Preview

Mml Commands

Satisfactory Essays
Open Document
Open Document
1353 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mml Commands
My MML Command Summary

0 To know ip addresses ZQRI

1. System Restart ZUSS:SYM:C=DSK,;
2. Unit Restart ZUSU:BCSU,0:C=DSK,;
3. Check Restart Status ZUSI:COMP:;
4. Set Recovery Ban, RBAN(If this is set, in case of crash, the system will not restart..recovery is banned) ZUST:BCSU,0:S-RBAN
5. Clear Recovery Ban ZUST:BCSU,0:C-RBAN

6. List of all BTSs, BCFs and TRXs connected to the BSC. ZEEI;

7. List of all BTSs and TRXs in BCF ZEEI: BCF=x:;

8. List of the BCF and the TRXs attached to BTS ZEEI: BTS=x:;

9. Channels configured in a TRX under a BTS ZERO: BTS=x: TRX=y:;

10. Channels configured for all the TRXs in a BTS ZERO: BTS=x:,

11. Locking of TRXs ZERS: BTS=x: TRX=y:L:;

12. Un Locking of TRXs ZERS: BTS=x: TRX=y:U:;

13. Locking of Channels ZERS: BTS=x: TRX=y: CH=2&&4:L:;

14. Unlocking of Channels ZERS: BTS=x: TRX=y: CH=2&&4:U:;

15. Frequency ZEEI: BTS=x:;

16. BAND..List all parameters of BTS ZEQO:BTS=x:;

17. BTS Locking ZEQS:BTS=x:L:;

18. BTS UnLocking ZEQS:BTS=x:U:;

19. To check frequency hopping parameter(BTS HOPPING MODE) ZEQO: BTS=x: HOP

20. To set the frequency hopping parameter ZEQE: BTS=x:HOP=Y/N;

21. Coding Scheme(MCA, MCU), MEAN BEP, BLER..ALL GPRS params of BTS. ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: MCA=y:;...ZEQV: BTS=x: MCU=y:;

22. GENA/ EGENA status and setting ZEQO: BTS=x: GPRS:;(for status)....ZEQV:BTS=x: GENA=N/Y:; ZEQV:BTS=x: EGENA=N/Y

23. NSEI, BVCI ZEQO: BTS=x: GPRS:;

24. CDED, CDEF, CMAX(dedicated, default, maximum GPRS capacity) ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: CDED=a: CDEF=b: CMAX=c:; (Do GENA N/Y while changing CDED etc)

25. LA status(ELA) ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: ALA=Y/N:;

26. C/I Ratio ZEQO: BTS=x: GPRS:;

27. DCSA, DCSU, UCSA, UCSU(Uplink/ Downlink CS in Ack Unack mode) ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: DCSA=a: DCSU=b: UCSA=c: UCSD=d:;

28. CODING

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 3

    • 3151 Words
    • 13 Pages

    (1) When you boot your system, Linux isn't running yet and cannot save you from…

    • 3151 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system.…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I learned about using Group Policy precedence, as well as the Block Inheritance and Enforce settings.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By restricting user access, only allowing the user/employees enough access to successfully do and complete their job/tasks; you can prevent user destruction.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    Here are some steps/tools that you can use to stop any kinds of attacks upon these servers:…

    • 364 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Three Day Road Chapter Notes

    • 6088 Words
    • 25 Pages

    -Niska is taking X home from the white man’s town, into the bush where she lives. It will be a “three-day paddle home” down river towards Hudson’s Bay (8).…

    • 6088 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    Texas political society and belief system are very much portrayed by the mix of three principle philosophical streams: established radicalism, social conservatism and populism. Established radicalism puts the essential political worth on political game plans that take into consideration the fullest activity of individual freedom the length of the freedoms of others are not preposterously limited. Established liberal thoughts frequently shape the premise for resistance to the utilization of government to achieve social targets. They push rather dependence on private activities or the free market to decide the best results. Notwithstanding going about as a rampart for business and the business sector economy, established radicalism in Texas additionally has…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Comment on the view that the design argument provides a coherent explanation of the universe (9)…

    • 666 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Mission Command

    • 2076 Words
    • 9 Pages

    With German forces on the run following the Allied success at Normandy and the breakout and pursuit across France, Allied forces were staged to enter Germany in late summer 1944. Both Field Marshal Montgomery and General Bradley clamored to be given the priority of effort. General Eisenhower chose Montgomery’s Operation MARKET GARDEN as the plan for action. It called for airborne forces to open the route for a ground force to move more than sixty miles up a single road, ending up north of the Rhine River near Arnhem, Netherlands. By accomplishing this task, the German Ruhr industrial heartland would be within easy grasp. But the operation failed. The ground force did not make it to the last bridge; it was six more months before Allied forces crossed the Lower Rhine River near Arnhem. Between 17 and 26 September 1944, there were 17,000 Allied casualties including eighty percent of the 1st Airborne Division (UK). The historical evidence overwhelmingly shows that the British 1st Airborne Division lost the Battle of Arnhem because of poor planning. This paper will prove the failure of The Battle of Arnhem was not solely the fault of MG Roy Urquhart. Although this was his first command of such a division (being an "outsider") could he have not completed his wartime mission any better despite having inexperienced leaders planning airborne operations, bad intelligence, allowing the Air Force to plan the DZs based off what was best for the air movement plan and poor execution. This paper examines MG Urquhart, the commander of 1st Airborne Division (UK).…

    • 2076 Words
    • 9 Pages
    Powerful Essays