Preview

Mml Commands

Satisfactory Essays
Open Document
Open Document
1353 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mml Commands
My MML Command Summary

0 To know ip addresses ZQRI

1. System Restart ZUSS:SYM:C=DSK,;
2. Unit Restart ZUSU:BCSU,0:C=DSK,;
3. Check Restart Status ZUSI:COMP:;
4. Set Recovery Ban, RBAN(If this is set, in case of crash, the system will not restart..recovery is banned) ZUST:BCSU,0:S-RBAN
5. Clear Recovery Ban ZUST:BCSU,0:C-RBAN

6. List of all BTSs, BCFs and TRXs connected to the BSC. ZEEI;

7. List of all BTSs and TRXs in BCF ZEEI: BCF=x:;

8. List of the BCF and the TRXs attached to BTS ZEEI: BTS=x:;

9. Channels configured in a TRX under a BTS ZERO: BTS=x: TRX=y:;

10. Channels configured for all the TRXs in a BTS ZERO: BTS=x:,

11. Locking of TRXs ZERS: BTS=x: TRX=y:L:;

12. Un Locking of TRXs ZERS: BTS=x: TRX=y:U:;

13. Locking of Channels ZERS: BTS=x: TRX=y: CH=2&&4:L:;

14. Unlocking of Channels ZERS: BTS=x: TRX=y: CH=2&&4:U:;

15. Frequency ZEEI: BTS=x:;

16. BAND..List all parameters of BTS ZEQO:BTS=x:;

17. BTS Locking ZEQS:BTS=x:L:;

18. BTS UnLocking ZEQS:BTS=x:U:;

19. To check frequency hopping parameter(BTS HOPPING MODE) ZEQO: BTS=x: HOP

20. To set the frequency hopping parameter ZEQE: BTS=x:HOP=Y/N;

21. Coding Scheme(MCA, MCU), MEAN BEP, BLER..ALL GPRS params of BTS. ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: MCA=y:;...ZEQV: BTS=x: MCU=y:;

22. GENA/ EGENA status and setting ZEQO: BTS=x: GPRS:;(for status)....ZEQV:BTS=x: GENA=N/Y:; ZEQV:BTS=x: EGENA=N/Y

23. NSEI, BVCI ZEQO: BTS=x: GPRS:;

24. CDED, CDEF, CMAX(dedicated, default, maximum GPRS capacity) ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: CDED=a: CDEF=b: CMAX=c:; (Do GENA N/Y while changing CDED etc)

25. LA status(ELA) ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: ALA=Y/N:;

26. C/I Ratio ZEQO: BTS=x: GPRS:;

27. DCSA, DCSU, UCSA, UCSU(Uplink/ Downlink CS in Ack Unack mode) ZEQO: BTS=x: GPRS:; ZEQV: BTS=x: DCSA=a: DCSU=b: UCSA=c: UCSD=d:;

28. CODING

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 3151 Words
    • 13 Pages

    (1) When you boot your system, Linux isn't running yet and cannot save you from…

    • 3151 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system.…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I learned about using Group Policy precedence, as well as the Block Inheritance and Enforce settings.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By restricting user access, only allowing the user/employees enough access to successfully do and complete their job/tasks; you can prevent user destruction.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    Here are some steps/tools that you can use to stop any kinds of attacks upon these servers:…

    • 364 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    must be recoverable in the event of system failure or natural disaster. To accomplish this, you…

    • 246 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Use intrusion prevention tools called behavior blockers that deny programsthe ability to execute operations that have not been explicitly permitted.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    week 3 lab

    • 350 Words
    • 2 Pages

    1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times, etc. When you change your password, it cannot be the password you were just using.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mission Command

    • 2076 Words
    • 9 Pages

    With German forces on the run following the Allied success at Normandy and the breakout and pursuit across France, Allied forces were staged to enter Germany in late summer 1944. Both Field Marshal Montgomery and General Bradley clamored to be given the priority of effort. General Eisenhower chose Montgomery’s Operation MARKET GARDEN as the plan for action. It called for airborne forces to open the route for a ground force to move more than sixty miles up a single road, ending up north of the Rhine River near Arnhem, Netherlands. By accomplishing this task, the German Ruhr industrial heartland would be within easy grasp. But the operation failed. The ground force did not make it to the last bridge; it was six more months before Allied forces crossed the Lower Rhine River near Arnhem. Between 17 and 26 September 1944, there were 17,000 Allied casualties including eighty percent of the 1st Airborne Division (UK). The historical evidence overwhelmingly shows that the British 1st Airborne Division lost the Battle of Arnhem because of poor planning. This paper will prove the failure of The Battle of Arnhem was not solely the fault of MG Roy Urquhart. Although this was his first command of such a division (being an "outsider") could he have not completed his wartime mission any better despite having inexperienced leaders planning airborne operations, bad intelligence, allowing the Air Force to plan the DZs based off what was best for the air movement plan and poor execution. This paper examines MG Urquhart, the commander of 1st Airborne Division (UK).…

    • 2076 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays