![]() Method and tool for network maintenance
专利摘要:
A computer implemented method for automated communication Network maintenance actions. The method comprises receiving (301) a first message comprising a predefined command and an identifier of a target item; automatically performing (303) for the target item an action corresponding to the predefined command; and reporting (304) status of the action in a second message. The action may be to deactivate or activate a cell or a base station of the communication network. 公开号:FI20195048A1 申请号:FI20195048 申请日:2019-01-28 公开日:2020-07-29 发明作者:Henri Karikallio 申请人:Elisa Oyj; IPC主号:
专利说明:
[0001] [0001] The present application generally relates to communication network maintenance and to a method and tool for network maintenance.BACKGROUND [0002] [0002] This section illustrates useful background information without admission of any technique described herein representative of the state of the art. [0003] [0003] Communication networks evolve constantly as capacity requirements change, operating environment changes and technology advances. Additionally, base stations and other network elements of communication networks require physical maintenance during life cycle of the base stations and network elements. There may be a need to replace physical components of the base station and/or to make other physical changes in the base station. In general, one base station comprises one or more cells. The changes may involve the whole base station, certain cells of the base station, or only one cell of the base station. [0004] [0004] When a physical change is made in an existing base station or one or more cells of the base station, there is a need to shut down or deactivate the base station or the cell in a controlled manner before unplugging power from the base station or the cell so that any users that are being served by the base station or the cell are moved to other base stations and cells of the network in a controlled manner. The same applies to powering up the base station or the cell. That is, there is a need to bring up or activate the base station or the cell in a controlled manner in order to O start using the base station or the cell in the network. [0006] [0006] Various aspects of examples of the invention are set out in the claims. [0007] [0007] According to a first example aspect of the present invention, there is provided a computer implemented method for automated communication network maintenance actions. The method comprises receiving a first message comprising a predefined command and an identifier of a target item; automatically performing for the target item an action corresponding to the predefined command; and reporting status of the action in a second message. [0008] [0008] The action may be performed in a network operations system. [0009] [0009] In an embodiment, the method further comprises receiving the first message from a client application. In another embodiment, the method further comprises receiving the first message through a web interface. [0010] [0010] In an embodiment, the second message is an SMS message. That is, a command may be received through a client application or a web interface while the response may be sent as an SMS message e.g. to a mobile device of a user. [0011] [0011] In an embodiment, the first and second messages are SMS messages. That is, basic SMS functionality of a mobile phone of a user may be used. [0012] [0012] In an embodiment, the method further comprises authenticating the sender of the first message prior to performing the action. [0013] [0013] In an embodiment, the target item is a cell or a base station. [0017] [0017] In an embodiment, the method further comprises performing the action for a base station comprising a cell corresponding to the target item. [0018] [0018] In an embodiment, the second message reports completion of the action or a failure of the action. [0019] [0019] In an embodiment, the method further comprises receiving an unknown command in the first message, and responsively reporting that the command is erroneous in the second message. [0020] [0020] According to a second example aspect of the present invention, there is provided an apparatus comprising a processor and a memory including computer program code; the memory and the computer program code configured to, with the processor, cause the apparatus to perform the method of the first aspect or any related embodiment. [0021] [0021] According to a third example aspect of the present invention, there is provided a computer program comprising computer executable program code which when executed by a processor causes an apparatus to perform the method of the first aspect or any related embodiment. [0022] [0022] The computer program of the third aspect may be a computer program product stored on a non-transitory memory medium. [0023] [0023] Different non-binding example aspects and embodiments of the present invention have been illustrated in the foregoing. The embodiments in the foregoing are used merely to explain selected aspects or steps that may be utilized in implementations of the present invention. Some embodiments may be presented only with reference to certain example aspects of the invention. It should be appreciated that corresponding embodiments may apply to other example aspects as well. [0028] [0028] Fig. 4 shows a flow diagram illustrating an example method in a client 3application according to certain embodiments; and [0029] [0029] Fig. 5 shows an apparatus according to an embodiment.DETAILED DESCRIPTON OF THE DRAWINGS [0030] [0030] Example embodiments of the present invention and its potential advantages are understood by referring to Figs. 1 through 5 of the drawings. In this document, like reference signs denote like parts or steps. [0031] [0031] Various embodiments relate to deactivating and activating cells and base stations of communication networks. The deactivation refers to a controlled shut down or locking of cells and base stations in a network operations system. The deactivation is so called merciful deactivation, wherein the network operations system moves any users that are being served by the target base station or cell to other base stations and cells of the network in a controlled manner. Calls and data connections of the users are moved and after deactivation the deactivated cell or base station does not accept new users (that is, new calls or data connections). After deactivation it is possible to unplug power from the target base station or cell without causing disturbance to users of the communication network. Activation is the reverse action wherein the target base station or cell is brought up or opened in a controlled manner in the network operations system. After activation, the target base station or cell is in normal operating mode and accepts new users (that is, new calls or data connections). [0032] [0032] Fig. 1 shows a conventional network maintenance scenario. The scenario shows a base station 101 and a first person 102 with a mobile phone 105 at the site making physical changes in the base station 101. The changes may involve O the whole base station, certain cells of the base station, or only one cell of the base N station 101. Further, the scenario shows a network operations system 103 and a O second person 104 taking care of deactivating and activating base stations in the N network operations system 103 as needed. The first person 102 and the second E person 104 coordinate timing of the physical changes with each other e.g. over 2 phone. In practice, the first person 102 and the second person 104 need to be 3 working at the same time and the second person 104 responsible for the actions in > the network operations system 103 may not be able to simultaneously serve first persons at different sites. Any changes made in the network operations system 103 are conveyed to the physical base stations 101 and other network elements of the 4communication network and the network operates accordingly. [0033] [0033] Embodiments of the present disclosure provide a new method and tool for use by the first person at the site. The methods and tools according to example embodiments can be used to easily deactivate and activate base stations or individual cells. The embodiments provide an automation system with an interface for deactivating and activating base stations or cells in a controlled manner. An embodiment provides an SMS (short message service) message based control interface. Certain embodiments employ SMS messages for the deactivating and activating operations. Certain alternative embodiments employ SMS messages for obtaining access to a control interface that provides functionality for the deactivating and activating operations. Such control interface may be for example a web interface. Also the term text message may be used for referring to SMS messages. SMS is well suited for communicating from a site under maintenance as availability of network resources may be limited at the site and SMS messages do not require a lot of network capacity. SMS messages may be quickly transmitted even using 2G technology that may be available even though 3G, 4G or 5G resources are not. In addition to SMS messages also some other message type with similar characteristics may be used in example embodiments. E.g. other message or connection types not requiring a data connection may be used. [0034] [0034] Fig. 2A shows a network maintenance scenario according to an embodiment. The scenario shows a base station 101 of a communication network and a first person 102 with a mobile phone 105 at the site making physical changes in the base station 101. The changes may involve the whole base station, certain cells of the base station, or only one cell of the base station 101. Further, the O scenario shows a network operations system 103. The network operations system N may be for example OSS, operations support system, comprising operating O configuration for different network elements of the communication network. Still N further, the scenario shows an automation system 204. The automation system 204 E and the network operations system 103 are communicatively connected to each 2 other. Any changes made in the network operations system 103 are conveyed to the 3 physical base stations 101 and other network elements of the communication > network and the network operates accordingly. [0035] [0035] The automation system 204 provides an interface for deactivating and activating base stations or cells or for performing some other action for the basestations or cells in a controlled manner in the network operations system 103. The interface may be an SMS interface or a web interface. The automation system 204 and the network operations system 103 may be different physical elements or logical elements executed in the same computer hardware. The first person 102 at the site interacts with the automation system 204 via a suitable user interface of a user device such as the mobile phone 105. In a first embodiment, SMS messages and existing SMS functionality in the mobile phone 105 is used and the first person 102 writes SMS messages with predefined content and sends them to the automation system 204. In a second embodiment the mobile phone 105 of the first user comprises a client application that sends to the automation system 204 SMS messages with predefined content in response to user commands. The client application may provide a graphical interface for use by the first person 102. In a third embodiment, there is a web interface for use by the first person 102. The web interface may be accessible through a browser application in the mobile phone 105 of the first person 102. The automation system 204 and/or the client application may implement suitable access control and user authentication. [0036] [0036] Fig. 2B shows a network maintenance scenario according to another embodiment. The scenario is similar to the scenario of Fig. 2A except that in the scenario of Fig. 2B there is additionally a separate server device 209 providing a web interface for use by the first person 102. The web interface may be a graphical interface or an interface that provides textual content. The automation system 204 and the server device 209 are communicatively connected to each other. Certain data and functionalities in the server device 209 may be accessible through a browser application in the mobile phone 105 of the first person 102. O [0037] In an embodiment, the first person 102 at the site may use the web N interface of the server device 209 to send commands to the automation system 204. O The automation system 204 may respond to the commands by sending a message N (e.g. SMS message) to the mobile phone 105 of the first user 102 or by sending the E response to the web interface of the server device 209. 2 [0038] In an embodiment, the first person 102 obtains access to data and 3 functionalities in the server device 209 by sending a predefined message to the > automation system 204. The automation system 204 responds by sending a link (a web address) that directs the first person 102 to the server device 209. The link may be usable only once and/or only for a limited time period to improve security. 6 [0039] [0039] By using the separate server device 209 providing a web interface, it is possible to provide access to certain limited data for persons that are not authorized to access and/or control the automation system 204 and/or the network operations system 209. In this way, security can be improved while automatically providing access to data that the persons at the site may need. The web interface may provide data in a more user friendly format than sending the data in an SMS message for example. [0040] [0040] Fig. 3 shows a flow diagram illustrating an example method in an automation system according to certain embodiments. The order of phases conducted in the flow chart may be changed expect where otherwise explicitly defined. Furthermore, it is to be noted that performing all phases of the flow chart is not mandatory. [0041] [0041] The method of Fig. 3 may be implemented in the automation system 204 of Fig. 2. In general, the method is implemented in a computer and do not require human interaction. It is to be noted that the method is triggered by a human action and may provide output that may be further processed by humans. [0042] [0042] The flow chart of Fig. 3 comprises following phases: O [0043] Phase 301: A first message comprising a predefined command and N an identifier of a target item is received. The target item may be for example a cell or O a base station. The command may be for example to deactivate a cell, to deactivate N a base station, to activate a cell, or to activate a base station. Available commands E may include also possibility to reguest information concerning the target item. [0045] [0045] Phase 303: Responsive to receiving the first message, the automation system 204 automatically performs an action corresponding to the command in the first message. The action is performed in the network operations system for the cell corresponding to the target item. Depending on the situation the action may concern an individual cell or a base station comprising the cell. In an embodiment there is a data storage comprising definition for the action to be taken for certain command and the automation system may fetch the definition form such data storage. [0046] [0046] Ifthe command in the first message is erroneous or unknown an error message may be returned to the sender. Also brief manual or other instructions may be returned. [0047] [0047] Phase 304: Completion of the action is reported in a return message (a second message). After receiving the return message, the first person at the site may proceed with the physical maintenance actions and for example physically plug off or plug in the target item without causing unexpected problems in user connections in the network. Alternatively, the return message may report failed action and optionally a reason for failing to perform the action. In response, the first person at the site is aware of the situation and may take further actions to solve the situation. [0048] [0048] One or more of phases 301-304 may additionally comprise logging O respective actions. For example received messages including the content and the N sender and actions that are responsively taken may be logged. O [0049] The method of Fig. 3 provides that the first person 102 at the site is N free to choose timing of the deactivating and activating base stations and cells E without needing to coordinate the timing with the second person 104 of Fig. 1. 2 [0050] Fig. 4 shows a flow diagram illustrating an example method in a client 3 application according to certain embodiments or in a server device implementing a > web interface. The order of phases conducted in the flow chart may be changed expect where otherwise explicitly defined. Furthermore, it is to be noted that performing all phases of the flow chart is not mandatory. 8 [0051] [0051] The method of Fig. 4 may be implemented in a client application running in the mobile device 105 of the first person 102 of Fig. 2A. The client application is operable to interact with the automation system 204 of Fig. 2A. Alternatively, the method of Fig. 4 may be implemented in a web interface running in the server device 209 of Fig. 2B. In general, the method is implemented in a computer and do not require human interaction. It is to be noted that the method is triggered by a human action and may provide output that may be further processed by humans. [0052] [0052] The flow chart of Fig. 4 comprises following phases: [0053] [0053] Phase 401: A predefined command and an identifier of a target item is received from a user. The target item may be for example a cell or a base station. The command may be for example to deactivate a cell, to deactivate a base station, to activate a cell, or to activate a base station. Available commands may include also possibility to request information concerning the target item. Example commands are discussed in more detail later in this document. In an embodiment the user may input the command and the identifier of the target item as free text. In another embodiment, the client application or the web interface may list available commands for the user to choose from and the user may input the identifier of the target item as free text. In a further embodiment, the client application or the web interface may list available identifiers of target items for the user to choose from and the user may input the command as free text. In still further embodiment, the client application or the web interface may list available commands and available identifiers of target items for the user to choose from. [0054] [0054] Phase 402: The client application or the web interface sends a first O message comprising the received command and identifier of the target item to the N automation system. [0057] [0057] In an alternative implementation, the return message or the second message is an SMS message sent to a mobile device of the first person. In this way the return message is easily noticed by the first person without requiring monitoring the client application or the web interface. The return message may direct the first user back to the client application or the web interface, though. [0058] [0058] The following lists examples of predefined commands and contents of messages sent to the automation system: 1) “DEACTIVATE <cell ID>" deactivates an individual cell 2) "DEACTIVATE CELL <cell ID>” deactivates an individual cell 3) “ACTIVATE <cell ID>” activates an individual cell 4) “ACTIVATE CELL <cell ID>” activates an individual cell 5) "DEACTIVATE BASE STATION <cell ID>" deactivates the whole base station, any cell of the base station can be used in the message 6) “ACTIVATE BASE STATION <cell ID>” activates the whole base station, any cell of the base station can be used in the message 7) "DEACTIVATE BASE STATION <name of the base station>” deactivates the whole base station, all base stations having the specified name are deactivated O 8) “ACTIVATE BASE STATION <name of the base station>” N activates the whole base station, all base stations having the O specified name are activated N 9) "HELP returns user manual E 10) "STATUS <cell ID>" returns status of an individual cell 2 11) “STATUS BASE STATION <cell ID>” returns status of the whole 3 base station, any cell of the base station can be used in the > message 12) “STATUS <name of the base station>" returns status of the identified base station [0059] [0059] The following lists examples of contents of return messages from the automation system (content of the messages is self explanatory): 1) “Base station <name of the base station> deactivated” 2) “Base station <name of the base station> activated” 3) “Base station <name of the base station> deactivating failed” 4) “Base station <name of the base station> activating failed” 5) “Partial failure of deactivating base station <name of the base station>; failure in cells L1234, L2345; successful in cells L9876, L8765" 6) “Base station <name of the base station> activating failed” 7) “Partial failure of activating base station <name of the base station>; failure in cells L1234, L2345; successful in cells L9876, L8765" 8) “Cell <cell ID> deactivated” 9) “Cell <cell ID> activated” O 10)“Cell <cell ID> deactivating failed” N 11) "Cell <cell ID> activating failed” O 12) “Concise user manual’, includes e.g. list of available commands N 13) "Link to user manual” z 14) “Link to status of the target item” For safety reasons the link can 2 be used only once or the link may be valid only for a short period 3 of time. The link may be a link to a web interface running e.g. in 2 the server device 209 of Fig 2B. 15) “Link to alerts of the target item” For safety reasons the link can be used only once or the link may be valid only for a short period 11of time. The link may be a link to a web interface running e.g. in the server device 209 of Fig 2B. [0060] [0060] Additionally, any return message reporting failure or partial failure may comprise information about the reasons of the failure. The reason for failure may be for example that the automation system failed to fetch status of the target item from the network operations system and therefore could not perform the action. Additionally or alternatively, the return message may comprise other information such as vendor of the target item, further information about the status and/or configuration of the target item. [0061] [0061] If the first message sent to the automation system comprises name of a base station and the network comprises more than one base station with this name, the corresponding action may be performed for all of these base stations. Alternatively, the process may be terminated and a return message reporting the failure may be sent. [0062] [0062] In an embodiment the automation system maintains log of the first messages sent to the automation system. In an embodiment the automation system periodically checks whether there are target items that have been deactivated for a certain period of time. If such target items are found, the automation system sends a reminder about these. The reminder is sent to the first person that previously deactivated the target item. Such check may be performed for example once a day, O twice a day (e.g. in the morning and in the evening), every other day, or once a N week. The reminder may be sent for example for each target item that has been O deactivated over 12 hours, 24 hours, 48 hours, or 72 hours. In this way, the N automation system helps to avoid forgetting to activate a target item that has been E deactivated. [0065] [0065] The general structure of the apparatus 50 comprises a processor 51, and a memory 52 coupled to the processor 51. The apparatus 50 further comprises software 53 and database 54 stored in the memory 52 and operable to be loaded into and executed in the processor 51. The software 53 may comprise one or more software modules and can be in the form of a computer program product. The database 54 may be usable for storing e.g. rules and patterns for use in data analysis. Further, the apparatus 50 comprises a communication interface 55 coupled to the processor 51. [0066] [0066] The processor 51 may comprise, e.g., a central processing unit (CPU), a microprocessor, a digital signal processor (DSP), a graphics processing unit, or the like. Fig. 5 shows one processor 51, but the apparatus 50 may comprise a plurality of processors. [0067] [0067] The memory 52 may be for example a non-volatile or a volatile memory, such as a read-only memory (ROM), a programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), a random-access memory (RAM), a flash memory, a data disk, an optical storage, a magnetic storage, a smart card, or the like. The apparatus 50 may comprise a plurality of memories. The memory 52 may be constructed as a part of the apparatus 50 or it may be inserted into a slot, port, or the like of the apparatus 50 by a user. [0068] [0068] The communication interface 55 may comprise communication modules that implement data transmission to and from the apparatus 50. The O communication modules may comprise, e.g., a wireless or a wired interface module. N The wireless interface may comprise such as a WLAN, Bluetooth, infrared (IR), radio O freguency identification (RF ID), GSM/GPRS, CDMA, WCDMA, or LTE (Long Term N Evolution) radio module. The wired interface may comprise such as Ethernet or E universal serial bus (USB), for example. Further the apparatus 50 may comprise a © user interface (not shown) for providing interaction with a user of the apparatus. The 3 user interface may comprise a display and a keyboard, for example. The user > interaction may be implemented through the communication interface 55, too. [0069] [0069] The database 54 may be certain memory area in the memory 52 or alternatively the database 54 may be a separate component or the database 54 may 13be located in a physically separate database server that is accessed for example through the communication unit 55. The database unit 54 may be a relational (SQL) or a non-relational (NoSQL) database. [0070] [0070] A skilled person appreciates that in addition to the elements shown in Fig. 5, the apparatus 50 may comprise other elements, such as microphones, displays, as well as additional circuitry such as memory chips, application-specific integrated circuits (ASIC), other processing circuitry for specific purposes and the like. Further, it is noted that only one apparatus is shown in Fig. 5, but the embodiments of the invention may equally be implemented in a cluster of shown apparatuses. [0071] [0071] Without in any way limiting the scope, interpretation, or application of the claims appearing below, a technical effect of one or more of the example embodiments disclosed herein is resource savings. Both human resources and time can be saved as the maintenance person at the site no longer needs to interact with a person responsible for network management system. [0072] [0072] Another technical effect of one or more of the example embodiments disclosed herein is enabling more flexibility and freedom in timing of performing the physical changes at the site. The automation system on the network side may be always available. [0073] [0073] Another technical effect of one or more of the example embodiments disclosed herein is a reliable and easy to use solution. SMS based automated deactivation and activation of target items provides that target items can be shut down and brought up in a controlled manner without causing unexpected problems in user connections in the network. [0076] [0076] It is also noted herein that while the foregoing describes example embodiments of the invention, these descriptions should not be viewed in a limiting 14sense. Rather, there are several variations and modifications, which may be made without departing from the scope of the present invention as defined in the appended claims. oO N > 00N I jami a 00 +O LO o OoN
权利要求:
Claims (15) [1] 1. A computer implemented method for automated communication network maintenance actions, the method comprising receiving (301) a first message comprising a predefined command and an identifier of a target item; automatically performing (303) for the target item an action corresponding to the predefined command; and reporting (304) status of the action in a second message. [2] 2. The method of claim 1, further comprising receiving the first message from a client application. [3] 3. The method of claim 1, further comprising receiving the first message through a web interface. [4] 4. The method of claim 2 or 3, wherein the second message is an SMS message. [5] 5. The method of any preceding claim, wherein the first and second messages are SMS messages. [6] 6. The method of any preceding claim, further comprising authenticating the sender of the first message prior to performing the action. D N [7] 7. The method of any preceding claim, wherein the target item is a cell or a base O station. N E [8] 8. The method of any preceding claim, wherein the command comprises at least 2 one of: to deactivate a cell, to deactivate a base station, to activate a cell, and to 3 activate a base station. N [9] 9. The method of any preceding claim, wherein the command comprises a request for status information. 16 [10] 10. The method of any preceding claim, further comprising performing the action in a network operations system for at least one cell corresponding to the target item. [11] 11. The method of any preceding claim, further comprising performing the action for a base station comprising a cell corresponding to the target item. [12] 12. The method of any preceding claim, wherein the second message reports completion of the action or a failure of the action. [13] 13. The method of any preceding claim, further comprising receiving an unknown command in the first message, and responsively reporting that the command is erroneous in the second message. [14] 14. An apparatus (50, 111) comprising a processor (51), and a memory (52) including computer program code; the memory and the computer program code configured to, with the processor, cause the apparatus to perform the method of any one of claims 1-13. [15] 15. A computer program comprising computer executable program code (53) which when executed by a processor causes an apparatus to perform the method of any one of claims 1-13. oO O N 00 N I a a 00 < O LO o O N 17
类似技术:
公开号 | 公开日 | 专利标题 US20180270349A1|2018-09-20|Using automatically collected device problem information to route and guide users' requests US10503579B2|2019-12-10|System and method for identifying operational disruptions in mobile computing devices US20190052476A1|2019-02-14|Smart appliance control method and smart appliance US20170339536A1|2017-11-23|Offline peer-assisted notification delivery EP2437524A1|2012-04-04|M2m service platform and work method thereof EP2771803B1|2017-06-28|File fetch from a remote client device US10750364B2|2020-08-18|Single sign-in for IoT devices EP3085128A1|2016-10-26|Systems, methods, and computer program products for obtaining mobile device data CN111314141A|2020-06-19|Route updating method and device CN104636678A|2015-05-20|Method and system for controlling terminal device under cloud computing environment JP2013025814A|2013-02-04|Virtual machine management system and management method CN111190586A|2020-05-22|Software development framework building and using method, computing device and storage medium FI129035B|2021-05-31|Method and tool for network maintenance CN105653306A|2016-06-08|Method and device for displaying start Setup interface US10044838B2|2018-08-07|Method of automatically setting protocol in programmable logic controller system US20130165099A1|2013-06-27|Enhanced System and Method for Custom Programming of Large Groups of Phones Without Requiring Additional Equipment CN107274222A|2017-10-20|Advertisement placement method and device CN103561417A|2014-02-05|Method for improving response quality of mobile client products to user request CN111143031A|2020-05-12|Method and device for changing capacity of virtual machine US10432465B2|2019-10-01|Automatic provisioning of a network access point US10924266B2|2021-02-16|Communication apparatus, communication system, and communication control method CN103997509A|2014-08-20|Service oriented architecture-based service processing method and apparatus KR20190100534A|2019-08-29|System for terminal access based beacon using protocol for Internet of Things, Method thereof, and Compueter readable storage medium having the same US10158704B2|2018-12-18|Method and system for clustering distributed objects to use them as if they were one object US20200186558A1|2020-06-11|Simultaneously testing whether a plurality of electronic devices connected via a communication network correctly handle exceptions
同族专利:
公开号 | 公开日 FI129035B|2021-05-31|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
2021-05-31| FG| Patent granted|Ref document number: 129035 Country of ref document: FI Kind code of ref document: B |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FI20195048A|FI129035B|2019-01-28|2019-01-28|Method and tool for network maintenance|FI20195048A| FI129035B|2019-01-28|2019-01-28|Method and tool for network maintenance| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|