Preview

Features of MoShell

Satisfactory Essays
Open Document
Open Document
327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Features of MoShell
In general, MoShell is capable of reading and editing Managed Objects, therefore it provides similar O&M services as the M-MGw Node Manager.
MoShell is a text-based network element manager for nodes that operate on the so-called Cello platform, which can be used across different nodes such as M-MGw, RNC and Node-Bs. Unlike element manager which requires a different version for M-MGw and RNC/Node-Bs.
MoShell provides certain powerful features that help in node configurations, troubleshooting and in node management. For example, it is possible to perform operations on many Managed Objects at the same time, which is a tremendous advantage over Node Manager.
MoShell also supports scripting, which gives new opportunities for node management, because many processes can be automated.
It is also possible to read the whole node configuration data and save the output to a log file.
AMOS Supports live network monitoring of Performance management report (PMR) for Network performance, counters and querying of capacity management reports e.g processor loads and node availability checks
MO configuration allows performing various MO operations, including reading MO contents, setting attribute values, creating and deleting Managed Objects as well as executing different MO actions in a fast and efficient way.
Has a logging service which provides alarm, event, system and availability logs.
There is a help functionality that can be used to full advantage of powerful features supported be MoShell such as the grep command.
RNC kget dump files for inconsistency checks, RNC parameter audits are executed on AMOS.
Batch parameter executions e.g. Rehoming of sites((Neighbour deletions, site rehoming, simulation exercises) Nodeb Mobatch executions for collecting NodeB parameters, features,CEs,plugInUnits.
High level O&M functions will also be a challenge for example Scripting Logging onto boards Traces Deletion and recreations and

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    Managing, maintaining, and modifying applications is easier, since only the web application on the server-side needs to be updated.…

    • 776 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Puppet: Puppet is a Ruby-based configuration management tool for Unix and Linux systems and Microsoft support was added recently to it. Puppet is often used to manage a host throughout it lifecycle – from initial installation, to maintenance and upgrades and finally to end-of-life. Puppet is designed to interact continually with the nodes it manages, unlike provisioning tools which configure the hosts and leave them unmanaged. Puppet is generally used in a client-server model where the Puppet manager is installed on the host which manages Puppet clients installed on managed nodes. Puppet manifests can be written on the manager which uses declarative language where the type of resource and its attributes are defined and Puppet takes care of implementing it on different…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Monitored GCCS-M system connections, communications channels, data feeds, manage overlays, pre-canned map and plot queries and track filters resulting in the system being operational during FST…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    OMNeT++ consists of a graphical editor which helps to edit network topology files graphically or in NED source view.…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Reduce: Reduce step processes the data from the slave nodes and outputs from the map task serves as the input to reduce task and to form the final and ultimate output.…

    • 496 Words
    • 2 Pages
    Good Essays
  • Good Essays

    This is used by Microsoft to seamlessly create a client/server model in Windows NT, with very little effort.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    Used for creating trace files Used by the optimizer for picking the best execution plans Stores the execution plan…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Data base administrator

    • 529 Words
    • 3 Pages

    (3) Ability to perform both DB2 and also operating system performance monitoring and the necessary adjustments.…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In the cisco environment the network management architectures almost always have the same basics, when it comes to its computer systems network tools and devices or software to help with maintenance, prevention and the recognizing of problems. Problems that can become bigger issues if network management is not in placed, as entities are programmed to take actions.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Sdlc Value

    • 1412 Words
    • 6 Pages

    Each of these system development offer advantage that are based on the scope and complexity of the system being built, and they all work differently because of the scale of the system varies widely and different processes are appropriate for different types of systems.…

    • 1412 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sample Manager LIMS supports the efforts of companies in the petrochemical and refining industries to control their processes with rigorous testing and real-time monitoring.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    2. Besides the WHOIS utility covered in this lab, what other functions did you discover are possible…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 2.6.2: Using Wireshark

    • 2260 Words
    • 10 Pages

    It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting.…

    • 2260 Words
    • 10 Pages
    Powerful Essays