PDA

View Full Version : Download E******* UMTS Feature Guidelines



Resistor
2011-04-17, 10:15 AM
Please find attached a document by E*******:

=====================================================================
E******* UMTS Feature Guidelines
FSC Performance Engineering
=====================================================================

dated Sep/2008, 247 pages.


This document describes and provides help on understanding, setting and using a significant number of the UMTS network functions.

To let you decide whether this document might be of any interest to you, I have attached below the following:

1) Complete Table of Contents (rather long) -- lets you see what is covered.
2) A random sample extract from the document (this one happens to be about the Monitored Set, but all other articles are of equal value and level of detail).

Please feel free to download the document, read it and only if you happen to find its contents useful, then come back and add reputation.
This would be greatly appreciated.

Enjoy,
Resistor.

(P.S. the password is in my signature below, scroll all the way down to the end of the posting)

(P.P.S. the forum rules advise us to use password to protected any attached file. For this reason I used 7zip.exe to zip and encrypt the attached file. However, user hendral is telling me that he tried opening the file and could not unzip it using RAR. This is believed to be a problem caused by the incompatibility of some programs with the advanced password protection used by 7zip.exe . If you too find that your favourite program cannot open the attached ZIP file then scroll further down and in a later message from me you will find the same file attached but not protected by a password. This is against the forum advice, so please excuse -- best use the attached here file and open it with 7zip.exe, which is a freeware and which you can get from here (http://downloads.sourceforge.net/sevenzip/7z920.exe).)

=====================================================================
Complete Table of Contents

1. Introduction p.10
1.1. Purpose & Scope p.10
1.2. Definitions for this Document p.10
2. Neighbor List p.12
2.1. Monitored Set Creation p.12
2.1.1. Neighbor Cell Priority p.13
2.1.2. IAF Monitored Subset Creation p.14
2.1.3. Field example of Monitored set creation p.16
2.1.4. IEF and GSM Monitored Subset Creation p.16
2.2. Neighbor List Creation and Priority p.16
3. 3G to 2G Neighbor List Generation p.19
3.1. UMTS to GSM 1:1 overlay with matched azimuths p.20
3.2. UMTS to GSM 1:1 overlay with mis-matched azimuths p.20
3.3. UMTS site without overlay p.21
3.4. New GSM site added to the 2G Network p.21
4. Idle Mode Process p.22
4.1. PLMN Selection p.23
4.1.1. PLMN Selection at UE switch on p.23
4.1.2. PLMN selection in Automatic Mode p.23
4.1.3. PLMN Selection in Manual Mode p.25
4.1.4. PLMN Selection while Roaming p.26
4.2. Cell Selection Procedure in UTRAN state p.26
4.3. Cell Reselection Parameters from 3G to 3G p.28
4.3.1. Measurements p.28
4.3.2. Eligibility p.28
4.3.3. Ranking p.29
4.4. Recommended Values for 3G to 3G Selection and Reselection parameters p.30
4.5. Cell Reselection Parameters from 3G to 2G p.31
4.5.1. Measurements p.31
4.5.2. Eligibility p.33
4.5.3. Ranking p.33
4.6. Recommended Values for 3G to 2G Reselection parameters p.35
4.7. Location and Routing Area Registration and Updating p.36
4.7.1. Terminology p.37
4.7.2. Normal LA and RA Updating p.37
4.7.3. Periodic LA and RA Updating p.37
4.7.4. IMSI Attach/Detach p.38
5. Call Setup Procedure p.40
5.1. Circuit Switched Call Setup p.40
5.1.1. RRC Setup Phase, CS Voice p.40
5.1.2. Pre-RAB Phase, CS Voice p.41
5.1.3. RAB Setup Phase, CS Voice p.44
5.1.4. Counters Related to CS Voice Call Setup p.46
5.1.5. Circuit Switched Voice Accessibility KPI p.50
5.2. Packet Switched Call Setup p.51
5.2.1. RRC Setup Phase, PS Setup p.51
5.2.2. Pre-RAB Phase, PS Setup p.52
5.2.3. RAB Setup Phase, PS Setup p.55
5.2.4. Counters Related to PS Setup p.57
5.2.5. Packet Switched Accessibility KPI p.59
6. Random Access Procedure p.60
6.1. Random Access Overview p.60
6.1.1. Random Access Channels p.60
6.1.2. Open Loop Power Control p.62
6.1.3. Physical Layer Random Access Procedure p.62
6.1.4. MAC Monitoring and Control of Random Access Transmissions p.65
6.1.5. RRC Control or Random Access Transmissions p.67
6.1.6. Interaction of RRC, MAC and Physical Layer Random Access Procedures p.68
6.1.7. RACH Sub-Channels p.69
6.1.8. Access Class and Access Service Class p.70
6.2. Random Access Parameter Optimization and Troubleshooting p.71
7. Paging Procedures p.74
7.1. Paging Types p.76
7.1.1. Paging Type 1 p.76
7.1.2. Paging Type 2 p.77
7.2. Paging Channels p.78
7.2.1. Paging Indication Channel p.78
7.3. DRX Procedure p.79
7.4. Paging Repetition p.81
7.5. E******* Specific Counters for Paging p.81
7.5.1. E******* Paging Counters p.81
8. Soft/Softer Handover p.84
8.1. Soft/Softer Handover Procedure and Parameters p.84
8.1.1. Event 1a Evaluation p.86
8.1.2. Event 1b Evaluation p.88
8.1.3. Event 1c Evaluation p.89
8.1.4. Event 1d Evaluation p.91
8.1.5. Event Triggered Periodical Measurement Reporting p.92
8.1.6. Buffering and Queuing p.93
8.1.7. Soft/Softer Handover Execution p.93
8.1.8. Soft/Soft Handover Signaling p.93
8.1.9. ReleaseConnOffset setting p.96
9. Compressed Mode Operation p.97
9.1. Halving the Spreading factor (SF/2) Method p.97
9.2. Higher Layered Scheduling (HLS) Method: p.98
9.3. Compressed Mode Pattern p.98
9.4. Limitations on number of mobiles in Compressed Mode p.99
10. 3G to 2G Handover and Cell Change p.101
10.1. T-Mobile Strategy for IRAT p.101
10.2. Feature Activation p.101
10.3. IRAT Interaction with Inter-Frequency Handover p.102
10.4. 3G to 2G IRAT Handover/Cell Change Procedure p.102
10.4.1. Event based Connection quality monitoring p.103
10.4.2. Event based GSM measurements reporting p.108
10.4.3. Identification of target GSM cell for Handover/Cell Change p.110
10.4.4. 3G to 2G IRAT Handover/Cell Change Execution p.110
10.5. Scenarios for 3G to 2G IRAT Handover / Cell Change p.116
10.5.1. Edge Thresholds p.116
10.5.2. Core Thresholds p.116
10.6. Parameter recommendations for IRAT Scenarios p.117
10.7. 3G to 2G IRAT Handover/Cell Change Optimization Strategy p.118
11. 3G to 3G Inter Frequency Handover p.120
11.1. Feature Activation p.120
11.2. Inter-Frequency Handover Interaction with IRAT Handover.p.120
11.3. Inter-Frequency Handover Procedure p.120
11.3.1. Event based Connection quality monitoring p.121
11.3.2. Event based GSM measurements reporting p.121
11.3.3. Identification of target cell for IF Handover p.122
11.3.4. 3G to 3G IF Handover execution. p.122
12. Emergency Call treatment p.125
13. 2G to 3G IRAT Cell Reselection p.127
13.1. E******* 2G to E******* 3G Reselection p.127
13.1.1. Measurements on WCDMA neighbors in idle mode p.128
13.1.2. Cell Reselection to UMTS for mobiles that don‟t support RSCP evaluation p.129
13.1.3. Cell Reselection to UMTS for mobiles that support RSCP evaluation p.130
13.2. Nokia 2G to E******* 3G Reselection p.131
13.2.1. UTRAN Neighbor Definitions and System Information p.132
13.2.2. Measurements on WCDMA neighbors in idle mode p.133
13.2.3. Cell Reselection to UMTS for mobiles that don‟t support RSCP evaluation p.133
13.2.4. Cell Reselection to UMTS for mobiles that support RSCP evaluation p.135
13.3. Nortel 2G to E******* 3G Reselection p.136
13.3.1. Measurements on WCDMA neighbors in idle mode p.137
13.3.2. Cell Reselection to UMTS for mobiles that don‟t support RSCP evaluation p.137
13.3.3. Cell Reselection to UMTS for mobiles that support RSCP evaluation p.139
13.4. 2G to 3G Reselection Parameter Recommendations p.139
13.4.1. E******* BSS p.139
13.4.2. Nokia BSS p.140
13.4.3. Nortel BSS p.140
14. Capacity Management Overview p.141
14.1. Overview of UMTS Resources p.142
14.1.1. DL Power p.142
14.1.2. Received Total Wideband Power p.143
14.1.3. OVSF Codes p.143
14.1.4. RBS Channel Elements p.145
14.2. Common Resource Utilization p.146
14.2.1. Overhead and Common Channels p.146
14.2.2. Maximum Downlink Transmission Power p.148
14.2.3. HSDPA Resources p.148
14.3. Dedicated Monitor Resource Handling p.149
14.3.1. Downlink Channelization Code Monitor p.150
14.3.2. Downlink Transmitted Carrier Power p.150
14.3.3. ASE Monitor p.152
14.3.4. RTWP Monitor p.153
14.3.5. RBS Hardware Monitor p.153
14.4. Services Class and Setup Type p.153
14.4.1. Service Class p.153
14.4.2. Setup Type p.154
15. Admission Control p.155
15.1. ARP attributes p.156
15.2. Enhanced Soft Congestion p.156
15.3. Admission Policies p.157
15.3.1. Downlink Channelization Code Admission p.157
15.3.2. Downlink Transmitted Carrier Power Admission p.157
15.3.3. Downlink ASE Admission p.158
15.3.4. Uplink ASE Admission p.158
15.3.5. Downlink Spreading Factor Admission p.158
15.3.6. Uplink Spreading Factor Admission p.158
15.3.7. Compressed Mode Admission p.159
15.3.8. HSDPA Admission p.159
15.3.9. Downlink Node B Hardware Admission p.160
15.3.10. Uplink Node B Hardware Admissionp.160
15.4. Counters Related to Admission Control p.161
16. Congestion Control p.165
16.1. Congestion Detection p.165
16.1.1. Uplink Cell Congestion p.165
16.1.2. Downlink Cell Congestion p.167
16.1.3. DL HSDPA Cell Congestion p.168
16.2. Resolution of Congestionp.169
16.3. Counters Related to Congestion Control p.170
17. Power Control p.178
17.1. Importance of Power Control p.178
17.2. Overall Power Control Procedure p.178
17.3. Power Control of downlink common channels p.179
17.4. Open Loop Power Control (Power Control of uplink common channels) p.180
17.5. Power Control of Dedicated channels p.183
17.5.1. Initial Downlink Power Setting p.184
17.5.2. Downlink Power Limits p.186
17.5.3. Initial Uplink Power Setting p.188
17.5.4. Initial Uplink SIR Target Setting p.189
17.5.5. Uplink Outer Loop Power Control p.190
17.5.6. Downlink Outer Loop Power Control p.192
17.5.7. Downlink Inner Loop Power Control p.192
17.5.8. Uplink Inner Loop Power Control p.193
17.6. Power Control during Soft Handover p.194
17.6.1. Uplink power control during SHO p.194
17.6.2. Downlink power control during Soft Handoverp.195
17.7. Power Control during Compressed Mode p.198
17.7.1. Uplink Power Control in Compressed Mode p.198
17.7.2. Downlink Power Control in Compressed Mode p.199
17.8. Power Control Scenarios p.200
17.8.1. Power Control steps for Radio Link Setup Procedure p.200
17.8.2. Power Control steps for RAB Establishment p.200
17.8.3. Power Control steps for Soft Handover p.201
17.9. Example of Power Control Procedure p.201
18. UE States p.203
18.1. Cell_DCH p.204
18.1.1. CELL_DCH to CELL_FACH state p.204
18.2. Cell_FACH p.204
18.2.1. CELL_FACH to CELL_DCH p.205
18.2.2. CELL_FACH to URA_PCH p.205
18.3. URA_PCH p.205
18.3.1. URA_PCH to CELL_FACH p.207
18.3.2. URA_PCH to IDLE p.207
19. R99 PS Data p.208
19.1. Radio bearer QoS p.208
19.2. Differentiation between traffic classes p.208
19.3. Radio Resource Management for packet data services p.209
19.4. Active Queue Management feature p.209
19.5. Channel Switching Feature p.210
19.6. Channel Switching Triggers p.211
19.7. Triggers for Dedicated to Dedicated channel switching p.211
19.7.1. Throughput-triggered Upswitch p.211
19.7.2. Throughput-triggered Downswitch p.212
19.7.3. Coverage-triggered downswitch p.212
19.8. Multi RAB State Transitions p.212
19.8.1. Speech + Interactive p.212
19.8.2. 2xInteractive p.213
19.8.3. Speech + 2xInteractive p.213
20. Channel Switching p.214
20.1. Common to Dedicated Evaluation p.215
20.2. Dedicated to Common Evaluation p.215
20.3. Common to URA Evaluation p.216
20.4. URA to Idle Evaluation p.217
20.5. Coverage Triggered Downswitch Evaluation p.217
20.6. Dedicated to Dedicated Upswitch Evaluation p.218
20.7. Throughput Based Dedicated to Dedicated Downswitch Evaluation p.220
20.8. Multi RAB Downswitch Evaluation p.221
20.9. Multi RAB Upswitch Evaluation p.221
20.10. Channel Switching Parameter Optimization p.222
21. High Speed Downlink Packet Access (HSDPA) p.224
21.1. HSDPA Codes Allocation p.224
21.2. HSDPA Scheduler Option p.225
21.3. Hybrid ARQ Options p.225
21.4. Admission and Congestion Control for HSDPA p.225
21.4.1. Channel type selection between HS-DSCH and DCH p.226
21.5. HSDPA Power Control p.227
21.5.1. HSDPA Power Usage p.227
21.5.2. HS-SCCH Power p.228
21.5.3. HS-DPCCH Power Control p.228
21.6. Channel Quality Estimation p.229
21.7. Iub Flow Control p.229
21.8. HSDPA Mobility – Serving HS-DSCH Cell Change p.232
21.8.1. HS-DSCH Cell Change due to change of best cell p.232
21.8.2. HS-DSCH Cell Change due to removal of serving HS cell p.233
21.9. HSDPA Mobility – Coverage triggered downswitch p.234
21.10. HSDPA Mobility over IuR without HS support p.234
21.11. Effect of HSDPA on R99 p.235
22. Data Services Strategy p.236
23. Parameter Recommendations p.237

24. Appendix A: Weighting Factor Analysis for Soft Handover Algorithm p.238
24.1. Event 1a evaluation p.238
24.2. Event 1b evaluation p.239
24.3. Tradeoff due to weighting factor p.240
25. Appendix B: Monitored Set Creation Field Example p.241
25.1. Description p.241
25.2. Execution p.241
25.3. Neighbor Lists p.241
25.4. Results p.241
26. References p.247


=====================================================================

Random Sample

2.1. Monitored Set Creation

The maximum number of cells that a UE is required to measure according to [4] is 32 of each type - Intra-Frequency, Inter-Frequency and GSM cells. For IEF cells, the number may be divided between a maximum of two frequencies. The IAF monitored subset always includes the cells in the active set.

The IAF Monitored Subset is obtained by performing Monitored Subset Reduction with MaxMonSubset = MaxIafMonSubset = C_MaxSohoListSubset(32) – PresActiveSet, where PresActiveSet is the number of cells in the present Active Set. It is equal to 1 when the connection is set up on CELL_DCH. The cells in the Reduced IAF neighbor Cell Lists that are not included in the IAF Monitored Subset shall be retained in the IAF Unmonitored Subset. The IAF Unmonitored Subset is used to check if a reported cell, belonging to the Detected Set, is a valid cell. The IEF Monitored Subset is obtained by performing Monitored Subset Reduction with MaxMonSubset=MaxIefMonSubset = maxIefMonSubset(32). A maximum of two unused frequencies are included in the IEF Monitored Set, if a third frequency is found during the filtering process then all “third-frequency” inter frequency neighbor cells are discarded. The GSM Monitored subset is obtained by performing Monitored Subset reduction with MaxMonSubset=MaxGSMMonSubset = maxGsmMonSubset(32).

Recommended Values: The parameters maxIefMonSubset and maxGsmMonSubset are recommended to be set to a value of 32. The parameter C_MaxSohoListSubset is a constant hard coded value and is set to 32 by E*******. The listed set sent to the UE contains the Active Set cells, plus the monitored set cells. The monitored set is created from the neighbor cell lists of all the cells in the Active Set, and if the resulting Monitored subset contained in the listed set becomes larger than MaxMonSubset, some of the neighbor cells will be removed and stored in the unmonitored set.

2.1.1. Neighbor Cell Priority

The neighbor cell priority defined by selectionPriority is used when building the monitored set, so that neighbor cells with higher priority are included before low priority neighbors, for each cell in the active set. The neighbor priorities are not compared between different cells in the active set, priorities only apply among defined neighbors out from the same cell. If several neighbors are given the same priority, the order between them is not defined. The highest priority is 1, which should be given to the most important neighbors. If no value or a value of zero is entered when a neighbor is defined, the system will automatically set it to the currently highest used value of selectionPriority + 1, that is, to the currently lowest priority definition for the source cell and for the relation type (Intra / Inter / GSM).This priority can be set separately for IAF, IEF and GSM neighbors. Refer to section “Neighbor List Creation and Priority” for the procedure to assign the Neighbor Cell priority for different neighbors of a serving cell.

2.1.2. IAF Monitored Subset Creation

If possible, a specific cell‟s position in the listed set sent to the UE is retained in consecutive measurement control messages. Cells that are removed from the IAF Monitored subset and not sent to the UE, are retained in the IAF Unmonitored subset. If there is only one cell (A) in the Active Set, a monitored set containing the first 31 neighbors of this cell is created in priority order (based on the setting of parameter selectionPriority). When a second cell (B) is added to the Active Set, and assuming that Cell (A) is reported as the strongest cell in the 1a event triggered measurement report, the monitored set is created in the following manner. Add both the active cells (A) and (B) to the listed set in the same position as they existed previously. Take the neighbor cell with the highest priority for the best active set cell, cell (A), and if it already exists in the old listed set, add it to the new listed set in the same position. If it does not exist in the old listed set, then the position does not matter; therefore store it for addition later in a temporary array. Take the neighbor cell with the highest priority for the second best active set cell (B), and if it already exists in the old listed set, add it to the new listed set in the same position. If it does not exist in the old listed set, then the position does not matter and it can be stored in a temporary array for addition later. Store the neighboring cell only if it does not already exist in the temporary array to avoid duplications. If it is already stored in the temporary array, take the next neighboring cell in priority order from the next cell in the Active Set, cell (A) applying the same rules. Repeat until all neighbor cells have been processed or until MaxIafMonSubset number of neighboring cells have been selected for the listed set. Take the cells that have been selected to be included in the new listed set that are stored in the temporary array and add them to the listed set by filling the empty spaces. The neighboring cells are picked from the temporary array in the order they were stored (FIFO). This makes sure that neighboring cells stored early in the temporary array will be the first to fill out the spaces in the listed set. If the listed set gets full (reaches a value of C_MaxSohoListSubset), remaining unprocessed neighbor cells or cells in the temporary array shall instead be stored in the unmonitored set, without duplicates. If the Active Set contains more than 2 cells, the above algorithm can be expanded to include the neighboring cells of all the active set cells. Below is an illustration of the combined monitored set, when the Active set has 3 cells.

The following figure shows the individual neighbor lists for the 3 cells in the active set. [Note by Resistor: the figure is in the document and is not included in this sample text] Assume that Cell A is the strongest cell and Cell C is the weakest cell. The combined monitored set when the active set contains all 3 cells is shown below.

2.1.3. Field example of Monitored set creation

Refer to Appendix B for a field example of the monitored set creation for event 1a when there is initially 1 cell in the Active set.

2.1.4. IEF and GSM Monitored Subset Creation

The IEF and GSM Monitored sets don‟t contain any Active set cells, and there is no unmonitored set in these cases. The maximum number of cells in the monitored subsets is maxIefMonSubset and maxGsmMonSubset respectively. Otherwise, the same approach as described in the previous section is used when creating the IEF and GSM monitored subsets.

=====================================================================
*** End of the random sample. The full document is in the attachment below ***


(The password is further down, in the signature)

(Note: the forum rules advise us to use password to protected any attached file. For this reason I used 7zip.exe to zip and encrypt the attached file. However, user hendral is telling me that he tried opening the file and could not unzip it using RAR. This is believed to be a problem caused by the incompatibility of ome programs with the advanced password protection used by 7zip.exe . If you too find that your favourite program cannot open the attached ZIP file then scroll further down and in a later message from me you will find the same file attached but not protected by a password. This is against the forum advice, so please excuse -- best use the attached here file and open it with 7zip.exe, which is a freeware and which you can get from here (http://downloads.sourceforge.net/sevenzip/7z920.exe).)

hendral
2011-04-17, 10:45 AM
File already corrupt. Pls you re-check.

Resistor
2011-04-17, 11:06 AM
To Hendral: I have just checked and the attachment downloaded successfully and the password worked as expected. You should try to download the attachment again -- it will work. Let me know what kind if problem you encounter and I'll try to help.

(Please do not quote my text in your posting, as it makes a rather long thread).

Thanks,
Resistor.

hendral
2011-04-17, 12:33 PM
When I open your file.rar, I get information that no file to be extracted. Pls you check your file. I have redownloaded, and still problem

Resistor
2011-04-17, 01:22 PM
Hello Hendral,

I am sorry that you are still having difficulties with opening the file.

1) I tried it now three times and all worked again OK.

2) My attached file is not RAR, like you say, but rather it is ZIP. I used 7zip.exe to unzip it.

I suppose that if you try to use RAR it may not be compatible with the encryption used by 7zip.exe. You can obtain a copy of 7zip.exe from here (http://downloads.sourceforge.net/sevenzip/7z920.exe).

3) To help you, and perhaps others, who might want to use RAR like you, I am attaching the same archive here below but not encrypted (not protected by a password) -- I hope that this time it will work for you.

Unfortunately, I cannot use RAR on my laptop because I am not allowed to install it (this is a company machine). Please let me know what I could do to help you.

Kind regards,
Resistor

alvinnsu
2011-04-18, 12:05 AM
can i know how i have a access to download this file ?

wolverine
2011-04-18, 12:10 AM
This has been shared before in the forum. Duplicate post..

riyantoyadi
2011-04-18, 01:11 AM
please double check on this forum before sending anything :confused:

Resistor
2011-04-18, 03:03 AM
To user alvinnsu: you have to earn points in this forum by posting something of interest to the others. Then you can spend these points on downloading attachments like this.

hendral
2011-04-18, 09:43 AM
File is OK without password

Resistor
2011-04-18, 09:36 PM
Hey,

So many downloads and so little reputation? Lokks like this was not an interesting topic, after all. Better not post the second part then..:(

Eluicas
2011-05-18, 01:01 PM
That is a excellent staff I also Will Upload interestins material soon.

roloramos
2011-05-18, 05:55 PM
Excellent documentation...very nice job!!
Compadre!!!

vaibhav.singh
2011-06-02, 09:45 PM
Hi please find attached e******* optimization Document:p

zeezzoo
2011-06-03, 12:41 AM
thx so much for the share

harrypotter
2011-06-03, 04:14 AM
Can someone share same documents for NSN.

echomoon
2011-06-03, 08:13 AM
thanxxx i found it helpfull:)

vaibhav.singh
2011-06-03, 06:20 PM
hi , i am unable to download this doc

vaibhav.singh
2011-06-03, 06:30 PM
i am unable to download this doc

safe_addeen
2011-07-02, 01:27 AM
Hello Hendral,

I am sorry that you are still having difficulties with opening the file.

1) I tried it now three times and all worked again OK.

2) My attached file is not RAR, like you say, but rather it is ZIP. I used 7zip.exe to unzip it.

I suppose that if you try to use RAR it may not be compatible with the encryption used by 7zip.exe. You can obtain a copy of 7zip.exe from here (http://downloads.sourceforge.net/sevenzip/7z920.exe).

3) To help you, and perhaps others, who might want to use RAR like you, I am attaching the same archive here below but not encrypted (not protected by a password) -- I hope that this time it will work for you.

Unfortunately, I cannot use RAR on my laptop because I am not allowed to install it (this is a company machine). Please let me know what I could do to help you.

Kind regards,
Resistor

Dear Resistor,
Could you please upload this file on a well known uploading web like 4shared. because i don't have privileges to download it.
Your support is highly appreciated.
BR/
Saif Addeen

kevin_h811
2011-07-02, 11:08 AM
Hi,

First download, Not OK .Installed 7Z.exe.

Second download on it, it works.

Regards//

riyantoyadi
2011-07-02, 04:11 PM
Hey,

So many downloads and so little reputation? Lokks like this was not an interesting topic, after all. Better not post the second part then..:(

you already got much Rep, right? then keeping your promise to Upload second part as your state above

songhence
2011-12-13, 06:03 PM
very useful doc, thanks very much

songhence
2011-12-16, 05:01 PM
I expect the guy sharing files without PSW