Mobile Network Config Prototype
Mobile Network Config Prototype
Johan Wirn Telecommunication Systems Laboratory Royal Institute of Technology Stockholm, Sweden
Supervisor and examiner: Johan Montelius <jm@imit.kth.se> Principal: Patrik Bjrkander <patrik.bjorkander@ericsson.com> Advisors: Richard Persson <Richard.persson@ericsson.com>
Acknowledgements
This report is part of a Master of Science degree project conducted at the Telecommunication Systems Laboratory of the Royal Institute of Technology (KTH). The principal of the project has been the Network configuration & Integration unit (UG/I) at Ericsson in Kista. Ericsson specified the objectives of this project as part of the CCR-tool Used Case 2, and the work was conducted at Ericsson between June and December 2005. I would like to thank Ericsson for the opportunity of working with this project which has strengthen my confidence and throughout all the appreciation and comments Im sure that this will be a future coming product that Im pleased to have a part in. I would like to express my sincere gratitude to the following people who made this project possible: Johan Montelius, KTH, for his supervision and management during this project. Patrik Bjrkander, Ericsson, for giving me the opportunity to work with this project, great interest and support during the whole project. Richard Persson, Ericsson, for the supervision, support, knowledge and inspiration during the project. Roger Berg, Ericsson, for his interest and knowledge during the full duration of this project. Roger Dahln, Ericsson, for his support and great discussions regarding RSG. Mario Landreville, Ericsson Canada, for his help and supervision with the Ericsson SSG script. Mats Wrang, for his support, Visual Basic and database knowledge.
Abstract
The mobile telephone system is getting more and more services that have to been taken under considerations and together with the complexity within the system the demands is increasingly high on the support requirements of the network. The demand on network availability, quality and reliability are almost always close to 100 percent and applies to both the contents of the support and how fast it is delivered. The configuration of the network has to been taken out from the network to be able to solve the more complex problems that occur. The product experts of today are managing the handling of the configuration data of the system manually. This requires both time and knowledge on how to connect to the Operator to how the network is setup. During this final degree project, developments of a prototype for pointing out the possibilities of collecting the configurations from the network have been built. The prototype has then been used to evaluate and demonstrate important issues and possibilities related to the collection of configuration data. The second part of the project have been an evaluation of the possibilities on how to make the collection of the configuration data in an automatically way and collect the configuration to a centralised database.
Executive summary
There is a need for automatically collection of configuration data from the nodes within the mobile telephone system. The automatically collection and handling of configuration data from the Media gateway (MGw) has under this thesis project been taken under investigation. To prove the requested system functionality to handle the collect configuration, a Prototype has been build. The Prototype has proven that the necessary comparison of two selected configurations can be done and that it can be stored in such a way that users can select and browse stored configurations. There are 3 problems that have been taken under consideration. 1) Take out the configuration from the node. Is it or how will it be possible to take out the configuration from the node? 2) Automatically collection of the configuration data from the MGw How will we transport the configuration data out of the Operators network to our destination? 3) System design of storing and displaying collected data How will it be possible to compare two configurations, store them and displaying configuration data from the MGw?
Data Base
Problem 3
Problem 1
How to take out the configuration has been solved in such a matter that there is a file located on the MGw that has to been taken out from the node through SFTP (Secure File Transport Protocol). The file is moved automatically throughout script to the SSG (Secure Support Gateway).
Problem 2
Automatically collection has been solved through a new but existing Ericsson system called Remote Support Gateway (RSG). Although this is primary used for remote access today this has been modified to include data transport of the configuration file from the MGw.
Problem 3
The potential of a system that will be able to store, display and compare different configurations from the MGw has been proven in a Prototype. Although the Prototype cant function and directly be a part of the whole automatically collection solution the Prototype shows the potential and pointing out that this functionality is really possible to build in a fullscaled solution. There is still however a lot of work that needs to be done before taken this to commercial use but the platform and the answers presented in this thesis is although a good investigation and answer lot of the questions regarding how and if this is possible to fulfill.
Conclusions
This thesis project has been an important step towards the realization of a system that will have the availability to automatically collect configuration data out of the Operator networks. This study has not only investigated if and how this will be possible it has also been proven with a Prototype that the collected information can be used for displaying and comparing different configurations. The project has also created a foundation for the upcoming system development and implementation process. Another important thing is the positive effects generated by this project. An example of this is the fact that the Prototype and the investigation has lead to that several important step has been taken towards the vision on automatically collecting data. For the technical side of the process of automatically collecting the configuration data this project has come to the conclusion that this could be implemented and there will not be any technically obstacle although all the services must be tested This thesis project has been an important step towards the realization of the automatically collecting process and the system developed during this project has pushed the decision process forward. The project has also created a foundation for the upcoming system development process to be able to automatically collect the configuration data from the nodes within the mobile telephone system.
Abbreviations
Explanation ACE-Server CLI DMZ ECGW ECN EGW FTP GUI IP ISDN MGw MMS RADM RDT RSG SFTP SMS SSG SSH TCP/IP UDP XML An Authentication Server from RSA Security Command Line Interface Demilitarized Zone Ericsson Corporate Gateway. Ericsson Corporate Network Ericsson Gateway File Transport Protocol Graphical User Interface Internet Protocol Integrated Service Digital Network Media Gateway Multimedia Messaging System Remote Administration Remote Data Transport Remote Support Gateway Secure file transfer protocol Short Message Service Secure Support Gateway Secure Shell Transport Control Protocol / Internet Protocol User Datagram Protocol Extensible Markup Language
Table of Contents
CHAPTER 1 INTRODUCTION ................................................................1 1.1 1.2 1.3 1.4 GENERAL OVERVIEW.........................................................................1 PROBLEM STATEMENT .......................................................................2 PARTICULARS OF THE PROJECT ..........................................................3 RELATED WORK .................................................................................3
CHAPTER 2 SYSTEM DESIGN OF REMOTE SUPPORT GATEWAY ..5 2.1 WHY REMOTE SUPPORT GATEWAY ....................................................5 2.2 THE FUNDAMENTALS OF REMOTE SUPPORT GATEWAY ......................6 2.2.1 Secure Support Gateway ............................................................6 2.2.2 Ericsson Gateway .......................................................................7 2.2.3 Remote Data Transfer ................................................................7 2.2.4 Remote Administration ...............................................................7 2.3 SECURITY ...........................................................................................8 2.3.1 Approved connection ..................................................................8 2.3.2 Firewall ......................................................................................8 2.3.3 IP security...................................................................................9 2.3.4 Secure Shell ..............................................................................10 CHAPTER 3 CONFIGURATION OF AUTOMATIC REMOTE COLL .11 3.1 THREE COLLECTION PHASES .............................................................11 3.2 COLLECT CONFIGURATION DATA FROM THE MGW ...........................12 3.3 TRANSPORT THE COLLECTED DATA FROM THE MGW........................13 3.3.1 Data Collection Scripts ............................................................13 3.3.2 The Configuration file(s) .........................................14 3.3.2.1 Example of the MGw configuration File .................18 3.3.2.2 Running the main script.........................................................19 3.3.2.3 The Shell Script......................................................................19 3.3.3 The SCRON file ........................................................................20 3.3.3.1 Example of the Scron file.......................................................20 3.4 REMOTE DATA TRANSFER CONFIGURATION .....................................21 3.4.1 RSGrdt user account.................................................................21 3.4.2 RADM user account..................................................................21 CHAPTER 4 THE PROTOTYPE ............................................................23 4.1 CONDITIONS .....................................................................................23 4.2 LAYOUT ............................................................................................24 4.2.1 Visual Basic ..............................................................................24 4.2.2 Browsing module ......................................................................25 4.2.3 Comparing module ...................................................................26 4.2.4 Uploading module ....................................................................28 4.3 SYSTEM DESIGN ...............................................................................29 4.3.1 The Database............................................................................30 4.3.2 The Polyhedra tool ...................................................................30
CHAPTER 5 CONCLUSIONS .................................................................31 5.1 THE VISION OF THE AUTOMATICALLY COLLECTION PROCESS ............31 5.2 SYSTEM DESIGN OF AUTOMATICALLY COLLECTION .........................32 5.3 THE PROTOTYPE ...............................................................................32 5.4 TECHNICAL CONCLUSIONS ................................................................32 5.5 FUTURE WORK ..................................................................................33 REFERENCES ........................................................................................34
10
Chapter 1 Introduction
1.1 General Overview
People have a need for mobility and have an on-line mentality that has driven the research and development for mobile phones system forward. Mobile telephone systems of today are all the time in an updating and upgrading mode and new features and services are requested and developed constantly [1]. The mobile telephone system will not longer only be used to setup a call between different subscribers it must handle all the services like call forwarding, voicemail, SMS, MMS, data traffic handling, billing, logging, authentication, encryption and many more services [2]. This complexity of todays mobile telephone- and datacom networks is putting increasingly high demands on the support requirements of such networks. The demands on network availability, quality and reliability are almost always close to 100 percent [1]. Each node in the mobile telephone system has a very specific role but because of the services it performs, partnership and interaction with other nodes within the system, the system itself becomes very complex and hard-to-grasp. Hard-to-grasp in a way that one or many changes can affect the overall performance in the system and the reason, that of cause is somewhere in the configuration of the system, can be hard to find. As pointed out the partnership and interaction between nodes within the mobile telephone system are affecting the overall performance but this will also affect the number of parameters within the node. For example there are 20-30.000 node specific parameters to set on a single Media Gateway (Node within the mobile telephone system) [4]. These parameters are not only specific for the Operator, they are specific for the node itself which means that if there are, let say 3 Media Gateways within the mobile system, there are 60-90.000 node specific parameters to set. This can be hard or even impossible to get an overview over even for the most advanced expert. Each mobile telephone system node has its own configuration and complexity and because of the interaction between the different nodes they can effect each other and in the end the overall performance of the network. Therefore there will be an extreme advantage to be able to go back and see how the configuration has change over time. Not only see the current configuration but to be able to get the perspective and compare different configurations [4].
The prototype will be configured in 4 parts: 1 - Interface An interface must be configured towards Polyhedra to be able to convert the Media Gateways (MGw) configuration information. 2 - Database All the configuration of the MGw shall be stored in a structured end easy manner. The database shall be easy to browse for Meta-data (i.e. nodenamn, hardware- and software type, country, operator etc). 3 - GUI/Browser functions Throughout a GUI or a CLI prompt it shall be possible to browse the database after given parameters with help of Meta-data. 4 - Report function A Comparison report that displays all the differences between two selected configuration files shall be generated. The report function shall not draw any conclusions.
The nodes within the RSG solution. On the left the Ericsson NW and to the right the Operator NW. IPSec is protecting the communication over the unsecured channel.
2.3 Security
In a security concept, one of the keys of RSG is to protect both the Operator and the Ericsson network. One vital part for achieving this is by handling the user authentication and authorization at both ends. The security aspect involves advanced authentication configuration through ACE-server and one-time password. [8]
2.3.2 Firewall
The RSG concept is built with enough security for a stand-alone installation. However, in almost all cases an existing firewall infrastructure is in place at the Operator side, and the RSG nodes could then be installed into the existing DMZ network with the following rules applied in the Operator Firewall [1]: ESP (IP Encapsulating Security Payload) for IPSec (protocol 50) UDP port 500 for IPSec ICMP 0, Internet control message protocol for echo reply ICMP 8, Internet control message protocol for echo ICMP 3, Internet control message protocol for destination unreachable
The below picture shows the solution where there is no DMZ firewalls existing. The SSG itself act as a fully configurable secure firewall, which makes the connection into the network safe. To protect the communication over the unsecured network the traffic is encapsulated inside IPSec (IP security) and SSH (Secure Shell).
Picture shows the RSG solution without an existing DMZ. The traffic is encapsulated inside IPSec and SSH.
2.3.3 IP security
IPSec (IP security) is a standard for securing IP communications and is used for securing the communications by encrypting and authenticating all IP packets. IPSec provides security at the OSI 3rd layer, network layer, and is in the RSG solution used to construct a Virtual Private Networks (VPN) tunnel between the Operator and Ericsson over the unsecured network. RSG is also always used together with SSH (Secure Shell) for secure login and file transport of the configuration data. IPSec is a set of cryptographic protocols for securing packet flows and key exchange. For securing packets there are two different types of protection or techniques. One, and the one that RSG is used, is the Encapsulating Security Payload (ESP) that provides authentication, data confidentiality and message integrity. The second, Authentication Header (AH) provides authentication and message integrity, but does not offer confidentiality. Originally AH was only used for integrity and ESP was used only for encryption. The authentication functionality was added subsequently to ESP [9]. The IPSec protocol protects the IP packet on a lower level than other Internet security protocols in widespread use, such as SSL and TLS. These operate from the transport layer up (OSI layers 4 - 7). This makes IPSec more flexible, as it can be used for protecting both TCP and UDP-based protocols, but increases its complexity and processing overhead, as it cant rely on TCP to manage reliability and fragmentation. IPSec was intended to provide either tunnel mode, portal-to-portal communications security, in which security of packet traffic is provided to several machines (even to whole LANs) by a single node, or in transport mode. Transport mode secure the end-to-end security of packet traffic in which the end-point computers do the security processing [9]. Both the tunnel and the transport mode can be used to construct Virtual Private Networks (VPN) and RSG is not depending on which mode to use however the tunnel mode is the dominated one. Note however, that the security implications are quite different between the two operational modes.
10
11
12
The following directories are created in /var/rdt/nidc. tmp Used as a temporary location during the execution of the data collection script. etc Contains the configuration file(s). log Contains the log file. transfer Contains sub-directories and is used as temporary location for collected data. The package is included a whole environment for taking care of the internal transport of the data to the SSG. Because this environment will act automatically and with no interference of the human factor the whole environment is controlled by the script scron. Scron define when to start the collection procedure this can be seen as a chain reaction: The Scron calls the Shell script with the proper configuration file. Within the configuration file there will be a set of Operator and node specific parameters that defines how and what to collect within the network. The Shell script calls the main script that is a standardized perl script that takes care of the transport defined in the configuration
file.
What
Scron script will contain the information - When
This script will be explained in details in chapter 3.3.2, The Configuration file(s) and chapter 3.3.3, The Scron file.
13
To automatically collect the requested data (db.dat) from the MGw and transport it to the SSG the Data Collection Scripts connects the MGw using FTP. In this case it is suitable because we want to collect a file and have access to a FTP-server on MGw. Except from the fact that we are using FTP for the transport there are otherwise three different types of protocols to choose from: TELNET, FTP and SYBASE. Each protocol is identified in the collection type of the configuration file. FTP Collects date using file transfer protocol by transferring files. Collects data using a Sybase client for direct connectivity to SQL server by sending queries. Collects data using TELNET
SYBASE
PRINTOUT
Within each section a list of properties are declared. The property is composed of a section name, followed by an attribute. A dot is used as a separator for each word and last a value of the attribute is set. Example: siteInfo.country = Canada.
14
Of cause this properties could have entered directly into the main script but to have a flexible environment, and the fact that it would be a proper way to in the future reuse this for contact with other nodes within the operator network, the need to have this entries separated from the main script is obvious. The configuration file will then be used by the main script to identify node and operator specific properties for the automatically collection. Site info The first section of the configuration file is called site info. This section is used to describe the market and all the information regarding to this. The siteInfo is very Operator specific.
Property SiteInfo.operator Description
String that identifies the operator name. String that identifies the market name String that identifies the system name (UMTS, GSM) Identify the country Characters string that identifies the country code String that identifies the market id. String that identifies the region.
Data Collection The data collection section is used to indicate different directory locations, script version, etc.
Property dataCollection.workingDir Description Directory location that identifies the root directory of the data collection. Default: /usr/local/rdt/nidc Directory location that identifies the temporary directory. This directory shall be used only by data collection. Default : /var/rtd/nidc/tmp Directory location that identifies the directory location for the collected files Identify the version of data collection package Debug flag. Default: 0. Can be one of the following: MSC, RXI, RNC, RANOS, GSN, HLR or MGW.
dataCollection.tmpDir
15
Logger The logger section is used to define the log property required by the logger module.
Property log.filename log.path log.rootLogger log.mode log.size Description String that identifies the name of the log file Directory location that identifies the path of the log file String that represents the logger properties String to Identify the mode. Default: append Digits string to indicate the size in bytes.
Network Element The network element section is used to identify which network element to collect information from. This structure is repetitive, that means that one or many network element can be identified. It has one index to guarantee that each network element will be unique. Therefore, each property of a network element is starting with the identifier NetworkElement followed by an index of the network element to guarantee the uniqueness. Example: NetworkElement.0.NodeName = MGw1 Its also possible to set more than one collection for a same network element. Therefore, the collection attributes are followed by an index. See the example below: NetworkElement.0.CollectionType.0 The properties bellows are required by each network element.
Property NetworkElement.(index).nodeName NetworkElement.(index).nodeType NetworkElement.(Index).ipAddress NetworkElement.(index).url NetworkElement.(index).bdd Description String that identifies the network element String that identifies the node type String that identifies the ip address String that identifies the url String that identifies the database name Digits string that identifies y the SYBASE NetworkElement.(index).sybasePort port. String that identifies the node standard. NetworkElement.(index).nodeStandard Accepted values are : tdma, gsm, umts. Digit string that indicate the NetworkElement.(index).nbCollection number of collections String that identifies collection type. Accepted values are: NetworkElement.(index)..collectionType.(index) FTP, PRINTOUT, SYBASE String that identifies the collection mode. There are 2 NetworkElement.(index).collectionMode.(index) modes. CURRENT or DAY_BEFORE. String that identifies the NetworkElement.(Index).collectionVersion.(index) collection version.
16
NetworkElement.(index).userName.(index)
NetworkElement.(index).userName.(index) NetworkElement.(index).receivers.(index)
String that identifies the user name identification for a particular collection String that identifies the password identification for a particular collection String that identifies the file receivers
Collection Type The collection type section is used to define the properties of a particular collection. For example, it identifies, in case of FTP, which file to retrieve and the directory where it will be located. The property of a collection type is composed of a collection type identifier followed by a collection type version followed by the attribute name identifies each collection type property. For example: FTP.1.0.nbFile Except from the fact that we are using FTP for the transport there are otherwise three different types of protocols to choose from: TELNET, FTP and SYBASE. Each protocol is identified in the collection type of the configuration file. FTP SYBASE PRINTOUT Collects date using file transfer protocol by transferring files. Collects data using a Sybase client for direct connectivity to SQL server by sending queries. Collects data using TELNET
FTP Collection Type properties The FTP collection type is transferring files or/and an entire directory. It uses the File Transfer Protocol. The table below contains the properties required by the FTP collection type.
Property NbFile FileType Dir.(index) Filename(index) Description Digit String that indicate the number of iteration. (See Note) Character string that identifies the file type. For example, txt, log, xml. Directory location where to retrieve the file from. String that Identifies a file name. It can be an absolute name or a file mask where wildcard can be used.
Note: The nbFile property is the number of file name you can get within the same fetch. For example, you might want to retrieve different log files located in 2 different directories and have them in the same output file. Date Tag The filename can also include a date tag as <YYYY><MM><DD>. This tag will be replaced by a date. The date is determined by the collection mode of each collection type.
17
18
# Collection type Section. FTP.1.0.nbFile = 1 FTP.1.0.dir.0 = /d/configuring/cv/ FTP.1.0.fileName.0 = db.dat FTP.1.0.fileType = dat
The h argument is used to indicate the directory location of the installation. The c argument is used to indicate the file name (with no directory location) of configuration file to use. The script expects to find the file name in the /etc directory of the installation.
19
A minute, expressed as a number from 0 through 59. An hour, expressed as a number from 0 through 23. A day of the month, expressed as a number from 1 through 31. A month of the year, expressed as a number from 1 through 12. A day of the week, expressed as a number from 0 through 6 (with 0 standing for Sunday). A year, expressed as a number from year 2005 and forward Any of these fields may contain an asterisk * standing for all possible values. For example, if you have an * as the day of the month, the job runs every day of the month. A field can also contain a set of numbers separated by commas, or a range of numbers, with the first number followed by a minus sign - followed by the second number. Here are some examples. 00**** - Midnight every day 0 0 * * 1-5 * - Midnight every weekday 0 0 1,15 * * * - Midnight on 1st and 15th of each month 001*5* - Midnight on 1st of each month and every Friday Note: The Scron file's rows are similar to the crontab-syntax, but have some add on and differences. Empty lines are allowed, comments are allowed (# at beginning of line) and it has one extra field for year.
20
21
22
4.1 Conditions
There are different conditions involved building the prototype that will show the potential and benefits of collecting the configuration data. The prototype should not been seen as a application on how to display this information in the best user friendly way it shall more been seen as prove of how this information can be readable and used in help of solving and prevent problems. The prototype is structured from three different conditions The availability of storing configuration data, collected from the MGw. This will be presented in how the database is structured and how to make the collected configuration readable. A browsing functionality of the collected information and a GUI interface for presenting it to the user. The browsing information will be taken out of the database and include information to sort out different markets, i.e. Country, Operator etc. The last part is that there must be a way to compare different configurations to each other and the result will be presented in a report function. This will not only limit the user to compare different configurations from the same node. The user will also be able to compare different MGw and also different operators MGw.
The prototype will point out the availability on how to handle the configuration collected from the MGw. The prototype shall not be seen as an extension or part of the automatic remote collection. It will be a standalone application where uploading of new configuration data will be handled manually. The prototype itself will not make any decision or changes of the information in any way. That is up to an expert within the area to manually come to a conclusion based on the material presented by the prototype.
23
4.2 Layout
The layout of the Prototype is presented in a well-known format because of the choice off programming languish Visual Basic and will be based on three different modules. Browsing module Comparing module Upload module
The browsing module will take care of browsing the database out of information regarding to the choices the user makes on which markets that shall be displayed. Out of the choices the comparing module, compare the differences within the selected configurations and display them to the user. The differences can also be generated in a report for later use. Because of the chosen system design, the Prototype will act as a stand-alone application and the uploading of new data must be done manually throughout the uploading module. This module will ask the user several questions regarding the market associated to the new data. All this information will be placed in the database for use by the browsing module. Because of the chose of Visual Basic for the programming language the layout of the program is very familiar to the windows user. The tools for designing Visual Basic is a graphical tool and the visual effects are very fast developed and adjustable In fact this graphical design will affect the appearance of the program, because of the well-known designed, to be very professional.
the visual settings of the graphically interface so the executed program will be familiar to the user because it looks like all his other windows programs. With Visual Basic it will be easy to create a professional interface in just a few keystrokes.
Picture shows the Prototype with the browsing module activated. It is in a very well-known format for the Windows user.
With the browsing function the user have a selected way of sorting out different markets and also a way to just browse the database for information. The information showed in the GUI of the Prototype is filtered out from the database so only relevant information is showed. For example, if the user wants to see configuration data from just one country, operators within that country is showed and not operators located somewhere else. The main reason for the browsing function is to choose two configurations to compare. To do this the proper configuration has to be selected and chosen by the Add button. This will cause that the configuration data that has been chosen by its appearance in the Sites Added field of the screen.
25
In the Result window the result of the comparison, initiated by the user will be showed. Because of the conversion made by the Polyhedra tool there is now 63 different files regarding to each configuration that has to be compared to each other. The result is presented with the number of differences within each file. When selecting one of these 63 files showed in the Result window detailed information regarding to the differences in this file will end up in the detailed information window to the right. Here detailed information of differences within selected file will be showed. Further down the completed file will be showed for manually browsing. Within the comparing module you will also find the report function.
26
Report function The report function will in an easy way show the differences between the configurations and is consisting of an overviewed specification and a detailed list of all the differences between the two configurations. Within the report all the difference throughout the comparison in the Comparing module will be displayed.
Picture shows the Report function of the Prototype. An overview of number of differences is presented and below a more detailed specification on the differences.
The report function has turned out to be a very popular and the most satisfied function within the Prototype. This is because of the easy and functional way the differences between the configurations are presented. The user will without any effort have a good overview of the differences and wont have to go through all the 63 files manually, which is very time consuming. The report will also be able to print or stored for future use throughout the menu of the Prototype.
27
The Prototype and its Upload module. The user will add some market information associated with the configuration selected.
To upload new configurations to the database knowledge of the market is needed such as Country, Operator, Site, Node, Software version, Node type and Node configuration. This will be sorted out and placed in the database but not confirmed that the correct information has been added to the configuration. Although, one of the parameters is checked and that is because without the right Software version the converting tool, Polyhedra, will not be able to convert the information required and therefore the configuration cant be readable and therefore within no use. For further details please see next chapter 4.2, System Design.
28
Upload scenario
Browsing scenario
MS Access
Polyhedra
63 files
The browsing module of the Prototype has an interface towards the database to filter out the different choices made by the user. For example if the user selecting on the country Sweden only the operators placed in that country will be showed in the Prototype. This filtering and interface is forming the Browsing scenario. For more details regarding the browsing module please see chapter 4.1.2, Browsing module. To be able to show the configuration to the user of the Prototype the configuration has to be converted into 63 readable files [17]. The converting process made by the Polyhedra tool and the market information associated to the new configuration collected is forming the upload scenario.
29
The database design of the MS Access database. As showed the database is a relationship database with relations between the different tables.
Chapter 5 Conclusions
During this thesis an evaluation of the automatically collection process and a designed of a Prototype for taking care of the collected data from the node Media Gateway has been done. This chapter concludes this thesis project by summarizing the most important insights gained.
This thesis project has been an important step towards the realization of the automatically collecting process and the system developed during this project has pushed the decision process forward. The project has also created a foundation for the upcoming system development process to be able to automatically collect the configuration data from the nodes within the mobile telephone system.
31
32
33
References
[1] Ericsson Internal Document (2004), RSG Product Description, 1551HSD 103 36 Uen Rev: F Ericsson Internal Document, Fred Erson (2005)- Performance data collection process, EAB/RN-04:0337, fred.erson@ericsson.com Ericsson Internal Document (2004) - SSG Administration Guide Release 3.2, 2/154 31-HSD 103 36 Rev: D Richard Persson, Ericsson Kista, Interview (November 2005), richard.person@ericsson.com Stefan Griph, RSG Product Manager, Stefan.Griph@ericsson.com Roger Dahlen, Ericsson Lule, RSG Support Discussions and interviews (October 2005), roger.dahlen@ericsson.com Mario Landreville, Ericsson Canada, SSG script handling and interviews (October 2005), mario.landreville@ericsson.com SecureID from RSA, ACE-servers are a system to provide strong authentication through RSA SecurID one-time passwords [www], www.rsasecurity.com, November 2005 N.Doraswamy, Dan Harkins (1999), IPSec The new security standard for Internet, Intranets, and Virutal Private Networks, ISBN 0-13-011898-2 Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes SSH: The Secure Shell (The Definitive Guide), O'Reilly 2005 (2nd edition). ISBN 0-596-00895-3 Forouzan, B. (2003). TCP/IP Protocol Suite, 2nd Edition. McGraw-Hill. ISBN 0-07-296772-2. Forouzan, B. (2004). Data Communications and Networking, McGrawHill. ISBN 0-07-123241-9. Greg Perry (1999) - Lr dig Visual Basic 6 p 3 veckor, [versttning: Jerker Thorell] ISBN 91-636-0523-6 Torsten Jonsson (2002)- Visual Basic i fokus : grundlggande applikationsutveckling och programmering version 6. ISBN 91-44-02427-4: [2]
[3]
[4]
[5] [6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15] [16]
Jan Friberg (1992) - Visual BASIC: Handboken, ISBN 91-86201-28-1 Redmond, Wash.: Microsoft Press, cop. 1998 - Microsoft Visual Basic 6.0 programmer's guide. ISBN 1-57231-863-5 Enea AB (January 2005), Real-Time Relational Database Version 6.2.0 [www], www.polyhedra.com, November 2005 Enea AB (October 2005), SQL Client Version 6.2.0 [www], www.polyhedra.com, November 2005
[17]
[18]
35