memory prober application · pdf filememory prober application ceragon proprietary and...

13
Copyright © 2017 by Ceragon Networks Ltd. All rights reserved. Memory Prober Application User Manual Version 1.0.0.27 March 2017 Document Revision E

Upload: lamthien

Post on 12-Mar-2018

227 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Copyright © 2017 by Ceragon Networks Ltd. All rights reserved.

Memory Prober Application User Manual

Version 1.0.0.27

March 2017

Document Revision E

Page 2: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 2 of 13

Notice

This document contains information that is proprietary to Ceragon Networks Ltd. No part of this publication may be reproduced, modified, or distributed without prior written authorization of Ceragon Networks Ltd. This document is provided as is, without warranty of any kind.

Trademarks

Ceragon Networks®, FibeAir® and CeraView® are trademarks of Ceragon Networks Ltd., registered in the United States and other countries.

Ceragon® is a trademark of Ceragon Networks Ltd., registered in various countries.

CeraMap™, PolyView™, EncryptAir™, ConfigAir™, CeraMon™, EtherAir™, CeraBuild™, CeraWeb™, and QuickAir™, are trademarks of Ceragon Networks Ltd.

Other names mentioned in this publication are owned by their respective holders.

Statement of Conditions

The information contained in this document is subject to change without notice. Ceragon Networks Ltd. shall not be liable for errors contained herein or for incidental or consequential damage in connection with the furnishing, performance, or use of this document or equipment supplied with it.

Open Source Statement

The Product may use open source software, among them O/S software released under the GPL or GPL alike license ("Open Source License"). Inasmuch that such software is being used, it is released under the Open Source License, accordingly. The complete list of the software being used in this product including their respective license and the aforementioned public available changes is accessible at:

Network element site:

ftp://ne-open-source.license-system.com

NMS site:

ftp://nms-open-source.license-system.com/

Information to User

Any changes or modifications of equipment not expressly approved by the manufacturer could void the user’s authority to operate the equipment and the warranty for such equipment.

Page 3: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 3 of 13

Table of Contents

1. Introduction ...................................................................................................... 4

2. Release Notes ................................................................................................... 5

3. Installation ........................................................................................................ 6

4. Appearance ....................................................................................................... 8

5. General Information ......................................................................................... 9

6. Activation ........................................................................................................ 11

7. Results ............................................................................................................ 12

8. Recommended Actions .................................................................................. 13

Page 4: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 4 of 13

1. Introduction

An issue has been identified affecting certain IP-20 products, which may lead to failures in SD and eMMC cards and result in system failure. Only certain products are affected, depending on usage and configuration among other factors.

The Memory Prober Application was designed to test IP-20 products and determine whether and to what extent they are affected by this issue. This application ensures that remedial action will only be taken in cases, and to the extent to which, such remedial action is required.

The Memory Prober Application can be run on a group of IP-20 devices, according to a list of IP addresses. The list can include IP-address ranges. The output is a CSV file that indicates, per device, whether or not any remedial action is necessary. If some remedial action is necessary, the output file indicates which action is necessary. Remedial actions include software upgrade, immediate replacement of the SD or eMMC card, and replacement of the SD or eMMC card at a later date.

This document guides you through the process of installing and using the Memory Prober Application.

Page 5: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 5 of 13

2. Release Notes The Memory Prober Application only operates with the following IP-20

SW versions:

8.7.0.0.0.166

8.5.5.0.0.121

8.5.5.0.0.110-5

8.3.0.0.0.512

8.2.0.0.0.342

8.0 - According to the device type:

IP-20G/IP-20GX - 8.0.0.0.0.687

IP-20N/IP-20A - 8.0.0.0.0.686

IP-20C/IP-20S/IP-20E - 8.0.0.0.0.350

The Memory Prober Application runs on Windows 7 or higher.

The Memory Prober Application requires that .NET version 4.5 be installed on the PC or laptop.

.NET version 4.5 can be downloaded from the following link: http://www.microsoft.com/en-us/download/details.aspx?id=30653

Page 6: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 6 of 13

3. Installation

1. Run the executable installation file from any location.

2. Press Next to continue the installation.

3. Optionally, select Create a desktop icon and press Next to begin the installation process.

4. Once the installation process has finished, click Finish to close the application installer.

Page 7: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 7 of 13

Page 8: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 8 of 13

4. Appearance 1. To start the application, select Memory Prober Application > Memory

Prober Application from the Start menu.

2. The main window contains the following buttons:

Load File - Loads a new IP Address list. The application processes either an Excel or a “CSV” file. For further information about the input file requirements, see Chapter 5, General Information.

Open Template – Creates a new Excel template file containing the headlines as required by the application.

Parallel Actions – Define the number of consecutive connections to run once the application is activated.

Settings - General connectivity settings used by the application.

Page 9: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 9 of 13

5. General Information 1. Input Files

The Memory Prober Application requires an input file containing a list of IP addresses.

The input file can be one of the following types:

Excel - An .xlsx file containing:

A worksheet named “Network_Devices_IP_Ranges”.

A table with a field named “IP Address”.

Optionally, a second field named “Last IP Address” used for creating a range of IP addresses.

A template of the Excel file can be created in the Main window.

NMS Export File - A .CSV file (Comma Separated Value) exported from your Network Management System containing an IP address field with the headline - “IP Address”.

2. Range of IP Addresses

If a range of IP addresses is required, enter the first IP address in the “IP Address” column and the last IP address in the “Last IP Address” column.

If only one IP address is required, leave the “Last IP Address” column empty for the relevant row.

Once activated, the application will create a list of the given range.

This option is only available for IP addresses in the same subnet.

Page 10: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 10 of 13

3. Login Credentials

The application requires access to the device via the root username. In order to change the default Password, go to the Settings menu and add the relevant values under Login Credentials.

4. Proxy Information

If a proxy is used for managing the device go to the Settings menu and add the relevant values under Proxy Information.

5. SSH Timeout

If management to the unit is slower than desired, change the SSH session timeout in the Settings menu.

Page 11: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 11 of 13

6. Activation 1. Loading the Excel Input File

In the main window, click Load File. A file browser window opens. Select the Excel or CSV file that contains the IP addresses, as described

in Chapter 5, General Information, under Input File. Once loaded, the application will display the list of devices.

Each device has the status “Waiting” until activated manually.

2. Parallel Actions

Once activated, the application can operate on 1 to 100 devices in parallel (depending on machine performance). Set the required number of parallel actions before activating the application.

3. Activation

Press Start to activate the process on the listed devices.

4. Device Status And Eecommendations

The “Device Status” bar displays the current action running on each device. Once completed, the bar will display the recommended action for each IP address.

5. Active/ Standby

The bullet in the Active column indicates the result calculated by the application according to the table in the “Recommended Actions” section. In case of device protection, a separate bullet will appear in the Standby column.

6. Connections

In order to validate the connectivity to the device:

Click Ping to open a ping shell command to the relevant device.

Press to open a Web management session to the relevant device.

7. Progress Bar

On the bottom left corner, the progress bar indicates the progress of the current operation on the list of IP addresses. When all devices are done, the bar will indicate 100%.

8. Termination

Press STOP to deactivate the application process prior to completion. The application will end the procedure on units where the procedure has already started.

Page 12: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 12 of 13

7. Results The results of the process can be read via one of the following interfaces:

1. User Interface

Once completed, the application window retains the list of IP addresses as loaded from the input file. The list contains the results for each device.

The Active column will indicate the calculated lifetime of the device. In case of device protection, the Standby column will display the calculated lifetime of the standby device.

2. CSV Results File

A result file is created for each application operation.

The file is saved in a CSV format, and is located in a subfolder named “RESULTS” under the path of the input file. Each results file is named “Network_ Analysis _Summary” and a date and time stamp is added.

The file includes the following columns:

IP Address - Device IP address as defined in the input file.

Unit Name - As received from the device.

Unit Type - As received from the device.

Location - As received from the device.

Index - A numeric value of the application result.

Color- Visually reflect the application recommendation.

Recommended Action - According to the application results.

SW Version - As received from the device.

Unit Serial Number - As received from the device.

Unit Part Number - As received from the device.

StandBy Parameters - If a protection feature is enabled the application will add the standby parameters.

Time - Date and Time of the operation.

CheckSum - Calculated value to validate the application results.

Page 13: Memory Prober Application · PDF fileMemory Prober Application Ceragon Proprietary and Confidential Page 2 of 13 ... CeraMap™, PolyView™, ... Proxy Information

Memory Prober Application

Ceragon Proprietary and Confidential Page 13 of 13

8. Recommended Actions

The application displays a recommended action according to the following table:

Communication problem. Please run the application again on the affected node.

Replace the eMMC (SM) or the SD card in the affected node within the upcoming year

Plan to replace the eMMC (SM) or SD card in the affected node within the upcoming two years.

Plan to replace the eMMC (SM) or SD card as part of your regular site maintenance within the upcoming 10 years.