Professional Documents
Culture Documents
V200R012
Operation Guide
Issue
02
Date
2008-05-31
Part Number
00389527
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any
assistance, please contact our local office or company headquarters.
Website:
http://www.huawei.com
Email:
support@huawei.com
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but the statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Contents
Contents
About This Document.....................................................................................................................1
1 Getting Started............................................................................................................................1-1
1.1 Logging In to the N2000 UMS.......................................................................................................................1-3
1.2 Changing the Current User Password.............................................................................................................1-3
1.3 Getting to Know the Client GUI.....................................................................................................................1-4
1.3.1 GUI.........................................................................................................................................................1-4
1.3.2 Menu Bar................................................................................................................................................1-5
1.3.3 Toolbar...................................................................................................................................................1-5
1.3.4 Main Window.........................................................................................................................................1-8
1.3.5 Status Bar...............................................................................................................................................1-8
1.3.6 Shortcut Conventions on the Client GUI...............................................................................................1-8
1.3.7 Shortcut Keys.........................................................................................................................................1-9
1.4 Setting Automatic Login...............................................................................................................................1-10
1.5 Changing the Login Server...........................................................................................................................1-11
1.6 Setting Client Display...................................................................................................................................1-11
1.6.1 Setting the Window Title.....................................................................................................................1-12
1.6.2 Setting the Output Information............................................................................................................1-12
1.6.3 Setting Topology Display Style...........................................................................................................1-12
1.6.4 Setting Topology Features...................................................................................................................1-13
1.6.5 Setting Alarm Colors............................................................................................................................1-14
1.6.6 Setting Alarm Local Display Properties...............................................................................................1-15
1.7 Customizing the Client Time Format............................................................................................................1-15
1.7.1 Setting the Time Format.......................................................................................................................1-15
1.7.2 Setting the Date Format........................................................................................................................1-16
1.8 Locking the Client.........................................................................................................................................1-17
1.8.1 Locking the Client Automatically........................................................................................................1-17
1.8.2 Locking the Client Manually................................................................................................................1-18
1.9 Unlocking the Client.....................................................................................................................................1-18
1.10 Querying Information on Client Components.............................................................................................1-18
1.11 Querying License Information....................................................................................................................1-18
1.12 Setting the Browser Path.............................................................................................................................1-19
1.13 Logging Out of the Current Session............................................................................................................1-19
1.14 Exiting from the Client................................................................................................................................1-19
Issue 02 (2008-05-31)
Contents
2 Topology Management.............................................................................................................2-1
2.1 Getting to Know Topology Management........................................................................................................2-3
2.1.1 Topology Management Interface...........................................................................................................2-3
2.1.2 Topology Management Terms...............................................................................................................2-3
2.1.3 Topology Legend...................................................................................................................................2-5
2.2 Process of Construct the Network Topology..................................................................................................2-7
2.3 Setting the Topology Background...................................................................................................................2-7
2.4 Setting Up a Physical Submap........................................................................................................................2-8
2.4.1 Designing a Topology............................................................................................................................2-9
2.4.2 Creating a Submap.................................................................................................................................2-9
2.4.3 Adding Devices....................................................................................................................................2-10
2.4.4 Creating a Link.....................................................................................................................................2-11
2.5 Adding Devices.............................................................................................................................................2-12
2.5.1 Adding a Device...................................................................................................................................2-12
2.5.2 Adding Devices in Batch......................................................................................................................2-14
2.5.3 Adding Devices Periodically................................................................................................................2-16
2.5.4 Setting Device Maintenance Information ............................................................................................2-17
2.5.5 Setting the Maintenance Personnel Information..................................................................................2-18
2.6 Topological Link Management ....................................................................................................................2-19
2.6.1 Classification of Topological Links.....................................................................................................2-20
2.6.2 Status Legends of the Topological Link..............................................................................................2-22
2.6.3 Displaying Topological Links..............................................................................................................2-23
2.6.4 Hiding Topological Links....................................................................................................................2-24
2.6.5 Querying Attributes of a Topological Link..........................................................................................2-25
2.6.6 Modifying Basic Attributes of a Topological Link..............................................................................2-26
2.6.7 Refreshing Topological Links..............................................................................................................2-26
2.6.8 Synchronizing Topological Links from the ATCA Devices................................................................2-27
2.6.9 Aggregating Multiple Links.................................................................................................................2-28
2.6.10 Expanding Aggregated Links.............................................................................................................2-28
2.6.11 Adding a Virtual Topological Link....................................................................................................2-28
2.6.12 Deleting a Virtual Topological Link..................................................................................................2-30
2.7 Adjusting the Network Topology..................................................................................................................2-30
2.7.1 Modifying the Submap Attributes........................................................................................................2-31
2.7.2 Deleting a Submap...............................................................................................................................2-31
2.7.3 Moving an Object.................................................................................................................................2-32
2.7.4 Copying an Object................................................................................................................................2-33
2.7.5 Deleting Objects in Batch....................................................................................................................2-33
2.7.6 Modifying the Device Attributes..........................................................................................................2-34
2.7.7 Deleting a Device.................................................................................................................................2-34
2.8 Refreshing the Topology View.....................................................................................................................2-35
2.9 Example of Setting Up a Network Topology................................................................................................2-35
2.10 Viewing the Topology Information.............................................................................................................2-36
ii
Issue 02 (2008-05-31)
Contents
3 Alarm Management...................................................................................................................3-1
3.1 Getting to Know Alarm Management.............................................................................................................3-3
3.1.1 Alarm Management Interface.................................................................................................................3-3
3.1.2 Alarm Severities.....................................................................................................................................3-4
3.1.3 Alarm Status...........................................................................................................................................3-4
3.1.4 Alarm Types...........................................................................................................................................3-5
3.1.5 Alarm Reporting Procedure...................................................................................................................3-5
3.2 Managing the Alarm Template.......................................................................................................................3-7
3.2.1 Alarm Templates....................................................................................................................................3-7
3.2.2 Exporting or Importing an Alarm Template..........................................................................................3-7
3.2.3 Creating an Alarm or Event Browse Template......................................................................................3-8
3.2.4 Creating the Alarm Statistics Template...............................................................................................3-10
3.2.5 Setting the Startup Template................................................................................................................3-11
3.2.6 Saving an Alarm Template As a New One..........................................................................................3-12
3.3 Monitoring Network Alarms.........................................................................................................................3-13
3.3.1 Monitoring Alarms Through the Topology View................................................................................3-13
3.3.2 Monitoring Alarms Through the Alarm Panel.....................................................................................3-14
3.3.3 Locating an Alarm................................................................................................................................3-15
3.3.4 Collecting Statistics on Alarms............................................................................................................3-16
3.4 Browsing Alarms...........................................................................................................................................3-17
Issue 02 (2008-05-31)
iii
Contents
Issue 02 (2008-05-31)
Contents
4 Performance Management........................................................................................................4-1
4.1 Overview of the Performance Measurement...................................................................................................4-2
4.1.1 Basic Concepts.......................................................................................................................................4-2
4.1.2 Device Type Definition..........................................................................................................................4-5
4.1.3 Performance Measurement Principle of IMS Devices...........................................................................4-5
4.1.4 GUI of the Performance Measurement..................................................................................................4-6
4.2 Managing Performance Measurement Tasks..................................................................................................4-7
4.2.1 Task State...............................................................................................................................................4-8
4.2.2 Querying Performance Measurement Tasks..........................................................................................4-8
4.2.3 Querying the Measuring Object of the Performance Measurement Task..............................................4-9
4.3 Querying the Performance Data......................................................................................................................4-9
4.3.1 Querying the Performance Data by Time Segment..............................................................................4-10
4.3.2 Querying the Performance Data by User-Defined Condition..............................................................4-10
4.3.3 Querying the Maximum and Minimum Performance Values..............................................................4-12
4.3.4 Saving the Performance Data to a File.................................................................................................4-13
4.3.5 Printing the Performance Measurement Data......................................................................................4-14
4.4 Monitoring the Device Performance.............................................................................................................4-15
4.4.1 Flowchart for Monitoring the Device Performance.............................................................................4-16
4.4.2 Creating a Performance Threshold Template.......................................................................................4-16
4.4.3 Creating a Performance Threshold Record..........................................................................................4-19
4.5 Measuring the Performance Data..................................................................................................................4-21
4.5.1 Time Distribution Measurement..........................................................................................................4-21
4.5.2 Time Distribution Comparison Measurement......................................................................................4-23
4.5.3 Saving the Measurement Results to a File...........................................................................................4-24
Issue 02 (2008-05-31)
Contents
5 FAQ...............................................................................................................................................5-1
5.1 Topology Management................................................................................................................................... 5-2
5.1.1 Why Is the Aerial View Unclear or Exceptional?..................................................................................5-2
5.1.2 Why Do Devices Vanish After the Topology View Is Refreshed?........................................................5-2
5.1.3 Why Does the Resolution Change of OS Cause Client Display Exception?.........................................5-3
5.1.4 Why Aren't the New Objects Displayed in the Topology View?.......................................................... 5-3
5.1.5 The Northbound Interface Dialog Box Cannot Be Displayed............................................................... 5-4
5.1.6 Why Are the Objects in the Topology View Overlapped?.................................................................... 5-4
5.1.7 Why Is the Location of an Object Changed?......................................................................................... 5-4
5.1.8 Why Are Some Menu Items Gray and Unavailable?.............................................................................5-5
5.1.9 Why Are the Devices in the Physical Path Fewer than Those Found by Auto Discovery?...................5-5
5.2 Fault Management...........................................................................................................................................5-5
5.2.1 Why Does the Fault Service Fail to Start?.............................................................................................5-6
5.2.2 Why Are the Alarm Statistics Displayed on the Alarm Panel Incorrect?..............................................5-6
5.2.3 Why Cannot the Alarm Email Be Received?.........................................................................................5-7
5.2.4 Why Cannot Alarms Be Viewed on the N2000 UMS Client?...............................................................5-7
5.2.5 Why Are Cleared Alarms Displayed as Uncleared?..............................................................................5-7
5.2.6 Why Cannot Alarm/Event Postprocessing Be Executed?......................................................................5-8
vi
Issue 02 (2008-05-31)
Figures
Figures
Figure 1-1 Client GUI..........................................................................................................................................1-5
Figure 2-1 Main Interface for topology management..........................................................................................2-3
Figure 3-1 Alarm management interface..............................................................................................................3-3
Figure 3-2 Alarm status switching model............................................................................................................3-5
Figure 3-3 Alarm reporting procedure.................................................................................................................3-6
Figure 3-4 Fault handling procedure..................................................................................................................3-26
Figure 3-5 Alarm panel......................................................................................................................................3-65
Figure 4-1 Principle diagram of IMS device performance measurement............................................................4-6
Figure 4-2 GUI of the performance measurement...............................................................................................4-7
Figure 4-3 Flowchart for monitoring the device performance...........................................................................4-16
Issue 02 (2008-05-31)
vii
Tables
Tables
Table 1-1 Tool button list (system/fault)..............................................................................................................1-5
Table 1-2 Tool button list (topology)...................................................................................................................1-6
Table 1-3 Shortcut keys........................................................................................................................................1-9
Table 2-1 Alarm status......................................................................................................................................... 2-5
Table 2-2 Running status......................................................................................................................................2-6
Table 2-3 Submap types.......................................................................................................................................2-6
Table 2-4 Node types............................................................................................................................................2-6
Table 2-5 Status legends of the topological link................................................................................................2-22
Table 3-1 Alarm severities................................................................................................................................... 3-4
Table 3-2 Fault handling procedure....................................................................................................................3-27
Table 3-3 Alarm auto processing policies..........................................................................................................3-37
Table 4-1 Measurement task state description..................................................................................................... 4-8
Issue 02 (2008-05-31)
ix
Related Versions
The following table lists the product version related to this document.
Product Name
Version
N2000 UMS
V200R012
Intended Audience
The intended audiences of this document are:
l
Organization
This document consists of the following chapters and is organized as follows.
Issue 02 (2008-05-31)
Chapter
Description
1 Getting Started
2 Topology Management
3 Alarm Management
Chapter
Description
4 Performance Management
5 FAQ
Conventions
Symbol Conventions
The following symbols may be found in this document. They are defined as follows.
Symbol
Description
Indicates a hazard with a high level of risk which, if not
avoided, will result in death or serious injury.
DANGER
WARNING
CAUTION
NOTE
TIP
General Conventions
Convention
Description
Boldface
Italic
Courier New
Issue 02 (2008-05-31)
Command Conventions
Convention
Description
Boldface
Italic
[]
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
GUI Conventions
Convention
Description
Boldface
>
Multi-level menus are in boldface and separated by the ">" signs. For
example, choose File > Create > Folder.
Keyboard Operation
Format
Description
Key
Press the key. For example, press Enter and press Tab.
Key 1+Key 2
Press the keys concurrently. For example, pressing Ctrl+Alt+A means the
three keys should be pressed concurrently.
Key 1, Key 2
Press the keys in turn. For example, pressing Alt, A means the two keys
should be pressed in turn.
Mouse Operation
Issue 02 (2008-05-31)
Action
Description
Click
Select and release the primary mouse button without moving the pointer.
Action
Description
Double-click
Press the primary mouse button twice continuously and quickly without
moving the pointer.
Drag
Press and hold the primary mouse button and move the pointer to a certain
position.
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Issue 02 (2008-05-31)
1 Getting Started
Getting Started
1-1
1 Getting Started
1-2
Issue 02 (2008-05-31)
1 Getting Started
Prerequisite
On the Windows OS, the N2000 UMS client is installed.
Context
By default, the N2000 UMS administrator is admin, and the password is admin. When the
admin user logs in to the N2000 UMS for the first time, the user must change the password.
Procedure
Step 1 Choose Start > Programs > iManager N2000 > N2000 Client, or double-click
Port: The port number of the server. Adopt the default setting.
Step 4 In the Login dialog box, enter the user name and password, and select the N2000 UMS server.
Step 5 Click Login.
----End
Result
You log in to the N2000 UMS server. The main topology window of the N2000 UMS client is
displayed by default. The status bar displays the login user name, the login time, the login mode,
and the name and IP address of the N2000 UMS server.
Procedure
Step 1 Choose File > Change Password.
Issue 02 (2008-05-31)
1-3
1 Getting Started
Step 2 In the Change Password dialog box, set Current Password, New Password, and Confirm
Password.
Step 3 Click OK.
----End
1.3.1 GUI
This section describes the graphic user interface (GUI) The N2000 UMS client.
The client can run on the Windows OS.
Figure 1-1 shows the GUI of the N2000 UMS client.
1-4
Issue 02 (2008-05-31)
1 Getting Started
1.3.3 Toolbar
The toolbar is located under the menu bar on the client interface, providing the icons for common
operations and the minimized alarm panel.
Common tool buttons are displayed as icons on the left part of the toolbar, as listed in Table
1-1 and Table 1-2. The minimized alarm panel is displayed on the right part of the toolbar. This
helps you to monitor the current alarms in real time.
Table 1-1 Tool button list (system/fault)
Category
System
Issue 02 (2008-05-31)
Icon
Name
Description
Exit
Lock System
1-5
1 Getting Started
Category
Icon
Fault
Name
Description
Log Out
Topology
Browser
NMS User
Management
Browse
Current Alarm
Stop the
Current Alarm
Sound
Show Alarm
Panel
Critical alarms
Major alarms
Minor alarms
Warnings
New events
1-6
Icon
Name
Description
Up
Zoom out
Issue 02 (2008-05-31)
Category
Issue 02 (2008-05-31)
Icon
1 Getting Started
Name
Description
Zoom in
Zoom in
Partially
Restore
Fit Window
View Move
Object
Attributes
Search
Topology
Navigator
View
Navigator
Filter Tree
and Legend
Aerial
View
Save the
Location of
the Current
Submap
Icons
Save the
Location of
All the
Current
Submap
Icons
Refresh
View
Lock View
1-7
1 Getting Started
Connection duration: The duration of the connection between the current client and the
server.
Login mode: The login mode which the server adopts. The options are single user mode
and multi-user mode.
Login server: The name and IP address of the server that the current client logs in.
For Menu
For any menu followed by an asterisk * (* represents a letter or number), you can press Alt+*
instead of choosing the menu.
For Button
1-8
For any button followed by an asterisk * (* represents a letter or number), you can press
Alt+* instead of clicking the button.
When a dialog box is open and the focus is on a button, this button is the default button. If
the focus is not on any button, OK is the default button.
When the focus is on a button, you can press Enter or space bar instead of clicking the
button.
If the focus is on a button that does not respond when you press Enter, then the effect is
the same when you press Enter or when you click the default button.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd
Issue 02 (2008-05-31)
1 Getting Started
of the column heading to sort the fields in the column. The icon
order and the icon
Shortcuts
The N2000 UMS client provides shortcuts for some operations. You can perform these
operations quickly by the shortcuts.
Issue 02 (2008-05-31)
Shortcut keys
Operation
F1
Esc
Ctrl+F
1-9
1 Getting Started
Shortcut keys
Operation
Ctrl+X
Ctrl+C
Ctrl+V
Ctrl+A
F9
Ctrl+Y
Ctrl+B
F6
F7
Ctrl+Tab
Ctrl+Alt+U
Unlock a terminal
Alt+X
Alt+O
Context
If a client is set to automatic login, no dialog box is displayed during login.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Automatic Login tab.
Step 3 Select Log in automatically. Set User Name and Password.
1-10
Issue 02 (2008-05-31)
1 Getting Started
NOTE
If select Full-screen display after login, the client is displayed in full screen mode after login.
Procedure
Step 1 Choose File > Change Login Server.
Step 2 In the Change Login Server dialog box, select the server you want to access, and then click
OK.
Step 3 In the Change Login User dialog box, enter User Name and Password, and then click OK.
----End
1-11
1 Getting Started
You can set the alarm local display properties to define the alarm display mode and effect on
the N2000 UMS client.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Main Frame Title tab.
Step 3 In Main Frame Title, enter the title you want to display.
Step 4 Click OK.
----End
Result
The title that you set is displayed. (You do not need to restart the client.)
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Output Window tab.
Step 3 In Output Window, set Maximum Output Lines for the output information. Select
Automatically scroll to the new message and Automatic dump as required.
Step 4 Click OK.
----End
Issue 02 (2008-05-31)
1 Getting Started
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Node Effect tab.
Step 3 In Node Icon, set the node icons in the topology view.
Step 4 In Node Border Color, set the border colors of the nodes in the topology view.
Step 5 In Node Label, set the node labels used in the topology view.
Step 6 In Link Line, set the width and display mode of the combined line in the topology view.
Step 7 In View Show Type Setting, set the number of the views that can be displayed.
Step 8 Click OK.
----End
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the View Effects tab.
Issue 02 (2008-05-31)
1-13
1 Getting Started
Step 3 In Display Settings, set the alarm status displayed in the topology view.
Step 4 In Status Icon Blinking Effect, set the alarms that use flash icons in the topology view.
Step 5 In Node Icon Blinking Effect, set the nodes that use flash effect in the topology view.
Step 6 Click OK.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Color tab.
Step 3 Set the colors for Critical Alarm, Major Alarm, Minor Alarm, and Warning as required.
Step 4 Click OK.
----End
1-14
Issue 02 (2008-05-31)
1 Getting Started
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Local Fault Settings tab.
Step 3 In the Local Fault Settings tab, set the alarm display mode and effect on the N2000 UMS as
required.
1-15
1 Getting Started
Context
l
The format is displayed in the Time Setting text box in real time.
You need to restart the client to have the settings take effect after you change the time
format.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Time tab.
Step 3 In the Time Settings group box, set the time format.
Step 4 Click OK.
Step 5 In the prompt, click OK.
----End
Context
l
The format is displayed in the Date Sample text box in real time.
You need to restart the client to have the settings take effect after you change the client
date format.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Date tab.
1-16
Issue 02 (2008-05-31)
1 Getting Started
Step 3 In the Date Settings group box, set the date format.
NOTE
Date format: It can be "yyyy/MM/dd", "dd/MM/yyyy", and "MM/dd/yyyy". The default is "dd/MM/yyyy".
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Locking Interval tab.
Step 3 Select Automatically locked. In the minutes later, this client will be automatically locked
text box, enter the time to enable the lock time.
NOTE
Clear the Automatically Locked check box to cancel client auto locking.
1-17
1 Getting Started
Result
If you set auto locking and do not perform any operations in the preset interval, the client is
locked automatically.
Procedure
Choose File > Lock System.
----End
Prerequisite
The client is locked.
Procedure
Step 1 Press Ctrl+Alt+U.
Step 2 In the Unlock dialog box, enter the user password. Click OK.
NOTE
You can unlock the client using the admin account and password.
----End
Result
If the password is correct, the client is unlocked, and you can perform operations on it.
Procedure
Step 1 Choose Help > About.
Step 2 In the About window, click the Component tab to view the information on the client
components.
----End
Issue 02 (2008-05-31)
1 Getting Started
Context
When the N2000 UMS needs expansion or the license is to expire, apply for the license files
from Huawei Technologies Co., Ltd..
Procedure
Step 1 Choose Help > About.
Step 2 In the About dialog box, click the License tab to view the
license information.
----End
Procedure
Step 1 Choose File > Preferences. In the Preferences dialog box, click the Browser Path tab.
Step 2 Click Browse. In the Open dialog box, select a file.
Step 3 Click OK.
----End
Procedure
Step 1 Choose File > Logout.
Step 2 In the Confirm dialog box, click OK.
----End
Result
After logout, the Login dialog box is displayed. You can log in to the N2000 UMS as another
user.
1-19
1 Getting Started
Context
The N2000 UMS works in client/server mode. Exiting from the client does not affect the running
of the N2000 UMS server.
Procedure
Step 1 Choose File > Exit.
Step 2 In the Confirm dialog box, click OK.
----End
1-20
Issue 02 (2008-05-31)
2 Topology Management
Topology Management
2-1
2 Topology Management
2-2
Issue 02 (2008-05-31)
2 Topology Management
Topological Object
A topological object in the topological view maps a physical or logical entity in the network. A
topological object can be a submap, a device, or a link between devices.
Issue 02 (2008-05-31)
2-3
2 Topology Management
Submap
On the N2000 UMS, you can divide a large network into several smaller networks by a certain
rule, such as by geographical area. This facilitates device management. Such small networks are
called submaps and are displayed as submap icons in the topological view.
Rack
A rack is a special kind of submap. A rack can contain several frames.
Device
A device can be classified into the physical device and the virtual device.
A physical device is used to mark a specific device. According to the protocol type, devices can
be divided into SNMP devices, MML devices, and XML devices.
A virtual device has some features of a device, but may not correspond to a specific device.
Link
A link is a map of the physical connection between two devices in the topology. The N2000
UMS links consist of virtual links and service links. A virtual link identifies the logical
connection between two managed objects. A service link identifies the physical connection
between two managed objects.
In the topological view, links are drawn according to the following rules:
l
Only one link is drawn between two devices no matter how many actual links occur between
the two devices in the same submap. You can double click the link for details.
If one link occurs between two devices in different submaps, a link is drawn between these
two submap icons in the topological view. If you want to query the details, right click the
topology node, and then select the Show Link Info tab.
If one link occurs between two low level devices of two submaps, a link is drawn between
the two submaps.
Topological View
On the N2000 UMS, the topological view includes the physical view and user-defined view.
The physical view is generated when the N2000 UMS is installed. In the physical view, the
topological structure is divided according to the geographic area or other rules. For a device or
a submap, several copies may exist in the physical view at a time.
The user-defined view is customized by users. You can select the desired device objects from
the physical view or other views, and create a view to reorganize the selected objects. Each user
can create up to five user-defined views.
Topological view is a map of managed communications network on the N2000 UMS. The
managed devices and links are displayed in the form of a tree and a diagram on the client
interface. In the topological view, you can perform configuration operations, alarm operations,
and performance operations.
In the N2000 UMS topological view, the navigation tree is displayed in the left pane, displaying
all topological objects (devices and submaps) and their levels. All the objects and the related
location of the current submap are displayed in the topological view in the right pane.
2-4
Issue 02 (2008-05-31)
2 Topology Management
Running Status
The N2000 UMS queries device status and configuration data at intervals, and displays the status
in the topological view.
The running status can be:
l
Normal
Unknown
Offline/Separation
Alarm Status
The N2000 UMS displays the trap data that is reported by the faulty devices in the topological
view.
The alarms can be:
l
Critical alarm
Major alarm
Minor alarm
Warning
Locking View
If an object is locked, it means that:
l
Status
Uncleared critical alarm
Uncleared major alarm
Uncleared minor alarm
Uncleared warning
Unacknowledged critical alarm
Issue 02 (2008-05-31)
2-5
2 Topology Management
Icon
Status
Unacknowledged major alarm
Unacknowledged minor alarm
Unacknowledged warning
For the submap, node, and link, different colors are used to represent their running status, as
shown in Table 2-2.
Table 2-2 Running status
Icon
Status
Normal
Unknown
Offline/Blocked
For the submap, different icons are used to represent the types of the submap, as shown in Table
2-3.
Table 2-3 Submap types
Icon
Type
Common Submap
For the node, different icons are used to represent the types of the node, as shown in Table
2-4.
Table 2-4 Node types
Icon
Type
3rd-Party-ICMP
3rd-Party-SNMP
3rd-Party-Router
3rd-Party-Switch
Dummy-Device
2-6
Issue 02 (2008-05-31)
Icon
2 Topology Management
Type
Local NMS
Sun Workstation
Virtual node
Microsoft Windows
Operation
Description
Prerequisite
You must be an NMS user with the Topo Watcher authority or higher.
Context
l
Issue 02 (2008-05-31)
The background file supports the JPG and GIF formats. The background image must be
provided by Huawei Technologies Co., Ltd..
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd
2-7
2 Topology Management
l
The background image is saved on the local client. If the image file does not exist on the
client, the corresponding submap has no background.
Procedure
Step 1 Choose View > Set Background.
Step 2 In the Set Background dialog box, in the submap list, select the submap that you want to modify.
Click Select Background.
Step 3 In the Open dialog box, set the background image file, and then click Open.
Step 4 In the Set Background dialog box, click OK.
The selected image is set to the background of the submap.
----End
Issue 02 (2008-05-31)
2 Topology Management
such smaller networks are called submaps. This operation enables you to create submaps in the
topology view.
2.4.3 Adding Devices
New devices need to be added to the submap after the submap is created.
2.4.4 Creating a Link
A link is the mapping of a connection between devices. You can create a link in the topology
view.
The hierarchies of the submap cannot exceed five. Too many hierarchies may make the
operations inconvenient.
Devices in each submap cannot exceed 300. If there are too many devices, the devices may
be overlapped, and this makes the device query difficult.
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
l
Procedure
Step 1 Choose File > New > Submap.
Issue 02 (2008-05-31)
2-9
2 Topology Management
Step 2 In the Submap navigation tree, select the type of the submap that you want to add.
Step 3 Click the Properties tab. In Name, enter the name of the submap.
Step 4 Click
next to Parent Path. In the Choose Path to Parent Submap dialog box, set the path
of the new submap.
The path of the new submap is displayed in Path.
Step 5 Click
to set.
next to Background. In the Open dialog box, select the background file that you want
Step 6 Click
next to Position. Move the cursor on to the topology view, and then click the position
where you want to locate the new submap.
The coordinates for the submap are displayed in Position.
Step 7 Click the Select Object tab. Click
submap.
or
Issue 02 (2008-05-31)
2 Topology Management
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
l
You cannot create a link between an object and its child object.
You cannot create a loop link, that is, a link cannot be created between an object and the
link itself or its duplicated node.
Procedure
Step 1 Choose File > New > Link.
Step 2 On the left of the Add Object dialog box, select the type of the link to be added.
2-11
2 Topology Management
NOTE
Only when the left and right objects are not submaps, the left and right ports can be set.
Step 6 Set the line type, line width, and line direction of the link.
Step 7 In the Remarks text box, enter the description for the link.
Step 8 Click OK.
----End
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
NOTE
2-12
When a device is added, mass data is loaded from the device, and this process takes a certain period (the
default timeout period is 180 seconds). During this period, the GUI does not respond to any other operations.
If the new device is not displayed in the topology view in a long period, refresh the view to check whether
the device is successfully added.
Issue 02 (2008-05-31)
2 Topology Management
Procedure
Step 1 Choose File > New > Device.
Step 2 On the left of the Add Object dialog box, select the type of the device to be added.
The time zone and DST for the N2000 UMS server are not set.
The DST is only set for the devices supporting the DST.
Issue 02 (2008-05-31)
2-13
2 Topology Management
Step 11 Select DST. In the DST Rule drop-down list, select the time rule.
Step 12 In the DST Offset drop-down list, set the offset time, start time, and end time. Click OK.
NOTE
The DST is only set for the devices supporting the DST. Step 10 to Step 12 are operations for setting the
DST.
The offset time is calculated in hours and minutes. The value ranges from one minute to 23 hours and 59
minutes (11439 minutes). The DST span is from one month to 11 months.
Step 13 In the Remarks text box, enter the descriptions of the new device.
Step 14 Click OK.
----End
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
l
Only one client can use the auto discovery function at a time.
Auto discovery does not search existing devices. The More Information dialog box
indicates that these devices already exist.
Procedure
Step 1 Choose File > Auto discovery.
2-14
Issue 02 (2008-05-31)
2 Topology Management
Step 2 In the Auto Discovery dialog box, in Device Type, select the device type.
Step 3 In Ping Times, select the times to ping the device.
Step 4 In Timeout(s), select the timeout period for the ping operation.
Step 5 In Layers, select the number of layers you want to search.
Step 6 Click Default SNMP Parameter. In the Set Default SNMP Parameters dialog box, select the
SNMP parameters template used for adapting the searched devices.
NOTE
By default, the SNMP default parameter template is used to adapt the searched devices.
Step 7 Select Name Device By IP. Then the name of a found device is its IP address.
Step 8 Click
next to Physical Path. In the Choose Path to Parent Submap dialog box, select the
target submap of the searched devices. The path of the target submap is displayed in Path. Click
OK.
Step 9 Click Add. In the IP Address Range dialog box, set the start IP address, end IP address, and
subnet mask of the searched device, and then click OK. A new IP address range is added to the
IP Address Range table.
The record lists the start IP addresses, end IP address, and subnet mask of the IP network segment
to be searched. If you want to select the IP address range to search the devices, select Enable.
Step 10 Click Filter to mask the IP addresses of the devices that you do not want to search.
Step 11 Click Next.
----End
Issue 02 (2008-05-31)
2-15
2 Topology Management
Prerequisite
You must be the NMS user admin.
Context
l
Only the admin user can set the time discovery policy.
If you clear Enable time discovery, click OK, and save only the preset parameters, the
N2000 UMS does not perform the time discovery.
Procedure
Step 1 Choose File > Time Discovery.
Step 2 In the Time Discovery dialog box, in Device Type, select the device type.
Step 3 In Ping Times, select the times to ping the device.
Step 4 In Timeout(s), select the timeout for the ping operation.
Step 5 Click Default SNMP Parameters. In the Set Default SNMP Parameters dialog box, select
the SNMP parameters template used for adapting the searched devices.
2-16
Issue 02 (2008-05-31)
2 Topology Management
Step 6 Select Name Device By IP. Then the name of the found device is its IP address.
Step 7 Click
next to Physical Path. In the Choose Path to Parent Submap dialog box, select the
target submap of the searched devices. The path of the target submap is displayed in Path. Click
OK.
Step 8 Click Add. In the IP Address Range dialog box, set the start IP address, end IP address, and
subnet mask of the found device, and then lick OK. A new IP address range is added to the IP
Address Range table.
NOTE
The record lists the start IP addresses, end IP address, and subnet mask of the IP network segment to be searched.
If you want to select the IP address range to search the devices, select Enable.
Step 9 Click Filter to mask the IP addresses of the devices that you do not want to search.
Step 10 In the Time Discovery dialog box, select Enable time discovery.
Step 11 Click OK to save the settings. The N2000 UMS searches the specific IP network segment and
device type at the specific intervals based on the settings.
----End
Prerequisite
You must be an NMS user with the Topo Maintainer authority or higher.
Procedure
Step 1 Choose System > Device Maintenance Info.
Step 2 In the Device Maintenance Info window, click Display.
Issue 02 (2008-05-31)
2-17
2 Topology Management
Location Info
In the Location Info group box, set the device location information.
Personnel Info
In the Personnel Info group box, select a maintenance person.
NOTE
If you want to add multiple maintenance persons for the device, click Personnel Info at the bottom. In
the Device Personnel Info dialog box, set the maintenance persons.
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
You are not recommended to name a maintenance person All.
Procedure
Step 1 Choose System > Maintenance Personnel Information.
2-18
Issue 02 (2008-05-31)
2 Topology Management
----End
2-19
2 Topology Management
Issue 02 (2008-05-31)
2 Topology Management
HSS9820, between the HSS9820 and the ATS9900, between the ATS9900 and the iCG9815,
and between the AIM6300 and the RM9000.
2.6.1.3 IMS SIP Topological Link
The IMS SIP topological link indicates the route (SIP link) between the CSC3300 devices in the
local domain or between the CSC3300 device in the local domain and the CSC3300 device in
another IMS domain.
2.6.1.4 Virtual Topological Link
The virtual topological link identifies the logical connection relation between two managed
objects, such as between two devices, between a submap and a device, and between two submaps.
The virtual topological link has only one state, that is, the normal state (green). In addition, this
state cannot be refreshed. A virtual topological link must be set up or deleted manually.
When there are multiple links between two ATCA devices, the multiple links are displayed
as an aggregated link on the N2000 UMS. The alarm status of the aggregated link depends
on the alarm with the highest priority of the aggregated link.
When both devices are configured with the link data to the peer end, the N2000 UMS sets
up only one IMS Diameter topological link.
When the device at either end is configured with the link data to the peer end, the N2000
UMS also sets up one IMS Diameter topological link. If the link that is set up cannot
function properly, the ATCA devices report an alarm, and the link is in faulty state.
The status of the IMS Diameter topological link is triggered by a link alarm.
If the devices at the both ends of the IMS Diameter topological link are offline, the link is
refreshed to the unknown state (blue); if an alarm is generated for the IMS Diameter topological
link, the link is refreshed to the faulty state (red).
Issue 02 (2008-05-31)
2-21
2 Topology Management
When a CSC3300 device at either end is configured with the route data, the N2000 UMS
sets up one IMS SIP topological link.
When the CSC3300 devices at the both ends are configured with the route data, the N2000
UMS sets up two IMS SIP topological links that are displayed as an aggregated link on the
N2000 UMS.
The IMS SIP topological link is shown in a dotted line. Generally, the IMS SIP topological link
is always in the normal state (green). When the devices at the both ends of the link go offline,
the IMS SIP topological link is refreshed to the unknown state (blue).
Table 2-5 describes only the colors of the links in the different states and the corresponding default line
type. You can set the line type of a topological link according to requirements. For details, see 2.6.6
Modifying Basic Attributes of a Topological Link.
Status
Line Type
Unknown
Issue 02 (2008-05-31)
Legend
2 Topology Management
Status
Line Type
Normal
Faulty
Unknown
Normal
Unknown
Normal
Procedure
Step 1 Click the Filter tab in the Main Topology tabbed page.
NOTE
By default, the Filter tab is displayed in the Main Topology tabbed page. If the Filter tab is not displayed,
choose View > Display > Filter Tree and Legend from the main menu.
Step 2 Unfold the Link Type node, and select the link type to be displayed, as shown in the following
figure.
Issue 02 (2008-05-31)
2-23
2 Topology Management
----End
Procedure
Step 1 Click the Filter tab in the Main Topology tabbed page.
NOTE
By default, the Filter tab is displayed in the Main Topology tabbed page. If the Filter tab is not displayed,
choose View > Display > Filter Tree and Legend from the main menu.
Step 2 Unfold the Link Type node, and deselect the link type to be hidden, as shown in the following
figure.
2-24
Issue 02 (2008-05-31)
2 Topology Management
----End
Procedure
Step 1 Select a topological link from the topological view. Right-click, and choose Object
Attributes.
Step 2 In the dialog box that appears, query the basic attributes, port information, and extended
attributes, as shown in the following figure.
Issue 02 (2008-05-31)
2-25
2 Topology Management
Procedure
Step 1 Select a topological link from the topological view. Right-click, and choose Object
Attributes.
Step 2 In the dialog box that appears, click the Property tab.
Step 3 In the Link Name text box, modify the link name; in the Line Type, Line Width, and Line
Direction drop-down lists, select the corresponding values; in the Remarks text box, input the
remarks.
Step 4 Click OK.
----End
Issue 02 (2008-05-31)
2 Topology Management
the early morning of each day. You can also refresh the topological links manually to obtain the
latest link status at any time.
2.6.7.1 Refreshing a Single/an Aggregated Topological Link Manually
This operation enables you to refresh a single/an aggregated topological link manually to obtain
the latest link status.
Context
N2000 UMS supports the manually refreshing of a topological link. It also supports the
automatically refreshing of the topological link. The link alarm and status of devices at both
ends of the link drive the system to automatically refresh the link status in real time. In addition,
the N2000 UMS provides the periodic polling mechanism to refresh the link status and link data
at wee hours of each day.
Procedure
Select a topological link from the topological view. Right-click, and chooseRefresh Link
Status.
CAUTION
l
You can manually refresh only the IMS Diameter topological links.
You can manually refresh only the aggregated links of the IMS Diameter topological links.
Only the IMS Diameter topological links are refreshed.
----End
Procedure
Step 1 Select an ATCA device node from the topological view. Right-click, and choose Synchronize
NE Data > Synchronize Link .
Issue 02 (2008-05-31)
2-27
2 Topology Management
CAUTION
l
If you select the OMU device node, the link data and link status of all topological links
between the OMU and its managed ATCA devices and all topological links between the
managed devices are synchronized.
If you select a managed ATCA device node, the topological link data and link status of the
selected ATCA device is synchronized.
Procedure
Select one link from the excessive links between two devices in the topological view. Rightclick, and choose Collapse, or click on the topological link.
----End
Result
The multiple links between the two devices are aggregated to one link.
Procedure
Select an aggregated link from the topological view. Right-click, and choose Expand, or click
on the topological link.
----End
Result
The aggregated link is expanded to multiple single links.
2-28
Issue 02 (2008-05-31)
2 Topology Management
Procedure
Step 1 Choose File > New > Link from the main menu, or in the topological view, right-click, and
choose New > Link.
Step 2 In the dialog box that appears, input the name of the virtual topological link in the Link
Name text box.
Step 3 Click
on the right of the Left Object text box, move the cursor of the mouse to the topological
view, and select the object on which the virtual link needs to be created.
on the right of the Right Object text box, move the cursor of the mouse to the
Step 4 Click
topological view, and select the object on which the virtual link needs to be created.
next to the Left Port text box. In the dialog box that appears, select the left port of the
Step 5 Click
virtual topological link.
NOTE
Skip this step if the left port of the virtual topological link is not required.
Step 6 Click
next to the Right Port text box. In the dialog box that appears, select the right port of
the virtual topological link.
NOTE
Skip this step if the right port of the virtual topological link is not required.
Step 7 Set the line type, width, and direction, as shown in the following figure.
NOTE
Skip this step if you use the default values of the line type, width, and direction.
2-29
2 Topology Management
Procedure
Step 1 Select a virtual topological link to be deleted from the topological view. Right-click, and
chooseObject Attributes.
Step 2 In the dialog box that appears, select the virtual topological link to be deleted from the Link tab,
as shown in the following figure.
2-30
Issue 02 (2008-05-31)
2 Topology Management
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Procedure
Step 1 Select a submap from the navigation tree or the topology view.
NOTE
To select multiple submaps at a time, press and hold Ctrl or Shift in the navigation tree, or press and hold
Shift in the topology view, and then select submaps.
2-31
2 Topology Management
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
When a submap is deleted, the links related to the submap are also deleted.
Procedure
Step 1 Select a submap from the navigation tree or the topology view.
NOTE
To select multiple submaps, press and hold Ctrl or Shift in the navigation tree, or press and hold Shift in the
topology view, and then select submaps.
Step 2 Choose File > Delete > Delete From This Submap.
NOTE
You can also press Delete after selecting the submap in the topology view.
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
l
When you cut and paste an object, the object is copied to the destination submap and deleted
from the source submap.
You cannot copy a submap, but you can cut and paste it.
Procedure
Step 1 In the topology view, switch to the source submap of the object you want to copy. Click the
object.
Step 2 Choose Eidt > Cut to copy the object to the clipboard.
Step 3 Switch to the destination submap. Choose Edit > Paste to paste the object in the submap.
----End
2-32
Issue 02 (2008-05-31)
2 Topology Management
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
l
You cannot paste the same device or submap to the destination submap.
You can press and hold Shift to select two or more objects. You can copy and paste multiple
objects at a time.
You cannot copy a submap, but you can cut and paste it.
Procedure
Step 1 In the topology view, go to the source submap of the object that you want to copy. Click the
object.
Step 2 Choose Edit > Copy to copy the object to the clipboard.
Step 3 Go to the destination submap. Choose Edit > Paste to paste the object in the submap.
----End
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
You cannot delete the non-empty submaps.
Procedure
Step 1 In the topology view or the navigation tree, select the topology object you want to delete.
NOTE
To choose multiple devices or submaps, press and hold Ctrl or Shift in the navigation tree, or press and
hold Shift in the topology view.
To choose multiple links, press and hold Shift in the topology view.
Step 2 Choose File > Delete > Delete from This Submap or press Delete.
Step 3 In the Confirm dialog box, click Yes.
Step 4 In the Delete Object Results dialog box, click Close.
Issue 02 (2008-05-31)
2-33
2 Topology Management
If the operation is successful, the devices, submaps, and their links are deleted from the
navigation tree and the topology view.
----End
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Procedure
Step 1 Select a device from the navigation tree or the topology view.
NOTE
To select multiple devices, press and hold Ctrl or Shift in the navigation tree, or press and hold Shift in the
topology view, and then select devices.
Step 2 Choose File > Object Attributes or right-click an object and choose Object Attributes .
Step 3 In the Object Attributes dialog box, on the Node tab, in the node property list, select a record.
The details of the record are displayed in the parameter configuration window.
Step 4 Modify Name, Node Alias, Icon Size or Icon Style, Remarks.
Step 5 Click OK.
----End
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
l
If all the nodes of the device are deleted, the device is deleted.
If a node is deleted, the links related to the node are also deleted.
Procedure
Step 1 Select a node from the navigation tree or the topology view.
NOTE
To select multiple nodes, press and hold Ctrl or Shift in the navigation tree, or press Shift in the topology view,
and then select the nodes.
Step 2 Choose File > Delete > Delete from This Submap.
2-34
Issue 02 (2008-05-31)
2 Topology Management
NOTE
You can also press Delete after selecting the device in the topology view.
Procedure
Choose View > Refresh View or click
on the toolbar.
----End
Background
Suppose your office needs to add some devices because of the fast growing of service. You need
to add these devices to the N2000 UMS network topology so that you can manage these devices
through the N2000 UMS.
Operations
To add the new devices to the N2000 UMS network topology, do as follows:
1.
Create a submap.
(1) Right-click the topology view and choose New > Submap.
(2) In the Submap navigation tree, select the type of the submap.
(3) Click the Properties tab. In the dialog box, set the basic properties of the submap.
(4) Click the Select Object tab and click
the submap.
or
Create a device.
(1) Double-click the submap created in Step 1.
(2) Right-click the submap and choose New > Device.
(3) In the Add Object dialog box, set the IP address, device name, path of the parent
submap, maintenance information, and position.
(4) Click OK. The created device is displayed in the current view.
Issue 02 (2008-05-31)
2-35
2 Topology Management
4.
Create a link.
(1) Right-click the topology view and choose New > Link.
(2) In the Add Object dialog box, set the link name, left and right objects, left and right
ports, line type, line width, and line direction.
(3) Click OK.
5.
Issue 02 (2008-05-31)
2 Topology Management
You can know the device type and quantity in the current submap by displaying device statistics
information.
2.10.8 Setting the Layout of the Topology View
You can set the layout of the topology view to arrange the topology objects based on the settings.
2.10.9 Viewing the Aerial View
If the topology window displays only a part of the topology view, you can use the aerial view
to browse the entire view or locate the display area of the topology window.
2.10.10 Adjusting the Topology View
You can adjust the topology view as required, including zooming out, zooming in, zooming in
partially, fitting window, restoring, and displaying the view in full screen mode.
2.10.11 Setting the Full Screen Display
If you set the full screen mode, you can view the topology view in full screen mode.
2.10.12 Printing the Topology View
You can print the topology view. You can preview the topology view before printing or print
the view directly.
2.10.13 Returning to the Parent Topology View
This operation allows you to switch between the parent and child submaps to browse all the
paths of the topology view.
2.10.14 Expanding or Collapsing Child Objects
You can expand or collapse the child topology objects in the navigation tree to view the topology
conveniently.
2.10.15 Arranging Topology Objects
You can tile or cascade the nodes of the device navigation tree. You can also sort them in
ascending or descending order.
Issue 02 (2008-05-31)
In filter mode: Customize the filter tree template. When you view Filter Tree and
Legend, select the template to view the topology in filter mode.
In aerial view mode: View the entire current view, and locate the area of the topology
window to be displayed.
In setting layout mode: Select a layout mode provided by the N2000 UMS. The
submaps and nodes are arranged automatically.
In zoom mode: You can zoom out, zoom in, zoom in partially, fit window, restore the
view, and display the view in full screen mode.
In traversing mode: You can switch between each parent view and child view to know
the current topology structure and all the paths of the topology view better.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd
2-37
2 Topology Management
Prerequisite
You must be an NMS user with the Topo Watcher authority or higher.
Context
l
When the N2000 UMS is started, the filter condition is empty by default. All the topology
objects are displayed.
When you deselect a filter condition, the objects matching the condition are not displayed.
Procedure
Step 1 Choose View > Display > Filter Tree and Legend or click
on the toolbar.
Step 5 Click Filter. Only the topology objects that meet Other Conditions are displayed in the topology
view.
Step 6 Choose View > Display > Filter Tree and Legend again to close the Filter Tree and
Legend panel.
----End
2-38
Issue 02 (2008-05-31)
2 Topology Management
Context
l
This operation applies to all the submaps in the topology view, not limited within the current
submaps.
If the keyword for search is the device name, dynamic fuzzy search is used. That is, when
you enter the search content, the result is displayed dynamically.
Procedure
Step 1 Choose Edit > Search or click
Step 2 In the Search dialog box, in Type, select the search type.
Step 3 In Mode, select the search mode.
Step 4 In Keyword, enter the keyword for search.
NOTE
Match whole word only and Match case are not selected by default.
Issue 02 (2008-05-31)
2-39
2 Topology Management
Procedure
Step 1 Select a submap from the navigation tree or the topology view.
Step 2 Open the Object Attributes dialog box of the submap:
l
Right-click a submap in the navigation tree or topology view and choose Object
Attributes.
Step 3 In the Object Attributes dialog box, on the Submap tab, in the Submap attributes list, select a
record to view the details of the submap.
NOTE
----End
Procedure
Step 1 Select a device in the topology view.
Step 2 Use either of the following methods to open the Object Attributes dialog box:
l
Right-click a device in the topology navigation tree or topology view and choose Object
Attributes .
Step 3 In the Object Attributes dialog box, on the Node tab, in the device attributes list, select a record
to view the detailed information on the device.
NOTE
If you want to select multiple devices at a time, in the device navigation tree, press and hold Ctrl or Shift, and
then select devices. You can also press and hold Shift in the topology view, and then select devices.
----End
2-40
Issue 02 (2008-05-31)
2 Topology Management
Procedure
Step 1 Select a link from the topology view.
Step 2 Open the Object Attributes dialog box of the link.
l
Step 3 In the Object Attributes dialog box, on the Link tab, select a record from the link attributes
list.
NOTE
Step 4 Click the Property tab to view the link name, link type, and link status.
Step 5 Click the Port Info tab to view the information on the left and right ports of the link.
Step 6 Click the Extend Property tab to view the information on the extended properties.
----End
Procedure
Step 1 Choose View > Display > Device Statistics .
Step 2 Switch the submap or view. In the Device Statistics window, view the device type and quantity.
----End
2-41
2 Topology Management
Procedure
Step 1 Choose View > Layout.
Step 2 In the Layout dialog box, in the Type drop-down list, select the layout type.
l
Select Tree. In the Layout dialog box, click OK. In the Please Select Root Node dialog
box, set the root node.
Select Star. In the Offset text box, enter the distance between nodes. In the Layout dialog
box, click OK. In the Please Select Root Node dialog box, set the root node.
Select Ring. In the Offset text box, enter the distance between nodes. In the Layout dialog
box, click OK.
Select Grid. In the Width and Height text boxes, enter the width and height between nodes.
In the Layout dialog box, click OK.
Procedure
Step 1 Choose View > Display > Aerial View or click
on the toolbar.
Step 2 In the Aerial View window, browse the full topology view.
Step 3 In the Aerial View window, drag the rectangle frame to change the display area of the current
topology view.
----End
Context
You can adjust the topology view to one tenth of or ten times the original one in size.
Procedure
l
on the toolbar.
The current view is adjusted to eighty percent of the original one in size.
l
2-42
on the toolbar.
Issue 02 (2008-05-31)
2 Topology Management
The current view is adjusted to 1.2 times the original one in size.
l
on the toolbar.
on the toolbar.
When the topology view is displayed in full screen mode, you can do as follows to exit the full screen
mode:
1. Press Esc or right-click the topology view and choose Exit from Full Screen.
2. In the Input Password dialog box, enter the login password.
----End
Prerequisite
You must be an NMS user with the Topo Maintainer authority or higher.
Context
l
After the view is displayed in full screen mode, you can press Esc to exit the full screen
mode. You need to enter your password or the admin user name and password.
If Full Screen Mode is set, Full Screen Mode has the highest priority, and other functions
such as Popup Client on Alarm Reception are invalid.
Procedure
Step 1 Choose View > Full Screen Mode.
The topology is displayed in full screen mode.
Step 2 If you want to exit the full screen mode, right-click the view and choose Exit from full
screen .
Step 3 In the Input Password dialog box, enter the user name and password.
Step 4 Click OK.
----End
2-43
2 Topology Management
Procedure
Step 1 Choose File > Print Preview.
Step 2 In the Print Preview dialog box, click Previous or Next to browse the topology view page by
page.
Step 3 Click Print. In the Print dialog box, set the parameters for print. Then click Print.
----End
Procedure
Step 1 In the topology view, double-click submap.
The topology view switches to the selected submap and displays the topology structure of the
submap.
Step 2 Choose View > Up or click
The topology view switches to the parent submap of the current submap and displays the
topology structure of this parent submap.
----End
Procedure
l
on the toolbar.
Click
on the toolbar.
on the toolbar.
Click
on the toolbar.
Issue 02 (2008-05-31)
2 Topology Management
Procedure
l
NOTE
Click
NOTE
Click
----End
2-45
2 Topology Management
Procedure
Step 1 Choose View > Display > View Navigator. The view navigation tree is displayed on the Device
Navigator panel.
Step 2 Choose View > View Navigator again. The view navigation tree is not displayed on the Device
Navigator panel.
NOTE
Click
----End
Issue 02 (2008-05-31)
2 Topology Management
Procedure
Step 1 On the toolbar, click
Step 2 When the pointer turns hand-shaped, drag the mouse to the position as required.
Step 3 Click the right button of the mouse or press Esc to perform other operations.
NOTE
When the pointer is hand-shaped, you can only move the topology view.
----End
Prerequisite
You must be an NMS user with the Topo Operator authority or higher.
Context
l
When the selected two devices are connected with a link, the link is added to the Selected
Links table.
Custom views are user-based. Users can view only their own custom views.
Procedure
Step 1 Choose File > New > View.
Issue 02 (2008-05-31)
2-47
2 Topology Management
Step 2 In the Create View dialog box, click the General tab.
Step 3 In Name, enter the view name.
next to Background text box. In the Open dialog box, set the background of the
Step 4 Click
custom view.
Step 5 Click Select Objects, and then move the cursor to the navigation tree or the topology view.
Right-click a device or a link and choose Select .
The selected submap, device, or link is displayed in the Select Object dialog box.
Step 6 In the Select Object dialog box, click Finish.
Step 7 In the Create View dialog box, on the Selected Nodes and Selected Links tabs, view the object
selected in the custom view.
Step 8 In the Create View dialog box, click OK.
----End
Result
Choose View > Display > View Navigator. The new view is displayed under Custom in the
navigation tree.
Issue 02 (2008-05-31)
2 Topology Management
Prerequisite
You must be an NMS user with the Topo Watcher authority or higher.
Context
Setting the startup submap enables you to set the submap displayed when the N2000 UMS is
started.
Procedure
Step 1 Choose View > Set Startup Submap.
Step 2 In the Set Start Submap dialog box, set the startup Submap.
Step 3 Click OK.
----End
Result
The current view is set to the startup submap. It will be displayed when you log in to the N2000
UMS next time.
Prerequisite
You must be an NMS user with the Topo Maintainer authority or higher.
Context
After a view is locked, the coordinates of an object can no longer be changed in the topology
view.
Procedure
Step 1 Choose View > Display > View Navigator.
Step 2 In View Navigator, double-click a view node to access the view.
Step 3 Choose View > Lock View, or click
----End
Issue 02 (2008-05-31)
2-49
3 Alarm Management
Alarm Management
3-1
3 Alarm Management
The N2000 UMS provides various methods of alarm notification, such as the alarm panel, alarm
box, email, and SMS. You can customize these methods to obtain the latest alarm information.
3.9 Setting the Alarm Remote Notification
By alarm remote notification, the N2000 UMS can notify the remote maintenance personnel of
a fault in time. You can set various filter conditions to send the notification of only the alarms
that you are concerned about. The alarms that are cleared within the preset delay interval are not
notified because they have no impact on the system. You can set the delay interval.
3.10 Dumping Alarms or Events
To ensure that the N2000 UMS works stably and effectively and that the database space is
sufficient, the alarms or events need to be dumped when the amount of the alarms or events
reaches a specified value. Alarm or event dump supports auto dump and manual dump.
3.11 Managing the Alarm Panel
The alarm panel monitors the alarms in the entire network in real time and displays statistics of
the alarms by alarm severity and status. The numbers of the uncleared alarms and
unacknowledged alarms of different severities are displayed on the alarm panel. When a new
alarm is reported, the statistics change accordingly.
3.12 Managing the Alarm Box
The common alarm box of the Huawei Technologies Co., Ltd. provides audio-visual alarms.
You can set the conditions for filtering alarms to the alarm box.
3-2
Issue 02 (2008-05-31)
3 Alarm Management
Issue 02 (2008-05-31)
3-3
3 Alarm Management
In Figure 3-1, the upper pane displays Current Alarms, providing the alarm severity, alarm
name, and alarm sources. The lower left pane displays Alarm Details, providing the details of
the selected alarm. The lower right pane displays Handling Suggestion, providing the cause
and handling suggestions for the selected alarm.
Description
Critical
Major
Minor
Warning
Acknowledge an alarm.
If an alarm is acknowledged, it is processed. By the alarm acknowledgement status, you
can identify whether an alarm is processed and then take proper measures.
Clear an alarm.
When the condition that causes a fault alarm is removed, the device recovers to its
normal state, and the device reports a cleared alarm to the N2000 UMS. The source
alarm is cleared. You can also clear an alarm manually.
2.
Alarm status
There are four types of alarm status: Ack&Uncleared, Ack&Uncleared,
Unack&Uncleared, and Ack&Cleared.
Figure 3-2 shows the alarm status switching model.
3-4
Issue 02 (2008-05-31)
3 Alarm Management
NOTE
The alarms in the Ack&Cleared state are called history alarms. The alarms in the other states are called
current alarms.
Description
Environment alarm
Signaling alarm
Relay alarm
Hardware alarm
Software alarm
Running alarm
Communication alarm
Flow Chart
Figure 3-3 shows the alarm reporting procedure.
Issue 02 (2008-05-31)
3-5
3 Alarm Management
Procedure
1.
Report NE alarms.
When an alarm is raised from an NE, the NE reports the alarm to the N2000 UMS through
MML or SNMP.
2.
Mask alarms.
The N2000 UMS discards the masked alarms based on the preset conditions.
3.
Redefine alarms.
The N2000 UMS redefines the alarms based on the preset conditions. Alarm redefinition
involves the redefinition of the alarm name, type, and severity.
4.
5.
6.
3-6
Issue 02 (2008-05-31)
3 Alarm Management
The N2000 UMS sends an alarm notification based on the preset conditions.
7.
3-7
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
l
For security purposes, the exported template does not contain the resource condition you
choose, that is, it does not contain the specific device information.
Procedure
Step 1 Choose Fault > Import/Export Template.
Step 2 In the Import/Export template dialog box, export or import the alarm template.
l
2.
Click
next to the File name text box. In the Save dialog box, set the destination
path and file name. Click Save.
3.
Click OK.
4.
2.
Click
next to the File name text box. In the Open dialog box, choose the template
file, and then click Open.
3.
Click OK.
4.
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
3-8
Issue 02 (2008-05-31)
3 Alarm Management
Context
l
The Save button of the default template is disabled. In other words, the default template
cannot be modified.
A template name cannot exceed 30 characters, and it cannot contain the special characters
such as: ~ ` ! @ # $ % ^ * ( ) { } | \ /.
Procedure
Step 1 In the alarm or event browse window, click Filter by Template, and then choose New .
Step 2 In the New Template dialog box, specify a template name. Click OK.
Step 3 In the New Template dialog box, on the Basic Settings and Alarm Source tabs, set the filter
conditions, and then click Save.
NOTE
On the Basic Settings tab, in the Severity, Acknowledge Status, Clear Status, or Type group box, you
need to select at least one parameter. On the Alarm Source tab, you need to select at least one object or
type. Otherwise, the N2000 UMS prompts that a certain parameter is not selected.
The history alarm browse template does not contain the Ack Status or Clear Status parameter. The event
browse template does not contain the Ack Status, Clear Status, Cleared Time, or Duration parameter.
The GUI is similar to the following figure.
Issue 02 (2008-05-31)
3-9
3 Alarm Management
Context
l
A template name cannot exceed 30 characters, and it cannot contain the special characters
such as: ~ ` ! @ # $ % ^ * ( ) { } | \ /.
3-10
When time is taken as the row name, the statistics range is specified as follows:
When statistics is collected by month, the statistics time range does not exceed one year.
When statistics is collected by day, the statistics time range does not exceed 90 days.
When statistics is collected by hour, the statistics time range does not exceed 240 hours.
When statistics is collected by time (five minutes), the statistics time range does not
exceed 24 hours.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd
Issue 02 (2008-05-31)
3 Alarm Management
The parameters for statistics conditions are correlated. If you set a parameter to a specific
value, another parameter may cannot be set or cannot be set to a specific value. For example,
if you set Row heading to month, Anytime and Since cannot be set.
Procedure
Step 1 In the Alarm Statistics window, click Statistic by Template, and then select New.
Step 2 In the New Template dialog box, specify a template name. Click OK.
Step 3 In the New Template dialog box, configure appropriate settings, and then click Save. In the
New Template dialog box, on the Basic Settings and Alarm Source tabs, set the filter
conditions, and then click Save.
Step 4 In the Confirm dialog box, click Yes. In the Confirm dialog box, click Yes or No.
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Issue 02 (2008-05-31)
3-11
3 Alarm Management
Procedure
Step 1 In the Current Alarms, History Alarms, Events, or Alarm Statistics window, click Filter by
Template, and then choose Open .
NOTE
Step 2 In the Open dialog box, select a template that you want to set to the startup template. Click Set
Startup Template.
When you set the startup template for a window, and then choose the corresponding menu to
access the window, the alarm or event information is displayed according to the settings of the
template.
----End
Context
You can save an alarm template as a new one no matter whether it is modified or not.
Procedure
Step 1 In the Current Alarms, History Alarms, Events, or Alarm Statistics window, click Filter by
Template, and then select Open .
3-12
Issue 02 (2008-05-31)
3 Alarm Management
NOTE
Click Filter (In the Alarm Statistics window, click Statistical Condition) to modify the filter conditions
in the current alarm template.
Step 2 In the Save As dialog box, set the template name, and then click OK.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 In the topology view or the navigation tree, right-click the device that raises an alarm and choose
Browse Alarm.
Issue 02 (2008-05-31)
3-13
3 Alarm Management
Step 2 On the Current Alarms tab, view the information on the current alarm of the device.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
l
3-14
Issue 02 (2008-05-31)
3 Alarm Management
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Context
l
All the alarm browse windows provide the access of locating alarms.
After you locate an alarm, the object that raises the alarm is focused in the topology view.
You can locate the objects in the topology tree or on the panel.
If the object that raises the alarm is deleted, the Locating to Topo Object menu is disabled.
Procedure
In the alarm browse window, right-click an alarm and choose Locating to Topo Object.
After the alarm is located, the object that raises the alarm is focused in the topology view.
----End
Issue 02 (2008-05-31)
3-15
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose Fault > Alarm Statistics.
Step 2 In the Statistical Condition dialog box, set the statistical conditions. Click OK.
NOTE
If you set the startup template for alarm statistics on the local client and choose Fault > Alarm Statistical, the
statistical result obtained by the startup template is displayed. If you do not set the startup template for alarm
statistics and choose Fault > Alarm Statistical , the Statistical Condition dialog box is displayed.
3-16
Click the Alarm Statistics tab. The alarm information collected based on the row and
column headings are displayed.
Click the Alarm Average Ack Time tab. The mean alarm acknowledgement time collected
based on the row and column headings is displayed.
Click the Alarm Average Cleared Time tab. The mean alarm clearance time collected
based on the row and column headings is displayed.
Issue 02 (2008-05-31)
3 Alarm Management
Step 4 According to the buttons at the bottom of the Alarm Statistics window, you can perform the
following operations:
l
Click Refresh to collect statistics on alarms again based on the current statistical condition.
----End
3-17
3 Alarm Management
Prerequisite
To perform the browse operation, you must be an NM user with the "Fault Maintainer" authority
or higher. To perform the acknowledgement or clearance operation, you must be an NM user
with the "Fault Operator" authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the Filter dialog box, set the filter conditions. Click OK.
NOTE
If the startup template for browsing the current alarms is set, the Filter dialog box is not displayed. The alarms
that meet the filter conditions are displayed.
Step 3 In the query result table, click a column heading to sort the results.
NOTE
If you click Alarm Source or Alarm Source Type, the NEs are grouped by NE ID. If you click a different
field, the alarm records are sorted in alphabetical order.
If you click , the fields are sorted in ascending order. If you click , the fields are sorted in descending
order. Switch between and to switch between the ascending and descending orders.
3-18
Choose Select All to select all the records in the query result table.
Issue 02 (2008-05-31)
3 Alarm Management
Choose Mask. In the Confirm dialog box, click OK to mask the selected alarm.
If the alarm is unacknowledged and cleared, it is moved to the history alarm database.
If the alarm is acknowledged and uncleared, it is moved to the history alarm database.
Choose Locating to Topo Object to locate the topology object that raises the alarm.
Step 5 Optional: Choose Display latest alarms to query new alarms in real time.
Step 6 In the query result table, choose an alarm, and do as follows:
l
Click Refresh to query current alarms again based on the current filter condition.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Context
You can use a preset template or set a new template to browse history alarms.
Issue 02 (2008-05-31)
3-19
3 Alarm Management
Procedure
Step 1 Choose Fault > Browse History Alarm.
Step 2 In the Filter dialog box, set the filter conditions. Then click OK.
NOTE
If the startup template for browsing history alarms is set, the Filter dialog box is not displayed, but the alarms
that match the startup template conditions are displayed.
Step 3 In the query result table, click a column heading to sort the results.
NOTE
If you click Alarm Source or Alarm Source Type, the NEs are grouped by NE ID. If you click a different
field, the alarm records are sorted in alphabetical order.
If you click , the fields are sorted in ascending order. If you click , the fields are sorted in descending
order. Switch between and to switch between the ascending and descending orders.
3-20
Choose Select All to select all the records in the query result table.
Choose Maintenance Experience to set the maintenance experience for the alarm.
Choose Mask. In the Confirm dialog box, click Yes to mask the alarm.
Choose Locating to Topo Object to locate the topology object that raises the alarm.
Issue 02 (2008-05-31)
3 Alarm Management
Step 5 Click the buttons in the lower part of the browse window:
l
Click Filter, and then set the filter conditions to query alarms.
Click Refresh to query alarms again based on the current filter conditions.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Context
You can use a preset template or set a new template to browse events.
Procedure
Step 1 Choose Fault > Browse Event.
Step 2 In the Filter dialog box, set the conditions. Then click OK.
NOTE
If the startup template for browsing events is set, the Filter dialog box is not displayed, and the events that match
the startup template conditions are displayed.
Step 3 Optional: In the query result table, click a column heading to sort the result.
Issue 02 (2008-05-31)
3-21
3 Alarm Management
NOTE
If you click Event Source or Event Source Type, the NEs are grouped by NE ID. If you click a different
field, the event records are sorted in alphabetical order.
If you click , the fields are sorted in ascending order. If you click , the fields are sorted in descending
order. Switch between and to switch between the ascending and descending orders.
Step 4 Optional: In the query result table, right-click an event and do as follows:
l
Choose Select All to select all the records in the query result table.
Choose Maintenance Experience to set the maintenance experience for the event.
Choose Mask. In the Confirm dialog box, click Yes to mask the event.
Choose Locating to Topo Object to locate the topology object that raises the event.
Step 5 Optional: Select Display latest events to view new events in real time.
Step 6 Optional: Click the buttons in the lower part of the browse window:
l
Click Filter, and then set the filter conditions to query events.
Click Refresh to query events again based on the current filter conditions.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Context
In the alarm correlation analysis, the alarms or events whose correlation actions are set to
mask are called correlative alarms or correlative events.
3-22
Issue 02 (2008-05-31)
3 Alarm Management
Procedure
Step 1 Choose Fault > Browse History Alarm, Fault > Browse Current Alarm , or Fault > Browse
Event.
Step 2 In the alarm or event list, right-click an alarm or an event and choose Correlative Alarms or
Correlative Events .
The Correlative Alarms or Correlative Events dialog box is displayed. The dialog box displays
the correlative alarms or correlative events of the selected alarm or event.
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the alarm browse window, click Filter by Template and choose New .
Step 3 In the New Template dialog box, specify a template name. Click OK.
Step 4 In the New Template dialog box, set the filter conditions. On the Alarm Source tab, select By
type. In the Type navigation tree, select NMS, and then click Save.
Step 5 In the Confirm dialog box, click Yes.
In the alarm browse window, the N2000 UMS alarms are displayed according to the new
template.
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the alarm browse window, click Filter by Template and choose New .
Step 3 In the New Template dialog box, specify a template name. Click OK.
Issue 02 (2008-05-31)
3-23
3 Alarm Management
Step 4 In the New Template dialog box, set the filter conditions. In the Type field, select all the options
except Power Supply and Environment. Click Save.
Step 5 In the Confirm dialog box, click Yes.
In the alarm browse window, the performance threshold alarms are displayed according to the
new template.
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 On the alarm browse window, click Filter by Template and choose New .
Step 3 In the New Template dialog box, specify a template name. Click OK.
Step 4 In the New Template dialog box, select Power Supply and Environment for Type. Click
Save.
Step 5 In the Confirm dialog box, click Yes.
In the alarm browse window, the environment alarms are displayed according to the new
template.
----End
Issue 02 (2008-05-31)
3 Alarm Management
The function of alarm acknowledgement provides a method to identify whether an alarm is being
handled. By alarm acknowledgement, you can identify the alarms that are not handled so that
you can handle these alarms in time.
3.5.5 Locating an Alarm
By locating an alarm, you can find the topology object that raises the alarm. The position of the
object is focused in the topology view.
3.5.6 Querying Device Maintenance Information
You can query device maintenance information to obtain the information on the device location
and the maintenance personnel. You can then notify the maintenance personnel if a device is
faulty.
3.5.7 Clearing Alarms
Alarms may be missing due to some faults. For example, when the N2000 UMS fails to
communicate with the device, the clearance alarms reported by the device may be missing. In
such a case, if the device does not support alarm check, these alarms are not cleared. For
maintenance purposes, the N2000 UMS allows you to clear the alarms manually.
3.5.8 Recording Alarm Maintenance Experiences
You can record the alarm maintenance experiences. When a similar alarm is raised, you can
refer to the alarm maintenance experiences so that the alarm can be cleared in time.
3.5.9 Example of Alarm Handling
This section provides an example on how to handle the alarm of insufficient disk space. It shows
the procedure and method for handling alarms. It helps you to know the basic procedure and
operations of alarm handling.
Flow Chart
Figure 3-4 shows the fault handling procedure.
Issue 02 (2008-05-31)
3-25
3 Alarm Management
3-26
Issue 02 (2008-05-31)
3 Alarm Management
Procedure
The fault handling procedure, as shown in Figure 3-4, is described inTable 3-2.
Table 3-2 Fault handling procedure
Step
Operation
Description
Receive an alarm
Acknowledge the
alarm
Collect fault
information
10
Record the
maintenance
experience
Prerequisite
To perform the browse operation, you must be an NM user with the "Fault Maintainer" authority
or higher. To perform the acknowledgement or clearance operation, you must be an NM user
with the "Fault Operator" authority or higher.
Issue 02 (2008-05-31)
3-27
3 Alarm Management
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the Filter dialog box, set the filter conditions. Click OK.
NOTE
If the startup template for browsing the current alarms is set, the Filter dialog box is not displayed. The alarms
that meet the filter conditions are displayed.
Step 3 In the query result table, click a column heading to sort the results.
NOTE
If you click Alarm Source or Alarm Source Type, the NEs are grouped by NE ID. If you click a different
field, the alarm records are sorted in alphabetical order.
If you click , the fields are sorted in ascending order. If you click , the fields are sorted in descending
order. Switch between and to switch between the ascending and descending orders.
Choose Select All to select all the records in the query result table.
Choose Mask. In the Confirm dialog box, click OK to mask the selected alarm.
l
3-28
If the alarm is unacknowledged and cleared, it is moved to the history alarm database.
Issue 02 (2008-05-31)
3 Alarm Management
If the alarm is acknowledged and uncleared, it is moved to the history alarm database.
Choose Locating to Topo Object to locate the topology object that raises the alarm.
Step 5 Optional: Choose Display latest alarms to query new alarms in real time.
Step 6 In the query result table, choose an alarm, and do as follows:
l
Click Refresh to query current alarms again based on the current filter condition.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
In the alarm browse window, select an alarm.
----End
Result
The alarm details are displayed at the lower left part of the alarm list. The alarm handling
suggestions are displayed at the lower right part of the alarm list.
Issue 02 (2008-05-31)
3-29
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the Filter dialog box, set the filter conditions. Click OK.
NOTE
If the startup template for browsing the current alarms is set, the Filter dialog box is not displayed. The alarms
that meet the filter conditions are displayed.
Step 3 In the Current Alarm window, right-click an alarm and choose Acknowledge.
3-30
Issue 02 (2008-05-31)
3 Alarm Management
Result
l
A progress bar indicates the progress if you acknowledge two or more alarms at a time.
When the N2000 UMS receives the command for acknowledging the alarm, the alarm status
becomes Ack. The N2000 UMS records when the alarm is acknowledged and who performs
this task. It also refreshes the information in all the windows on the client and updates the
data of the alarm panel and alarm box.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Context
l
All the alarm browse windows provide the access of locating alarms.
After you locate an alarm, the object that raises the alarm is focused in the topology view.
You can locate the objects in the topology tree or on the panel.
If the object that raises the alarm is deleted, the Locating to Topo Object menu is disabled.
Procedure
In the alarm browse window, right-click an alarm and choose Locating to Topo Object.
Issue 02 (2008-05-31)
3-31
3 Alarm Management
After the alarm is located, the object that raises the alarm is focused in the topology view.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 In the alarm browse window, right-click an alarm and choose Locating to Topo Object.
The topology object that raises the alarm is focused.
Step 2 Choose System > Device Maintenance Info.
Step 3 In the Device Maintenance Info window, double-click the records in the maintenance
information list or click Display to view the device maintenance information.
NOTE
If you do not select any device in the topology view and choose System > Device Maintenance Info, the
maintenance information on all the devices is displayed.
3-32
Issue 02 (2008-05-31)
3 Alarm Management
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
You cannot roll back the operation of clearing an alarm.
Procedure
Step 1 Choose Fault > Browse Current Alarm.
Step 2 In the Current Alarms window, right-click an alarm and choose Clear .
Issue 02 (2008-05-31)
3-33
3 Alarm Management
Result
l
A progress bar indicates the progress if you acknowledge two or more alarms at a time.
The N2000 UMS changes the status of an alarm to Cleared. The N2000 UMS records when
the alarm is cleared and who performs this task. It also refreshes the information in all the
windows on the client and updates the data of the alarm panel and alarm box.
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Settings > Maintenance Experience .
Step 2 In the Alarm/Event navigation tree, select an alarm, and then click Edit.
3-34
Issue 02 (2008-05-31)
3 Alarm Management
Step 3 In the Edit dialog box, enter the experience of handling this alarm.
NOTE
Background
The N2000 UMS reports an alarm of insufficient disk space.
Operation Guide
Based on the 3.5.1 Fault Handling Procedure, do as follows:
1.
2.
3.
Issue 02 (2008-05-31)
3-35
3 Alarm Management
To avoid others handling the same alarm, you need to acknowledge it. When you
acknowledge the alarm, it indicates that the alarm is being processed. Right-click the alarm
and choose Acknowledg.
4.
5.
6.
7.
Issue 02 (2008-05-31)
3 Alarm Management
Description
Alarm auto
synchronization
When the network connection fails or the N2000 UMS restarts, the
alarms on the N2000 UMS may be different from those on the devices.
The N2000 UMS then automatically synchronizes the alarms with
those on the devices.
Alarm auto
acknowledgement
After the related faults are removed, you do not need to manually
acknowledge the cleared alarms. You can set the auto
acknowledgement conditions so that the N2000 UMS can
automatically acknowledge alarms that meet the conditions.
Alarm redefinition
You can redefine the alarm name, function type and severity on the
N2000 UMS. The N2000 UMS then displays the redefined alarm based
on your settings.
Alarm mask
If you are not concerned about some alarms, you can set the N2000
UMS to mask them. For example, when the equipment is under
maintenance or test, mass alarms are raised. Such alarms can be
masked.
Alarm
postprocessing
You can set the alarm postprocessing policy. The N2000 UMS can
then process the alarms that match the preset conditions based on the
policy.
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
l
Issue 02 (2008-05-31)
3-37
3 Alarm Management
l
Procedure
Step 1 Choose Fault > Settings > Auto Acknowledgement and Synchronization .
Step 2 In the Auto Acknowledgement and Synchronization dialog box, set the auto
acknowledgement.
l
The immediate acknowledgement applies to only the alarms that are cleared after the immediate
acknowledgement configuration, but it does not apply to those alarms that are cleared before the configuration.
Result
The alarms that match the preset conditions are automatically acknowledged. The user who
acknowledges the alarms is recorded as NMS.
Issue 02 (2008-05-31)
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
Because alarm synchronization may have a big impact on the N2000 UMS, only alarms are
synchronized, and events are not.
Procedure
Step 1 Choose Fault > Settings > Auto Acknowledgement and Synchronization .
Step 2 In the Auto Acknowledgement and Synchronization dialog box, in the Auto
Acknowledgement and Synchronization group box, set the alarm synchronization parameters.
l
Enable synchronize all alarms when the NMS is started indicates that the N2000 UMS
automatically synchronizes the alarms with those on all the devices when it is started.
Enable synchronize the alarms when the communication is resumed between the NMS
and the devices indicates that the N2000 UMS automatically synchronizes the alarms with
those on a specific device when it resumes the communication with the device.
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Issue 02 (2008-05-31)
3-39
3 Alarm Management
Procedure
Step 1 Choose Fault > Settings > Redefine Alarm/Event .
Step 2 In the Redefine Alarm/Event window, click New. A new alarm or event redefinition record is
displayed.
2.
In Alarm/Event, click
event for redefinition.
3.
In Device, click
4.
NOTE
Alarm/Event Name and Type are related to Device. You can set Alarm/Event Name and Type only
when you select all the devices in Device. By default, all the devices in Device are selected.
5.
In Type, in the drop-down list, select a type for the redefined alarm or event.
6.
In Severity, in the drop-down list, select a severity for the redefined alarm or event.
NOTE
You can also modify an existing alarm or event redefinition record by performing the previous steps.
, it indicates that the field cannot be modified. If the Enable field is displayed in purple
that the record is modified but not applied. If the Enable field is displayed in green
record is new and not applied.
, it indicates
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
3-40
Issue 02 (2008-05-31)
3 Alarm Management
Context
Alarms are masked based on their original properties (the properties before redefinition).
Therefore, if you set the redefinition and mask for an alarm, the mask settings take effect before
the redefinition settings take effect.
Procedure
Step 1 Choose Fault > Settings > NE Alarm/Event Mask.
Step 2 In the NE Alarm/Event Mask window, click New. An alarm or event mask record is created.
2.
3.
NOTE
You can also modify an existing alarm or event mask record by performing the previous steps.
, it indicates that the field cannot be modified. If the Enable field is displayed in purple
that the record is modified but not applied. If the Enable field is displayed in green
record is new and not applied.
, it indicates
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Settings > NMS Alarm/Event Mask.
Step 2 In the NMS Alarm/Event Mask window, select the check box in the mask field of an alarm or
event.
Issue 02 (2008-05-31)
3-41
3 Alarm Management
NOTE
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Settings > Alarm/Event Post Actions .
Step 2 In the Alarm/Event Post Actions window, click New. A new alarm or event postprocessing
record is displayed.
3-42
1.
2.
3.
Set Start Time, End Time, Postprocessing Action Settings, and Remarks.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd
Issue 02 (2008-05-31)
3 Alarm Management
NOTE
l
l
You can also modify an existing alarm or event postprocessing record by performing the previous steps.
If the Enable field of the current rule is displayed in purple
but not yet applied. If the Enable field is displayed in green
created but not yet applied.
Issue 02 (2008-05-31)
3-43
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
3-44
Issue 02 (2008-05-31)
3 Alarm Management
Context
l
The correlation analysis settings take effect in a specified period. The effective period
depends on the server time.
The correlation conditions are different between the correlation analysis of a single alarm
or event and that of two alarms or events. The correlation properties of the correlation
analysis of a single alarm or event are based on a specific device and a specific time range.
The correlation properties of the correlation analysis of two alarms or events are based on
the alarm sources and time range between the two alarms or events.
Procedure
Step 1 Choose Fault > Settings > Correlation Rule .
Step 2 In the Correlation Rule window, on the Correlation Analysis tab, click New. A new alarm or
event correlation analysis rule is displayed.
2.
3.
2.
3.
NOTE
You can also modify an existing alarm or event correlation analysis rule by performing the previous steps.
, it indicates that the field cannot be modified. If the Enable field is displayed in purple
that the record is modified but not applied. If the Enable field is displayed in green
record is new and not applied.
, it indicates
3-45
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Settings > Correlation Rule .
Step 2 In the Correlation Rule window, on the Alarm/Event Frequency Analysis tab, click New. A
rule of the alarm or event frequency analysis is created.
3-46
1.
2.
In Alarm/Event, click
event.
3.
Issue 02 (2008-05-31)
3 Alarm Management
NOTE
If the handling policy is set to generate N2000 UMS alarms, an avalanche alarm is raised when the triggering
condition is met.
You can also modify an existing rule of the alarm or event frequency analysis by performing the previous
steps.
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Settings > Correlation Rule .
Step 2 In the Correlation Rule window, on the Intermittent Alarms/Repeat Events Analysis tab,
click New. A new intermittent alarm or repeat event analysis rule is displayed.
Set whether to enable the intermittent alarm or repeat event analysis rule.
2.
In Alarm/Event, click
. In the Select Alarm/Event dialog box, select an intermittent
alarm or a repeat event for analysis.
3.
Issue 02 (2008-05-31)
3-47
3 Alarm Management
NOTE
You can also modify an existing intermittent alarm or repeat event analysis rule by performing the previous
steps.
If the Enable field of the current rule is displayed in purple
but not yet applied. If the Enable field is displayed in green
created but not yet applied.
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Step 1 Choose Fault > Settings > Correlation Rule .
Step 2 In the Correlation Rule window, on the Acknowledged and Uncleared Alarm Time
Analysis tab, click New. A rule of the acknowledged and uncleared alarm time analysis is
created.
Step 3 Set the rule of the acknowledged and uncleared alarm time analysis.
3-48
1.
2.
In Alarm, click
3.
Issue 02 (2008-05-31)
3 Alarm Management
NOTE
You can also modify an existing rule of the acknowledged and uncleared alarm time analysis by performing
the previous steps.
2.
Create a record of alarm or event correlation analysis and set the related parameters.
Click New and set the parameters according to the following table.
Issue 02 (2008-05-31)
Parameter
Operation
Enable
Correlative Alarm/Event 1
Correlative Alarm/Event 2
Priority
Start Time
End Time
Condition
Set it to NE Equal Z.
3-49
3 Alarm Management
Parameter
Operation
Action
Set it to Mask.
2.
Operation
Enable
Correlative Alarm/Event
1
Set it to alarm M.
Correlative Alarm/Event
2
Set it to alarm N.
Priority
Start Time
End Time
Condition
Action
Issue 02 (2008-05-31)
3 Alarm Management
condition to In 1 hours 0 minutes, the number of raised alarms is greater than 5. Set the
handling policy to Change the alarm severity to Critical.
Operation Guide
1.
2.
Create a record of the alarm or event frequency analysis and set the related parameters.
Click New. Set the parameters according to the following table.
Parameter
Operation
Enable
Alarm/Event
Triggering Condition
Handling Policy
2.
Create a record of the intermittent alarm or repeat event analysis and set the related
parameters.
Click New and set the parameters according to the following table.
Parameter
Settings
Enable
Alarm/Event
Triggering
Condition
Handling Policy
Issue 02 (2008-05-31)
3-51
3 Alarm Management
2.
Create a record of the acknowledged and uncleared alarm time analysis and set the related
parameters.
Click New. Set the parameters according to the following table.
Parameter
Operation
Enable
Alarm
Triggering Condition
Handling Policy
Issue 02 (2008-05-31)
3 Alarm Management
Description
Alarm panel
The alarm panel is a panel on the client. It displays the status of the
current N2000 UMS alarm data through different color blocks and
statistical data. You can monitor the alarms in the network through
this panel to know the alarm severities and the statistical data.
Topology view
The topology view is a view that shows the device layout on the client.
The colors and status of the device icons in the view indicate the alarm
status of the devices. You can observe the icons to know whether an
alarm occurs in a device and the severity and status of the alarm.
Alarm box
Sound box
The sound box plays sounds to inform you of the current alarm status.
To use the sound box, connect it to the N2000 UMS client and set the
parameters. You can know new alarms and their severities through the
sound box.
Remote notification
by email or SMS
You can set a mail server, wireless modem, or SMS gateway for
remote notification. The N2000 UMS notifies the maintenance
personnel of alarms by email or SMS.
Alarm browse
window
You can set alarm browse conditions to browse current alarms, history
alarms, and events.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Context
The settings are effective for only the current client.
Issue 02 (2008-05-31)
3-53
3 Alarm Management
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Local Fault Settings tab.
Step 3 On the Local Fault Settings tab, set the display mode of the alarm panel.
NOTE
Display alarm panel at startup: The alarm panel is displayed when the client is started.
Display the alarm panel when a new alarm is reported: The client displays the alarm panel automatically
when receiving a new alarm.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose Fault > Alarm Box.
Step 2 On the Audio-Visual Indication tab, set the severities of the alarms of which you want to notify
users through the alarm box.
3-54
Issue 02 (2008-05-31)
3 Alarm Management
Step 3 Click the Communications Parameters tab. Set the serial port and the baud rate.
NOTE
Set the serial port and the baud rate as required. Otherwise, the alarm box fails to work properly.
Prerequisite
l
You must be an NMS user with the Fault Watcher authority or higher.
When modifying the alarm sound settings, you need to stop the current alarm sound,
because you need to initialize the sound.
The alarm sound settings are effective for the only local client.
You can click Restore Defaults to restore the alarm sound to the default values.
Context
Issue 02 (2008-05-31)
3-55
3 Alarm Management
l
Do not stop the sounds of all severities, because you may miss some critical or major alarms
and delay the alarm handling.
Sound playing policy: If the alarm severity corresponding to the current alarm sound is
higher than that of the new one, no action needs to be taken. If the current alarm severity
is lower than or equal to the new alarm severity, stop the current alarm sound and play the
new alarm sound.
When an alarm sound is reset, the sound is not played again according to the alarm statistics
but played when a new alarm is received.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Sound tab.
Step 3 On the Sound tab, set the parameters for the sound corresponding to the related alarm severity.
NOTE
If you set the playing duration to -1, the alarm sound will last until you stop the sound or clear the alarm.
To set alarm sounds by alarm name, click Advanced. In the Advanced dialog box, on the Set by Name tab,
select alarms, select an audio file, and set the playing duration. Then click OK.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Color tab.
3-56
Issue 02 (2008-05-31)
3 Alarm Management
Step 3 Set the colors for Critical Alarm, Major Alarm, Minor Alarm, and Warning as required.
Step 4 Click OK.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, on the Local Fault Settings tab, set the threshold for uncleared
alarms.
NOTE
When the number of the uncleared alarms reaches this threshold, the N2000 UMS prompts you to handle the
alarms.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Local Fault Settings tab.
Step 3 On the Local Fault Settings tab, select The Client Is on Top When a New Alarm Is
Reported and specify the alarm severity.
Issue 02 (2008-05-31)
3-57
3 Alarm Management
Result
After you complete the settings, when the new alarms of the specified severity are raised, the
client is displayed on top automatically.
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
The communication parameters are global. Therefore, it applies to all alarm remote notification
rules. You do not need to set the communication parameters for each remote notification rule.
Procedure
Step 1 Choose Fault > Settings > Remote Notification .
3-58
Issue 02 (2008-05-31)
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
l
The notification delay settings are universal. They are effective to all the rules for the alarm
remote notification. Therefore, you do not need to set the notification delay for each remote
notification rule.
Procedure
Step 1 Choose Fault > Settings > Remote Notification .
Step 2 In the Remote Notification window, click Delay Settings.
Step 3 In the Delay Settings dialog box, set the notification delay.
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
To enable the remote notification, configure the communication parameters as follows:
Issue 02 (2008-05-31)
3-59
3 Alarm Management
Procedure
Step 1 Choose Fault > Settings > Remote Notification .
Step 2 In the Remote Notification window, click New. A rule of the alarm remote notification is
created.
2.
3.
Set Email, Mobile Phone, Time Zone, Enable Alarm Clearance Notification, and
Remarks.
NOTE
You can also modify an existing alarm notification rule by performing the previous steps.
You must set either Email or Mobile Phone. You can also set both of them.
Issue 02 (2008-05-31)
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
l
After dump, the source data is deleted from the database immediately.
By default, the N2000 UMS can store a maximum of 50,000 current alarms, 1,000,0000
history alarms, and 120,000 event alarms. You can modify the maximum number of the
history alarms to the maximum of 2,000,000.
By default, auto periodic dump starts between 1:00 and 2:00 in the morning; auto overflow
dump starts automatically in 10 minutes after the number of alarms reaches the maximum.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 2 In the Dump Settings dialog box, in the Dump Settings navigation tree, select Alarm Data.
3-61
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
After dump, the source data is deleted from the database immediately.
Procedure
Step 1 Choose System > Database > Dump Settings.
Step 2 In the Dump Settings dialog box, in the Dump Settings navigation tree, select Event Data.
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
After dump, the source data is deleted from the database immediately.
3-62
Issue 02 (2008-05-31)
3 Alarm Management
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 2 In the Manual Dump dialog box, in the Manual Dump navigation tree, select Alarm Data.
The file path and the file format cannot be set here. They are synchronized with the alarm data settings. You
can modify them only by setting the corresponding items in System > Database > Dump Manually.
Step 4 Specify the start time and end time of the alarms.
NOTE
If the start time and end time are not specified, all the history alarms in the database are dumped.
Step 5 Click Query to query the alarms that meet the dump conditions.
Step 6 Click Dump. In the Confirm dialog box, click Yes.
----End
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Context
After dump, the source data is deleted from the database immediately.
Issue 02 (2008-05-31)
3-63
3 Alarm Management
Procedure
Step 1 Choose System > Database > Dump Manually.
Step 2 In the Manual Dump dialog box, in the Manual Dump navigation tree, select Event Data.
The dumped file path and the file format cannot be set here. They are synchronized with the alarm data settings.
You can modify them only by setting the corresponding items in System > Database > Dump Settings.
Step 4 Specify the start time and end time of the events.
NOTE
If the start time and end time are not specified, all the events in the database are dumped.
Step 5 Click Query to query the events that meet the dump conditions.
Step 6 Click Dump. In the Confirm dialog box, click Yes.
----End
Issue 02 (2008-05-31)
3 Alarm Management
NOTE
The alarm panel displays only alarm information by default. Event information is displayed only after the event
template is added to the alarm panel.
l
The four colors on the alarm panel represent the four alarm severities: Critical, Major,
Minor, and Warning. The numbers on the color blocks indicate the numbers of the alarms
or events that meet the conditions on the template.
The alarm panel displays the alarm statistical information in real time. When a new alarm
is reported, the corresponding color block blinks one minute and the sound box plays the
alarm sound. At the same time, the statistical information on the alarm panel is refreshed
in real time.
You can add the alarm template to the alarm panel. The alarm panel displays the alarm
statistical information according to the alarm template. By default, the alarm panel is bound
with the All Current Alarms template that displays all the current alarms. When the alarm
panel is displayed as a thumbnail, the displayed alarm statistical information is the statistical
information that meets the conditions specified in the All Current Alarms template. All
templates except The All Current Alarms template can be deleted from the alarm panel.
You can add the event template to the alarm panel. The alarm panel displays the event
statistical information according to the event template.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Issue 02 (2008-05-31)
3-65
3 Alarm Management
Context
To display the complete alarm panel by default, choose File > Preferences . In the
Preferences dialog box, click the Local Fault Setting tab, and then select Display alarm panel
at startup.
Procedure
Choose Fault > Show Alarm Panel, or click
on the toolbar.
----End
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Context
The settings are effective for only the current client.
Procedure
Step 1 Choose File > Preferences.
Step 2 In the Preferences dialog box, click the Local Fault Settings tab.
Step 3 On the Local Fault Settings tab, set the display mode of the alarm panel.
3-66
Issue 02 (2008-05-31)
3 Alarm Management
NOTE
Display alarm panel at startup: The alarm panel is displayed when the client is started.
Display the alarm panel when a new alarm is reported: The client displays the alarm panel automatically
when receiving a new alarm.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose Fault > Alarm Box.
Step 2 On the Audio-Visual Indication tab, set the severities of the alarms of which you want to notify
users through the alarm box.
Issue 02 (2008-05-31)
3-67
3 Alarm Management
Step 3 Click the Communications Parameters tab. Set the serial port and the baud rate.
NOTE
Set the serial port and the baud rate as required. Otherwise, the alarm box fails to work properly.
Prerequisite
You must be an NMS user with the Fault Watcher authority or higher.
Procedure
Step 1 Choose Fault > Alarm Box.
Step 2 In the Alarm Box dialog box, on the Audio-Visual Indication tab, click Stop Current Alarm
Sound.
3-68
Issue 02 (2008-05-31)
3 Alarm Management
Prerequisite
You must be an NMS user with the Fault Operator authority or higher.
Procedure
Choose Fault > Synchronize Alarm Box Data.
----End
Issue 02 (2008-05-31)
3-69
4 Performance Management
Performance Management
Issue 02 (2008-05-31)
4-1
4 Performance Management
Performance Measurement
Performance measurement refers to various measurement activities on the device, including the
traffic measurement, the measurement on system resources, signaling, ports, and interior
operation status. Performance measurement provides reliable data reference for network
measurement, networking plan and operation management.
Measuring Object
It is a physical or logical entity, or a combination of various entities to be measured, such as a
trunk circuit group, common control component, or destination. For the SNMP device, a port or
board can be an object.
Measuring Entity
It is also called measurement item. It is a specific parameter (for example, the traffic, call
attempts, and average occupied time) for which the data must be collected during the
measurement.
Measuring Unit
It is a specific measurement category, such as the measurement of the incoming traffic, outgoing traffic, and internal traffic. In performance measurement, the measuring unit specifies
what to be measured. Each measuring unit consists of one or more measuring entities.
4-2
Issue 02 (2008-05-31)
4 Performance Management
Measuring Time
The measuring time specifies when to measure the entity. The measuring time contains start
date, end date, polling period, repeat period, and time segments. You can set it from four aspects,
such as date range, repeat period, time segment and polling period.
NOTE
The set time of all the timers related to the performance measurement on the N2000 UMS server is not the
DST time on the device.
Restrictions
Description
Date Range
The date range specifies the start date and the end date of a measurement
task. The task starts the measurement at the specified start date and stops it
at the specified end date.
Repeat Period
By default, the repeat period is daily. The date range and the repeat period
of performance measurement specify on which days the measurement is
carried out.
Time
Segments
The time segments specifies in which time segment of the day the
measurement is carried out. The measurement mode of each measurement
day is the same. You can divide each day into three time segments at most,
without overlaps with one another. The default time segment is [00:00,
23:59], which represents collecting data for 24 hours.
To re-divide the time segments, delete the default time segment first, and
then specify the start time and end time for each time segment. For example,
you can specify a measurement task to run during a certain segment on each
Saturday and Sunday, such as [9:00, 11:00), [13:00, 16:00), and [20:00,
21:00). Here 9.00 represents a closed time segment, 11.00 represents an
open time segment.
Each time segment starts at a specified time (precise to minute). The
measurement lasts for several consecutive periods. Within the defined time
segments, the tasks run based on the polling period. The different time
segments cannot be overlapped.
Issue 02 (2008-05-31)
4-3
4 Performance Management
Restrictions
Description
Polling Period
The polling period is interval at which the performance data is output, that
is, how often the performance data is output.
Such as 5 minutes, 15 minutes, 30 minutes, 1 hour or 1 day. By default, it
is 15 minutes. In the time segments, the system measures data based on a
specific polling period, and then outputs the results.
The polling period cannot be greater than the shortest time length in three
time segments of a day.
Polling period determines how often in each time segment the system output
the measurement result.
For example, you set time attributes of a task as follows:
l
After the preceding settings, the system measures data every 30 minutes
during [09:00, 12:00) every Saturday and Sunday from 2005-01-01 to
2005-02-01. That is, the system collects measurement data at 09:30, 10:00,
10:30, 11:00, and 11:30.
Entity Threshold
The threshold is a pre-set standard for measuring entity, including upper limit and lower limit.
If the entity value is more than the upper limit or less than the lower limit during the measurement
period, an alarm will be raised for that threshold. The upper limit and lower limit can be set
according to the actual conditions. Not all entities have the threshold attribute.
Object Type
It refers to the different methods used for describing restrictions. Generally, each restriction can
have several object types for selection. For example, for the restriction of Which incoming
users to be measured, the incoming user can be described by external code, such as dialed
number set + telephone number, or by internal code, such as module number + user type + user
logical number. But you can select only one method of them.
Measurement Type
It is the combination of a specific entity and object, such as Trunk Group Traffic and Outgoing
Call Attempts.
Measurement Task
Measurement task is a description of a specific traffic measurement task, containing four
attributes, such as object, index, time and output. Object attribute decides which to be measured.
4-4
Issue 02 (2008-05-31)
4 Performance Management
Index attribute decides what to be measured. Time attribute decides when to measure the
performance data. Output attribute decides how to output the measurement result.
SNMP Device
The SNMP device supports the SNMP protocol. The SNMP device can be defined in
management information base (MIB), such as UA5000(PVMV1). The N2000 UMS can manage
the SNMP devices, by reading and writing the managed objects in the MIB.
MML Device
The MML device supports the MML protocol, providing MML interfaces to the N2000 UMS,
such as SoftX3000, iGWB, and MRS6100. The N2000 UMS can manage and maintain the MML
device using MML commands.
IMS Device
IMS Device refers to a device that works in the IMS network, including IP Centrex, ATCA
device, MSOFTX3000, UMG8900_IMS, and MRS6200. Where, MSOFTX3000 and
UMG8900_IMS are MML devices. IP Centrex, ATCA device, and MRS6200 are SNMP
devices.
For IMS devices, only the ATCA device supports the performance measurement function of the
N2000 UMS.
Measurement Principle
The N2000 UMS realizes the performance measurement of the whole network through the
performance measurement tasks on the BAM of IMS devices.
1.
For collecting performance measurement, N2000 UMS server has to synchronize the task
present on the device.
2.
The IMS device sends the result file containing the performance data to the N2000 UMS
and when the file is generated.
3.
If you have defined the performance threshold alarm, and the performance index exceeds the limit, the threshold
alarm is reported.
Principle Diagram
Figure 4-1 shows the performance measurement principle of IMS devices.
Issue 02 (2008-05-31)
4-5
4 Performance Management
4-6
Issue 02 (2008-05-31)
4 Performance Management
Issue 02 (2008-05-31)
4-7
4 Performance Management
Description
Not started
It indicates that the task is created. The current device time is earlier than the
start time of a task. That is, the task is not started.
Running
It indicates that the current device time is between the start time and the end
time of a task, and the task is not suspended. That is, the task is running.
Suspended
It indicates that the task is inactive. In this case, the task outputs no result.
The suspended task can be activated again.
Terminated
It indicates that the current device time is later than or equal to the end time
of a task. That is, the task is complete.
Prerequisite
l
Procedure
Step 1 Choose Performance > Task Management from the main menu to open the Task
Management window.
Step 2 On the Task Management navigation tree, select a task node; or double-click a record from the
task list in the right pane.
Step 3 View the basic information about the performance task on the Basic Info tab.
NOTE
----End
4-8
Issue 02 (2008-05-31)
4 Performance Management
Prerequisite
l
Procedure
Step 1 Choose Performance > Task Management from the main menu to open the Task
Management window.
Step 2 On the Task Management... navigation tree, select a task node; or double-click a record from
the task list in the right pane.
Step 3 In the window that appears, click the Measuring Object tab to view the measuring object
information about the measurement task. It displays information on the device name, object type,
and measuring object.
NOTE
If you want to fast locate a measuring object, you can input the object name in the Measuring Object text box,
and click Search to fast locate the measuring object.
----End
You cannot query the performance data collected by the SNMP large-capacity performance measurement
task (also called batch collection task) on the GUI of the N2000 UMS. The collected performance data is
exported to an NBI file that is provided to the upper NMS or a third-party NMS for analysis.
4-9
4 Performance Management
Prerequisite
There are performance tasks on the N2000 UMS.
Context
The performance data collected by the SNMP large-capacity performance measurement task
(batch collection task) cannot be queried on the GUI of the N2000 UMS. The collected
performance data is exported to an NBI file that is provided to the upper NMS or a third-party
NMS for analysis.
Procedure
Step 1 Choose Performance > Task Management from the main menu to display the Task
Management window.
Step 2 On the Task Management... navigation tree, select a task node; or double-click a record from
the task list in the right pane.
Step 3 In the window that appears, click the Data Info. tab. From the Condition drop-down list, select
the desired time segment. The user-defined option is described in the next section.
Step 4 Query the performance data in the result list.
----End
Prerequisite
There are performance tasks on the N2000 UMS.
Context
Up to three time segments can be set in a day, such as [10:00, 14:00), [14:00, 18:00), and [18:00,
22:00). The start time is closed interval and the end time is open interval. The end time of the
previous segment can be repeated with the start time of the later one. Each segment cannot be
overlapped, such as [10:00, 14:00), [13:00, 18:00).
Procedure
Step 1 Choose Performance > Task Management... from the main menu to open the Task
Management window.
4-10
Issue 02 (2008-05-31)
4 Performance Management
Step 2 On the Task Management... navigation tree, select a task node; or double-click a record from
the task list in the right pane.
Step 3 In the window that appears, click the Data Info. tab. From the Condition drop-down list, select
User Defined.
In the dialog box that appears, the system displays the Time tab.
Step 4 Configure Query Time Range and Time Segments, as shown in the following figure.
Step 5 Click the Measuring Entity tab, and configure the measuring entities and their logical type, as
shown in the following figure.
Step 6 Click the Measuring Object tab, and select the measuring object, as shown in the following
figure.
Issue 02 (2008-05-31)
4-11
4 Performance Management
NOTE
The system selects all the measuring objects by default. You can also click User-defined Measuring Objects
and Select Obj... to select the desired measuring objects in the dialog box that appears. Click OK.
Step 7 Click OK to view the performance data in the Task Management window.
----End
Prerequisite
You have queried the original performance data in the specified time segment or in the userdefined condition.
Procedure
Step 1 Choose Performance > Task Management from the main menu to open the Task
Management window.
Step 2 On the Task Management navigation tree, select a task node; or double-click a record in the
right pane.
Step 3 In the window that appears, click the Data Info. tab. Select the filtering criteria from the
Condition drop-down list, and query the measurement data.
Step 4 In the performance data result list, select a record, right-click, and choose Peak Search.
Step 5 In the dialog box that appears, select Object, Entity, and Search Type.
4-12
Issue 02 (2008-05-31)
4 Performance Management
Step 6 Click Search to display the result, as shown in the following figure.
NOTE
Select a record from the result list in the preceding figure, and click Go to to locate the performance data of the
result. Click Next. Only if there is one record in the list, the Next button displays as Search.
Prerequisite
You have queried the performance data to be saved.
Context
You can save all the queried performance data or the performance data displayed in the current
window.
Issue 02 (2008-05-31)
4-13
4 Performance Management
Procedure
Step 1 Choose Performance > Task Management from the main menu to open the Task
Management window.
Step 2 On the Task Management navigation tree, select a task node; or double-click a record in the
right pane.
Step 3 In the dialog box that appears, click the Data Info. tab. Select the filtering criteria from the
Condition drop-down list, and view the measurement data.
Step 4 In the Performance Data Management window, click Save to open the Save dialog box.
Step 5 Select the data type to Screen Data or All Data.
Step 6 Click OK.
Step 7 In the dialog box that appears, locate a saving path, input a file name, and select a file type.
Step 8 Click Save.
----End
Prerequisite
l
Context
You can print all the performance data or the performance data displayed in the current window.
Procedure
Step 1 Choose Performance > Task Management from the main menu to open the Task
Management window.
Step 2 On the Task Management navigation tree, select a task node; or double-click a record in the
right pane.
Step 3 In the dialog box that appears, click the Data Info. tab. Select the filtering criteria from the
Condition drop-down list, and view the measurement data.
Step 4 On the performance data querying interface, click Print to open the Print dialog box.
Step 5 Select the data type to Screen Data or All Data, and click OK.
Step 6 In the dialog box that appears, click Print.
Step 7 In the dialog box that appears, set the printing condition.
Step 8 Click OK.
----End
4-14
Issue 02 (2008-05-31)
4 Performance Management
The SNMP large-capacity performance measurement task does not support threshold operations. That
is, you cannot receive threshold alarms by configuring a performance threshold. In addition, the IMS
does not support the threshold operations.
The performance alarm threshold is meaningful only when the performance measurement task exists.
Critical alarm
Major alarm
Minor alarm
Warning
In the performance threshold template, you can set the lower limit and upper limit for these four
alarm levels. These limits are totally independent. If the message reported by a performance
measurement task meets several alarm levels, the system reports alarms of each level.
Assume that the measuring unit is lower than 100% for the CPU Occupancy.
l
If the measurement result is 95%, the system reports a critical alarm and a major alarm.
If the measurement result is 85%, the system reports a major alarm and a minor alarm.
Under the following conditions, a cleared alarm is generated for the performance threshold
alarm.
l
4-15
4 Performance Management
Set a threshold template for the measuring entity of the specified device type. In this case,
the alarm level and alarm generation condition of the measuring unit can be defined.
2.
Set a threshold record for measurement tasks and measuring objects of a specific device of
a certain type according to the threshold template.
3.
During the data collection, the N2000 UMS checks the performance data with alarm
thresholds.
l
Flowchart
Figure 4-3 shows the flowchart for monitoring the device performance.
Figure 4-3 Flowchart for monitoring the device performance
Issue 02 (2008-05-31)
4 Performance Management
Context
l
The threshold template name cannot be repeated with other template names.
For the advanced configuration, you can set 1-3 time segments in a day, such as [10:00,
14:00], [14:01, 18:00], and [18:01, 22:00]. All the time segments are closed interval. The
end time of the previous segment cannot be repeated with the start time of the later one.
Each segment cannot be overlapped, such as [10:00, 14:00], [13:00, 18:00].
For the advanced configuration, if you select the Compare with previous check box (the
options are Hour, Day, Week, and Month), the performance data collected this time is
compared with that collected in the last period. An alarm is generated when the difference
reaches the threshold. For example, if you set Compare with previous to Hour, it indicates
that the performance data collected this time is compared with that collected before one
hour. The threshold alarm is generated when the difference reaches the threshold.
Procedure
Step 1 Choose Performance > Configure > Threshold Template... from the main menu to display
the Threshold Template Management window.
Step 2 Select Device Type and Measuring Unit, and click Create in the lower right corner; or rightclick the threshold template list, and choose Create Template. The Create Template dialog
box appears.
Step 3 In the Template Name text box, input the name of the performance template.
Step 4 From the Measuring Unit drop-down list, select the desired measuring unit.
Step 5 From the Alarm Level drop-down list, select the alarm level of the threshold template.
Step 6 Click the Simple or Advanced check box.
l
Issue 02 (2008-05-31)
2.
Select the desired Measuring Entity, and set the lower or upper threshold, as shown
in the following figure. The upper threshold must be larger than the lower threshold.
4-17
4 Performance Management
NOTE
An alarm is generated when the performance data is lower or higher than the threshold.
3.
l
4-18
Click Detail Expression to view the detailed information about the template
expression.
2.
Click the time segment tab, and set the start time and end time.
3.
Click A, select Measuring Entity and Operator, and select or input Entity/Value.
Other threshold conditions can be set similarly.
4.
Double-click an Alias Name record, click a condition button, and double-click other
Alias Name records to add the template expression. The following figure shows the
complete configuration.
Issue 02 (2008-05-31)
4 Performance Management
NOTE
You can also select the Compare with previous check box, and select the desired period from the
drop-down list.
5.
Click Detail Expression to view the detailed information about the template
expression.
Prerequisite
l
Issue 02 (2008-05-31)
4-19
4 Performance Management
You have not created any performance threshold record for the current performance task,
performance threshold template, and the selected measuring object.
Once you create the threshold record, a threshold alarm is generated when the threshold
condition is met.
After the device or task of the measuring unit is deleted, the performance threshold record
is deleted.
After the performance threshold template is deleted, the performance threshold record is
deleted.
A measuring object can create multiple threshold records by using different threshold
templates.
A task, measuring object, or threshold template cannot create multiple threshold records.
Context
Procedure
Step 1 Choose performance > Task Management... from the main menu to display the Task
Management window.
Step 2 On the task management navigation tree, select a task node, or double-click a record in the right
pane.
Step 3 In the window that appears, click the Threshold Info. tab, and click Create in the lower right
corner; or right-click the threshold record list, and choose Create Threshold . The Create
Threshold dialog box appears.
Step 4 In the Threshold Name text box, input the record name.
Step 5 In the Template Name drop-down list, select the performance threshold template of the
measuring unit.
Step 6 Click Select Object... to select at least one measuring object in the dialog box that appears, and
click OK to return to the Create Threshold dialog box, as shown in the following figure.
Issue 02 (2008-05-31)
4 Performance Management
The SNMP large-capacity performance measurement task cannot measure the performance data.
Prerequisite
l
You have created a performance measurement task and the task has collected performance
data.
Context
When Period is Week, Month, and Year, you can click SetTime to set up to three time
segments. Up to three time segments can be set in a day, such as [10:00, 14:00), [14:00, 18:00),
and [18:00, 22:00). The start time is closed interval and the end time is open interval. The end
time of the previous segment can be repeated with the start time of the later one. Each segment
cannot be overlapped, such as [10:00, 14:00), [13:00, 18:00).
NOTE
The SNMP large-capacity performance measurement task (batch collection task) does not support the time
distribution measurement.
Issue 02 (2008-05-31)
4-21
4 Performance Management
Procedure
Step 1 Choose Performance > Data Analysis > Time Distribution Analysis... from the main menu
to open the Time Distribution Analysis window. In the upper area of the window, the
parameters are displayed, as shown in the following figure.
Step 2 In the Device Type drop-down list, select the desired device type.
Step 3 Click Select Device to select a device.
Step 4 In the Measuring Unit drop-down list, select the desired measuring unit.
Step 5 In the Analysis Type drop-down list, select the analysis type, such as Single Measuring
Object and Multiple Measuring Object.
NOTE
When you select many devices, Analysis Type is Multiple Measuring Object.
Step 6 In the Time Range area, click the Period drop-down list, and select a task period.
Step 7 Click ... next to Start Time and specify the start time in the dialog box that appears; or select
the Latest option and set a time range related to the current system time.
Step 8 Click Measuring Object. In the dialog box that appears, select the desired measuring object,
and click OK.
Step 9 Click Measuring Entity. In the dialog box that appears, select the measuring entity, and click
OK.
Step 10 Click the Formula column, and set the related operator, such as SUM, AVG, MIN, and MAX.
Step 11 Click Query or Apply to display the result, as shown in the following figure.
----End
4-22
Issue 02 (2008-05-31)
4 Performance Management
Prerequisite
You have created a performance measurement task and the task has collected performance data.
Context
l
When Period is Week, Month, and Year, you can click SetTime to set up to three time
segments. Up to three time segments can be set in a day, such as [10:00, 14:00), [14:00,
18:00), and [18:00, 22:00). The start time is closed interval and the end time is open interval.
The end time of the previous segment can be repeated with the start time of the later one.
Each segment cannot be overlapped, such as [10:00, 14:00), [13:00, 18:00).
NOTE
The SNMP large-capacity performance measurement task (batch collection task) does not support the time
distribution comparison measurement.
Procedure
Step 1 Choose Performance > Data Analysis > Compare Time Analysis... from the main menu to
open the Compare Time Analysis window. In the upper area of the window, the parameters
are displayed, as shown in the following figure.
Step 2 In the Device Type drop-down list, select the desired device type.
Step 3 In the Device Name drop-down list, select the desired device.
Step 4 In the Measuring Unit drop-down list, select the desired measuring unit.
Step 5 In the Analysis Type drop-down list, select the desired analysis type.
Step 6 In the Time Range area, select a period for comparison, and set two different start times. The
start time cannot be later than the current time.
l
Step 7 Click Measuring Object. In the dialog box that appears, select the desired measuring object.
Step 8 Click Measuring Entity. In the dialog box that appears, select the measuring entity.
Step 9 Click the Formula column, and set the related operator, such as SUM, AVG, MIN, and MAX.
Step 10 Click Query to display the result, as shown in the following figure.
Issue 02 (2008-05-31)
4-23
4 Performance Management
----End
Prerequisite
You have queried the performance data to be saved.
Context
If the display type of the measurement report is Table and the report is saved as a HTML file,
the different parameters in the measurement report are saved as a table. If the display type of
the measurement report is Multiple Bar or Curve and the report is saved as a HTML file, the
different parameters in the measurement report are saved as a figure.
Procedure
Step 1 Query the performance measurement data in the Time Distribution Analysis, Compare Time
Analysis, and Global Traffic Flow Analysis windows.
Step 2 In the Performance Data Management window, click Save to open the Save dialog box.
Step 3 In the dialog box that appears, locate a saving path, input a file name, and select a file type.
Step 4 Click Save.
----End
Prerequisite
4-24
Issue 02 (2008-05-31)
4 Performance Management
Procedure
Step 1 Query the performance measurement data in the Time Distribution Analysis, Compare Time
Analysis, and Global Traffic Flow Analysis windows.
Step 2 On the performance data querying interface, click Print to open the Print dialog box.
Step 3 Set the print conditions.
l
The measurement result is a table format: The pages to be printed are selected in the preview
window.
The measurement result is not a table format: Set the print conditions after you select a
view range of the print or preview.
Step 4 Click Print. In the dialog box that appears, set the printing condition, and click OK.
----End
Automatic dumping
There are two modes for dumping the performance data automatically:
l
Periodic dumping
The performance data is dumped periodically according to the set time. The performance
data is dumped to the local disk from the database.
Overflow dumping
When the database capacity for saving the performance data exceeds the set threshold (The
threshold is configured in the $N2000ROOT/server/conf/DataAdminDm.cfg, and the
default value is 80%), the performance measurement system dumps the overflow data. The
system dumps part or all the performance data (the percentage is configured in the
$N2000ROOT/server/conf/DataAdminDm.cfg, and the default value is 20%) to the local
disk from the database.
The immediate dumping indicates that the performance data that is generated earlier than the
specified time is dumped.
4.6.1 Configuring the Default Condition for Automatically Dumping Performance Data
This operation enables you to configure the default condition, such as default period and data
saving path, for automatically dumping the performance data.
4.6.2 Configuring the User-Defined Condition for Automatically Dumping Performance Data
This operation enables you to configure the user-defined condition for automatically dumping
performance data.
4.6.3 Dumping Performance Data Immediately
This operation enables you to dump performance data immediately.
4.6.4 Configuring the Overflow Dump Condition for Performance Data
Issue 02 (2008-05-31)
4-25
4 Performance Management
This operation enables you to configure the overflow dump condition for performance data.
When the performance data in the database exceeds the set threshold for saving the performance
data, the performance measurement system dumps the overflow data.
Context
l
By default, all the MUs that are not configured with the user-defined condition use the
default condition for dumping the performance data. That is, the default dump condition is
valid only for the performance data collected by a new performance measurement task.
The performance measurement system dumps the performance data according to the set
time restriction at 00:00 every day.
You can configure the time for automatically dumping the performance data in the
configuration file. The time is regarded as the automatic dump time.
Procedure
Step 1 Choose Performance > Data Dump > Auto Dump... from the main menu.
Step 2 In the dialog box that appears, click the Default Configuration tab.
Step 3 Configure the default dump condition, as shown in the following figure.
NOTE
If you do not select the Save Data check box, the performance data is deleted from the database directly
without being saved.
Issue 02 (2008-05-31)
4 Performance Management
Prerequisite
The device is added to the N2000 UMS and the performance measurement task is created for
the MU of the device.
Context
The configured user-defined dump condition is valid for all the MUs that have created
performance measurement tasks. The performance measurement system periodically dumps the
performance data according to the configured conditions.
Procedure
Step 1 Choose Performance > Data Dump > Auto Dump... from the main menu.
By default, the Customized Configuration tab is displayed.
Step 2 On the MU Template tree, select a template.
Step 3 Configure the user-defined dump condition, as shown in the following figure.
NOTE
If you do not select the Save Data check box, the performance data is deleted from the database directly
without being saved.
If you want to change the dump condition, click Reset to fast reset the user-defined condition to the
default value.
4-27
4 Performance Management
Prerequisite
The device is added to the N2000 UMS and the performance measurement task is created for
the MU of the device.
Procedure
Step 1 Choose Performance > Data Dump > Prompt Dump... from the main menu.
Step 2 Select a device type from the Device Type drop-down list.
Step 3 Select a template from the Measuring Unit drop-down list.
Step 4 Click
next to the End Data text box, and set from which date (00:00 of the day) all the
collected data is dumped.
Step 5 Select or clear the Save Data check box, as shown in the following figure.
NOTE
If you do not select the Save Data check box, the performance data is deleted from the database directly
without being saved.
4-28
Issue 02 (2008-05-31)
4 Performance Management
Context
You can configure the overflow dump condition by modifying DataAdminDm.cfg in
$N2000ROOT\server\conf. The earliest saved data is dumped each time.
NOTE
$N2000ROOT indicates the installation path of the N2000 UMS on the server. The following uses the
path format on Windows as an example. The path format on Solaris is $N2000ROOT/server/conf.
After modifying the parameters in the configuration file, you need to restart the SysMonitor and data
maintenance process to make the configuration file task effect.
Procedure
Step 1 Open the $N2000ROOT\server\conf\DataAdminDm.cfg file.
Step 2 Set the parameters as follows.
l
Overflow_Dump_Theshhold: The threshold value for saving performance data when the data
overflows. By default, it is 80%.
Overflow_Dump_Percent: The data dumped from the data when the data overflows. By
default, it is 20%.
Context
For the selected measuring units, you need to determine whether the performance data collection
tasks are created. If not, the performance data cannot be collected.
You can query, configure, and modify the northbound interface parameters in the ipms.cfg, and
ipms_NB_Default.cfg files in the $N2000ROOT\server\conf directory. You can query or
configure the following parameters:
l
Issue 02 (2008-05-31)
GENERATION_TIMER_TIME: The generation time of the file. You can query this
parameter in the ipms.cfg configuration file. The format is HHMMSS. For example,
220000 indicates that the northbound interface file is generated at 22:00:00 everyday.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd
4-29
4 Performance Management
DELETION_TIMER_TIME: The time at which the file is deleted. You can query this
parameter in the ipms_NB_Default.cfg configuration file. The format is HHMMSS. For
example, 230000 indicates that the overdue northbound interface file is deleted at 23:00:00
everyday.
BASE_DIR_PATH: The base path of saving the northbound interface file. You can query
this parameter in the ipms.cfg configuration file. For example, D:\imap\nbinterface. If
you do not set this parameter, the northbound interface file is saved in $N2000ROOT
\nbinterface by default. A directory is named by the date, such as \imap\nbinterface
\20051026.
CUSTOMER_ID : This parameter specifies the customer that is currently supported. You
can query this parameter in the ipms.cfg configuration file. For all MU based NBI, the
CUSTOMER_ID is Default.
FORMAT_FILE: This specifies the XML file from which the format of the northbound
interface file must be read. For example, NB_Default_Format.xml. You can query this
parameter in the ipms_NB_Default.cfg configuration file.
NB_DLL_FILE: The specific DLL file that needs to be loaded for NBI of the specific
customer. You can query this parameter in the ipms.cfg configuration file.
If the performance northbound interface is configured, the system generates the northbound
interface file every 60 minutes by default and saves the data of the latest 5 days. You can modify
the parameters by configuring the related configuration file. After modifying the configuration
file, you must restart the performance measurement daemon.
4-30
Issue 02 (2008-05-31)
4 Performance Management
CAUTION
You can set the time related to the performance measurement on the N2000 UMS server, such
as time for generating the file (GENERATION_TIMER_TIME) and the time for deleting the
file (DELETION_TIMER_TIME). The time is not the daylight saving time (DST).
When setting NBINTERFACE_TIMER_INTERVAL_MINS, it is recommended that this
parameter is set greater than or equal to the maximum collection period of the performance data.
Otherwise, the generated northbound interface file may be null.
For the detailed configuration of the performance northbound interface, see the related user guide
of the performance northbound interface.
Procedure
Step 1 Choose Performance > Configure > NorthBound Interface... from the main menu to display
the NorthBound Interface Management dialog box.
Step 2 From the Device Type drop-down list, select the desired device type. In the Version drop-down
list, select the related version to display all the measuring units.
Step 3 Select a measuring unit, right-click, and choose Enable Send Data.
Step 4 In the dialog box that appears, click OK to return to the NorthBound Interface
Management dialog box.
Step 5 Click Refresh.
Step 6 Click Close.
----End
Result
The N2000 UMS generates a northbound interface file of the measured performance data in the
specified path periodically.
Issue 02 (2008-05-31)
4-31
5 FAQ
FAQ
Issue 02 (2008-05-31)
5-1
5 FAQ
Analysis
The aerial view is a minified topology view. Therefore, some nodes in the view may be invisible.
The cause is that the topology view is magnified by a large factor after layout.
Solution
Close the aerial view, and then open it again.
Analysis
A possible cause is the right changes. The device nodes displayed in the topology view are the
devices that you have rights to access upon login. If some other administrators change your rights
at the time, the topology view is not refreshed automatically.
5-2
Issue 02 (2008-05-31)
5 FAQ
Solution
1.
To manage the device, you need to apply for the right from the administrator.
2.
After refreshing the topology view manually, you can see the latest authorized device.
Analysis
The resolution change of the operating system causes the exception of the client GUI display.
Solution
Restart the N2000 UMS client after you change the resolution.
5.1.4 Why Aren't the New Objects Displayed in the Topology View?
Description
The new topology objects, such as devices or submaps, are not displayed in the topology view.
Analysis
There are two possible causes:
l
You add the objects through the service on the server. The data is not synchronized to the
client.
When a device type or a submap type is filtered from the filter tree in the topology view,
the devices or submaps of this type are not displayed. Therefore, if you want the topology
view to display the topology object, select the corresponding type in the filter tree.
1.
The topology view can be automatically refreshed some time after the device is added
(depending on the communication status). If the topology view is not refreshed for a long
time, it indicates that the network status may be unstable and the data packets are lost. Click
Solution
Issue 02 (2008-05-31)
If the type of the device or the submap is filtered from the filter tree, choose View >
Display > Filter Tree and Legend . In the filter tree on the Filter tab, select the
corresponding device or submap type.
5-3
5 FAQ
Analysis
A possible cause is that the service program of the northbound interface is not started.
Solution
Start the northbound interface service through the system monitor client. For the details on the
name of the northbound interface service, see the N2000 UMS Administrator Guide.
Solution
You can use the following methods to solve the problem:
l
Create different submaps and add the topology objects to them. Choose File > New >
Submap.
Arrange the layout of topology view so that the topology view displays the topology objects
regularly. Choose View > Layout.
Create the filter tree templates so that each filter tree displays only the topology objects of
the specified type. Choose View > Display > Filter Tree and Legend.
Analysis
The location of the topology object is changed by other users that have the rights to manage the
topology object.
Solution
Grant the management rights only to the proper users that are qualified for managing the topology
object. For example, grant the rights to manage Device A only to the user and the administrator.
Then other users cannot see Device A in the topology view or change the location of Device A.
5-4
Issue 02 (2008-05-31)
5 FAQ
Analysis
l
The current login user has no operation rights to the menu items.
The menu items are not supported in the current window. For example, Edit > Move to
is gray and unavailable if no corresponding topology object is selected in the topology view.
Learn the functions and operation conditions of the menu items and perform the operations
when the conditions are satisfied.
Solution
5.1.9 Why Are the Devices in the Physical Path Fewer than Those
Found by Auto Discovery?
Description
In auto discovery, the found devices listed in the dialog box are more than those in the physical
path.
Analysis
Before the auto discovery, the devices that use the NE addresses have been created in other
physical path of the topology view. So the devices are not found in the physical path.
Solution
Check if these devices have been created.
Choose Edit > Search to display the Search dialog box. Choose Device in Type, choose NE
Address in Mode. Enter the NE address in decimal mode, such as 10.10.10.10. In this way, you
can query the new device at an NE address.
5-5
5 FAQ
Analysis
To receive the trap reported by the device, the fault service monitors Port 162. If the port is used
by other processes, the fault service fails to start.
Solution
Check if Port 162 is used by other processes with the netstat a command. If it is used by other
processes, you need to stop these processes and restart the fault service.
$ netstat -a | grep 162
.....*.162 ..................Idle
5.2.2 Why Are the Alarm Statistics Displayed on the Alarm Panel
Incorrect?
Description
The statistics on alarms displayed on the alarm panel do not comply with the actual situation.
Analysis
l
The current alarms are acknowledged or cleared and changed into history alarms
automatically. If the alarm statistics on the alarm panel are refreshed before some of the
current alarms are changed into history alarms, the data on the alarm panel may be incorrect.
When deleting resources, you need to change the corresponding alarms to the history
alarms, notify the client to delete the alarm. Also, you have to decide whether to notify the
client to refresh the data on the alarm panel according to InformReqPanelFlag in the
emffault.cfg file. Suppose that the client first receives the refresh notification, and refreshes
the alarm panel accordingly before receiving the notification of deleting the device alarm
from the server. Then this leads to the fact that the data of alarms displayed on the alarm
panel are less than the actual numbers.
In deleting a resource, there may be still alarms reported by the resource. This is because
the alarm was generated before the deletion of the resource, but the alarm arrives later than
you delete the resource. Then such alarm is not stored in the history alarm database.
Therefore, if you refresh the alarm panel after deleting a resource, the numbers displayed
on the alarm panel are less than the actual numbers.
Solution
In the Current Alarms window, clear the Display Latest Alarms check box and click the
Refresh button.
5-6
Issue 02 (2008-05-31)
5 FAQ
Analysis
Check if The Server Requires Account Authentication in Remote Notification is selected.
When the authentication is not required by the mail server, an error occurs if you select the check
box.
Solution
Clear the check box next to The Server Requires Account Authentication in Remote
Notification.
NOTE
In setting the remote notification, you have to ensure the accuracy of the email address, SMTP server,
sending address, user name, and the password. Besides, you also need to make sure whether the mail server
requires account authentication or not.
Analysis
The fault management module supports alarm masking. These alarms probably have been
masked.
Solution
Choose Fault > Settings > NE Alarm/Event Mask to delete the conditions that lead to the
problem.
Analysis
l
Issue 02 (2008-05-31)
The network transmission process cannot ensure the correct sequence of reporting and
clearing alarms. Therefore, when the interval is too short between reporting the alarm and
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd
5-7
5 FAQ
clearing the alarm, the notification for clearing the alarm reaches the NMS before the alarm
itself. This leads to the loss of the cleared alarm in the statistics on the alarm panel.
l
The network transmission process cannot ensure the correct sequences of reporting and
clearing alarms. If you query an alarm before clearing it, then the notification for clearing
the alarm may reach the NMS before the queried results because the of the network
transmission reasons. Thus the cleared alarm is still displayed as uncleared.
Solution
In the Current Alarms window, clear the Display Latest Alarms check box and click
Refresh.
Analysis
In different OSs, special characters have different meanings in file names. The status of a process
is also related to an OS.
Solution
The postprocessing process name is user-defined. Avoid using the said characters in the name.
5-8
Issue 02 (2008-05-31)
3G
3rd Generation
3GPP
A
ACB
ACL
ADSL
AMG
AN
Access Network
ARP
AS
Application Server
ASN.1
ATCA
ATM
ATS
B
BAM
BAS
BCC
BRA
C
Issue 02 (2008-05-31)
A-1
CAR
CBR
CC
Conference Call
CDE
CG
Charging Gateway
CN
Core Network
CNM
CRC
CSC
D
DD
Database Description
DHCP
DMM
DMS
DNS
DSL
E
EAU
EC
Echo Cancellation
EMF
EML
EMS
ETS
ETSI
A-2
FAX
Facsimile
FE
Fast Ethernet
FR
Frame Relay
FTP
Issue 02 (2008-05-31)
G
GGSN
GMSC
GPRS
GSM
GSN
GUI
H
HDLC
HLR
HSS
Issue 02 (2008-05-31)
IAD
IADMS
iCG
ICMP
ID
Identification/Identity
IEEE
IFMI
IGMP
IMA
IMS
IP Multimedia Subsystem
IMT-2000
IN
Intelligent Network
IP
Internet Protocol
IPoA
IP over ATM
ISDN
ISO
ITC
A-3
ITU
Iu
Iu Interface
L
LAN
LE
Local Exchange
LL
Logical Link
LLC
LMT
M
M2000
iManager M2000
MA
Multi-service Access
MAC
MG
Media Gateway
MGC
MGCP
MIB
MML
Human-Machine Language
MODEM
MOdulator-DEModulator
MRP
MRS
MSC
MTBF
MTC
MPEG Transcoder
MTTR
A-4
NAT
NGN
NML
NMS
Issue 02 (2008-05-31)
NN
Network Node
NNI
O
OAM
OMU
O&M,OM
OMC
OSS
OSTA
P
PC
Personal Computer
PDU
POTS
PPP
Peer-Peer Protocol
PPPoE
PRA
PSTN
PVC
PVC
PVP
Q
QoS
Quality of Service
Issue 02 (2008-05-31)
RAM
RAS
RM
Resource Manager
RNC
RSTP
A-5
RTCP
RTP
S
SAP
SAPI
SCH
Synchronization Channel
SCP
SGSN
SMC
SMS
SQL
SDH
SIP
SML
SMTP
SNMP
Softswitch
Softswitch
T
TC
Transcoder
TCAP
TCP
TDM
TDT
TOS
Type of Service
TMN
TMSI
TTL
Time to Live
TUP
A-6
Issue 02 (2008-05-31)
UE
User Equipment
UDP
UI
User Interface
UMG
UMSC
UMTS
UNI
UTC
V
VC
Virtual Channel
VCI
VLAN
VLR
VMSC
VPI
VPN
W
WAP
X
XML
Issue 02 (2008-05-31)
A-7
Index
Index
A
adding device
in batch, 2-14
periodically, 2-16
alarm
acknowledging, 3-30
alarm auto processing, 3-37
alarm reporting procedure, 3-5
alarm status, 3-4
auto acknowledgement, 3-37
auto synchronization, 3-38
clearing, 3-33
notification methods, 3-53
panel, 3-65
redefine, 3-39
setting alarm color, 1-14, 3-56
setting alarm local display properties, 1-15
setting alarm sound, 3-55
severity, 3-4
type, 3-5
view alarm detail, 3-29
alarm auto processing
setting NMS alarm/event mask, 3-41
alarm box
setting, 3-54, 3-67
stopping the alarm sound, 3-68
synchronizing, 3-69
alarm panel
displaying, 3-65
setting the alarm panel style, 3-53, 3-66
alarm remote notification
add a remote notification rule, 3-59
setting parameters for, 3-58
alarm template
creating alarm statistics template, 3-10
creating alarm/event browse template, 3-8
alarms/events
mask, 3-40
postprocess, 3-42
auto dump
alarm data, 3-60
event data, 3-61
Issue 02 (2008-05-31)
B
basic attribute of a topological link
modifying, 2-26
browsing
current alarm, 3-18, 3-27
event, 3-21
history alarms, 3-19
C
changing current user password, 1-3
changing login server, 1-11
classification of topological links, 2-20
client
automatic lock, 1-17
manual lock, 1-18
unlock, 1-18
client GUI
set date format, 1-16
set main window title, 1-12
set output information, 1-12
set time format, 1-15
shortcut conventions, 1-8
collect alarm statistics manually, 3-16
configuring
performance northbound interface, 4-29
D
device
adding, 2-12
deleting, 2-34
modifying, 2-34
setting maintenance information, 2-17
viewing information of, 2-40
device type definition, 4-5
display client on top, 3-57
dual home topological link
displaying, 2-23
dumping performance data
default condition for automatic dump, 4-26
immediate dump, 4-28
i-1
Index
E
example
alarm handle, 3-35
browsing environment alarm, 3-24
browsing performance threshold alarm, 3-23
browsing the N2000 UMS alarms, 3-23
setting up network topology, 2-35
exit, 1-19
F
flow
monitoring device performance, 4-16
I
IMS Diameter topological link
displaying, 2-23
hiding, 2-24
IMS management topological link
displaying, 2-23
hiding, 2-24
IMS SIP topological link
displaying, 2-23
hiding, 2-24
L
license
query license information, 1-19
link
creating, 2-11
link type
IMS Diameter topological link, 2-21
IMS management topological link, 2-21
IMS SIP topological link, 2-22
virtual topological link, 2-22
log
log out, 1-19
set automatic login, 1-10
M
managing performance measurement tasks, 4-7
manual dump
alarms, 3-62
events, 3-63
master/slave gateway registry topological link
displaying, 2-23
mode of viewing topology, 2-37
monitoring alarm
through the alarm panel, 3-14
through the topology view, 3-13
monitoring device performance, 4-15
i-2
N
N2000 UMS client
menu bar, 1-5
status bar, 1-8
P
performance data
dumping, 4-25
performance measurement
concept, 4-2
GUI, 4-6
time distribution comparison measurement, 4-23
time distribution measurement, 4-21
performance measurement principles
IMS Devices, 4-5
performance measurement task
managing, 4-7
querying basic information about a task, 4-8
querying measuring objects, 4-9
performance threshold record
creating, 4-19
performance threshold template
creating, 4-16
printing
performance data, 4-14
performance measurement result, 4-24
Process
Construct the network topology, 2-7
Q
querying device maintenance information, 3-32
querying performance data
basic time segment, 4-10
user-defined condition, 4-10
querying the maximum and minimum performance
values, 4-12
R
Record alarm maintenance experiences, 3-34
refreshing
single/aggregated topological link, 2-27
S
saving
performance data, 4-13
performance measurement result, 4-24
set auto display of message on alarms, 3-57
setting alarm/event correlation rule
acknowledged and uncleared time analysis, 3-48
correlation analysis, 3-44
frequency analysis, 3-46
intermittent alarm and repeat event analysis, 3-47
Issue 02 (2008-05-31)
Index
submap
creating, 2-9
deleting, 2-32
modifying, 2-31
synchronizing topological links from the ATCA
devices, 2-27
T
topological link
aggregating, 2-28
displaying, 2-23
expanding, 2-28
hiding, 2-24
querying, 2-25
topology
design, 2-9
icons, 2-5
searching topology object, 2-38
set the topology background, 2-7
topology view
adjust, 2-42
filter display, 2-38
print, 2-44
refresh, 2-35
setting display effect, 1-13
setting feature, 1-13
setting layout, 2-42
V
view
aerial, 2-42
creating custom view, 2-47
link information, 2-41
move, 2-46
returning to the parent topology view, 2-44
submap information, 2-40
virtual topological link
adding, 2-28
deleting, 2-30
displaying, 2-23
hiding, 2-24
Issue 02 (2008-05-31)
i-3