finite sequence of equally-spaced
Transform samples of a radio signal into an equivalent length
sequence of equally-spaced samples of the discrete-
time Fourier transform (DTFT), which is a complex-
valued function of frequency.
DHCP Dynamic Host DHCP is a network protocol that enables a server to
Configuration Protocol assign an IP address automatically to a computer
from a defined range of numbers configured for a
given network.
DL Downlink DL is the direction of traffic flow from the eNB
transmitting to one or more subscribers. Uplink (UL)
is the opposite direction, traffic flowing from the
subscriber’s customer premise or user equipment to
the eNB.
DL-SCH Downlink Shared The DL-SCH is the main data bearing channel, which
Channel is allocated to users on a dynamic and opportunistic
basis.
DNS Domain Name System A directory of internet domain names that are
translated into IP addresses
DRA Dynamic Resource DRA is an essential technique to exploit the time-
Allocation space-frequency variation in wireless channels by
distributing precious radio resources, such as
spectrum and power, either to maximize or minimize
the network performance metrics.
DRX Discontinuous DRX is a method used in communications to
Reception conserve energy use. The user equipment and the
187
network negotiate phases in which data transfer
occurs. At other times the device enters a low power
state.
DS Direct Spread DS systems transmit the message bearing signals
using a bandwidth that is more than the bandwidth
that is needed by the message signal.
DSCP Differentiated Service DSCP is a field in an IP packet that enables various
Code Point levels of service to be assigned to network traffic.
This is achieved by marking each packet on the
network with a DSCP code and appropriating to it
the corresponding level of service.
DTCH Dedicated Traffic A DTCH is an uplink or downlink
Channel communication channel that is only accessible by
one device to transfer user data.
DTX Discontinuous DTX is a method of momentarily powering
Transmission down a wireless device when there is no data
throughput.
EARFCN E-UTRA Absolute Radio A unique number given to each radio channel in
Frequency Channel Global System for Mobile (GSM) communications.
Number The EARFCN is used to calculate the exact frequency
of the radio channel.
ECM Evolved Packet System ECM is the process of identifying, setting up,
(EPS) Connection controlling, and removing a transmission path
Management between two or more points in the Universal Mobile
Telecommunications System (UMTS) evolved packet
system.
EIRP Effective Isotropic EIRP is the product of transmitter power and
Radiated Power antenna gain in a certain direction relative to an
isotropic antenna. You could use the EIRP value, for
example, to determine if the radio is within
regulatory values.
EMM Enterprise Mobility EMM refers to the people, processes, and
Management technology focused on managing devices, wireless
networks, and other computing services in a
business context.
eNB E-UTRAN Node B In LTE, the eNB is a base station that manages radio
resources and mobility in the cell and sector to
optimize all the user communications in a flat radio
network structure.
EPC Evolved Packet Core EPC is a framework for providing converged voice
and data on a fourth-generation (4G) LTE network.
EPC-U Evolved Packet Core As part of the 3GPP Standard Release 8, the user
(EPC) User Plane data (user plane) is separated from the signaling
188
(control plane). EPC-U refers to the user plane.
EPS Evolved Packet System EPS, also called Evolved Packet Core (EPC), is the
central network portion of the Universal Mobile
Telecommunications System (UMTS) LTE mobile
communication system. The packet system primarily
transfers packet data between edge networks and
the radio access network (RAN).
E-RAB E-UTRAN Radio Access The concatenation of an S1 bearer and the
Bearer corresponding radio bearer. E-RAB transports the
packets of an EPS bearer between a UE and the EPC,
and allows the UE to be tracked as it moves.
ESP Encapsulating Security ESP is a protocol within the Internet Protocol
Payload Security (IPSec) standard for providing
authentication, integrity, and confidentiality of
network packet data in IPv4 and IPv6 networks.
E-UTRA Evolved Universal E-UTRA is the air interface of 3GPP’s LTE upgrade
Mobile path for networks.
Telecommunications
System (UMTS)
Terrestrial Radio Access
E-UTRAN Evolved Universal E-UTRAN is the combination of E-UTRA, user
Mobile equipment, and eNBs.
Telecommunications
System (UMTS)
Terrestrial Radio Access
Network
EV-DO Evolution for Data EV-DO is the third-generation (3G)
Optimized telecommunications standard for the wireless
transmission of data through radio signals, typically
for broadband internet access.
FA Foreign Agent An FA is a router serving as a mobility agent for
a mobile node.
FDD Frequency Division FDD is a method for establishing a full-duplex
Duplex communications link that uses two different radio
frequencies for transmitter (Tx) and receiver (Rx)
operation.
FDM Frequency Division FDM is a technique for sending two or more signals
Multiplexing over the same radio channel. Each signal is
transmitted as a unique range of frequencies within
the bandwidth of the channel as a whole, enabling
several signals to be transmitted simultaneously.
FDMA Frequency Division FDMA is a channel access method used in multiple-
Multiple Access access protocols as a channelization protocol. FDMA
189
gives users an individual allocation of one or several
frequency bands, or channels.
FEC Forward Error FEC is a method of obtaining error control in data
Correction transmission in which the source (transmitter) sends
redundant data and the destination (receiver)
recognizes only the portion of the data that contains
no apparent errors.
FFT Fast Fourier Transform The FFT is a mathematical method for transforming a
function of time into a function of frequency.
Sometimes the method is described as transforming
from the time domain to the frequency domain.
FMC Fixed Mobile FMC is the trend towards seamless connectivity
Convergence between fixed and wireless telecommunications
networks.
FQDN Fully Qualified Domain Also known as an absolute domain name, FQDN is a
Name domain name for a specific computer or host on the
internet that specifies its exact location in the tree
hierarchy of the Domain Name System (DNS).
GBIC Gigabit Interface GBIC is a standard for transceivers, commonly used
Converter with Gigabit Ethernet and fiber channel. By offering
a standard, hot swappable electrical interface, one
gigabit port can support a wide range of physical
media, from copper to long-wave, single-mode
optical fiber, at lengths of hundreds of kilometers.
GBR Guaranteed Bit Rate GBR is the minimum bit rate requested by an
application. In LTE, minimum GBR bearers and non-
GBR bearers may be provided.
GGSN Gateway GPRS Support A GGSN is part of the core network that connects
Node Global System for Mobile Communications (GSM)
based third-generation (3G) networks to the
internet.
GI Guard Interval GIs are used to ensure that distinct transmissions do
not interfere with one another. These transmissions
may belong to different users (as in Time Division
Multiple Access, or TDMA) or to the same user (as in
Orthogonal Frequency Division Multiplexing, or
OFDM).
GP Guard Period In Time Division Multiple Access (TDMA), each user’s
timeslot ends with a GP to avoid data loss and to
reduce interference to the following user, caused by
propagation delay. Thus, a user’s timeslot is
protected from interference from the preceding user.
GPRS General Packet Radio GPRS is a packet-oriented mobile data service on the
190
Service second-generation (2G) and third-generation (3G)
cellular communication system’s Global System for
Mobile (GSM) communications.
GSM Global System for A digital mobile telephony system which uses a
Mobile variation of Time Division Multiple Access (TDMA)
technology. GSM is the most widely used of the 3
digital wireless telephony technologies (TDMA, GSM,
and CDMA) in Europe and other parts of the world.
GT Guard Time GT is the interval left vacant on a transmission
channel that can be used for synchronization and/or
compensating for a signal distortion.
GTP General Packet Radio GTP is a group of IP-based communications protocols
Service (GPRS) used to carry General Packet Radio Service (GPRS)
Tunneling Protocol within Global System for Mobile (GSM)
communications), Universal Mobile
Telecommunications System (UMTS), and Long-Term
Evolution (LTE) networks.
GTP-U General Packet Radio GTP-U is used for carrying user data within the
Service (GPRS) General Packet Radio Service (GPRS) core network
Tunneling and between the radio access network (RAN) and
Protocol (GTP) User the core network (CN).
Plane
GUMMEI Globally Unique MME The GUMMEI is constructed from the Mobile
Identity Country Code (MCC), Mobile Network Code (MNC),
and Mobility Management Entity (MME) Identifier
(MMEI).
GUTI Globally Unique GUTI is allocated to the user equipment (UE) by the
Temporary User Mobility Management Entity (MME) and has two
Equipment (UE) Identity components - the Globally Unique MME Identity
(GUMMEI) and the MME temporary mobile
subscriber identity (M-TMSI). While the GUMMEI
identifies the MME, the M-TMSI identifies the UE
within the MME.
GW Gateway A GW refers to a piece of networking hardware that
is equipped for interfacing with another network
that uses different protocols.
HA Home Agent An HA is a router on a mobile node’s home network
that maintains information about the device’s
current location, as identified in its care-of address.
HA High Availability HA indicates 100% operation, a never failing
component or system
H-ARQ Hybrid ARQ H-ARQ is a combination of high-rate, forward error-
correcting code and Automatic Repeat Request
191
(ARQ) error control. In standard ARQ, redundant bits
are added to data to be transmitted using an error-
detecting code such as a cyclic redundancy check.
HDTV High-Definition HDTV is a television display technology that provides
Television picture quality similar to 35mm film.
H-FDD Half-Frequency Division H-FDD requires that two communication parties take
Duplex turns transmitting data over two separate frequency
bands or channels.
HLR Home Location Register HLR is the main database of permanent subscriber
information for a network. The HLR is an integral
component of mobile networks.
HO Handoff or Handover HO refers to the process of transferring an ongoing
call or data session from one channel (eNB 1)
connected to the core network to another channel
(eNB 2).
HPLMN Home Public Land The HPLMN identifies the public network in which
Mobile Network the subscriber’s profile is held. Users roaming to
(PLMN) other networks will receive subscription information
from the HPLMN.
HSDPA High Speed Downlink HSDPA is an enhanced third-generation (3G)
Packet Access communications protocol which allows networks
based on Universal Mobile Telecommunications
System (UMTS) to have higher data speeds.
HSPA High Speed Packet HSPA is a telecommunications technology that
Access allows for data transmission speeds up to 21 Mbps.
HSPA+ (also called Evolved HSPA or 4G) is a further
evolution of HSPA that offers data speeds of up to 42
Mbps.
HSS Home Subscriber Server HSS is the master user database that supports
Internet Protocol Multimedia Subsystem (IMS)
network entities that handle data sessions.
HSUPA High Speed Uplink HSUPA is an amalgamation of two mobile protocols,
Packet Access High Speed Downlink Packet Access (HSDPA) and
HSUPA, that extends and improves the performance
of existing third-generation (3G) mobile networks
utilizing Wideband Code Division Multiple Access
(WCDMA) protocols.
ICI Inter-Carrier ICI is an impairment known to degrade performance
Interference of Orthogonal Frequency Division Multiplexing
(OFDM) transmissions. It arises from carrier
frequency offsets (CFOs), from the Doppler spread
due to channel time variation,and, to a lesser extent,
from sampling frequency offsets (SFOs).
192
ICIC Inter-cell Interference ICIC techniques apply restrictions to the radio
Coordination resource management (RRM) block, improving
favorable channel conditions across subsets of users
that are severely impacted by the interference, and
thus attaining high spectral efficiency.
IDFT Inverse Discrete Fourier IDFT is a Fourier series, using the Discrete-Time
Transform Fourier Transform (DTFT) samples as coefficients of
complex sinusoids at the corresponding DTFT
frequencies. It has the same sample-values as the
original input sequence.
IEEE Institute of Electrical The IEEE is a technical professional organization
and Electronics whose purpose is to educate and advance electrical
Engineers and electronic engineering, telecommunications,
computer engineering, and allied disciplines.
IETF Internet Engineering The IETF is the body that defines standard internet
Task Force operating protocols such as TCP/IP.
IFFT Inverse Fast Fourier An IFFT algorithm computes the Discrete Fourier
Transform Transform (DFT) of a sequence, or its inverse.
IMEI International Mobile IMEI is a 15- or 17-digit code that uniquely identifies
Equipment Identity mobile phone sets.
IMS Internet Protocol (IP) The IMS or IP Multimedia Core Network
Multimedia Subsystem Subsystem is an architectural framework for
delivering IP multimedia services.
IMSI International Mobile An IMSI is used to identify the user of a cellular
Subscriber Identity network and is a unique identification associated
with all cellular networks.
IMT International Mobile IMT is a set of requirements issued by the
Telecommunication International Telecommunication Union (ITU-R) in
2008 for what is marketed as fourth-generation (4G)
mobile phone and internet access service.
IN Intelligent Networks An IN is a telephone network architecture in which
the service logic for a call is located separately from
the switching facilities, allowing services to be added
or changed without having to redesign the switching
equipment.
IP Internet Protocol IP is the protocol by which data is sent from one
computer to another over the internet.
IPSec Internet Protocol IPSec is a protocol suite for secure internet
Security protocol communications that works by
authenticating and encrypting each IP packet of a
communication session.
IPv4 Internet Protocol IPv4 is the fourth revision of the internet protocol
Version 4 (IP) and a widely-used protocol in data
193
communications over various kinds of networks. IPv4
is a connectionless protocol used in packet-switched
layer networks, such as Ethernet.
ISI Inter-Symbol ISI is a form of distortion of a signal in which one
Interference symbol interferes with subsequent symbols. This is
an unwanted phenomenon, as the previous symbols
have a similar effect as noise, thus making the
communication less reliable.
ISUP Integrated Services ISUP is the protocol used to support the signaling
Digital Network (ISDN) necessary to provide voice and non-voice services in
Signaling User Part telephone communications. It is an extension of
Signaling System 7 (SS7), used as the interface
protocol for voice and data within, and for ingression
or egression to/from, the Public Switched Telephone
Network (PSTN).
ITU International The ITU is an agency of the United Nations whose
Telecommunication purpose is to coordinate telecommunication
Union operations and services throughout the world.
KBPS Kilobits per Second In the U.S., Kbps means thousands of bits per second
and is a measure of bandwidth on a data
transmission medium.
KHz Kilohertz KHz is a measure of frequency equivalent to 1,000
cycles per second.
KPI Key Performance In the context of a telecommunications network, a
Indicator KPI is a quantifiable measure used to evaluate the
success of network performance (speed, quality).
Typically, network operators will monitor several
types of KPIs to determine whether changes may be
needed to improve network performance.
L1 Layer 1 In the seven-layer Open Systems Interconnection
(OSI) model of computer networking, the physical
layer (PHY), or L1, is the first and lowest layer. The
physical layer defines the means of transmitting raw
bits rather than logical data packets over a physical
link connecting network nodes.
L2 Layer 2 The data link layer, or L2, is the second layer of the
seven-layer Open Systems Interconnection
(OSI) model of computer networking. L2 is the
protocol layer that transfers data between adjacent
network nodes in a wide area network (WAN) or
between nodes on the same local area network
(LAN) segment.
L3 Layer 3 The network layer, or L3, is the third layer of the
194
seven-layer Open Systems Interconnection (OSI)
model of computer networking. L3 is responsible for
packet forwarding, including routing through
intermediate routers, since it knows the address of
neighboring network nodes. It also manages quality
of service (QoS), and recognizes and forwards local
host domain messages.
LAC Location Area Code The geographical location of an eNB. Used by mobile
devices in determining the best serving eNB.
LB Load Balancing In computing, LB distributes workloads across
multiple computing resources, such as computers, a
computer cluster, network links, central processing
units, or disk drives. Load balancing aims to optimize
resource use, maximize throughput, minimize
response time, and avoid overload of any single
resource.
LCR Low Chip Rate Universal Terrestrial Radio Access (UTRA) Time
Division Duplexing (TDD) 1.28 Megachips per Second
(MCPS) LCR, or UTRA-TDD LCR, is an air interface
standard found in Universal Mobile
Telecommunications System (UMTS) mobile
networks in China as an alternative to Wideband
Code Division Multiple Access (W-CDMA).
LI Lawful Intercept LI describes obtaining communications network data
pursuant to lawful authority for the purpose of
analysis or evidence. Such data generally consists of
signaling or network management information, or, in
fewer instances, the content of the communications.
LTE Long-Term Evolution LTE is a standard for high-speed wireless
communication for mobile phones and data
terminals. It is based on the Global System for
Mobile Communications (GSM) / Enhanced Data
Rates for GSM Evolution (EDGE) and Universal
Mobile Telecommunications System (UMTS) / High
Speed Packet Access (HSPA) network technologies.
LTE increases the capacity and speed using a
different radio interface together with core network
improvements.
MAC Medium Access Control In the IEEE 802 reference model of computer
networking, the media access control (MAC) layer is
the lower sublayer of the data link layer (Layer 2) of
the seven-layer Open Systems Interconnection (OSI)
model.
MAC Message Authentication The MAC is used to authenticate devices based on
195
Code their physical MAC addresses. It is an early form of
filtering. MAC authentication requires that the MAC
address of a machine must match a manually
defined list of addresses.
MBMS Multimedia Broadcast MBMS is a point-to-multipoint interface specification
Multicast Service for Third-Generation Partnership Project (3GPP)
cellular networks. The specification is designed to
provide efficient delivery of broadcast and multicast
services, both within a cell as well as within the core
network.
MBR Maximum Bit Rate The MBR is the maximum number of bits that can
be conveyed or processed per unit of time.
MBSFN Multimedia Broadcast MBSFN is a transmission mode which exploits LTE’s
Multicast Service Orthogonal Frequency Division Multiplexing (OFDM)
(MBMS) Single radio interface to send multicast or broadcast data
Frequency Network as a multicell transmission over a synchronized
single-frequency network.
MCC Mobile Country Code An MCC is used to uniquely identify the operator of a
telecommunications network. MCC + MNC = PLMN.
MCCH Multicast Control The MCCH is a sublayer of Layer 2 protocol of Radio
Channel Interface Protocol Architecture as per the
Broadcast/Multicast Control Standard (BMC-STD). It
exists in the user plane only and is located above the
Radio Link Control, a Layer 2 function responsible for
mapping logical channels.
MCH Multicast Channel An MCH (one-to-many or many-to-many
distribution) is a group communication where
information is addressed to a group of destination
computers simultaneously.
MCM Multi-Carrier MCM is a method of transmitting data by splitting it
Modulation into several components, and sending each of these
components over separate carrier signals. The
individual carriers have narrow bandwidth, but the
composite signal can have broad bandwidth.
MCS Modulation and Coding MCS is a numerical index based on Orthogonal
Scheme Frequency Division Multiplexing (OFDM) that
represents the maximum data rate that can be
achieved over-the-air. The MCS index value
comprises several variables, including channel width,
modulation type, coding rate, and spatial streams.
Link to MCS index for 802.11n and 802.11ac:
http://mcsindex.com/
ME Mobile Equipment ME is the device that the customer uses to originate
196
and receive calls in a wireless network, or a radio
terminal used for radio communication over the
Um* interface.
*It is called Um because it is the mobile analog to
the U interface of an Integrated Services Digital
Network (ISDN).
MGCF Media Gateway Control The MGCF controls the resources in media gateways
Function with an H.248 interface.
MGW Media Gateway An MGW is a translation device or service that
converts media streams between disparate
telecommunications technologies such as Plain Old
Telephone Service (POTS), Signaling System 7 (SS7),
Next-Generation networks (2G, 2.5G, and 3G radio
access networks), or private branch exchange (PBX)
systems.
MHz Megahertz A MHz is one million hertz, as a measure of the
frequency of radio transmissions or the clock speed
of a computer.
MIB Master Information MIB is a very important message or information that
Block is broadcasted by the Long-Term Evolution (LTE) eNB,
irrespective of any users’ presence. The MIB is first
among the other system information blocks (SIB),
which are also broadcasted by the eNB.
MIMO Multiple Input Multiple MIMO is an antenna technology for wireless
Output communications in which multiple antennas are
used at both the source and the destination. The
antennas at each end of the communications circuit
are combined to minimize errors and optimize data
speed.
MIP Mobile IP MIP is an Internet Engineering Task Force (IETF)
standard communications protocol that is designed
to allow mobile device users to move from one
network to another while maintaining a permanent
IP address.
MISO Multiple Input Single MISO is an antenna technology for wireless
Output communications in which multiple antennas are
used at the source (but not at the destination). The
antennas are combined to minimize errors and
optimize data speed.
MMD Multimedia Domain MMD is essentially a version of the Third-Generation
Partnership Project (3GPP) Internet Protocol (IP)
Multimedia Subsystem (IMS) architecture that has
been adapted by 3GPP2. In Code Division Multiple
Access (CDMA) networks, the terms IMS and MMD
197
are often used interchangeably, even though,
technically, IMS is a subset of MMD.
MME Mobility Management The Long-Term Evolution (LTE) MME is responsible
Entity for initiating paging and authentication of mobile
devices.
MMEGI MME Group Identity A group of Mobility Management Entities (MMEs) is
assigned an MMEGI, which works along with
Mobility Management Entity Code (MMEC) to make
an MME identifier (MMEI). An MMEI uniquely
identifies the MME within a network.
MML Man-Machine Language MML is a standardized computing interface language
for managing telecommunications network devices
from a console.
MMS Multimedia Messaging MMS is a standard way to send messages that
Service include multimedia content over a network.
MNC Mobile Network Code Uniquely identifies a mobile network operator
(carrier) using the GSM (including GSM-R), UMTS,
and LTE public land mobile networks
MS Mobile Station An MS comprises all user equipment and software
needed for communication with a mobile network.
MSC Mobile Switching Center The MSC is a second-generation (2G) core network
element which controls the network
switching subsystem elements. Alternatively, or
adaptively, Maximum Segment Size (MSS) can be
used in Global System for Mobile Communications
(GSM) networks as well if the manufacturer has
implemented support for GSM networks in the MSS.
MTCH Multimedia Broadcast MTCHs are the channels used to transport
Multicast Service multimedia content from one device to another.
(MBMS) Traffic Channel
MTU Maximum Transmission The size of the largest network layer protocol data
Unit unit that can be communicated in a single network
transaction
NACK Negative NACK is a signal used in digital communications to
Acknowledgement ensure that data is received with a minimum of
errors. Sometimes the NACK signal is called a
rejection (REJ).
NAS Non-Access Stratum NAS is a functional layer in Universal Mobile
Telecommunications System (UMTS) and Long-Term
Evolution (LTE) wireless telecom protocol stacks
between the core network and user equipment. This
layer establishes communication sessions and
maintains continuous communications with the user
198
equipment as it moves.
NBM Network-Based Mobility An alternate from host-based mobility, NBM requires
no localized mobility management support on the
mobile nodes and is independent of global mobility
management protocol, resulting in modular mobility
management architecture.
NFV Network Function NFV is a network architecture concept that uses the
Virtualization technologies of information technology (IT)
virtualization to virtualize entire classes of network
node functions into building blocks that may
connect, or chain, together to create communication
services.
NMS Network Management An NMS is a set of hardware and/or software tools
System that allow an information technology (IT)
professional to supervise the individual components
of a network within a larger network
management framework. In the context of a Baicells
network, the Operations Management Console
(OMC) is a network management application that
may communicate with the LTE NMS through the
northbound interface.
NTP Network Time Protocol The network operator may use one or more NTP
servers to provide correct time-of-day to the eNBs
and other equipment.
OFDM Orthogonal Frequency OFDM is a frequency division multiplexing scheme
Division Multiplexing used as a digital multi-carrier modulation method.
Many closely spaced orthogonal sub-carrier signals
are used to carry data on several parallel data
streams or channels.
OFDMA Orthogonal Frequency OFDMA is a multi-user version of OFDM. Multiple
Division Multiple Access access is achieved in OFDMA by assigning subsets of
subcarriers to individual users.
OMC Operations The Baicells OMC is a Cloud-based network
Management Console management application with a graphical user
interface (GUI) that enables operator administrators
to configure and manage the Baicells eNBs and UEs.
OPC Object Linking and Open Platform Communications (OPC) and OLE for
Embedding (OLE) for Process Control is a series of standards for industrial
Process Control telecommunications, and which enable real-time
plant data between control devices from different
manufacturers.
OSS Operations Support An OSS is a set of programs that help a
System communications service provider monitor, control,
199
analyze, and manage a telephone or computer
network. The Baicells OSS, or BOSS, allows operators
to manage mobile subscriber information.
PAPR Peak-to-Average Power PAPR is the relationship between the maximum
Ratio power of a sample in a transmitted Orthogonal
Frequency Division Multiplexing (OFDM) symbol and
its average power.
PBCH Physical Broadcast The PBCH carries system information for user
Channel equipment requiring access to the network. It only
carries what is termed Master Information Block, or
MIB, messages.
PCC Policy and Charging Network function that enables application servers to
Control dynamically control the QoS and charging
requirements of the services they deliver. Also
improves roaming services. PCC is necessary for
operators to differentiate and monetize LTE services.
PCCH Paging Control Channel PCCH is a downlink channel that transfers paging
information. This channel is used when the network
does not know the location cell of the user
equipment (UE), or the UE is in the cell connected
state but utilizing UE sleep mode procedures.
PCEF Policy and Charging A serving gateway (SGW) function that enforces
Enforcement Function gating and QoS for individual IP flows.
PCFICH Physical Control Format The PCFICH is one of the control channels that works
Indicator Channel at Layer 1, the physical layer. It is used to dynamically
indicate the number of symbols to be used for the
Physical Dedicated Control Channel (PDCCH).
PCH Paging Channel The PCH is the downlink transport channel in
Universal Mobile Telecommunications System
(UMTS) that carries the Paging Control Channel
(PCCH). It is used to broadcast paging and
notification messages in a cell. The PCH is
transported in the Secondary Common Control
Physical Channel (S-CCPCH).
PCI Physical Cell Identifier PCI, or Layer 1 identity, is an essential configuration
parameter of a radio cell that uniquely identifies
each cell site in the wireless network. PCI planning is
crucial for quality of service (QoS) and somewhat
similar to scrambling code allocation in Wide-Band
Code Division Multiple Access (WCDMA) air interface
standards.
PCRF Policy and Charging Rule PCRF is the software node designated in real-time
Function that provides policy control and flow based charging
200
control decisions.
PDCCH Physical Dedicated The PDCCH carries a message called Downlink
Control Channel Control Information (DCI), which includes resource
assignments for user equipment.
PDCP Packet Data PDCP is specified by the Third-Generation
Convergence Protocol Partnership Project (3GPP) in TS 25.323 for Universal
Mobile Telecommunications System (UMTS) and TS
36.323 for Long-Term Evolution (LTE) networks. The
PDCP is in the radio protocol stack in the UMTS and
LTE air interface on top of the Radio Link Control
(RLC) layer.
PDN Packet Data Network The PDN is specified and identified by the Access
Point Name (APN), or eNB, to allow a mobile data
user to communicate with the network.
PDP Packet Data Protocol PDPs are network layer (Layer 3) addresses. General
Packet Radio Service (GPRS) systems support both
X.25 and Internet Protocol (IP) network layer
protocols. Therefore, PDP addresses can be X.25, IP,
or both.
PDP Policy Decision Point PDP is a point in the network which evaluates digital
access requests against authorization policies before
issuing access decisions.
PDSCH Physical Downlink The PDSCH is the main data bearing channel which is
Shared Channel allocated to users on a dynamic and opportunistic
basis. The PDSCH also is used to transmit broadcast
information not transmitted on the Physical
Broadcast Channel (PBCH) which includes System
Information Blocks (SIB), paging, and Radio Resource
Control (RRC) signaling messages.
PDU Protocol Data Unit A PDU is information that is delivered as a unit
among peer entities of a network and that may
contain control information, such as address
information or user data.
P-GW PDN Gateway The P-GW communicates with the outside world,
i.e., packet data networks (PDN), using a Silicon
Graphics International (SGI) interface. Each PDN is
identified by an access point (AP), or eNB, name.
PHICH Physical Hybrid The PHICH in the downlink carries Hybrid ARQ
Automatic Repeat acknowledgements/negative acknowledgements
Request (ARQ) Indicator (ACK/NACK) for uplink data transfers. PHICHs are in
Channel the first Orthogonal Frequency Division Multiplexing
(OFDM) symbol of each subframe.
PHY Physical Layer The PHY layer is the first layer of the Open System
201
Interconnection Model, or Layer 1. The physical layer
deals with bit-level transmission between different
devices and supports electrical or mechanical
interfaces connecting to the physical medium for
synchronized communication.
PLMN Public Land Mobile A PLMN is any wireless communications system
Network intended for use by terrestrial subscribers in vehicles
or on foot. Such a system can stand alone, but often
it is interconnected with a fixed system such as the
public switched telephone network.
PMCH Physical Multicast The PMCH is a transmission channel that is used to
Channel transfer information from one source to one or more
devices (multiple receiving points) that are operating
within a radio coverage area. The PMCH carries the
multicast channel (MCH).
PMIP Proxy Mobile IP (MIP) PMIP is a network-based mobility management
protocol standardized by Internet Engineering Task
Force (IETF) and specified in RFC 5213.
PN Pseudo-Random Noise PN is a signal noise which satisfies one or more of
the standard tests for statistical randomness.
Although it seems to lack any definite pattern, PN
consists of a deterministic sequence of pulses that
repeat after a certain period.
PRACH Physical Random-Access PRACH is a Layer 1 channel used by wireless
Channel terminals to access the mobile network, e.g., Time
Division, Frequency Division, or Code Division
Multiple Access (TDMA, FDMA, CDMA) based
network for call setup and bursty data transmission.
PRB Physical Resource Block The PRB is an LTE specification that allocates users a
specific number of subcarriers for a predetermined
amount of time.
PRI Primary Rate Interface The PRI is a telecommunications interface standard
used on an Integrated Services Digital Network
(ISDN) for carrying multiple Digital Signal Zero (DS0)
voice and data transmissions between the network
and a user.
P-RNTI Paging Radio Network The P-RNTI is used by the user equipment to receive
Temporary Identity paging messages, and is carried by the Paging
Control Channel (PCCH) logical channel which is
mapped to the Paging Channel (PCH) transport
channel. The PCH transport channel is mapped to
the Physical Downlink Shared Channel (PDSCH)
physical channel.
202
P-SCH Primary Synchronization The P-SCH is a code that is repeated at the beginning
Channel of each time slot. The same code is used by all the
cells and enables the user equipment to detect the
existence of the Universal Mobile
Telecommunications System (UMTS) cell and to
synchronize on the time slot boundaries.
PSDU Protocol Service Data The PSDU is referred to in the Institute of Electrical
Unit and Electronics (IEEE) 802.11 standard as the Media
Access Control Packet Data Unit (MPDU) with an
additional Physical Layer Convergence Procedure
(PLCP) preamble and header. The term typically
references physical layer operations.
PSTN Public Switched The PSTN is the aggregate of the world’s circuit-
Telephone Network switched telephone networks that are operated by
national, regional, or local operators, providing
infrastructure and services for public
telecommunications.
PUCCH Physical Uplink Control The PUCCH is used to carry Uplink Control
Channel Information (UCI). Long-Term Evolution (LTE) user
equipment can never transmit both PUCCH and
Physical Uplink Shared Channel (PUSCH) during the
same subframe.
PUSCH Physical Uplink Shared The PUSCH channel carries user data. It supports
Channel Quadrature Phase Shift Keying (QPSK) and 16
Quadrature Amplitude Modulation (QAM), with
64QAM being optional.
QAM Quadrature Amplitude QAM is both an analog and a digital signal
Modulation modulation scheme. It conveys two analog message
signals, or two digital bit streams, by
modulating the amplitudes of two carrier waves,
using the amplitude-shift keying (ASK) digital
modulation scheme or amplitude modulation (AM)
analog modulation scheme.
QCI Quality of Service QCI is a mechanism used in Third-Generation
(QoS) Class Identifiers Partnership Project (3GPP) Long Term Evolution (LTE)
networks to ensure bearer traffic is allocated
appropriate quality of service (QoS).
QoS Quality of Service QoS refers to the capability of a network to provide
better service to selected network traffic. Various
technologies, including Frame Relay, Asynchronous
Transfer Mode (ATM), Ethernet, 802.1 networks,
Synchronous Optical Networking (SONET), and
Internet Protocol (IP) routed networks are capable of
providing various levels of QoS.
203
QPSK Quadrature Phase Shift QPSK is a form of Phase Shift Keying (PSK) in which
Keying two bits are modulated at once, selecting one of four
possible carrier phase shifts (0, 90, 180, or 270
degrees). QPSK allows the signal to carry twice as
much information as ordinary PSK using the same
bandwidth.
RACH Random Access RACH is a shared channel used by wireless terminals
Channel to access the mobile network for call setup and
bursty data transmission.
RAN Radio Access Network A RAN is part of a mobile telecommunications
system. Conceptually, the RAN resides between a
mobile device and the core network.
RAT Radio Access RAT is the underlying physical connection method for
Technology a radio-based communication network.
RB Radio Bearer An RB is a channel offered by Layer 2 to higher Open
System Interconnection (OSI) layers for the transfer
of either user or control data. In other words, Layer 2
offers to the upper layers the service of information
transmission between the user’s equipment and the
Universal Terrestrial Radio Access Network (UTRAN)
by means of the RBs and signaling RBs.
RB Resource Block An RB is a time and frequency resource that
occupies 12 subcarriers (12×15 KHz = 180 KHz) and
one slot (= 0.5 ms). RBs are allocated in pairs by the
scheduler (then referred to as scheduling blocks).
RF Radio Frequency RF is any of the electromagnetic wave
frequencies that lie in the range extending from
approximately 3 KHz to 300 GHz, which include
those frequencies used for communications or radar
signals.
RLC Radio Link Control RLC is a Layer 2 protocol used on the air interface in
Universal Mobile Telecommunications System
(UMTS) and Long-Term Evolution (LTE) networks.
ROCH Robust Header ROCH is a standardized method to compress the
Compression Internet Protocol (IP), User Datagram Protocol
(UDP), UDP-Lite, Real-Time Transport Protocol (RTP),
and Transmission Control Protocol (TCP) headers of
internet packets.
RRC Radio Resource Control The RRC protocol is used on the air interface in
Universal Mobile Telecommunications System
(UMTS) and Long-Term Evolution (LTE) networks.
RRC handles the control plane signaling of Layer 3
between the user equipment and the Radio Access
204
Network (RAN) - either Universal Terrestrial Radio
Access Network (UTRAN) or Evolved UTRAN (E-
UTRAN) - as well as for the radio interface between a
relay node and the E-UTRAN.
RRM Radio Resource RRM is the system level management of co-channel
Management interference, radio resources, and other
radio transmission characteristics in wireless
communication systems. RRM functionality is used in
cellular networks, wireless local area networks, and
wireless sensor systems.
RSRP Reference Symbol The RSRP is the linear average over the power
Received Power contributions for the resource elements that carry
cell-specific reference signals within the frequency
bandwidth. The signal strength reflects the user
equipment’s received Carrier Routing System (CRS)
power of a Long-Term Evolution (LTE) cell.
RSRQ Reference Signal The RSRQ reflects the relative ratio of signal and
Received Quality interference within the system. RSRQ = N×RSRP/(E-
UTRA carrier RSSI), where:
N is the number of resource blocks (RBs) of the
Evolved Universal Terrestrial Radio Access
Network (E-UTRAN) carrier Received Signal
Strength Indicator (RSSI) measurement
bandwidth, and RSRP is the Reference Symbol
Received Power.
RSSI Received Signal Strength RSSI is the linear mean value of all the signals that
Indicator the user equipment has received, including the intra-
frequency signal and interference, the inter-
frequency interference, and thermal noise.
RTO Retransmission Timeout An RTO occurs when a sender is missing too many
acknowledgements and then takes a timeout or
stops sending packets altogether. The sender usually
starts sending again after this brief delay. Too many
of these can cause delays on the network for all
users. Analyzing RTOs can help identify packet loss
and to locate congested links.
RTT Round Trip Time The length of time it takes for a signal to be sent plus
the length of time it takes for an acknolwedgement
of that signal to be received.
S1-U Single 1 User Plane The S1-U interface is the interface between the
Long-Term Evolution (LTE) Radio Access Network
(RAN) and the Evolved Packet Core (EPC) transport
network layer’s Mobility Management Entity (MME)
interface built on the Internet Protocol (IP) transport
205
eNB control plane. S1-U supports the tunneling of
end-user packets between the eNB and the User
Plane Entity (UPE).
SAE System Architecture SAE is the core network architecture of the Third-
Evolution Generation Partnership Project’s (3GPP’s) Long-Term
Evolution (LTE) wireless communications standard.
SC Single Carrier An SC transmission means one radio frequency (RF)
carrier is used to carry the information. Hence,
information in the form of bits is carried by a single
RF carrier.
SC-FDMA Single Carrier Frequency SC-FDMA deals with the assignment of multiple
Division Multiple Access users to a shared communication resource. It is also
called Linearly Pre-coded OFDMA (LP-OFDMA)
SCH Synchronization An SCH is a downlink control channel used in Global
Channel System for Mobile Communication (GSM) cellular
telephone systems. It is part of the Unacknowledged
Mode (Um) air interface specification. The purpose
of the SCH is to allow the mobile device to identify a
nearby cell quickly and synchronize to an eNB.
SCTP Stream Control The SCTP is a transport layer protocol, serving in a
Transmission Protocol similar role to the popular Transmission Control
Protocol (TCP) and User Datagram Protocol (UDP).
SDF Service Data Flow An SDF is an aggregate set of packet flows that
match a set of service data flow filters in a Policy and
Charging Control (PCC) rule.
SDMA Space (or Spatial) SDMA is a satellite communications mode that
Division Multiple optimizes the use of radio spectrum and minimizes
Access system cost by taking advantage of the directional
properties of dish antennas.
SDU Service Data Unit An SDU is a unit of data that has been passed down
from an OSI layer to a lower layer and that has not
yet been encapsulated into a protocol data
unit (PDU) by the lower layer.
SFP Small Form-Factor An SFP is a small transceiver that plugs into
Pluggable the SFP port of a network switch and connects to
fiber and Gigabit Ethernet (GbE) optical fiber cables
at the other end. Superseding the Gigabit Interface
Converter (GBIC) transceiver, SFP modules are also
called "mini-GBIC" due to their smaller size.
SG Signaling Gateway An SG is a network component responsible for
transferring signaling messages (e.g., information
related to call establishment, billing, location, short
messages, address conversion, and other services)
206
between Common Channel Signaling (CCS) nodes
that communicate using different protocols and
transports.
S-GW Serving Gateway The S-GW resides in the user plane where it
forwards and routes packets to and from the eNB
and packet data network (PDN) gateway.
SI System Information The SI provides information to the user equipment
about various parameters of both the Access
Stratum (AS) and Non-Access Stratum (NAS).
SI-1 System Information SI messages inform mobile devices about all
Message 1 important parameters of how to access the network
and how to find neighboring cells.
SIB System Information A SIB carries relevant information for the user
Block equipment (UE), which helps the UE to access a cell,
perform cell reselection, and obtain information
related to intra-frequency, inter-frequency, and inter-
Radio Access Technology (RAT) cell selections.
SIM Subscriber Identity A SIM card is an integrated circuit that stores a
Module mobile subscriber’s critical information securely
SIMO Single Input Multiple SIMO is an antenna technology for wireless
Output communications in which multiple antennas are
used at the destination (receiver), but not at the
transmitter. The antennas are combined to minimize
errors and optimize data speed. The source
(transmitter) has only one antenna.
SINR Signal-to-Interference- Signal-to-Interference-plus-Noise-Ratio (SINR), also
plus-Noise Ratio known as the carrier-to-interference ratio (CIR or
C/I), is a quantity (dB) used to give theoretical upper
bounds on channel capacity. SINR is calculated based
on the power of a certain signal of interest divided
by the sum of the interference power from all the
other interfering signals and background noise.
SIP Session Initiation SIP is a communications protocol for signaling and
Protocol controlling multimedia communication sessions.
SIR Signal-to-Interference See “SINR”.
Ratio
SMS Short Message Service SMS is a text messaging service that uses
standardized communications protocols to enable
fixed line or mobile phone devices to exchange short
text messages.
SN Service Node An SN is a switching point that comprises a point of
end-user access to the network and network
services.
207
SNR Signal-to-Noise Ratio The SNR is a measure that compares the level of a
desired signal to the level of background noise. It is
defined as the ratio of signal power to the noise
power, often expressed in decibels.
SOFDMA Scalable Orthogonal SOFDMA refers to the air interface outlined for
Frequency Division portable or mobile WiMAX systems by the Institute
Multiple Access of Electrical and Electronics Engineers (IEEE), used in
the IEEE 802.16e (2005) standard.
SON Self-Organizing Network SON refers to automation technology designed to
make the planning, configuration, management,
optimization, and healing of mobile radio access
networks (RANs) simpler and faster. SON
functionality and behavior has been specified in
generally accepted mobile industry standards.
SRNC Serving Radio Network When a Radio Network Controller (RNC) has a Radio
Controller Resource Control (RRC) connection with user
equipment (UE), it is known as the Serving RNC, or
SRNC, for that UE. The SRNC is responsible for the
user’s mobility within the Universal Terrestrial Radio
Access Network (U-TRAN) and is also the point of
connection towards the core network.
STC Space-Time Coding STC is a technique used in wireless communications
to transmit multiple copies of a data stream across
several antennas and to exploit the various received
versions of the data to improve the overall reliability
of the data transfer.
TA Tracking Area A TA manages and represents the locations of user
equipment. Through re-optimization, the network
design is successively improved by reassigning some
cells to TAs other than their original ones.
TAI Tracking Area Identifier The TAI is the identity used to identify tracking areas
(TAs). The TAI is constructed from the Mobile
Country Code (MCC), Mobile Network Code (MNC)
and Tracking Area Code (TAC).
TDD Time Division Duplex TDD is a transmission scheme that allows
asymmetric flow for uplink and downlink data
transmission. TDD refers to duplex communication
links where the uplink traffic is separated from the
downlink traffic by allocating different time slots in
the same frequency band.
TEID Tunnel Endpoint The separate tunnels between each set of end points
Identifier are identified by a TEID in the General Packet Radio
Service Tunneling Protocol for User Data (GTP-U)
messages, normally a dynamically allocated random
208
number.
TFT Traffic Flow Template The TFT is used by the Gateway General Packet
Radio Service Support Node (GGSN) to discriminate
between different user payloads. The TFT
incorporates packet filters such as quality of service
(QoS), Policy Decision Point (PDP) context, and
security.
TM Transparent Mode TM is one of the three modes used to transfer the
upper layer Protocol Data Units (PDUs) via the Radio
Link Control (RLC).
TTI Transmission Time TTI is a parameter in Universal Mobile
Interval Telecommunications System (UMTS) and other
digital telecommunication networks that refers to
the duration of a transmission on the radio link. TTI
is related to encapsulation of data from higher layers
into frames for transmission on the Radio Link Layer
(RLL).
UARFCN Universal Mobile In short, this is the frequency point of a neighboring
Telecommunications eNB’s frequency.
System (UMTS)
Absolute Radio
Frequency Channel
Number.
UCI Uplink Control The UCI is a set of information that is carried by the
Information Physical Uplink Control Channel (PUCCH). Depending
on what kind of information the UCI in the Physical
Dedicated Control Channel (PDCCH) carries, PDCCH
is classified into various formations.
UDP User Datagram Protocol The UDP is one of the core members of the Internet
Protocol (IP) suite. With UDP, computer applications
can send messages, in this case referred to as
datagrams, to other hosts on an IP network.
UE User Equipment In Long-Term Evolution (LTE) networks, UE (also
referred to as customer premise equipment, or CPE)
is any device used directly by an end-user to
communicate via the network.
UL Uplink The UL path of a network connection is used to send
data from the user equipment to the network.
UL-SCH Uplink Shared Channel A physical UL-SCH is a transmission channel that is
used to transport user data from one or more mobile
devices that can transmit on the channel.
UM Unacknowledged Mode UM is one of three modes used to transfer upper
layer Protocol Data Units (PDU) in Radio Link Control
209
(RLC) used on the air interface in Long-Term
Evolution (LTE) networks.
UMA Unlicensed Mobile UMA is a technology that allows UMA-capable user
Access equipment to switch back and forth seamlessly
between networks and local wireless networks.
UMTS Universal Mobile UMTS is a third-generation broadband, packet-based
Telecommunications transmission of text, digitized voice, video, and
System multimedia at data rates up to and possibly higher
than 2 megabits per second (Mbps).
UPnP Universal Plug and Play UPnP is a set of networking protocols that permits
devices such as personal computers, printers,
internet gateways, Wi-Fi access points, and mobile
devices to discover each other's presence on the
network and communicate. UPnP is intended
primarily for residential users and not enterprise-
class devices.
UpPTS Uplink Pilot Time Slot The UpPTS is one of the three fields that make up
the 1ms special subframes that comprise the half-
frames used in the Long-Term Evolution (LTE) Time
Division Duplex (TDD) frame structure.
UpTS Uplink Time Slot In Time Division Long-Term Evolution (TD-LTE)
networks, the UpTS allows the user equipment to
transmit data to the receiver.
USIM Universal Subscriber A SIM card is an integrated chip that securely stores
Identity Module a mobile subscriber’s critical information for Global
(GSM) networks. A USIM provides enhanced features
and allows a subscriber to access any Universal
Mobile Telecommunications System (UMTS)
network, including GSM and CDMA.
VoIP Voice over Internet VoIP is a service that enables people to make voice
Protocol calls using only their computers connected to the
network. With VoIP, the internet is the transmission
medium for telephone calls by sending voice data in
packets using IP rather than by traditional circuit
transmissions of the Public Switched Telephone
Network (PSTN).
VPLMN Visited Public Land VPLMN is the network on which the mobile
Mobile Network subscriber has roamed when leaving their Home
(PLMN) PLMN (HPLMN).
VRB Virtual Resource Blocks Physical Resource Blocks (PRBs) and VRBs support
various kinds of resource allocations. VRB supports
both block-wise transmission (localized) and
transmission on non-consecutive subcarriers
210
(distributed) to maximize frequency diversity.
WCDMA Wideband Code Division WCDMA is a third-generation standard that employs
Multiple Access the Direct Sequence CDMA (DS-CDMA) channel
access method and the Frequency Division Duplexing
(FDD) method to provide high-speed and high-
capacity service.
Wi-Fi Wi-Fi Wi-Fi is the marketing name for a standard defined
by the Institute for Electrical and Electronics
Engineering (IEEE) called 802.11x. In the same way
that a local area network (LAN) describes the cabled
connection of residential or business computing
devices in the same geographical or logical domain,
Wi-Fi describes the wireless connection of
residential or business computing devices in the
same geographical or logical domain. Wi-Fi also is
referred to as wireless LAN (WLAN).
WiMAX Worldwide WiMAX is a family of wireless communication
Interoperability for standards based on the Institute for Electrical and
Microwave Access Electronics Engineering (IEEE) 802.16 set of
standards, which provide multiple physical layer
(PHY) and Media Access Control (MAC) options.
WLAN Wireless Local Area See “Wi-Fi”.
Networks
211
Appendix C: FAQs
If you have questions, please check the most up-to-date Frequently Asked Questions (FAQs)
as well as other helpful resources on the following websites:
• Baicells support website - https://na.Baicells.com/support/
• Baicells support forum on Facebook -
https://www.facebook.com/groups/Baicellsoperatorsupportgroup/
212
Appendix D: CloudKey
More recent releases of user equipment (UE) firmware (for example, version 1.0.8) allow the
operator to pre-configure the UE using the Baicells CloudCore Operations Management
Console (OMC). The operator enters their CloudKey account information in the UE Web GUI
or through the OMC, as follows. The operator’s CloudKey information is shown in the top right
corner of their CloudCore account. Each CloudKey is unique to each operator.
UE GUI:
Log in to the UE GUI for the device.
1. Click on the System tab located on the left.
2. Click on TRO69.
3. Enter the operator’s CloudKey information in the box marked CloudKey.
4. Click on Submit, and once the UE attaches to the eNB the UE will apear in the OMC
Monitor window. A reboot is not required for this field to take effect.
OMC:
Alternatively the operator can use the OMC Device Manager function to add the UE.
1. Log in to your OMC account.
2. Click on System > Device Management.
3. Click +Add in the top right corner.
4. A popup window will appear. Enter the UE’s MAC address, and the UE device will be
added to the operator’s account.
213