MML Basic Human-Machine Language

Man Machine Language (MML) uses a series of commands to realize various operations of the maintenance terminal. The communication protocol is relatively simple, which is conducive to the realization of remote maintenance . The disadvantage is that users need to memorize complex commands, and the output results are all pure characters, so it is not as intuitive and convenient to use as the GUI method. Wherein, the MML interface also refers to the man-machine access interface, and in the telecommunications business, also refers to the business system interface in the business support system.

Program Introduction

Man Machine Language (MML) uses a series of commands to realize various operations of the maintenance terminal. The communication protocol is relatively simple, which is conducive to the realization of remote maintenance. The disadvantage is that users need to memorize complex commands, and the output results are all pure characters, so it is not as intuitive and convenient to use as the GUI method.

The MML command line operating environment also adopts the access/service mechanism of the client/server architecture. The MML server runs on the BAM (Back Administration Module, which is the background management module in Huawei's access network equipment) and is the center of MML control. Complete user login, task scheduling, command interpretation and compilation, authority management, timed task management and other functions; MML client is only a simple input and output interface, mainly to complete the input and output functions of ASCII characters.

After receiving a login request from a client, the MML server assigns a workstation number according to its TCP port and saves it, and then queries the authority database based on the client's IP address and operator account to obtain the operator's authority on this workstation. After the server receives a specific command, it first performs syntax analysis on the command through the command interpreter, and if the analysis passes, then it judges whether the operator can execute the command through the authority analysis program . If it can be executed, this command is distributed to each business process or itself. After each business process executes the command, it sends a response to the MML server, and the MML server forwards the response to each MML client according to the correspondence between the workbench number and the TCP port.

The command interpreter processes the input command sequence, mainly analyzing the syntax of each command, and also includes partial semantic analysis. In fact, the execution of each command is completed on each relevant server.

Program Features

MML has the following characteristics.

(1) The MML command set encapsulates the services of the switch, and a command corresponds to a function rather than a simple operation. For example, adding a user requires several steps: modify the user data index table → modify the ST user data table → modify the ST user device table → format conversion → set the host, and the encapsulated commands make these steps transparent. To add a user, the user only needs to execute a functional command, without knowing what changes should be made in the database, how to take effect, and so on.

(2) The MML system strictly checks the consistency of data, and each function checks the relationship between tables when it is executed, which can prevent the generation of invalid garbage data.

(3) The MML command set is equivalent to a set of underlying APIs for the switch platform, and other applications are based on it, while the GUI terminal translates the user interface operations into commands and submits them to the MML system, which is responsible for the functions executes and returns text results , which are then converted to appropriate responses on the GUI terminal. In this way, the stability of the switch system can be guaranteed, and the operation of the whole switch will not be affected due to the problem of the application program.

(4) The input and output of the MML system is based on pure character streams, and supports programs such as TELNET to interact with switching devices. It can easily connect clients across multiple platforms (such as supporting dumb terminals without processing capabilities, etc.), which is very useful. It is conducive to centralized network management and complies with the development trend of communication products.

command format

The format of the MML command is as follows:

<command name>: [<parameter1>=<value1>[, <parameter2>=<value2>[, ...]]]

1. There are 7 types of parameter values

(1) Numerical type: pure numerical value. Represented by decimal numbers, such as: 19, 65 535, ...

(2) Boolean type: Boolean value. TRUE or FALSE.

(3) String type: any sequence of characters that does not contain quotation marks. Use a pair of double quotation marks to indicate, such as: "SM1->tandem office", "12/13", ...

(4) Enumeration type: English abbreviation indicating a certain meaning. Such as: ASL, OPT, TSSC,…

(5) Bit field type: represents a collection of a series of Boolean values. Use an l or a 0 after the Boolean sub-parameter name to indicate that the sub-parameter is true or false, such as: LOC-1 indicates that the LOC is true, if there are more than one sub-parameters, use & to connect, such as: LCO-1&NTT-0&ITT One 0,...

(6) Keyboard type: telephone keyboard input. Trailing keystroke sequences with K', eg: K'010, K'*57#, K'26540808, ...

(7) Date and time type: Indicates date and time. Each domain is connected with &, such as: 2002&3&5, 23&59, ...

2. There are two ways to combine parameter values, which are for numeric and keyboard types

(1) Interval: use &&. Connect interval boundaries. For example: 1&&16 means from 1 to 16.

(2) Combination: Use &. connect. Such as: 1&. 16 means 1 and 16.

Naming rules

The MML command set is named according to a unified rule, which is easy for users to remember. The naming rules of MML commands are as follows.

(1) The command word is composed of at most two identifiers, which support connecting with spaces (or hyphens), for example: identifier 1 identifier 2.

(2) Identifier 1 is an action word, and the length is strictly three letters; Identifier 2 is the specific object of the command action operation, which is composed of 3 to 8 characters (numbers are allowed) (as long as the expression is clear, the fewer the characters, the more good).

(3) The composition of the MML system command allows less than two identifiers, such as LGI (login).

(4) Other commands are organized according to "<command action word> <compound word of function block and object>".

(5) LST command and DSP command: DSP command is specially used to display the host dynamic query results, traffic statistics, and test task results. The static data query of the database all uses the LST command.

Attachment: Common commands for network optimization of a major communication company

Reposted from: Man-Machine Language (MML: Man-Machine Language)_mml Protocol_so~what's Blog-CSDN Blog

Guess you like

Origin blog.csdn.net/fuhanghang/article/details/131934516