+ All Categories
Home > Documents > TEMS Investigation 15.x Training

TEMS Investigation 15.x Training

Date post: 22-Nov-2015
Category:
Upload: taufiqibrahimext
View: 512 times
Download: 5 times
Share this document with a friend
Description:
TEMS Investigation 15.x Training
Popular Tags:
110
TEMS Investigation 15.X - Feb 2014 @ Globe 1 TEMS INVESTIGATION 15.X
Transcript

TEMS INVESTIGATION 10.1

TEMS Investigation 15.X - Feb 2014 @ Globe5

SOURCES OF DATA (1/2)TEMS Investigation receives information from a number of different sourcesPhones and UEsScanners and phone-based scannersPC cards and USB modemsAQM module In-building positioningGPS receiversCell definition filesLogfiles

[ DATA COLLECTION ]The TEMS Investigation software gets information from a number of different sourcesPESQ and POLQA TEMS Investigation 15.X - Feb 2014 @ Globe6SOURCES OF DATA (2/2)Phones, Scanners, PC cards, USB modems, and Fixed Wireless Terminals provides TEMS Investigation with information about the Radio Access NetworkConnected via USB, serial or Ethernet port*Auto detection of devicesData communication via RAS and NDIS*There are differences between devices from different vendors and between models from the same vendorThe correct device license is required on the license key to connect a specific device

[ DATA COLLECTION ]

NDIS Network Driver Interface SpecificationRemote Access Service (RAS)TEMS Investigation 15.X - Feb 2014 @ Globe4

Data collection and real-time troubleshootingOn-screenpost-processingReportingWHAT IS TEMS INVESTIGATION?

[ INTRODUCTION ]TEMS Investigation 15.X - Feb 2014 @ Globe7LICENSINGLicensing is based on the HASP technologyHardware-based (HASP HL)Software-based (HASP SL)License type based on GLSGLS (Global Licensing System)

A HASP key is a hardware device that contains the license information for your Canfield software.Presentation Name Month Year7TEMS Investigation 15.X - Feb 2014 @ Globe8ODM (On Device Measurement) TEMS POCKETCloud based LicenseODM Icon running on the phoneGLS Based License (New) TEMS INVESTIGATIONGLS Based LicenseCloud based License (TEMS Licensing)GLS websites (http://ascom.flexnetoperations.com)ODM Icon running on the phone

[ LICENSE]Presentation Name Month Year8Smart Phone (LT25i)Smart Phone (LT25i)Sony Xperia (No Longer join cooperation with Ericsson)Technology: GSM/WCDMA/LTEManufactured: 2012Android Base (Open System)Qualcomm Chipset (MSM8960 Snapdragon)HSPA+WCDMA (42/5.8), LTE (100/50)CPU: Dual Core 1.5 GhzSmartData Communication: NDISTEMS Investigation 15.X - Feb 2014 @ Globe9TEMS Investigation 15.X - Feb 2014 @ Globe10AUTO DETECTION OF EQUIPMENTAuto detection of equipmentNearly all of the devices that are connectable in TEMS Investigation are detected and enabled automaticallySome few devices have to be enabled manuallyNon-verified equipment can be manually added to the auto detection list via the manual UE configuration utility Devices that have been detected by TEMS Investigation appear in the Equipment Configuration window

[ DATA COLLECTION ]Connect and GO!

TEMS INVESTIGATION 15Module 2: Software Installation and Recommended Settings[ THE INDUSTRY-LEADING AIR INTERFACE TEST TOOL ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This module should take approximately 60 minutes.

Explain to the audience that in this module we will talk about software installation and recommended settings for running TEMS Investigation.11TEMS Investigation 12.0, August 2010, Ascom12TEMS Investigation 15.X - Feb 2014 @ GlobeObjectivesAfter completing this module you will be able to:Understand your laptop by using TI Computer Diagnostic.Understand the hardware and software requirements for TEMS Investigation.Install TEMS Investigation.Understand the license update process.Review your license contents.Run TEMS Investigation.

[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]Notes for the instructor: This section should take approximately 2 minutes.

Read the objectives to the audience and clarify any doubts.TEMS Investigation 12.0, August 2010, Ascom1213TEMS Investigation Computer Diagnostics (1/3)Evaluates current status of the PC.Determines how well it is prepared for running TEMS Investigation.Performs the following:Checks several PC settings that have significant impact on TEMS Investigation performance, particularly regarding data collection.Checks hardware capabilities (processor and RAM), and matches them against the requirements of TEMS Investigation.It is not launched automatically after the installation of TEMS Investigation. Please check this first![ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Describe the use of the TEMS Investigation Computer Diagnostics and explain the different test cases.

For TEMS Investigation to operate properly, the computer that will run it must be configured appropriately in a variety of aspects.

The Computer Diagnostics is a utility that evaluates the current status of the PC and determines how well it is prepared for running TEMS Investigation, in particular, for doing data collection.

Specifically, this utility does the following:

Checks a variety of PC settings that have a significant impact on TEMS Investigation performance, particularly with regard to data collection. Feedback in plain text is given on these settings, complete with recommendations for changes.Checks hardware capabilities (processor and RAM), and matches them against the requirements of TEMS Investigation.

This utility is launched automatically after the installation of TEMS Investigation has finished. It can also be launched when needed from Start>All Programs>Ascom>TEMS Products>Utilities.

All test cases or a subset of them can be run. Select the checkboxes of the test cases you want to run. Explain the different test cases and what is evaluated on each of them. Refer to sections 7.1 and 7.2 of the Getting Started Manual for further details.

The color coding in the Status column has the following interpretation:

Windows SettingsGreen: The setting is OK and does not need to be changed.Orange: The setting is not OK but can be changed.Red: The setting is not OK and is not editable.HardwareGreen: All WEI part scores are OK.Red: At least one WEI part score is not OK.

Detailed information on the Computer Diagnostics utility can be found in section 7 of the Getting Started Manual.

TEMS Investigation 12.0, August 2010, Ascom1314TEMS Investigation Computer Diagnostics (2/3) AutoPlay Automatic launching of a PC application following device connect must be avoided. Therefore, make sure that for all connected devices used with TEMS Investigation, AutoPlay is disabled.

How to disable AutoPlay is explained at http://support.microsoft.com/kb/967715 under the heading How to disable or enable all Autorun features in Windows 7 and other operating systems. The value that should be used to get a green light in the Computer Diagnostics tool is 0xFF, which means Disables AutoRun on all kinds of drives.

Check Port-scanning SoftwareYou should not have any software installed that periodically scans COM or USB ports, for instance Microsoft Outlook synchronization software. The reason is that such software may cause difficult device connect problems in TEMS Investigation.

Security ProductsPlease note that hard disk encryption software, firewalls, virus scanners, and other security products may prevent multiple RAS sessions from being maintained concurrently, thus interfering with data service testing. Contact your IS/IT department for assistance in these matters.The realtime scanning feature of antivirus software is prone to generate considerable CPU load. If you find the overall CPU load excessive, it may be a good idea to try turning off the realtime scanning feature.[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Describe the use of the TEMS Investigation Computer Diagnostics and explain the different test cases.

For TEMS Investigation to operate properly, the computer that will run it must be configured appropriately in a variety of aspects.

The Computer Diagnostics is a utility that evaluates the current status of the PC and determines how well it is prepared for running TEMS Investigation, in particular, for doing data collection.

Specifically, this utility does the following:

Checks a variety of PC settings that have a significant impact on TEMS Investigation performance, particularly with regard to data collection. Feedback in plain text is given on these settings, complete with recommendations for changes.Checks hardware capabilities (processor and RAM), and matches them against the requirements of TEMS Investigation.

This utility is launched automatically after the installation of TEMS Investigation has finished. It can also be launched when needed from Start>All Programs>Ascom>TEMS Products>Utilities.

All test cases or a subset of them can be run. Select the checkboxes of the test cases you want to run. Explain the different test cases and what is evaluated on each of them. Refer to sections 7.1 and 7.2 of the Getting Started Manual for further details.

The color coding in the Status column has the following interpretation:

Windows SettingsGreen: The setting is OK and does not need to be changed.Orange: The setting is not OK but can be changed.Red: The setting is not OK and is not editable.HardwareGreen: All WEI part scores are OK.Red: At least one WEI part score is not OK.

Detailed information on the Computer Diagnostics utility can be found in section 7 of the Getting Started Manual.

TEMS Investigation 12.0, August 2010, Ascom1415TEMS Investigation Computer Diagnostics (3/3)Sleep Mode, Screen Savers, Energy SavingFeaturesYou should make sure that the computer used for measurement and recording does not go into any kind of standby mode: Never put the PC in Sleep mode.

Disable the Windows screen saver: Open the Control Panel and select Personalization Screen Saver. Under Screen saver, select (None). In the same dialog, make appropriate settings under Power management so that these features are never activated during measurement.

Disable any other screen savers.(If the PC does go into standby, it may be necessary to unplug your data collection devices and plug them in again.)

User Access Control (UAC)In Windows 7, there are four UAC levels. UAC should be set to the lowest level, Never notify.

For running multiple concurrent data service sessions or logging IP data, as well as for the automatic software update function, this is strictly necessary.[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Describe the use of the TEMS Investigation Computer Diagnostics and explain the different test cases.

For TEMS Investigation to operate properly, the computer that will run it must be configured appropriately in a variety of aspects.

The Computer Diagnostics is a utility that evaluates the current status of the PC and determines how well it is prepared for running TEMS Investigation, in particular, for doing data collection.

Specifically, this utility does the following:

Checks a variety of PC settings that have a significant impact on TEMS Investigation performance, particularly with regard to data collection. Feedback in plain text is given on these settings, complete with recommendations for changes.Checks hardware capabilities (processor and RAM), and matches them against the requirements of TEMS Investigation.

This utility is launched automatically after the installation of TEMS Investigation has finished. It can also be launched when needed from Start>All Programs>Ascom>TEMS Products>Utilities.

All test cases or a subset of them can be run. Select the checkboxes of the test cases you want to run. Explain the different test cases and what is evaluated on each of them. Refer to sections 7.1 and 7.2 of the Getting Started Manual for further details.

The color coding in the Status column has the following interpretation:

Windows SettingsGreen: The setting is OK and does not need to be changed.Orange: The setting is not OK but can be changed.Red: The setting is not OK and is not editable.HardwareGreen: All WEI part scores are OK.Red: At least one WEI part score is not OK.

Detailed information on the Computer Diagnostics utility can be found in section 7 of the Getting Started Manual.

TEMS Investigation 12.0, August 2010, Ascom1516PC Hardware Requirements[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.3 is designed to run on a standard PC and interfaces with the connected devices mainly through USB or serial ports.

Processor and RAM requirements are strongly dependent on 1) what external devices are connected and 2) what tasks they perform.

The recommended minimum configuration is: Pentium T7200 or AMD TL-58 class CPU, preferably with dedicated graphics card from ATI or nVidia; 1 GB RAM.

Please note that it is not advisable to collect data with more than one device, or to collect data in an LTE or HSPA network, using this configuration.

HSPA and LTE data service testing at high throughput rates (above 50 Mbit/s) with a Qualcomm chipset based device requires a very powerful PC processor, for example a second-generation Intel Core i5 or comparable Intel Core i7.

For testing with a large array of connected devices (for example, 68 devices plus GPS), an Intel Core i7-nnnQM/XM, Intel Core i7-2nnnQM/XM, or equivalent processor is necessary.Other hardware requirements: One USB port for each user terminal USB port for HASP HL SRM hardware key ( For hardware dongle license)

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 8 minutes.

Describe the PC hardware requirements for TEMS Investigation.

PC hardware requirements.

TEMS Investigation 12 is designed to run on a standard PC and interfaces with the connected devices mainly through USB or serial ports.Processor and RAM requirements are strongly dependent on what external devices are connected and what tasks they perform.The recommended minimum configuration is: Pentium T7200 or AMD TL-58 class CPU, preferably with dedicated graphics card from ATI or nVidia; 1 GB RAM.Note that it is not advisable to collect data with more than one device, or to collect data in an LTE or HSPA network, using this configuration.

Other hardware requirements. Show the audience where to find the Getting Started Manual and the specific section regarding PC hardware requirements.

One USB port for each phone or USB modem.USB port for HASP HL hardware key.USB port, Bluetooth port, or serial port for GPS.USB port for PCTel SeeGull EX/LX MM2/PCT scanner.Serial port for PCTel SeeGull LX dual-band/single-band scanner.Ethernet port for DRT scanner.ExpressCard/34 slot or PC Card slot for any data card.Sound card and loudspeakers for event audio indications.Graphics: 1024x768 (SVGA) with at least 16 bit colors (High Color).Enough disk space to accommodate temporary files created during logfile recording and replay.

Important Note: Explain to the audience that during drive testing it must be ensured that the PC and all devices connected to it have adequate power supply for the duration of the test. This is especially important to keep in mind if they are using a USB hub that is not self-powered (i.e. has no external power supply). With multiple devices connected, it may even be necessary to take the precaution of providing extra power via UPS or extra batteries during drive testing. If the power provided is insufficient, problems may arise with device drivers, which in turn may cause malfunctions in Windows and possibly data loss.

16TEMS Investigation 12.0, August 2010, Ascom17PC Software Requirements[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]The following operating systems are supported: Windows 7 with Service Pack 1 (x86, x64) (not Windows 7 Home) Windows Vista with Service Pack 2 (x86)

Below is for the third-party software that is required for various tools and actions in TEMS Investigation. When installing third-party software, administrator rights are required, and possibly (depending on UAC settings) the installation must be run using the Run as administrator option.

.NET Framework version 4.5 must be installed on the PC. It is included in the TEMS Investigation installation package and will be installed automatically if not already present.

Microsoft Network Monitor (NetMon) is used by TEMS Investigation as IP sniffer and must be present. It is installed along with TEMS Investigation. (NetMon version 3.4) Internet Explorer 8 or later required for Report Generator and online help. Internet Explorer 9 or later required for HTTP download/upload testing with Internet Explorer. It is also required for streaming over HTTP. Adobe Flash Player required for streaming over HTTP. Microsoft DirectX 9.0c or later required for RTP streaming.TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Describe the PC software requirements for TEMS Investigation.

Operating System.

Windows 7, Professional Edition.Windows Vista with Service Pack 1, Enterprise Edition.Windows XP Professional with Service Pack 3.Windows XP Tablet PC Edition with Service Pack 3.All the latest Windows updates should always be installed.Supported languages are English (U.S.), Chinese (simplified characters), and Japanese.TEMS Investigation has been verified for 32-bit Windows only.No guarantees can be given regarding functionality or performance under 64-bit Windows.Furthermore, for many supported measurement devices, 64-bit drivers are currently lacking.

Third-party software. When installing third-party software, administrator rights are required, and in Microsoft Vista the installation must be run using the Run as administrator option. Show the audience where to find the Getting Started Manual and the specific section regarding PC software requirements.

The .NET Framework version 3.5 SP1 must be installed on the PC. It is included on the TEMS Investigation installation CD.Internet Explorer 6.0 or higher required for Report Generator and online Help.Microsoft Core XML Services (MSXML) 6.0 required for support of XML-format cell files if Windows XP is used. (In Windows 7 and Windows Vista, MSXML 6.0 is included).Microsoft DirectX 9.0c required for video streaming measurements.

17TEMS Investigation 12.0, August 2010, Ascom18Installing TEMS InvestigationThe installation is done by running the file TEMSInvestigation15.3.exe. For the first time, there will be 2 options will appear, 1) FlexNet or 2) HASP license will be used as licensing solution. If you have a HASP dongle, select HASP SRM License.

You must have administrator rights on the PC to be able to install TEMSInvestigation.

Also please note that the PC must have a working Internet connection when executing the EXE file, since various software components will be retrieved over the Internet. This includes Microsoft .NET 4.5 in case the PC does not already have it installed. If Microsoft .NET 4.5 needs to be installed, the entire installation procedure may take up to 1020 minutes to complete. [Kindly use the full dotnetfx4.5 SW] File : dotnetfx45_full_x86_x64.exe

On some PCs, a reboot may take place after the .NET Framework installation.

By default, TEMS Investigation will be installed to the directory C:\Program Files\Ascom\TEMS Products\TEMS Investigation 15.3.

** Please ensure your laptop is 32 bit or 64 bit. If the laptop does not work, reinstall the Microsoft C++ vcredist_x64.exe or vcredist_x84.exe software[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain the TEMS Investigation installation process.

The user must have administrator rights on the PC to be able to install TEMS Investigation.

Insert the installation CD and follow the on-screen instructions. If for some reason the installation does not start automatically, run the file SetupTEMSInvestigation12.0.exe.

TEMS Investigation is installed by default in the folder C:\Program Files\Ascom\TEMS Products\TEMS Investigation 12.0.

A number of utilities are also installed. Once installed, the applications and utilities can be run by choosing Start>All Programs>Ascom>TEMS Products.

HASP SRM Remote Update, used to update license options in HASP keys.Manual UE Configuration, used to assist TEMS Investigation in detecting certain types of devicesTEMS Pocket Positioning Tool, used to assign geographical coordinates to TEMS Pocket logfiles recorded by pinpointing (no GPS).TEMS Investigation Computer Diagnostics, used to rate the capabilities of the PC and check its current settings, matching the findings with the requirements posed by TEMS Investigation. This utility is launched in the course of the installation.

TEMS Investigation 12.0, August 2010, Ascom1819Installing Device Drivers (1/4)USB drivers are provided for all user terminals that can be purchased with TEMS Investigation, as well as for many other For certain user terminals, however, drivers must be obtained from the suppliers.

Sony Xperia V LT25i, Xperia T LT30a

For these devices you need to obtain the driver from Sony PC Companion. When connecting the phone, you will be presented with the option to install Sony PC Companion software. Select Install.Should this dialog not be displayed, you can enable the option to displayInstall PC Companion on the phone as follows: Settings Xperia Connectivity Install PC Companion. In the AutoPlay dialog thatappears, Select Run Startme.exe.[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain the Device Drivers installation process. These drivers are needed to be able to connect devices with TEMS Investigation.

The drivers are delivered on a separate CD in a ZIP archive.

After installing TEMS Investigation unpack the ZIP archive preferably to the following location: C:\Program Files\Ascom\TEMS Products\TEMS Investigation 12.0. This location is easy to remember.

The HASP SRM driver is installed automatically on the PC along with TEMS Investigation.

All the details regarding the installation of device drivers for different devices can be found in section 6 of the Getting Started Manual. Show the audience where to find this document and the specific section for this topic.

TEMS Investigation 12.0, August 2010, Ascom1920Installing Device Drivers (2/4)After the installation is done, enable tethering on the phone under Settings More Tethering & portable hotspot USB Tethering. In the Device Manager, verify that the item Sony sa0106 ADB Interface Driver appears. See the screenshot below. The Xperia phone should now be detected in TEMS Investigation.

This is because the PC Companion software might interfere with other devices.

Do the uninstall from the Windows Control Panel asusual.[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ Globe

Notes for the instructor: This section should take approximately 5 minutes.

Explain the Device Drivers installation process. These drivers are needed to be able to connect devices with TEMS Investigation.

The drivers are delivered on a separate CD in a ZIP archive.

After installing TEMS Investigation unpack the ZIP archive preferably to the following location: C:\Program Files\Ascom\TEMS Products\TEMS Investigation 12.0. This location is easy to remember.

The HASP SRM driver is installed automatically on the PC along with TEMS Investigation.

All the details regarding the installation of device drivers for different devices can be found in section 6 of the Getting Started Manual. Show the audience where to find this document and the specific section for this topic.

TEMS Investigation 12.0, August 2010, Ascom2021Installing Device Drivers (3/4)Sony Arc LT18i

[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ Globe

TEMS Investigation 12.0, August 2010, Ascom2122Installing Device Drivers (4/4)Sony Arc LT18i

[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ Globe

TEMS Investigation 12.0, August 2010, Ascom2223HASP Admin Control CenterReview what is covered by your local or network license.Accessed using Internet Browserhttp://localhost:1947/_int_/features.htmlEach Feature Id is related to a license option.[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Describe the use of the HASP Admin Control Center to review the contents of a license.

The HASP Admin Control Center is used to review the contents of a license.

It is accessed using an internet browser at the following URL: http://localhost:1947/_int_/features.html.

Each feature id corresponds to a license option. The meanings of these ids can be found in chapter 3.5 of the Getting Started Manual. Show the audience where to find this document and the specific chapter for this topic.

Available HASP Keys (HL or SL) can also be identified using the HASP Admin Control Center.

The HASP Admin Control Center is also used to configure the license server when using a network license. Detailed information on this particular topic can be found in section 5.2.2 of the Getting Started Manual.

TEMS Investigation 12.0, August 2010, Ascom23Feature ID (Licensing) (1/2)TEMS Investigation 15.X - Feb 2014 @ Globe24

Feature ID (Licensing) (2/2)TEMS Investigation 15.X - Feb 2014 @ Globe25

26License Control Center for GLS licenseChecking the mapped on license at License Control Center[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ Globe

Notes for the instructor: This section should take approximately 5 minutes.

Describe the use of the HASP Admin Control Center to review the contents of a license.

The HASP Admin Control Center is used to review the contents of a license.

It is accessed using an internet browser at the following URL: http://localhost:1947/_int_/features.html.

Each feature id corresponds to a license option. The meanings of these ids can be found in chapter 3.5 of the Getting Started Manual. Show the audience where to find this document and the specific chapter for this topic.

Available HASP Keys (HL or SL) can also be identified using the HASP Admin Control Center.

The HASP Admin Control Center is also used to configure the license server when using a network license. Detailed information on this particular topic can be found in section 5.2.2 of the Getting Started Manual.

TEMS Investigation 12.0, August 2010, Ascom2627Launching TEMS InvestigationHASP license or GLS license is required to launch TEMS Investigation.HASP HL: Hardware key must be connected to a USB port of the PC.Global License SystemLaunched from:Start>All Programs>Ascom>TEMS Products>TEMS Investigation 15.3[ SOFTWARE INSTALLATION AND RECOMMENDED SETTINGS ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Describe the requirements to launch TEMS Investigation and explain how to launch it.

To be able to launch TEMS Investigation, a HASP license either HL or SL is required.For HASP HL: The hardware key must be connected to a USB port of the PC.For HASP SL: The software key must be applied to the PC or checked out from a License Server.

TEMS Investigation is launched from: Start>All Programs>Ascom>TEMS Products>TEMS Investigation 12.0.

TEMS Investigation 12.0, August 2010, Ascom27Installation NotesUAC must be set to the lowest level (i.e. turned off) for this function to work. If an error dialog stating The requested operation requires elevation appears upon start-up of TEMS Investigation, that indicates there is a problem with the UAC level.

For faster boot up TEMS Investigation, Click the DeviceDetection Properties and uncheck the Device that will not beused or not purchased such as Andrew, Anritsu, DRT,Rohde & Schwarz, Transcom etc. You need to restart the TEMSInvestigation before it will be applied.TEMS Investigation 15.X - Feb 2014 @ Globe28

When starting TEMS Investigation for the first time after installation, you are invited to connect to an Ascom server and find out if there is a newer TEMS Investigation software version available.If you click Check for updates, a wizard opens where you can check whether a newer version exists. If that is the case, you proceed to decide whether or not to install it. If you accept the update, it will be downloaded, whereupon TEMS Investigation terminates automatically and the update is installed. Because of the automatic shutdown that takes place, be sure to save your work before accepting an update. Click Close to dismiss the update check. The update check prompt also appears on application start-up if no update check has been performed over the last 28 days. Alternatively, you can manually initiate the update check from the about box (Help menu About TEMS Investigation 15.3) by clicking the button Tech Support and then Check for updates.Or you can also go to Start All Programs Ascom Utilities Check for TEMS Investigation 15.3 Updates29Automatic Check for TEMS InvestigationSoftware Updates

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Describe the requirements to launch TEMS Investigation and explain how to launch it.

To be able to launch TEMS Investigation, a HASP license either HL or SL is required.For HASP HL: The hardware key must be connected to a USB port of the PC.For HASP SL: The software key must be applied to the PC or checked out from a License Server.

TEMS Investigation is launched from: Start>All Programs>Ascom>TEMS Products>TEMS Investigation 12.0.

TEMS Investigation 12.0, August 2010, Ascom29Accompanying Utilities (1/2)

A number of utilities are installed along with TEMS Investigation 15.X: RouteFinder, used to search TRP logfiles. See the RouteFinder Users Manual. RouteUtility, used to split a TRP logfile into several self-contained logfiles, or to extract a segment from a TRP logfile into a new logfile. See the Users Manual, section 10.10. (Optional features) HASP SRM Remote Update, used to update license options in HASP keys. See the document TEMS HASP SRM Key Information which is found in the TEMS Investigation documentation package. Manual UE Configuration, used to assist TEMS Investigation in detecting certain types of devices. See the Device Configuration Guide, section 3.1 and the Users Manual.Service Settings, used to manage configuration sets for service testing.See the Users Manual, section 12.18.2.

TEMS Investigation 15.X - Feb 2014 @ Globe30Accompanying Utilities (2/2)Computer Diagnostics, used to rate the capabilities of the PC and check its current settings, matching the findings with the requirements posed by TEMS Investigation. This utility is launched in the course of the installation. See the Device Configuration Guide, chapter 2 for full coverage of this utility. TEMS Pocket Positioning Tool, used to assign geographical coordinates to TEMS Pocket logfiles (*.tpz, versions 11.012.2) recorded by pinpointing (i.e. no GPS). See the TEMS Pocket Positioning Tool Users Manual, which is part of the TEMS Investigation documentation package.

TEMS Investigation 15.X - Feb 2014 @ Globe31

32TEMS INVESTIGATION 15.XTEMS Investigation User Interface[ THE INDUSTRY-LEADING AIR INTERFACE TEST TOOL ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This module should take approximately 120 minutes.

Explain to the audience that in this module we will talk about the TEMS Investigation User Interface.32TEMS Investigation 12.0, August 2010, Ascom33TEMS Investigation 15.X - Feb 2014 @ GlobeObjectivesAfter completing this module you will be able to:Understand the user modes of TEMS Investigation.Describe the TEMS Investigation user interface.Use predefined workspaces and configure new ones.Load maps into your workspace.Load cell files into your workspace.[ TEMS INVESTIGATION USER INTERFACE ]Notes for the instructor: This section should take approximately 2 minutes.

Read the objectives to the audience and clarify any doubts.TEMS Investigation 12.0, August 2010, Ascom3334TEMS Investigation 15.X - Feb 2014 @ GlobeTEMS Investigation User ModesTEMS Investigation can be run in two different modes:Drive testing mode: Information presented on the screen is obtained from devices connected to the PC and activated in TEMS Investigation. New logfiles can be recorded in this mode.Analysis mode: Information presented on the screen is read from a logfile. This mode is used for inspection and analysis. Previously it is called Replay ModeUser modes are mutually exclusive.

[ TEMS INVESTIGATION USER INTERFACE ]Notes for the instructor: This section should take approximately 5 minutes.

Describe the User Modes of TEMS Investigation and explain the difference between them.

TEMS Investigation can be run in two different modes, one for testing and recording, and one for replay and analysis.

Drive testing mode: The information presented on the screen is obtained from data-collecting devices connected to the PC and activated in TEMS Investigation. In drive testing mode you can record new logfiles.Replay mode: The presented information is read from a logfile. In this mode you replay logfiles for inspection and analysis. You can also use the recording function to copy material between logfiles.

The two modes are mutually exclusive. At the beginning of a session, the application is in replay mode. As soon as you activate external equipment, however, it switches to drive testing mode and remains in this mode as long as some external device is activated. Deactivating all external devices returns the application to replay mode.

If you have a logfile open, you must close it before you can activate external devices.To be able to open a logfile, you must first deactivate all currently active external devices.

34TEMS Investigation 12.0, August 2010, Ascom35TEMS Investigation 15.X - Feb 2014 @ GlobeTEMS Investigation User InterfaceWorkspaceWorksheetsNavigatorToolbarsMenu BarStatus Bar

[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 10 minutes.

Describe the User Interface of TEMS Investigation and give a brief explanation of the different parts that compose it.

The Workspace is the entity that stores all the windows and settings used in a working session. Only one workspace can be open at a time.

To manage your windows more smoothly, you can divide your workspace into several worksheets. Up to ten worksheets can be active simultaneously.

From the Navigator you manage and operate your connected equipment, open presentation windows, change the mode of presentation of information elements, and manage your worksheets.

The toolbars provide shortcuts to certain functions in the application, particularly those relating to logfile recording and replay. Most of the toolbar buttons are mirrored in the menus. Show the audience the different toolbars (Record toolbar, Replay toolbar, Report toolbar, File and View toolbar).

The menus mirror the toolbars as well as the Navigators Menu and Worksheets tabs.

The status bar displays various messages that indicate the current status of the application.

A number of central operations in TEMS Investigation, as well as many standard file and edit operations, can also be performed from the keyboard. A list of keyboard shortcuts is found in appendix A of the TEMS Investigation Users Manual.

35TEMS Investigation 12.0, August 2010, Ascom36TEMS Investigation 15.X - Feb 2014 @ GlobeWorkspaces and WorksheetsWorkspace is the entity that stores all windows and settings used in a working session.Only one workspace open at a time.Handled from File and View toolbar or File menu.Worksheets are divisions of the workspace to manage windows more smoothly.Up to ten worksheets can be active simultaneously.Handled from the Worksheet menu[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 10 minutes.

Explain the concepts of Workspace and Worksheets and what are they used for.

The Workspace is the entity that stores all the windows and settings used in a working session. Only one workspace can be open at a time. Settings include information on connected external devices. When you start TEMS Investigation for the first time, a default workspace is opened. This also happens if you have never saved a workspace. After you have saved a workspace for the first time, the workspace last saved will be opened each time you start the application. Workspaces are handled from the File and View Toolbar or alternatively from the File Menu. (Show the audience where the pre-defined workspaces are stored.)

To manage your windows more smoothly, you can divide your workspace into several worksheets. Up to ten worksheets can be active simultaneously. This is already done in the default workspace, which has a number of worksheets dedicated to different purposes, as shown by their designations. Worksheets are handled from the Worksheet menu, which can also be accessed by right-clicking in a worksheet. (Show the audience how to copy, rename or remove a worksheet and note that when copying a worksheet the device channel index (MS/DC) is incremented in all windows.)36TEMS Investigation 12.0, August 2010, Ascom37TEMS Investigation 15.X - Feb 2014 @ GlobeNavigatorAllows to setup and manage your workspace and external equipment.

It has the following tabs:Equipment tab.Menu tab.Info Element tab.Worksheets tab.Logfile tab.[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 10 minutes.

Describe the Navigator tabs and explain the use of them.

The Navigator pane is located on the left in the TEMS Investigation main window, it allows you to set up and manage your workspace and your external equipment. The Navigator has the following tabs:

The Equipment tab, used for equipment handling. (Show and explain the functionalities of this tab)Top pane:- Shows the devices currently plugged into the PC and has controls for activating and deactivating the devices in TEMS Investigation.- Provides shortcut to device properties.- One device at a time is in focus in this pane.Bottom pane:- The functionality here relates to the device that is currently selected in the top pane.- Activities tab: From here you can manually apply various commands to and perform various actions with the selected device.

The Menu tab, lists the types of windows that are available in the application. (Show how to add windows to the worksheet.)They are divided into the categories Presentation, Control, and Configuration. To open a window, double-click the corresponding symbol, or drag the symbol from the Navigator to the worksheet where you want it. All Navigator windows can also be opened from the menu bar.

The Info Element tab, lists all the information elements handled by TEMS Investigation. It is used to edit presentation attributes of the Information Elements. (Show how to edit presentation attributes of the Information Elements.)

The Worksheets tab, gives an overview of your current workspace configuration. (Show the use of this tab.)It lists the worksheets currently active in the workspace. Each worksheet is represented by a folder containing the windows in this worksheet. Double-clicking on a symbol will make that particular window and the worksheet it is placed on active. You can rearrange windows from this tab by dragging them between the worksheet folders.

The Navigator can be hidden by switching to full screen mode (done from the View menu or from the File and View toolbar).

37TEMS Investigation 12.0, August 2010, AscomLogfile Tab Under Navigator (1/2)TEMS Investigation 15.X - Feb 2014 @ Globe38

Logfile Tab Under Navigator (2/2)TEMS Investigation 15.X - Feb 2014 @ Globe39

40TEMS Investigation 15.X - Feb 2014 @ GlobePresentation WindowsLine ChartsBar ChartsStatus WindowsMessage WindowsEvent Counter windowsMap

[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 20 minutes.

Describe the different presentation windows and explain how they can be customized to show different Information Elements.

The presentation windows are used to present information elements, events, and messages, either in real time or during logfile replay. Real time and logfile data are presented in fundamentally the same way.

The Line Charts are used to plot numeric information elements in order to visualize how their values evolve over time. Line charts can also present events.

The Bar Charts are used to view successive snapshots in time of a selected set of information elements. The bar chart is especially suited to the presentation of frequency scans, but the chart itself is generic and can present any measurement data.

The Status windows present information elements in tabular form.

The Message windows are used to list messages and reports received or transmitted by external devices (Layer 2 and Layer 3 messages, mode reports, and error reports). They are also used to present events generated by TEMS Investigation.

The Event Counter window keeps track of the number of times a set of events have occurred. What events to show is user-configurable.

Map windows are used to display a map of your testing area and present your drive test route graphically on this map. Data on cells, events, and information elements are shown along the route in symbolic form; numeric values can also be easily accessed. Like the other presentation windows, Map windows are fully user-configurable.

40TEMS Investigation 12.0, August 2010, Ascom41TEMS Investigation 15.X - Feb 2014 @ GlobeControl WindowsService Control DesignerService Control Monitor

[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 20 minutes.

Describe on a high level the Service Control Designer, Service Control Monitor and GSM Channel Verification windows, and briefly explain the use of them.

A new scripting tool called Service Control replaces the Command Sequence on previous versions of TEMS Investigation. The Service Control tool is used to control the actions of devices that you activate in the application. With this new tool you build scripts in the form of flowcharts, which makes it very easy to create, adapt, and reuse building blocks of a script.

The Service Control Designer window is where you compose service control workflows. (Show and explain the different parts of this window)- The Activity pane is a palette holding all script building blocks: for running services, for controlling devices, and for execution flow control.- The Workflow pane is the area where you assemble your script graphically in the form of a flowchart.- The Properties pane contains properties of the activity that you are currently working with (the one currently selected in the Workflow pane).- In the Configuration Sets pane you define various entities that can be reused in any script, for example all the details of accessing a particular FTP server.

The Service Control Monitor window is used to monitor the execution scripts that have been created with the Service Control Designer.

The GSM Channel Verification tool allows you to check the availability of a set of GSM traffic channels, typically those used in one cell or a set of cells. TEMS Investigation lets one or several GSM-capable Sony Ericsson phones make calls repeatedly on the chosen channels until all timeslots of interest have been tested. Since there is no way for TEMS Investigation to control the timeslot allocation, traffic channel verification may take a non-trivial amount of time to complete. To reduce the testing time, you can use several phones.

41TEMS Investigation 12.0, August 2010, Ascom42TEMS Investigation 15.X - Feb 2014 @ GlobeConfiguration WindowsAudio IndicationsEvent DefinitionFile TransferGeneral

[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 10 minutes.

Describe the different configuration windows and explain the use of them.

The Audio Indications window is used to configure the audio signal to be played when a particular event occurs. This is useful if you are performing a drive test on your own and need to keep your eyes on the road. (Show how to associate audio signals with events for a particular device and how to create different templates)

The Event Definition window is used to create User-defined events using pre-defined events, Layer 3 messages , Information Elements or a combination of them. (Show how to create a user-defined event using an Information Element)

The File Transfer window is used to set up logfile transfers via FTP. Logfiles can be uploaded via FTP according to preconfigured FTP server settings. (Show and explain the File Transfer Settings window and how to start a logfile transfer)

The General window is used to configure miscellaneous settings that affect the behavior of TEMS Investigation. For example you can configure how scanning information elements are sorted for certain technologies and what parameters are used for sorting. It is also used to load cell files to be able to view them on the map. (Show the different settings specified for each technology in this window)

42TEMS Investigation 12.0, August 2010, Ascom43TEMS Investigation 15.X - Feb 2014 @ GlobeLoading MapsA GeoSet is a special type of workspace used for map layers.GeoSets are constructed using the GeoSet Manager.TAB files are used to construct a GeoSet.Once the GeoSet is created it can be opened as a map in the Map Window.

[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 10 minutes.

Explain the concept of GeoSet and show how to construct them using the GeoSet Manager. Once created, open the GeoSet in the Map Window.

A GeoSet is a special type of workspace used for map layers. A GeoSet contains settings regarding layer order, projections, zoom levels, labels, colors, etc.

The Map window works with a GeoSet instead of an ordinary workspace. If you have a new map that you want to use in TEMS Investigation, you should construct a GeoSet file for it to be able to save changes to the map later on. This file (with extension .gst) can then be opened in a Map window.

To construct a GeoSet you use TAB files (MapInfo format). If your map is in bitmap format or uncompressed tiff format, you must generate TAB files for it by using the Position Map feature in the Map Window.

It is possible to load TAB files in a Map window directly, without constructing a GeoSet, but any changes made using the Layer Control will be lost.

The GeoSet Manager looks and works much like a Map window. However, while changes made in a Map window cannot be saved, changes made using the GeoSet Manager can be saved to the GeoSet (*.gst) file associated with the map.

43TEMS Investigation 12.0, August 2010, Ascom44TEMS Investigation 15.X - Feb 2014 @ GlobeLoading Cell FilesCell FilesText format (.cel)*XML format (.xml)Load cell files using the General WindowAdd Cell Layer Themes in the Map WindowCell ThemeCell Line ThemeCell Color Theme

* GSM and UMTS only[ TEMS INVESTIGATION USER INTERFACE ]

Notes for the instructor: This section should take approximately 10 minutes.

Describe the cell file formats used in TEMS Investigation (show samples files) and explain the process of loading cell files (show how to do this). Show how to add Cell Layer Themes and how to configure them.

TEMS Investigation can present information of individual cells in cellular networks. It is possible to draw cells on maps and to display cell names in various windows. Cell data is also used in logfile reports. Cell data can be provided in two ways:

In a file with a plain-text, TEMS Investigation specific format (*.cel). This format is for UMTS only. GSM and WCDMA cells can be mixed in one file.In a plain-text XML file (*.xml) whose format is common to several TEMS products.

To make a cell file active, it must be loaded in the General window. You can have several cell files loaded in the application at the same time.

To present cell information in the map, you create cell themes. A theme is basically a group of settings describing how to present a set of data. The themes can be defined at any time, you do not have to load a cell file first.

The Cell Theme is concerned with basic plotting of cell sites.The Cell Line Theme is used to: - Indicate serving cells and positions where handovers have taken place if the data source is a phone. - Give a best server indication, if the data source is a scanner.The Cell Color Theme is used to visualize the neighbor relations of the current serving cell/active set members or of an arbitrary user-selected cell. The neighbor relations shown are those indicated in the loaded cell file.

44TEMS Investigation 12.0, August 2010, AscomPinpoint WindowUsing IBWave Technology Pinpointing can beManualPredefined

TEMS Investigation 15.X - Feb 2014 @ Globe45

[ TEMS INVESTIGATION USER INTERFACE ]

46TEMS INVESTIGATION 15Module 4: Connecting Equipment[ THE INDUSTRY-LEADING AIR INTERFACE TEST TOOL ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This module should take approximately 90 minutes.

Explain to the audience that in this module we will talk about how to connect equipment in TEMS Investigation to perform tests.46TEMS Investigation 12.0, August 2010, Ascom47ObjectivesAfter completing this module you will be able to:Activate/deactive equipment in TEMS Investigation.Manually run services and apply control functions.View and modify certain properties of devices.Use the Manual UE Configuration utility.[ CONNECTING EQUIPMENT ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 2 minutes.

Read the objectives to the audience and clarify any doubts.TEMS Investigation 12.0, August 2010, Ascom4748How to Sony LT25i detectableUSB Debugging ONSettings Developer OptionsCheck USB DebuggingUSB tethering ONMoreTethering & Portable hotspotCheck USB tethering[ CONNECTING EQUIPMENT ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 15 minutes.

Describe the procedures to activate and deactivate devices in TEMS Investigation from the Equipment tab of the Navigator. (Show how to do this)

External devices supported by TEMS Investigation are automatically detected by the application after they have been plugged into the PC and are listed in the top pane of the Navigators Equipment tab.

Each device is represented by a numbered EQ item. You can change the EQ index assigned to the device. In presentation windows, external devices are represented by their channels (MS, DC, PS).

The icon to the left of each device shows the status of the device in TEMS Investigation.Red cross: Device is deactivatedNo symbol added: Device is activatedHourglass: Device activation or deactivation in progressProhibited sign an label NL; device string is red: Device has no licenseEarth symbol: Device is selected as preferred GPS

You need to activate a device in TEMS Investigation before you can use it for data collection.

To activate a detected device, right-click it on the Navigators Equipment tab and choose Activate from the context menu. To activate all detected devices, click the Activate All button on the Equipment tab toolbar.The red cross disappears from each device icon to indicate that the device is now active. Furthermore, when you select an activated device in the Navigator top pane, the Activities tab in the bottom pane is populated with the operations that you can perform manually on this device.

To deactivate a device, right-click it on the Navigators Equipment tab and choose Deactivate from the context menu. To deactivate all active devices, click the Deactivate All button on the Equipment tab toolbar.

48TEMS Investigation 12.0, August 2010, Ascom49Equipment tab of the NavigatorExternal devices are automatically detected and listed in the top pane of the Navigators Equipment tab.Each device is represented by a number EQ item.You need to activate a device before you can use it for data collection.Activate/Deactivate a detected device from its context menu (right-clicking it).Activate/Deactivate all devices clicking the Activate All/Deactivate All buttons on the Equipment tab toolbar.[ CONNECTING EQUIPMENT ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 15 minutes.

Describe the procedures to activate and deactivate devices in TEMS Investigation from the Equipment tab of the Navigator. (Show how to do this)

External devices supported by TEMS Investigation are automatically detected by the application after they have been plugged into the PC and are listed in the top pane of the Navigators Equipment tab.

Each device is represented by a numbered EQ item. You can change the EQ index assigned to the device. In presentation windows, external devices are represented by their channels (MS, DC, PS).

The icon to the left of each device shows the status of the device in TEMS Investigation.Red cross: Device is deactivatedNo symbol added: Device is activatedHourglass: Device activation or deactivation in progressProhibited sign an label NL; device string is red: Device has no licenseEarth symbol: Device is selected as preferred GPS

You need to activate a device in TEMS Investigation before you can use it for data collection.

To activate a detected device, right-click it on the Navigators Equipment tab and choose Activate from the context menu. To activate all detected devices, click the Activate All button on the Equipment tab toolbar.The red cross disappears from each device icon to indicate that the device is now active. Furthermore, when you select an activated device in the Navigator top pane, the Activities tab in the bottom pane is populated with the operations that you can perform manually on this device.

To deactivate a device, right-click it on the Navigators Equipment tab and choose Deactivate from the context menu. To deactivate all active devices, click the Deactivate All button on the Equipment tab toolbar.

49TEMS Investigation 12.0, August 2010, Ascom50Running services and applying control functions manuallyManually run services on a device from the Activities subtab.Manually apply control functions to a device.Right-click specific activity to enable context menu, then select activity and associated Configuration Set where required.A Configuration Set defines settings for a particular activity.Configuration Sets created here can later be used for scripts.[ CONNECTING EQUIPMENT ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 30 minutes.

Explain the different functions that can be accomplished from the Activities subtab in the bottom pane of the Navigators Equipment tab. Show how various services can be run manually on a device and how control functions can also be applied manually from this subtab.

From the Navigators Equipment tab (bottom pane, Activities subtab), you can manually run various services on a device and manually apply control functions to it, as opposed to controlling the device with a script.

For all manual operations, you right-click the desired item on the Activities subtab to enable the context menu and then select the activity and an associated Configuration Set where required.

The Configuration Set defines settings for a particular activity, for example in the case of a voice call you specify there the number to dial, or in the case of an FTP download session you specify there the details to access a particular FTP server. Note that some activities do not require a Configuration Set or have a Default configuration set.

To create a new Configuration Set, select Configuration Sets from the context menu by right-clicking the corresponding activity. The configuration sets you create here can later be used when creating scripts. (Explain how to create new configuration sets for different activities like Voice, FTP download, HTTP get, etc.)

Show how to apply Radio Access Technology Lock from the Activities subtab.

Show how to apply Band Lock from the Activities subtab.

Show how to perform Voice calls, create a configuration set if needed.

Show how to perform HTTP Get, create a configuration set if needed.

Show how to perform FTP Download, create a configuration set if needed.

50TEMS Investigation 12.0, August 2010, Ascom51Equipment PropertiesYou can view and modify certain properties of devices from TEMS Investigation.Device properties vary by phone model.Right-click the device in the top pane of Navigators Equipment tab and select PropertiesClick Apply after changing properties for changes to take effect.[ CONNECTING EQUIPMENT ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 15 minutes.

Describe the procedure to access the Equipment Properties of devices. Explain the different properties that can be edited and the control functions that can be applied to a device.

From TEMS Investigation you can view and modify certain properties of devices.

The properties of the devices vary by phone model.

To access the properties dialog of a device, right-click the device in the top pane of the Navigators Equipment tab and select Properties

After making changes to the properties, click the Apply button for the changes to take effect.

Explain all the properties that can be edited and control functions that can be applied. (Show how to enable Extended Reports, show how to lock on a WCDMA cell, show how to lock on a GSM cell.)

51TEMS Investigation 12.0, August 2010, Ascom52TEMS Investigation 15.X - Feb 2014 @ GlobeManual UE ConfigurationThe Manual UE Configuration utility helps TEMS Investigation recognize a device that is not detected properly.For certain devices you must use the Manual UE Configuration utility as an aid to detection.This utility is launched by clicking the Start Manual UE Config button on the Equipment tab of the Navigator.[ CONNECTING EQUIPMENT ]

Notes for the instructor: This section should take approximately 15 minutes.

Describe the procedure to access the Manual UE Configuration utility. Explain the steps required to configure a device that was not properly detected.

If a device is not detected properly by TEMS Investigation, although it is supported, you can run the Manual UE Configuration utility to help TEMS Investigation recognize the device.

Normally there is no need to run this utility, there are however certain devices for which you must use Manual UE Configuration as an aid to detection.

To launch this utility, click the Start Manual UE Config button on the Navigators Equipment tab.

52TEMS Investigation 12.0, August 2010, Ascom53SummaryTEMS Investigation 15.X - Feb 2014 @ GlobeExternal devices are automatically detected and listed in the top pane of the Navigators Equipment tab.To Activate/Deactivate a detected device, right-click it on the Navigators Equipment tab and choose Activate/Deactivate from the context menu.You can Activate/Deactivate all devices by clicking the Activate All/Deactivate All buttons on the Equipment tab toolbar.You can manually run services on a device and apply control functions to it from the Activities subtab.You can view and modify certain properties of devices from TEMS Investigation. Device properties vary by phone model.The Manual UE Configuration utility helps TEMS Investigation recognize a device that is not detected properly.

[ CONNECTING EQUIPMENT ]Notes for the instructor: This section should take approximately 5 minutes.

Read the Summary to the audience and clarify any doubts.

TEMS Investigation 12.0, August 2010, Ascom53

54TEMS INVESTIGATION 15Module 5: Service Control Designer and Service Control Monitor[ THE INDUSTRY-LEADING AIR INTERFACE TEST TOOL ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This module should take approximately 180 minutes.

Explain to the audience that in this module we will talk about the Service Control Designer and the Service Control Monitor.54TEMS Investigation 12.0, August 2010, Ascom55ObjectivesAfter completing this module you will be able to:Understand how to compose and configure scripts.Understand how to validate and run scripts.Understand how to save and load scripts and snippets.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 2 minutes.

Read the objectives to the audience and clarify any doubts.TEMS Investigation 12.0, August 2010, Ascom5556The Service Control DesignerThe Service Control Designer window is used to compose service control workflows (scripts).Panes:Activity paneWorkflow paneProperties paneConfiguration Sets pane

[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Describe the Service Control Designer window and explain the different panes available.

The Service Control Designer window is where you compose service control workflows, also known as scripts.

It is composed of the following panes:The Activity pane is a palette holding all script building blocks: for running services, for controlling devices, and for executing flow control.The Workflow pane is the area where you assemble your script graphically in the form of a flowchart.The Properties pane contains properties of the activity that you are currently working with (the one currently selected in the Workflow pane).In the Configuration Sets pane you define various entities that can be reused in any script, for example all the details for accessing a particular FTP server.

56TEMS Investigation 12.0, August 2010, Ascom57Composing and configuring scripts (1/13)Script that dials single voice calls.Add voice call activity to the script.Dial box and Properties pane are tagged with exclamation mark, activity is not properly configured yet.Define a configuration set for the Dial activity in the Configuration Sets pane.Properties and Workflow panes are updated with the configuration data.To specify duration of the call we use the Wait activity.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 15 minutes.

Explain how to compose a script that dials single voice calls.

First, we need to add a voice dial activity to the script. This is done by dragging the Dial activity from the Voice node and dropping it into the empty workflow.

The Dial box is tagged with an exclamation mark. This means that the activity is not yet properly configured. A similar exclamation mark in the Properties pane indicates the property that is undefined: Configuration.

We need to define a configuration set for the Dial activity. This is done in the Configuration Sets pane. For a voice dial, the configuration consists of the phone number to call.

To define a configuration set, select an existing one from the drop-down menu or create a new one. Click Apply to update the changes.

The Properties and Workflow panes are now updated with the configuration data.

When just dialing a call like this, it will not have a duration. The call will be established and then immediately hung up. To give a duration to a call, we need to use the Wait activity.

57TEMS Investigation 12.0, August 2010, Ascom58Composing and configuring scripts (2/13)Drag the Wait activity just below the voice dial box.Set the duration in the Properties pane.Add the Hang Up activity after the wait.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Explain how to specify the duration of a call and how to hang up the call.

To specify the duration of the call, drag the Wait activity to a position just below the voice dial box. The graphical user interface helps you position the Wait box correctly by means of guiding symbols and text. The Wait box is tagged with an exclamation mark.

Set the duration of the wait in the Properties pane.

Finally, add a Hang Up activity after the wait.58TEMS Investigation 12.0, August 2010, Ascom59Composing and configuring scripts (3/13)Setting Up a Network ConnectionAdd Network Connect activity to the script.Exclamation marks indicate that configuration is missing.Define a configuration set for the Network Connect activity.Select the configuration set in the Properties pane[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Explain how to set up a Network Connection.

A Network Connection is a necessary preparation for running data services.

From the IP node in the Activity pane, add a Network Connect activity to the script.

Again you will be notified that a matching configuration is missing.

We need to define a new configuration set for the Network Connect activity or choose an existing one. A configuration set for a data connection is created in the same way as one for voice, it contains more parameters. In particular, you need to specify whether to use RAS or NDIS.

Select the configuration set in the Properties pane.59TEMS Investigation 12.0, August 2010, Ascom60Composing and configuring scripts (4/13)Setting Up a Data Service activity (FTP download)Add a Network Connect activity and associate it with an existing configuration set (W995_Dialup_1)Then add a Network Disconnect activity at the bottom of the workflow.Insert an FTP Download activity between the network connect and disconnect.Define a configuration set for the FTP Download activity and select it in the Properties pane.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 15 minutes.

Explain how to set up a Data Service activity.

We will set up an FTP download as an example of a data service activity.

First, add a Network Connect activity to the script and associate it with an existing configuration set, for example, the W995_Dialup_1 configuration set created previously.

Then add a Network Disconnect activity at the bottom of the workflow. The disconnect operation will take down the network connection. This activity does not need a particular configuration, it does not need to be associated with a particular configuration set.

The FTP session itself is handled by the FTP Download activity. Insert an FTP Download activity between the network connect and disconnect activities.

For the FTP Download activity, we need to define a new configuration set representing the FTP server and how to access it or choose an existing one.

Select the configuration set in the Properties pane.60TEMS Investigation 12.0, August 2010, Ascom61Composing and configuring scripts (5/13)Explicit PS attach and detach operations.To measure the time taken by these operations for the purpose of computing KPIs.Add a PS Detach and a PS Attach activity in that order at the beginning of a workflow.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain how to perform explicit PS attach and PS detach operations.

One reason for doing this could be to measure the time taken by these operations, particularly for the purpose of computing KPIs.

We will reuse the workflow for FTP download.

From the IP category, add a PS Detach and a PS Attach activity, in that order, at the start of this workflow.

This will detach the device from the PS network and then reattach the device.

61TEMS Investigation 12.0, August 2010, Ascom62Composing and configuring scripts (6/13)Snippets.A snippet is fixed sequence of activities defined as a building block.Can be reused, saving time and effort creating new scripts.Predefined snippets for all supported services are provided.Predefined snippets are tailored to produce all data required for KPI computation.An arbitrary activity sequence can also be saved as a user-defined snippet.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain the concept of a snippet and the use of them.

A snippet is a fixed sequence of activities that is defined as a building block and can be reused as such, saving time and effort when creating new scripts.

Predefined snippets for all supported services are provided in the Activity pane.

The predefined snippets are tailored to produce all data required to compute KPIs. The KPI computation itself is done using TEMS Discovery.

You can also save an arbitrary activity sequence as a user-defined snippet. You do this by selecting all of the activities dragging the mouse pointer, then from the File menu select Save as Snippet.

62TEMS Investigation 12.0, August 2010, Ascom63Composing and configuring scripts (7/13)Activity properties that control execution.On Failure: Determines what happens if an activity fails.Abort: Used to abort an activity after a fixed length of time or if a particular event occurs.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Explain the use of activity properties that control execution.

All activities have some general properties governing their execution:

The On Failure property determines what will happen if an activity fails when first attempted.Continue Script Execution: If an activity fails, the activity is abandoned, and the execution proceeds to the next activity in the workflow branch in question.Stop Script Execution: If an activity fails, the activity is abandoned, and the whole script is terminated.Retry: If an activity fails, it will be retried. When you choose this option, a set of further parameters appear: Retries the number of retries; Delay the time to wait before each retry; On Failure what action to take if all retries fail (continue or stop script).

The Abort property is used to abort an activity after a fixed length of time or if a particular event occurs.Disabled: The activity will execute as long as it takes to complete.On Timeout: The activity will be aborted after a fixed period of time, unless it has already completed before that time. What you indicate here is thus a maximum duration for the activity.On Event: The activity will be aborted if and when one of the specified events occurs; otherwise it will run to completion.

63TEMS Investigation 12.0, August 2010, Ascom64Composing and configuring scripts (8/13)Sequence Activity.Defines a sequence of activities as a unit, allowing it to be treated as such.This activity has no unique properties.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Explain the use of the control flow activity Sequence.

This control structure formally defines a sequence of activities as a unit, allowing it to be treated as such. For example, the entire sequence can be enabled or disabled in a single action.

This activity has no unique properties.

Suppose your script includes PS detach followed by PS attach and you want a convenient means of turning the detach/attach activities on and off. You can then encapsulate the PS Detach and PS Attach activities within a sequence.

Expand the Control Flow node and from it drag a Sequence activity to a position immediately above the PS Detach activity.

Select the PS Detach and PS Attach activities by holding Ctrl and clicking each activity, then drag them both (using the PS Detach box as handle) into the sequenceActivity1 box.

You can now enable and disable the detachattach sequence as a whole.

64TEMS Investigation 12.0, August 2010, Ascom65Composing and configuring scripts (9/13)If-Else Activity.Used to split the execution flow into several branches based on outcome of previous activity.Evaluation of conditions proceeds from left to right.Each branch is constituted by an if-else branch activity.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Explain the use of the control flow activity If-Else.

An If-Else construct is used to split the execution flow into several branches based on the outcome of a previous activity.

Evaluation of conditions proceeds from left to right.

At the top level the IfElse activity does not have any unique properties. Each branch of the construct, however, is constituted by an ifelse branch activity.

An example, suppose the phone is on a WCDMA network and is instructed to do an FTP download. Now if the phone is handed over to GSM, so that the throughput is sharply reduced, then we want to abandon the download, i.e. the activity should terminate. This is accomplished by imposing a terminate on event condition on the activity. After a handover to GSM has occurred, we want to proceed with a voice call (which does not require a large bandwidth). If on the other hand the phone remains on WCDMA, then after the FTP download has completed we want to continue with a video streaming session.

To do this, we use an if-else construct in the following manner:First, add a Network Connect activity, and then an FTP Download activity with the Abort property set to On Event and Handover from UTRAN selected as event.Then add an If-Else activity below the FTP download.- For the left-hand branch (ifElseBranchActivity1), set Condition Type to Activity Result, and set the associated attributes as follows:Activity = the name of the FTP download activity, by default ftpDownloadActivity1.Operator = Equals.Result = Stopped by Event.- For the right-hand branch (ifElseBranchActivity2), set Condition Type to Any. This always evaluates to true, so that the right-hand branch will be executed whenever the condition in the left-hand branch is false. This is not shown in the image above.Add a voice dial activity on the left branch to the node sequenceActivity1 and a streaming activity on the right branch to the node sequenceActivity2.

65TEMS Investigation 12.0, August 2010, Ascom66Composing and configuring scripts (10/13)While Activity.Used to repeat a sequence of activities a predetermined number of times.While loops can be nested arbitrarily.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 10 minutes.

Explain the use of the control flow activity While.

While loops are used to repeat a sequence of activities a predetermined number of times.

While loops can be nested arbitrarily.

An example, suppose we want to execute an FTP download five times.

To do this, we use a while loop in the following manner:First, drag a While activity to the start of the workflow.In the Properties pane, set the number of times you want to iterate the while loop. By entering the value 5, we stipulate that the loop should be run five times in total.Then, drag the predefined FTP download snippet into the while loop, dropping it onto sequenceActivity1.To insert a brief pause after each pass through the while loop, append a Wait activity at the end of the FTP snippet.Set the duration of the Wait activity in the Properties pane.If we set Duration to 10s, the script will perform five FTP downloads in succession with a 10s idle interval between downloads.

66TEMS Investigation 12.0, August 2010, Ascom67Composing and configuring scripts (11/13)Wait Activity.The function depends on its position in the workflow.Following a Dial or Video Dial activity, gives duration to the call.Appearing elsewhere, it temporarily suspends the execution of the workflow branch where it is located.The Duration property governs how long to wait.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain the use of the control flow activity Wait.

The function of the Wait activity depends on its position in the workflow.

When following a Dial or Video Dial activity, the Wait gives duration to the call, extending it beyond the call established point for as long as specified by the wait time. If there is no Wait, the call is established and then terminated immediately.

When appearing elsewhere, the Wait activity does nothing, so in effect it temporarily suspends the execution of the workflow branch where it is located. After the wait time has expired, the execution proceeds to the next activity.

The Duration property governs how long to wait.67TEMS Investigation 12.0, August 2010, Ascom68Composing and configuring scripts (12/13)Parallel Activity.Causes the workflow to split unconditionally into two or more branches (no hard limit).Each branch must involve different devices.Each parallel branch is encapsulated within a Sequence activity.This activity has no unique properties.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 15 minutes.

Explain the use of the control flow activity Parallel.

This control structure causes the workflow to split unconditionally into two or more braches, each of which must involve different devices.

There is no hard limit on the number of branches.

A device can participate in more than on branch, provided that the device supports concurrent execution of the services involved or several sessions using the same service.

Each of the parallel branches is encapsulated within a Sequence activity.

This activity has no unique properties.

An example, if one phone is to place a voice or video call to another, caller and receiver must be put in parallel, one dialing and the other answering. To create a branching structure for these concurrent tasks, we use the Parallel activity from the Control Flow category.

A parallel structure is also recommended for MMS send/receive.68TEMS Investigation 12.0, August 2010, Ascom69Composing and configuring scripts (13/13)UE Control functionality.Control functions accessible from the Equipment Tab of the Navigator can be applied in a script as activities.RAT lock and Band lock activities are more generic than the manual control functions.UE control activity in a script can only be executed if the target device is capable of the operation in question.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain the use of the UE control functionality in scripts.

A number of control functions accessible from the Navigator (Equipment tab, bottom part, Activities tab) can also be applied in a script in the form of activities.

For the RAT lock and band lock functions, it must be noted that the script activities are inevitably more generic in nature than the manual control functions. The Band Lock activity has bands from every supported technology selectable, whereas the manual band lock function in the Navigator (acting as it does on a specific device of a well-defined make and model) can only lock on the bands supported by the device.

In conclusion, a UE control activity in a script can be executed only if the target device is capable of the operation in question. You will be notified if this is not the case.69TEMS Investigation 12.0, August 2010, Ascom70Validating and Running Scripts (1/5)Validating Scripts.To ensure a script is syntactically correct.To make sure it does not assign tasks that you devices dont support .A non-trivial issue when building complex scripts.Also crucial for UE control functionality.Scripts are automatically validated when started.Can be validated in advance.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain the use of Script validation.

Before a script is run, it needs to be validated to ensure that it is syntactically correct and does not assign tasks that your devices do not support.

This may seem trivial for simple scripts, however, when building more complex scripts involving multiple devices and control logic, the validation becomes a non-trivial issue.

Validation is also crucial for UE control functionality.

A script is automatically validated when you start it.

You can also explicitly have a script validated in advance:Go to the Script menu and select Validate. You will be presented with the results.If the script passes validation, you will receive a notification Script validation succeeded. The script is then ready to be run.

70TEMS Investigation 12.0, August 2010, Ascom71Validating and Running Scripts (2/5)Running Scripts General aspects.Scripts can be run from the Service Control Designer or Service Control Monitor.Devices involved in a script execute their assigned activities independently of one another with the following exceptions:When devices engage in a service where they interact.When devices are involved in different workflow branches that converge. In this case, all branches are synchronized before the execution proceeds past the point of convergence.The script will not work properly if the keylock function is activated in any of the phones.It is recommended that you disable IPv6 for all device modems in Windows 7 and Vista.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain the general aspects of script execution.

You can run a script either from the Service Control Designer or from the Service Control Monitor.

The devices involved in a script will execute their assigned activities independently of one another, except when the devices engage in a service where they interact, and when devices are involved in different workflow branches that converge. In the latter case, all branches are synchronized before the execution proceeds past the point of convergence.

When executing a script, the keylock function must not be activated in any of the phones. If it is, the script will not work properly.

It is recommended that you disable IPv6 for all device modems in Windows 7 and Vista.

71TEMS Investigation 12.0, August 2010, Ascom72Validating and Running Scripts (3/5)Running Scripts from the Service Control Monitor.Click the Open Script button to select your script.Click the Run Script button to start the script.Click the Stop Script button to stop script execution.Status tab shows current status for each device.Summary tab shows statistics on the outcome of each activity type.

[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain how to run a script from the Service Control Monitor.

Click the Open Script button to select your script.

Click the Run Script button to start the script.

Click the Stop Script button to stop script execution.

On the Status tab, the current status for each device is displayed. If a device is engaged in multiple concurrent service sessions, one line is printed for each session.

On the Summary tab, statistics are given on the outcome of each activity type (number of succeeded, aborted, and failed activities). Clicking an underlined number in this table brings up a summary of each activity that has been run.

72TEMS Investigation 12.0, August 2010, Ascom73Validating and Running Scripts (4/5)Running Scripts from the Service Control Designer.Enter the script menu and choose Run.The Status and Summary tabs replace the usual contents of the window.Click the Stop Script button to stop script execution.Click the Return to Designer button to return to the Service Control Designer window.

[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain how to run a script from the Service Control Designer.

Enter the script menu and choose Run.

The Status and Summary tabs replace the usual contents of the window. They are identical with those in the Service Control Monitor.

Click the Stop Script button to stop script execution.

Click the Return to Designer button to return to the Service Control Designer window.

73TEMS Investigation 12.0, August 2010, Ascom74Validating and Running Scripts (5/5)Suppressing parts of a script.To run only certain parts of a script and exclude others, you can disable any individual activity.Right-click and deselect Enabled from the context menu.Change Enable flag to False in Properties pane.Activity currently disabled appears dimmed in the workflow pane.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain how to suppress parts of a script.

To run only certain parts of a script and exclude others, you can disable any individual activity byRight-clicking and deselecting Enabled from the context menu.Changing the Enable flag to False in Properties pane.

An activity that is currently disabled appears dimmed in the workflow pane.

74TEMS Investigation 12.0, August 2010, Ascom75Saving and Loading Scripts

To save a script to file, click the Save button on the Service Control Designer toolbar.Extension of the file is .tsc (for TEMS Service Control).The Save Script dialog contains the following options:Description. Free-text field.Format. Standard or Redistributable.You can save the script as a snippet.You can save the script as an image.To open an existing script stored on file, click the Open button on the Service Control Designer toolbar.[ SERVICE CONTROL DESIGNER AND SERVICE CONTROL MONITOR ]

TEMS Investigation 15.X - Feb 2014 @ GlobeNotes for the instructor: This section should take approximately 5 minutes.

Explain how to save and load scripts.

To save a script to file, click the Save button on the Service Control Designer toolbar. Alternatively, from the File menu select Save or Save As

The file will receive the extension .tsc for TEMS Service Control.

The Save Script dialog contains the following options:Description: Free-text field where you can optionally enter a description of the script.Format: You can save the script either with or without the configuration sets it uses.Standard: No configuration sets are saved with the script. This means that changes to a configuration set will automat


Recommended