Académique Documents
Professionnel Documents
Culture Documents
NSR Counters
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This document is not an official
customer document and Nokia Siemens Networks does not take responsibility for any errors or
omissions in this document. This document is intended for the use of Nokia Siemens Networks
customers only for the purposes of the agreement under which the document is submitted. No
part of this documentation may be used, reproduced, modified or transmitted in any form or
means without the prior written permission of Nokia Siemens Networks. The documentation has
been prepared to be used by professional and properly trained personnel, and the customer
assumes full responsibility when using it. Nokia Siemens Networks welcomes customer
comments as part of the process of continuous development and improvement of the
documentation.
The information or statements given in this documentation concerning the suitability, capacity or
performance of the mentioned hardware or software products are given “as is” and all liability
arising in connection with such hardware or software products shall be defined conclusively and
finally in a separate agreement between Nokia Siemens Networks and the customer.
IN NO EVENT WILL Nokia Siemens Networks BE LIABLE FOR ERRORS IN THIS
DOCUMENTATION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL,
DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES SUCH AS BUT
NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS
OPPORTUNITY OR DATA, that might arise from the use of this document or the information in it.
THE CONTENTS OF THIS DOCUMENT ARE PROVIDED "AS IS". EXCEPT AS REQUIRED
BY APPLICABLE MANDATORY LAW, NO WARRANTIES OF ANY KIND, EITHER EXPRESS
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT,
ARE MADE IN RELATION TO THE ACCURACY, RELIABILITY OR CONTENTS OF THIS
DOCUMENT. NOKIA SIEMENS NETWORKS RESERVES THE RIGHT TO REVISE THIS
DOCUMENT OR WITHDRAW IT AT ANY TIME WITHOUT PRIOR NOTICE.
This document and the product it describes are considered protected by copyrights and other
intellectual property rights according to the applicable laws.
The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark of
Nokia Corporation. Siemens is a registered trademark of Siemens AG.
Other product names mentioned in this document may be trademarks of their respective owners,
and they are mentioned for identification purposes only.
Copyright © Nokia Siemens Networks 2007. All rights reserved.
The following terms are trademarks of IBM Corporation in the United States, other countries, or
both:
IBM
Cloudscape
DB2
e-business on demand
EServer
Informix
iSeries
Lotus
MQSeries
Redbooks
SecureWay
Tivoli
VisualAge
ZSeries
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United
States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft
Corporation in the United States, other countries, or both.
Intel, Intel Inside (logos), MMX, Celeron, Intel Centrino, Intel Xeon, Itanium, Pentium and
Pentium III Xeon are trademarks or registered trademarks of Intel Corporation or its subsidiares
in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product and service names may be trademarks or service marks of others.
1. The Software. Red Hat Enterprise Linux and Red Hat Applications (the "Software") are either
a modular operating system or application consisting of hundreds of software components. The
end user license agreement for each component is located in the component's source code.
With the exception of certain image files identified in Section 2 below, the license terms for the
components permit Customer to copy, modify, and redistribute the component, in both source
code and binary code forms. This agreement does not limit Customer's rights under, or grant
Customer rights that supersede, the license terms of any particular component.
2. Intellectual Property Rights. The Software and each of its components, including the source
code, documentation, appearance, structure and organization are owned by Red Hat and others
and are protected under copyright and other laws. Title to the Software and any component, or to
any copy, modification, or merged portion shall remain with the aforementioned, subject to the
applicable license. The "Red Hat" trademark and the "Shadowman" logo are registered
trademarks of Red Hat in the U.S. and other countries. This agreement does not permit
Customer to distribute the Software using Red Hat's trademarks. Customer should read the
information found at http://www.redhat.com/about/corporate/trademark/ before distributing a
copy of the Software, regardless of whether it has been modified. If Customer makes a
commercial redistribution of the Software, unless a separate agreement with Red Hat is
executed or other permission granted, then Customer must modify any files identified as
"REDHAT-LOGOS" and "anaconda-images" to remove all images containing the "Red Hat"
trademark or the "Shadowman" logo. Merely deleting these files may corrupt the Software.
3. Limited Warranty. Except as specifically stated in this agreement or a license for a particular
component, to the maximum extent permitted under applicable law, the Software and the
components are provided and licensed "as is" without warranty of any kind, expressed or
implied, including the implied warranties of merchantability, non-infringement or fitness for a
particular purpose. Red Hat warrants that the media on which the Software is furnished will be
free from defects in materials and manufacture under normal use for a period of 30 days from the
date of delivery to Customer. Red Hat does not warrant that the functions contained in the
Software will meet Customer's requirements or that the operation of the Software will be entirely
error free or appear precisely as described in the accompanying documentation. This warranty
extends only to the party that purchases the Software from Red Hat or a Red Hat authorized
distributor.
4. Limitation of Remedies and Liability. To the maximum extent permitted by applicable law, the
remedies described below are accepted by Customer as its only remedies. Red Hat's entire
liability, and Customer's exclusive remedies, shall be: If the Software media is defective,
Customer may return it within 30 days of delivery along with a copy of Customer's payment
receipt and Red Hat, at its option, will replace it or refund the money paid by Customer for the
Software. To the maximum extent permitted by applicable law, Red Hat or any Red Hat
authorized dealer will not be liable to Customer for any incidental or consequential damages,
including lost profits or lost savings arising out of the use or inability to use the Software, even if
Red Hat or such dealer has been advised of the possibility of such damages. In no event shall
Red Hat's liability under this agreement exceed the amount that Customer paid to Red Hat under
this agreement during the twelve months preceding the action.
5. Export Control. As required by U.S. law, Customer represents and warrants that it: (a)
understands that the Software is subject to export controls under the U.S. Commerce
Department's Export Administration Regulations ("EAR"); (b) is not located in a prohibited
destination country under the EAR or U.S. sanctions regulations (currently Cuba, Iran, Iraq,
Libya, North Korea, Sudan and Syria); (c) will not export, re-export, or transfer the Software to
any prohibited destination, entity, or individual without the necessary export license(s) or
authorizations(s) from the U.S. Government; (d) will not use or transfer the Software for use in
any sensitive nuclear, chemical or biological weapons, or missile technology end-uses unless
authorized by the U.S. Government by regulation or specific license; (e) understands and agrees
that if it is in the United States and exports or transfers the Software to eligible end users, it will,
as required by EAR Section 741.17(e), submit semi-annual reports to the Commerce
Department's Bureau of Industry & Security (BIS), which include the name and address
(including country) of each transferee; and (f) understands that countries other than the United
States may restrict the import, use, or export of encryption products and that it shall be solely
responsible for compliance with any such import, use, or export restrictions.
6. Third Party Programs. Red Hat may distribute third party software programs with the Software
that are not part of the Software. These third party programs are subject to their own license
terms. The license terms either accompany the programs or can be viewed at http://www.redhat.
com/licenses/. If Customer does not agree to abide by the applicable license terms for such
programs, then Customer may not install them. If Customer wishes to install the programs on
more than one system or transfer the programs to another party, then Customer must contact the
licensor of the programs.
7. General. If any provision of this agreement is held to be unenforceable, that shall not affect the
enforceability of the remaining provisions. This agreement shall be governed by the laws of the
State of North Carolina and of the United States, without regard to any conflict of laws provisions,
except that the United Nations Convention on the International Sale of Goods shall not apply.
Copyright © 2003 Red Hat, Inc. All rights reserved. "Red Hat" and the Red Hat "Shadowman"
logo are registered trademarks of Red Hat, Inc. "Linux" is a registered trademark of Linus
Torvalds. All other trademarks are the property of their respective owners.
Contents
Contents 5
1 aucSubscribers 11
2 backgroundRestoreAttempt 13
3 backgroundRestoreFailed 15
4 bsIndexRestoreAttemp 17
5 bsIndexRestoreFailed 19
6 bytesReceived 21
7 bytesTransmitted 23
8 capacityPages 25
9 capacityTotalPages 27
10 capacityUsedPages 29
11 cleanedMtAttempt 31
12 cleanedMtFailed 33
13 cleanedRestoreAttempt 35
14 cleanedRestoreFailed 37
15 cleaningAttempt 39
16 cleaningCancelAttempt 41
17 cleaningCancelFailed 43
18 cleaningFailed 45
19 cleaningScheduleAttempt 47
20 cleaningScheduleFailed 49
21 cpuLoadAvg 51
22 cpuLoadPeak 53
23 cpuOverValuePercentage 55
24 cpuOverValueThreshold 57
25 durationMax 59
26 durationMin 61
27 durationSum 63
28 executionAttempt 65
29 executionDurationMax 67
30 executionDurationMin 69
31 executionDurationSum 71
32 executionFailedAll 73
33 executionFailedReason-0 75
34 executionFailedReason-1 77
35 executionFailedReason-2 79
36 executionFailedReason-3 81
37 executionFailedReason-4 83
38 executionFailedReason-5 85
39 executionFailedReason-6 87
40 executionFailedReason-7 89
41 executionFailedReason-8 91
42 executionFailedReason-9 93
43 fraudRestoreAttempt 95
44 fraudRestoreFailed 97
45 hlrSubscribers 99
46 hlrSubscribersActive 101
47 hlrSubscribersCleaned 103
48 hlrSubscribersInactive 105
49 imeiRestoreAttempt 107
50 imeiRestoreFailed 109
51 inboundRequestBytes 111
52 inboundRequestDurationMax 113
53 inboundRequestDurationMin 115
54 inboundRequestDurationSum 117
55 inboundRequestFailedAll 119
56 inboundRequestFailedReason-0 121
57 inboundRequestFailedReason-1 123
58 inboundRequestFailedReason-2 125
59 inboundRequestFailedReason-3 127
60 inboundRequestFailedReason-4 129
61 inboundRequestFailedReason-5 131
62 inboundRequestFailedReason-7 133
63 inboundRequestFailedReason-8 135
64 inboundRequestFailedReason-9 137
65 inboundRequestMsgs 139
66 inboundRequestReplyBytes 141
67 inboundRequestReplyMsgs 143
68 memFreeKB 145
69 memUsedKB 147
70 notificationSendAttempt 149
71 notificationSendFailed 151
72 outboundRequestBytes 153
73 outboundRequestDurationMax 155
74 outboundRequestDurationMin 157
75 outboundRequestDurationSum 159
76 outboundRequestFailedAll 161
77 outboundRequestFailedReason-0 163
78 outboundRequestFailedReason-1 165
79 outboundRequestFailedReason-2 167
80 outboundRequestFailedReason-3 169
81 outboundRequestFailedReason-4 171
82 outboundRequestFailedReason-5 173
83 outboundRequestFailedReason-6 175
84 outboundRequestFailedReason-7 177
85 outboundRequestFailedReason-8 179
86 outboundRequestFailedReason-9 181
87 outboundRequestMsgs 183
88 outboundRequestReplyBytes 185
89 outboundRequestReplyMsgs 187
90 packetsReceived 189
91 packetsTransmitted 191
92 pageSizeKB 193
93 preprovisionedActivateAttempt 195
94 preprovisionedActivateFailed 197
95 preprovisionedMmlAttempt 199
96 preprovisionedMmlFailed 201
97 preprovisionedMtAttempt 203
98 preprovisionedMtFailed 205
99 preprovisioningAttempt 207
1 aucSubscribers
2 backgroundRestoreAttempt
3 backgroundRestoreFailed
4 bsIndexRestoreAttemp
5 bsIndexRestoreFailed
6 bytesReceived
7 bytesTransmitted
8 capacityPages
9 capacityTotalPages
10 capacityUsedPages
11 cleanedMtAttempt
12 cleanedMtFailed
13 cleanedRestoreAttempt
14 cleanedRestoreFailed
15 cleaningAttempt
16 cleaningCancelAttempt
17 cleaningCancelFailed
18 cleaningFailed
19 cleaningScheduleAttempt
20 cleaningScheduleFailed
21 cpuLoadAvg
22 cpuLoadPeak
23 cpuOverValuePercentage
24 cpuOverValueThreshold
25 durationMax
26 durationMin
27 durationSum
28 executionAttempt
29 executionDurationMax
30 executionDurationMin
31 executionDurationSum
32 executionFailedAll
33 executionFailedReason-0
34 executionFailedReason-1
35 executionFailedReason-2
36 executionFailedReason-3
37 executionFailedReason-4
38 executionFailedReason-5
39 executionFailedReason-6
40 executionFailedReason-7
41 executionFailedReason-8
42 executionFailedReason-9
43 fraudRestoreAttempt
44 fraudRestoreFailed
45 hlrSubscribers
46 hlrSubscribersActive
47 hlrSubscribersCleaned
48 hlrSubscribersInactive
49 imeiRestoreAttempt
50 imeiRestoreFailed
51 inboundRequestBytes
52 inboundRequestDurationMax
53 inboundRequestDurationMin
54 inboundRequestDurationSum
55 inboundRequestFailedAll
56 inboundRequestFailedReason-0
57 inboundRequestFailedReason-1
58 inboundRequestFailedReason-2
59 inboundRequestFailedReason-3
60 inboundRequestFailedReason-4
61 inboundRequestFailedReason-5
62 inboundRequestFailedReason-7
63 inboundRequestFailedReason-8
64 inboundRequestFailedReason-9
65 inboundRequestMsgs
66 inboundRequestReplyBytes
67 inboundRequestReplyMsgs
68 memFreeKB
69 memUsedKB
70 notificationSendAttempt
71 notificationSendFailed
72 outboundRequestBytes
73 outboundRequestDurationMax
74 outboundRequestDurationMin
75 outboundRequestDurationSum
76 outboundRequestFailedAll
77 outboundRequestFailedReason-0
78 outboundRequestFailedReason-1
79 outboundRequestFailedReason-2
80 outboundRequestFailedReason-3
81 outboundRequestFailedReason-4
82 outboundRequestFailedReason-5
83 outboundRequestFailedReason-6
84 outboundRequestFailedReason-7
85 outboundRequestFailedReason-8
86 outboundRequestFailedReason-9
87 outboundRequestMsgs
88 outboundRequestReplyBytes
89 outboundRequestReplyMsgs
90 packetsReceived
91 packetsTransmitted
92 pageSizeKB
93 preprovisionedActivateAttempt
94 preprovisionedActivateFailed
95 preprovisionedMmlAttempt
96 preprovisionedMmlFailed
97 preprovisionedMtAttempt
98 preprovisionedMtFailed
99 preprovisioningAttempt
100
preprovisioningFailed
101
qosRestoreAttempt
102
qosRestoreFailed
103
rangeScanCount
104
readCount
105
receivedBytes
106
scanCount
107
secondsBehindAvg
108
secondsBehindMax
109
secondsBehindMin
110
sentBytes
111
simpleReadCount
112
subscriberRestoreAttempt
113
subscriberRestoreFailed
114
subscribers
115
swapFreeKB
116
swapUsedKB
117
sysAvailabilityPercentage
118
sysUptimeSeconds
119
transactionAbortCount
120
transactionCommitCount
121
transactionCount
122
usageAttempt
123
usageFailedAll
124
usageFailedReason-0
125
usageFailedReason-1
126
usageFailedReason-2
127
usageFailedReason-3
128
usageFailedReason-4
129
usageFailedReason-5
130
usageFailedReason-6
131
usageFailedReason-7
132
usageFailedReason-8
133
usageFailedReason-9
134
virtualSubscriberRestoreAttempt
135
virtualSubscriberRestoreFailed
136
writeCount